paper_id
stringlengths
9
16
version
stringclasses
26 values
yymm
stringclasses
311 values
created
timestamp[s]
title
stringlengths
6
335
secondary_subfield
sequencelengths
1
8
abstract
stringlengths
25
3.93k
primary_subfield
stringclasses
124 values
field
stringclasses
20 values
fulltext
stringlengths
0
2.84M
1809.07685
1
1809
2018-08-09T10:12:48
Finding Explanations of Entity Relatedness in Graphs: A Survey
[ "cs.SI" ]
Analysing and explaining relationships between entities in a graph is a fundamental problem associated with many practical applications. For example, a graph of biological pathways can be used for discovering a previously unknown relationship between two proteins. Domain experts, however, may be reluctant to trust such a discovery without a detailed explanation as to why exactly the two proteins are deemed related in the graph. This paper provides an overview of the types of solutions, their associated methods and strategies, that have been proposed for finding entity relatedness explanations in graphs. The first type of solution relies on information inherent to the paths connecting the entities. This type of solution provides entity relatedness explanations in the form of a list of ranked paths. The rank of a path is measured in terms of importance, uniqueness, novelty and informativeness. The second type of solution relies on measures of node relevance. In this case, the relevance of nodes is measured w.r.t. the entities of interest, and relatedness explanations are provided in the form of a subgraph that maximises node relevance scores. This paper uses this classification of approaches to discuss and contrast some of the key concepts that guide different solutions to the problem of entity relatedness explanation in graphs.
cs.SI
cs
Finding Explanations of Entity Relatedness in Graphs: A Survey Raoul Biagioni1*, Pierre-Yves Vandenbussche2, V´ıt Nov´acek1, 1 Fujitsu Ireland Ltd., Co. Dublin, Ireland 2 Insight Centre for Data Analytics at NUI Galway, Co. Galway, Ireland * [email protected] Abstract Analysing and explaining relationships between entities in a graph is a fundamental problem associated with many practical applications. For example, a graph of biological pathways can be used for discovering a previously unknown relationship between two proteins. Domain experts, however, may be reluctant to trust such a discovery without a detailed explanation as to why exactly the two proteins are deemed related in the graph. This paper provides an overview of the types of solutions, their associated methods and strategies, that have been proposed for finding entity relatedness explanations in graphs. The first type of solution relies on information inherent to the paths connecting the entities. This type of solution provides entity relatedness explanations in the form of a list of ranked paths. The rank of a path is measured in terms of importance, uniqueness, novelty and informativeness. The second type of solution relies on measures of node relevance. In this case, the relevance of nodes is measured w.r.t. the entities of interest, and relatedness explanations are provided in the form of a subgraph that maximises node relevance scores. This paper uses this classification of approaches to discuss and contrast some of the key concepts that guide different solutions to the problem of entity relatedness explanation in graphs. 1 Introduction Graphs can conveniently represent large amounts of information as networks of rela- tionships between objects. Structuring information as a graph allows to search for relationships between some entities of interest. However, in large graphs, information may range from trivial to meaningful, and a need thus exists for extracting only those relationships that are relevant and meaningful in a particular context. For example, a graph of biological pathways can be used for discovering a previously unknown re- lationship between two proteins. Domain experts, however, may be reluctant to trust such a discovery without a detailed explanation as to why exactly the two proteins are deemed related in the graph. Judgement of what constitutes a relationship, and what is meaningful and non-trivial is nonetheless a subjective matter. For this reason solutions have been proposed in the literature to find meaningful and non-trivial relationships between entities of interest in objective ways. In this paper we provide an overview of the types of solutions, their associated methods and strategies proposed for finding such relationships, henceforth referred to as entity relatedness explanations. 1/10 1.1 Focus of this Paper The focus of this paper is to present and discuss strategies and methods that are able to select relevant relationships between entities of interest in a graph in order to make the knowledge embedded in a graph more usable e.g. for visualisation or analytical purposes. Although this paper does not claim to be exhaustive, it provides an overview of key methods that are representative solutions to this problem. We distinguish two solutions to the problem of finding entity relatedness explanations. The first type of solution relies on information inherent to the paths connecting the entities. This type of solution provides entity relatedness explanations in the form of a ranked list of relevant paths. The rank of a path is measured in terms of importance, uniqueness, novelty and informativeness. The second type of solution relies on measures of node relevance. In this case, the relevance of a node is measured w.r.t. the entities of interest and related- ness explanations are provided in the form of an explanation subgraph that maximises node relevance scores. This paper uses this classification of approaches to discuss and contrast some of the key concepts that guide different solutions to the problem of entity relatedness explanation in graphs. 1.2 Summary of Contributions The main contributions of this survey are the following: • We identify two possible solutions to the problem of entity relatedness explanations in graphs. One focusing on the graph theoretic and, where applicable, semantic information inherent to the path connecting entities of interest; the second focusing on finding one or more optimal subgraphs by measuring the relevance of nodes w.r.t. entities of interest. • For each solution type, we provide a synthesis of core methods and strategies. • Finally we discuss the assumptions underpinning the graph theoretic concepts from which solutions are derived and how these assumptions may or may not be applicable to the entity relatedness explanation problem. To the best of the authors' knowledge only one similar survey of entity relatedness explanations in graphs exists [3]. To explain the relationships among entities of inter- est, the survey groups papers by whether solutions to finding relatedness explanations concern two entities of interest, or whether they concern two or more entities. In this survey we extend this view by framing the discussion around the strategies and rationale behind identifying and extracting relevant relationships between entities of interest. The requirement for this survey emanated from a specific biomedical research case. As part of this research a knowledge graph of biomedical entities had been assembled from multiple heterogeneous data sources. However, finding relevant relationships for two given entities of interest, among the myriad of paths connecting those entities was challenging and prompted the requirement for surveying the existing entity relatedness literature in search for possible solutions. Relevant research publications were selected through a process of reference exploration, starting from two seed papers [16, 17]. From the seed paper, related works references were repeatedly explored with the goal of finding papers that discuss directly or indirectly the entity relatedness explanation problem. The initial search returned 336 articles and 19 met the requirement for detailed review. 1.3 Organisation of this Paper This paper is organised around the two proposed types of solutions to the problem of finding entity relatedness explanations in a graph. Section 2 introduces relevant paths 2/10 extraction, a solution that retrieves explanations in the form of a list of ranked paths. Section 3 introduces relevant subgraph extraction, a solution that retrieves entity relat- edness in the form of optimised subgraphs. We propose to distinguish between maximal relevance (Section 3.1), minimum cost (Section 3.2) and node grouping (Section 3.3) strategies. Finally, in Section 4 we discuss and contrast some of the key concepts that guide both relevant paths and relevant subgraph extraction solutions. 2 Relevant Paths Extraction One possible solution to the entity relatedness explanation problem is to consider all paths that connect two entities of interest and to identify those paths that best explain the relationship between those entities. Relatedness of nodes in paths w.r.t. entities of interest is assumed and the task is to rank paths in terms of their relevance to the context, their uniqueness, novelty and informativeness. This is achieved by exploiting graph theoretic, statistical and semantic information embedded in paths. Relevant paths extraction solutions are limited to two entities of interest. The research areas covered by relevant paths extraction solutions include literature- based discovery (LBD) [23], link discovery [12] and the Semantic Web [2, 4, 16, 17]. Examples of input graphs used include co-citation graphs [12] and biochemical net- works [23]. Input graphs used in Semantic Web research papers are based on the Resource Description Framework (RDF), a data model based on named relationships between resources [2]. A well known example of an RDF-based input graph is Freebase and DBPedia. The primary graph theoretic measures used for path ranking are node degree and path length. Node degree is considered indicative of e.g. activity in a social network or interaction in a genetic regulatory network. High node degree suggests importance and paths containing such nodes are ranked higher. For example, in [23], the importance of a given path is scored using the arithmetic sum of the degree centrality values dc for all n nodes B in the path (Eq. 1). score = X dc(Bn) n (1) The length of paths connecting entities of interest is used as a proxy measure for association strength. The shorter a path, the stronger the association. However, a strong association does not necessarily lead to a higher rank. In certain contexts one may want to give preference to weak associations i.e. long paths. For example, as described in [2], money laundering involves transactions that may change several hands. Hence, in a graph representing financial transactions, one may want to include long paths in a relatedness explanation for sender and receiver entities. For this reason, the authors define the weight L of a path A such that the contribution of a path's length to its rank be informed by whether preference should be given to short (Eq. 2a) or long paths (Eq. 2b), where length(A) is the number of nodes in A. LA = LA = 1 − 1 length(A) 1 length(A) (2a) (2b) Statistical path scoring measures are based on frequency of occurrence counts, e.g. the number of similar paths [12], the number of nodes in a path [2], or the number of edges in a path [4]. In [12] and [4], low frequency of occurrence counts represent 3/10 rarity and specificity. Similarly, in [16], high frequency of occurrence counts represent diversity. In this case, the authors use the frequency of occurrence of nodes and edges to define path diversity and path informativeness measures. Path informativeness is based on the frequency of occurrence of edges and the inverse frequency of occurrence of nodes [16]. Path diversity σ is measured by the ratio of common labels to the total number of labels between two paths π1 and π2 (Eq. 3). Both measures are complementary. Path diversity ensures that paths with rare edges, potentially discarded if they appear in paths with low informativeness, are retained. As illustrated by this example, statistics-based ranking is typically framed in terms of conceptual ideas. The properties of information associated with those concepts are novelty, uniqueness, non- triviality and informativeness. In general, those properties are deemed desirable and result in a higher rank. σ(π1, π2) = Labels(π1) ∩ Labels(π2) Labels(π1) ∪ Labels(π2) (3) Path ranking measures are often used in combination. For example, in [2], the overall frequency of occurrence rari of a node i in an input graph is combined with the association length weight LA described above to produce an overall weight of path rarity RA (Eq. 4a for short and Eq. 4b for long paths). RA = 1 length(A) RA = 1 − 1 length(A) length(A) X i=1 length(A) X i=1 rari rari (4a) (4b) Similarly, [4] and [17] combine measures of specificity and of diversity. Specifically, where a graph is composed of multiple schemas (i.e. domains), this information can be used to determine whether a given path "spans" several domains. The more schemas are covered by the edges in a path, the higher the rank. Lastly, semantic information is extracted, where applicable, from RDF [17] and ontology schema hierarchy [2]. Such hierarchies represent a partial ordering of entities and, the deeper an entity lies in the hierarchy, the more specific or informative it is. 3 Relevant Subgraph Extraction A second approach to solving the entity relatedness explanation problem is to extract a subgraph such that its nodes are as relevant as possible to some entities of interest. We distinguish between strategies that focus on maximal relevance (Section 3.1), min- imum cost (Section 3.2) and node grouping (Section 3.3) methods. Relevant subgraph extraction is suited to cases with more than two entities of interest e.g. Q = {q1, ..., qn} or with two sets of entities Q1 and Q2. The research areas covered by relevant subgraph extraction solutions include data mining [13], knowledge discovery [11], graph mining [18], graph theory [1] and graph databases [7, 8]. Examples of input graphs used in the reviewed papers include domain- specific knowledge bases, social networks, food networks, protein-protein interaction networks, co-authorship graphs. 3.1 Maximal Relevance Approaches Maximal relevance approaches select an explanation subgraph by maximising a good- ness function that measures and optimises the relevance of candidate subgraphs. The 4/10 relevance of a subgraph is assessed through the relevance and/or importance of its con- stituent nodes. Relevance relates to the entities of interest, importance relates to the network as a whole. A globally important node may be one that acts as an important information bridge, authority or hub; as opposed to nodes that are isolated, with little influence on the rest of the network. The importance and relevance of nodes is used to search for the most informative explanation subgraph. The computation of importance and relevance scores is discussed next. 3.1.1 Node Scoring Node relevance scores are typically computed using random walk (RW) [6,7,9,11,19,21, 22]. The RW method allows to compute a probability distribution over the set of nodes in a graph. This probability information can be used to measure node relevance i.e. how much each node contributes to the relationships with the nodes of interest. RW-based methods are also suitable for measuring the overall, or global, importance of nodes [6,13] in a graph. In this case a small probability is assigned to the walker "jumping" to any node in the graph, rather than moving to an adjacent node. A well-known example is PageRank [15]. The most commonly used random walk "flavour" is Random Walk with Restart (RWR) [6, 7, 11, 13, 22]. Another similar type of random walk, the Absorbing Random Walk (ARW) is proposed in [9]. In a RWR, a small probability is assigned to the walker restarting the walk from where it began. This restart probability makes the RWR method an attractive choice in light of the "w.r.t. entities of interest" aspect of node relevance scoring. In an ARW, a walker stops (i.e. is absorbed) when an entity of interest is reached. ARW is used to compute the expected number of times a node is used when randomly walking through the graph, starting from one entity of interest until eventually being absorbed by a distinct entity of interest. The relevance of a node is proportional to these quantities. The relevance r of a node j w.r.t. the entire set Q of entities of interest qi ∈ Q can be computed, as seen in e.g. [21], by multiplying individual pair-wise relevance scores (Eq. 5). r(Q, j) = Q Y i=1 r(i, j) (5) The above approach has, however, one potential weakness. It assumes that candidate explanatory nodes have a relationship with all entities of interest. This can be addressed by relaxing the way in which node relevance w.r.t. the entire set of entities of interest [21] allow for two additional scenarios. Node relevance may is computed. For example, relate to at least one (Eq. 6) or to at least k entities of interest, where k (1 ≤ k ≤ Q). The same idea is adopted in [19]. In their paper, the authors propose entity relatedness explanations for two sets of entities of interest Q1 and Q2. The authors search for "central nodes" to which entities of interest are related in some relevant way e.g. through common geo-political events. An essential aspect of the methodology consists of relaxing the stringency requirements on how many of the entities of interest in each of the sets must exhibit such commonalities with the central nodes. r(Q, j) , r(Q, j, 1) = 1 − Q Y i=1 (1 − r(i, j)) (6) 5/10 3.1.2 Subgraph Optimisation Methods that provide entity relatedness explanations in the form of a subgraph H [6,10, 13, 21] are designed such as to maximise the "goodness" of this subgraph (Eq. 7). The goodness of H is measured by the sum of the relevance scores of the nodes it contains (Eq. 8) where r(Q, j) is the relevance score of node j w.r.t. all nodes of interest in Q. H ∗ = argmaxH g(H) g(H) = X r(Q, j) j∈H (7) (8) The above approach can easily be adapted to cases where the relatedness explanation is composed of more than one subgraph. This case is illustrated in [13]. The authors partition the input graph into k groups (P1 to Pk). In this case, the goodness of H is measured by the sum of the maximised goodness score of each group Pi where Q′ Pi is a subset of Q and all the nodes in Q′ Pi belong to Pi (Eq. 9). g(H) = X X r(j, Q′ Pi ) Pi j∈Pi (9) 3.2 Minimum Cost Approaches Minimum cost approaches select relevant subgraphs based on the assumption that re- lated nodes are close to each other. The proposition made is that entity relatedness explanations can be extracted by interconnecting the entities of interest through short- est paths, subject to the input graph being fully connected. The minimum cost approach minimises the number of edges (for unweighted graphs) or the weights of the edges (for weighted graphs) in the subgraph. The resulting subgraph is known as a spanning tree and the problem of producing a spanning tree for a set of entities of interest is known as the Steiner Tree problem. Authors that frame the entity relatedness explanation problem as a Steiner Tree problem include [1, 7, 11, 18]. 3.3 Node Grouping As described in Section 3.1.1, explanatory nodes may not necessarily be related to all entities of interest and a possible solution for dealing with this scenario is to relax relevance requirements. In this section, we briefly describe an alternative solution, namely grouping nodes, that have high relevance w.r.t. each other [1, 7, 8, 13]. In this case, the intention is to spread entities of interest across groups. This then allows for connecting paths to be restricted to a subset of entities of interest at a time before inter-connecting the groups. A diverse and eclectic set of methods has been proposed in the literature to achieve this task. In [7], nodes are grouped by their correlation to one of the entities of interest. For each entity of interest q, the authors find a set of nodes that are pair-wise correlated to q. A pair of nodes u and v are correlated if r(u, v) ≥ σ and r(v, u) ≥ σ, where σ is a predefined minimum relevance threshold. Other methods include clustering nodes into domain-specific communities [8], grouping nodes based on density of linkages [13], methods based on Information Theory [1] and methods based on flow information in networks [8]. Approaches to inter-connecting groups of related nodes include minimum cost methods [7]. 6/10 4 Discussion and Conclusion In this paper, we presented a survey of strategies and methods for finding entity related- ness explanations in graphs. We identified two possible solutions to this problem. One focusing on graph theoretic and semantic information embedded in paths connecting entities of interest; the second focusing on finding an optimal subgraph in which the relevance scores of nodes w.r.t. entities of interest is maximised. In this Section, we discuss and contrast some of the key concepts that guide both the relevant paths and relevant subgraph extraction solutions. 4.1 Relevance and Shortest Paths An interesting observation made in the process of this survey is the lack of adoption of some of the traditional node centrality measures such as closeness 1 and betweenness 2. This may appear surprising at first considering how node centrality is a fundamental measure for understanding the roles played by nodes in networks [14]. The lack of adop- tion can be explained by the fact that graph centrality measures assume that information travels along shortest paths. However, adopting this assumption without considering the nature of the information being represented as a graph may be problematic. For example, in an industry-news network on the one hand, the shortest path is known and information travels in a targeted manner. On the other hand, in a social network, gos- sip propagates without specific target; using shortest path-based centrality measures to explain the flow of gossip is likely to produce low quality results [5]. Similarly, in many of the domains in which entity relatedness explanation are sought, information does not take any sort of ideal path from source to target and, in such cases, node centrality measures could fail to adequately model entity relationships [10]. Whether shortest paths methods are deemed applicable to the entity relatedness problem differs among authors. For example, in [6] and in [11], shortest paths are used as indicators of relevance that adequately capture entity relatedness while in [4] preference is given to long paths because they are seen as more specific thus "more likely to reveal rare and uncommon associations" between entities of interest. The solution proposed in [2] allows for both views. Shorter paths are seen as representing direct relationships, while longer paths represent indirect relationships. Both direct and indirect relationships can be meaningful, depending on the problem at hand, and it is up to the practitioners to define their preference. How can the ambivalence concerning the use of shortest paths as means of extracting relatedness explanations from graphs be addressed? Is it more useful to try extracting relatedness explanations by modelling information flow as a random process? Indeed, in [9] and in [14] it is argued that, if information flows randomly, then contributions from all paths, not just the shortest, should contribute to entity relatedness explanations. It is precisely this observation which led to the prevalence of RW-based methods in relevant subgraph extraction methods. RW-based methods allow to compute node relevance scores on all possible ways to connect entities of interest, each way having a certain likelihood, rather than relying only on shortest distance. 4.2 The Subjective Nature of Relevance Whether a relatedness explanation is relevant is, as noted in Section 1, a matter of subjective judgement. Different people will almost certainly have differing notions of 1Closeness is the mean shortest-path distance between a node and all other nodes reachable from it [14]. 2Betweenness is calculated as the fraction of shortest paths between node pairs that pass through the node of interest [14]. 7/10 relevance. An entity relatedness explanation grounded in LBD will need to be based on the uncommon and novel in order to support the discovery of new, yet unknown relationships. In this case, solutions and methods that favour nodes in a graph that have low degree will be preferred because high degree can be seen as a weak measure because a node through which many entities are connected is too general for contributing to succinctly explain how entities of interest are related [20]. Conversely, an entity relatedness explanation which deals with biological knowledge such as a gene interaction graph will need to take into account that high connectivity is an important property of the underlying graph [23]. In this case, high node degree is desirable and is seen as an appropriate indicator of relevance. The above example illustrates that there is no one correct answer to the question whether high, or low, node degree is a good indicator of relevance. The advantage of relevant paths extraction over relevant subgraph extraction lies in that the former allows to more easily adapt to the configurations deemed most appropriate for a given context. Specifically, entity relatedness explanations are configurable through the path ranking scheme inherent to the relevant paths extraction. Examples of papers that implemented relevant paths extraction solutions as configurable, user-driven and interactive applica- tions include [2, 4, 16, 17]. In contrast, relevant subgraph extraction allows for only limited "tuning" to account for subjective notions of relevance. The advantages of this type of solution over relevant paths extraction are two-fold. First, relevant subgraph extraction methods allow for more than two entities of interest to be specified. Second, as discussed in Section 4.1, the way in which information flow is modelled, namely as a random process, can be seen as a more adequate way of representing knowledge in graphs. 4.3 Final Remarks In Section 1.2, we described how the requirement for this survey arose from the chal- lenges associated with manually inspecting the myriad of connecting paths between entities of interest in a graph. The solutions, methods and strategies described in this paper can help practitioners make decisions in a more informed way when faced with implementing solutions to the task of explaining the relationships between entities of interest. Based on the input graph at hand, the particularities of the context and the information represented, our paper helps practitioners assess which one of the two types of solutions, and their corresponding methods and strategies best suits their needs and context. Acknowledgements The work presented in this paper was supported by the TOMOE project funded by Fu- jitsu Laboratories Ltd., Japan and Insight Centre for Data Analytics at National Univer- sity of Ireland Galway (supported by the Science Foundation Ireland grant 12/RC/2289). References 1. L. Akoglu, D. H. Chau, J. Vreeken, N. Tatti, H. Tong, and C. Faloutsos. Mining Connection Pathways for Marked Nodes in Large Graphs. In Proceedings of the 2013 SIAM International Conference on Data Mining, pages 37 -- 45. Society for Industrial and Applied Mathematics, 2013. 8/10 2. B. Aleman-Meza, C. Halaschek-Weiner, I. B. Arpinar, C. Ramakrishnan, and A. P. Sheth. Ranking complex relationships on the semantic Web. IEEE Internet Computing, 9(3):37 -- 44, 2005. 3. N. M. K. Alsudairy, V. V. Raghavan, A. M. Hafez, and H. I. Mathkour. Connec- tion Subgraphs: A Survey. Journal of Applied Sciences, 11:3221 -- 3232, 2011. 4. K. Anyanwu, A. Maduko, and A. Sheth. SemRank: Ranking Complex Relation- ship Search Results on the Semantic Web. In Proceedings of the 14th International Conference on World Wide Web, WWW '05, pages 117 -- 127. ACM, 2005. 5. S. P. Borgatti. Centrality and network flow. Social Networks, 27(1):55 -- 71, 2005. 6. C. Chen, G. Wang, H. Liu, J. Xin, and Y. Yuan. SISP: A New Framework for Searching the Informative Subgraph Based on PSO. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management, CIKM '11, pages 453 -- 462. ACM, 2011. 7. J. Cheng, Y. Ke, and W. Ng. Efficient Processing of Group-oriented Connection Queries in a Large Graph. In Proceedings of the 18th ACM Conference on Infor- mation and Knowledge Management, CIKM '09, pages 1481 -- 1484. ACM, 2009. 8. J. Cheng, Y. Ke, W. Ng, and J. X. Yu. Context-Aware Object Connection In 2009 IEEE 25th International Conference on Discovery in Large Graphs. Data Engineering, pages 856 -- 867, 2009. 9. P. Dupont, J. Callut, G. Dooms, J.-N. Monette, Y. Deville, and B. P. Sainte. Rel- evant subgraph extraction from random walks in a graph. Universite Catholique de Louvain, UCL/INGI, Research Report RR, 380167, 2006. 10. C. Faloutsos, K. S. McCurley, and A. Tomkins. Fast discovery of connection subgraphs. In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '04, pages 118 -- 127. ACM, 2004. 11. G. Kasneci, S. Elbassuoni, and G. Weikum. MING: Mining Informative Entity Relationship Subgraphs. In Proceedings of the 18th ACM Conference on Infor- mation and Knowledge Management, CIKM '09, pages 1653 -- 1656. ACM, 2009. 12. S.-d. Lin and H. Chalupsky. Unsupervised link discovery in multi-relational data In Third IEEE International Conference on Data Mining, via rarity analysis. pages 171 -- 178, 2003. 13. H. Liu, C. Chen, J. Xin, and L. Zhang. Searching the Informative Subgraph Based on the PeakGraph Model. The Computer Journal, 59(8):1207 -- 1219, 2016. 14. M. E. J. Newman. A measure of betweenness centrality based on random walks. Social Networks, 27(1):39 -- 54, 2005. 15. L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab, 1999. 16. G. Pirr´o. Explaining and Suggesting Relatedness in Knowledge Graphs. In The Semantic Web - ISWC 2015, Lecture Notes in Computer Science, pages 622 -- 639. Springer, Cham, 2015. 17. C. Ramakrishnan, W. H. Milnor, M. Perry, and A. P. Sheth. Discovering Infor- mative Connection Subgraphs in Multi-relational Graphs. ACM SIGKDD Explo- rations Newsletter, 7(2):56 -- 63, 2005. 9/10 18. N. Ruchansky, F. Bonchi, D. Garcia-Soriano, F. Gullo, and N. Kourtellis. To be connected, or not to be connected: That is the minimum inefficiency subgraph problem. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, CIKM '17, pages 879 -- 888. ACM, 2017. 19. S. Seufert, K. Berberich, S. J. Bedathur, S. K. Kondreddi, P. Ernst, and G. Weikum. ESPRESSO: Explaining Relationships Between Entity Sets. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, CIKM '16, pages 1311 -- 1320. ACM, 2016. 20. P. Shiralkar, A. Flammini, F. Menczer, and G. L. Ciampaglia. Finding streams in knowledge graphs to support fact checking. In 2017 IEEE International Con- ference on Data Mining, ICDM 2017, New Orleans, LA, USA, November 18-21, 2017, pages 859 -- 864, 2017. 21. H. Tong and C. Faloutsos. Center-piece Subgraphs: Problem Definition and Fast Solutions. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '06, pages 404 -- 413. ACM, 2006. 22. H. Wang, C. K. Chang, H.-I. Yang, and Y. Chen. Estimating the Relative Impor- tance of Nodes in Social Networks. Journal of Information Processing, 21(3):414 -- 422, 2013. 23. B. Wilkowski, M. Fiszman, C. M. Miller, D. Hristovski, S. Arabandi, G. Rosem- blat, and T. C. Rindflesch. Graph-Based Methods for Discovery Browsing with Semantic Predications. AMIA Annual Symposium Proceedings, 2011:1514 -- 1523, 2011. 10/10
1603.09164
1
1603
2016-03-30T13:00:15
Spider and the Flies : Focused Crawling on Tumblr to Detect Hate Promoting Communities
[ "cs.SI" ]
Tumblr is one of the largest and most popular microblogging website on the Internet. Studies shows that due to high reachability among viewers, low publication barriers and social networking connectivity, microblogging websites are being misused as a platform to post hateful speech and recruiting new members by existing extremist groups. Manual identification of such posts and communities is overwhelmingly impractical due to large amount of posts and blogs being published every day. We propose a topic based web crawler primarily consisting of multiple phases: training a text classifier model consisting examples of only hate promoting users, extracting posts of an unknown tumblr micro-blogger, classifying hate promoting bloggers based on their activity feeds, crawling through the external links to other bloggers and performing a social network analysis on connected extremist bloggers. To investigate the effectiveness of our approach, we conduct experiments on large real world dataset. Experimental results reveals that the proposed approach is an effective method and has an F-score of 0.80. We apply social network analysis based techniques and identify influential and core bloggers in a community.
cs.SI
cs
Spider and the Flies : Focused Crawling on Tumblr to Detect Hate Promoting Communities Indraprastha Institute of Information Technology, Swati Agarwal Delhi (IIIT-D), India [email protected] Ashish Sureka ABB Corporate Research Labs Bangalore, India [email protected] 6 1 0 2 r a M 0 3 ] I S . s c [ 1 v 4 6 1 9 0 . 3 0 6 1 : v i X r a ABSTRACT Tumblr is one of the largest and most popular microblog- ging website on the Internet. Studies shows that due to high reachability among viewers, low publication barriers and so- cial networking connectivity, microblogging websites are be- ing misused as a platform to post hateful speech and re- cruiting new members by existing extremist groups. Manual identification of such posts and communities is overwhelm- ingly impractical due to large amount of posts and blogs being published every day. We propose a topic based web crawler primarily consisting of multiple phases: training a text classifier model consisting examples of only hate pro- moting users, extracting posts of an unknown tumblr micro- blogger, classifying hate promoting bloggers based on their activity feeds, crawling through the external links to other bloggers and performing a social network analysis on con- nected extremist bloggers. To investigate the effectiveness of our approach, we conduct experiments on large real world dataset. Experimental results reveals that the proposed ap- proach is an effective method and has an F-score of 0.80. We apply social network analysis based techniques and identify influential and core bloggers in a community. Keywords Hate and Extremism Detection, Information Retrieval, Mi- croblogging, Mining User Generated Content, Online Radi- calization, Social Network Analysis, Topical Crawler 1. INTRODUCTION Tumblr is the second largest microblogging platform, has gained phenomenal momentum recently. It is widely used by fandoms: communities of users having similar interests in various TV shows and movies [15]. Therefore, it is especially popular among young generation users and provides them a platform to discuss daily events. They communicate by blogging and publishing GIF images as their reactions and emotions on several topics [5]. According to Tumblr statis- tics 2015 1, over 219 million blogs are registered on Tumblr and 420 million are the active users. 80 million posts are be- ing published everyday, while the number of new blogs and subscriptions are 0.1 million and 45 thousands respectively. Tumblr is also posed as a social networking website that facilitates users to easily connect to each other by following other users and blogs without having a mutual confirmation. Bloggers can also communicate via direct messages that can be sent privately or can be posted publicly using 'ask box'. It facilitates bloggers to send these messages anonymously if they don't want to reveal their Tumblr identity [13]. Sim- ilar to other social networking websites, Tumblr has very low publication barriers. A blogger can publish a new post and can re-blog an existing public post which is automati- cally broadcasted to it's followers unless it is enabled as a private post [7]. The type of posts can be chosen among seven different categories including multi-media and other content: text, quote, link, photo, audio, video and URL. Unlike Twitter, Tumblr has no limit on the length of textual posts. Similar to hashtags in Twitter, there are separated tags associated with the blog content that make a post eas- ier to be searchable on Tumblr 2. Tumblr also allows users to update their other connected social networking profiles when something is posted. The simplicity of navigation, high reachability across wide range of viewers, low publication barriers, social networking and anonymity has led users to misuse Tumblr in several ways. Previous studies shows that these features of Tumblr are exclusive factors to gain the attention of modern extrem- ist groups [4][16]. This is because Tumblr provides every kind of multimedia posts which is a great medium to share your views with your target audiences. These groups form their own communities that share a common propaganda. They post rude comments against a religion to express their hatred and spread extremist content. Social networking fa- cilitates these groups to recruit more people to promote their beliefs and ideology among global audiences [8][12]. Fig- ure 1 illustrates a concrete example of various types of hate promoting posts and their associated tags on Tumblr. The number of notes shows the number of times that post has been liked and re-blogged by other blogs. Online-radicalization and posting hateful speech is a crime against the humanity and mainstream morality; it has a ma- jor impact on society [8]. Presence of such extremist content on social media is a concern for law enforcement and intelli- gence agencies to stop such promotion in country as it poses the threat to the society [3][9]. It also degrades the repu- tation of the website and therefore is a concern for website moderators to identify and remove such communities. Due to the dynamic nature of website, automatic identification of extremist posts and bloggers is a technically challenging problem [17]. Tumblr is a large repository of text, pictures and other multimedia content which makes it impractical to search for every hate promoting post using keyword based flagging. The textual posts are user generated data that con- 1https://www.tumblr.com/about 2https://www.tumblr.com/docs/en/using tags Figure 1: A Concrete Example of Different Types (Text, Video, Audio) of Hate Promoting Post on Tumblr tain noisy content such as spelling, grammatical mistakes, presence of internet slangs and abbreviations. Presence of low quality content in contextual metadata poses technical challenges to text mining and linguistic analysis [3][13]. The work presented in this paper is motivated by the need of investigating solutions to counter and combat the online ex- tremism on Tumblr. The research aim of the work presented in this paper is the following: 1. To investigate the application of topical crawling based algorithm for retrieving hate promoting bloggers on Tumblr. Our aim is to examine the effectiveness of random walk in social network graph graph traversal and measuring its performance. 2. To investigate the effectiveness of contextual metadata such as content of the body, tags and caption or title of a post for computing the similarity between nodes in graph traversal. To examine the effectiveness of re- blogging and like on a post as the links between two bloggers. 3. To conduct experiments on large real world dataset and demonstrate the effectiveness of proposed approach in order to locate virtual and hidden communities of hate and extremism promoting bloggers and apply So- cial Network Analysis based techniques to locate cen- tral and influential users. 2. LITERATURE SURVEY In this section, we discuss closely related work to the study presented in this paper. Based on our review of exist- ing work, we observe that most of the researches for detect- ing online radicalization are performed on Twitter, YouTube and various discussion forums [1]. We conduct a literature survey in the area of identifying hate promoting commu- nities on social networking websites and short text classi- fication of Tumblr microblog . O'Callaghan et. al. [14] describe an approach to identify extreme right communities on multiple social networking websites. They use Twitter as a possible gateway to locate these communities in a wider network and track dynamic communities. They perform a case study using two different datasets to investigate English and German language communities. They implement a het- erogeneous network within a homogeneous network and use four different social networking platforms (Twitter accounts, Facebook profiles, YouTube channels and all other websites) as extreme right entities or peers and edges are the possible interactions among these accounts. Mahmood S. [12] describes several mechanisms that can be useful in order to detect presence of terrorists on social networking websites by analyzing their activity feeds. They use Google search and monitor terror attack using keyword- based flagging mechanism. They monitor sentiments and opinions of users following several terrorism groups on on- line social networks and propose a counter-terrorism mech- anism to identify those users who are more likely to commit a violent act of terror. They also discuss honeypots and counter-propaganda techniques that can be used to rehabil- itate radicalized users back to normal users. The disadvan- tage of keyword based flagging approach is the large number of false alarms. David and Morcelli [8] present a keyword based search to detect several criminal organizations and gangs on Twitter & Facebook. They discuss a study of ana- lyzing the presence of organized crime and how these gangs use social media platforms to recruit new members, broad- cast their messages and coordinate their illegal activities on web 2.0. They perform a qualitative analysis on 28 groups and compare their organized crime between 2010 and 2011 on Facebook. Agarwal et. al. propose a one-class classification model to identify hate and extremism promoting tweets [16]. They conducted a case study on Jihad and identified several lin- guistic and stylistic features from free form text such as pres- ence of war, religious, negative emotions and offensive terms. They conduct experiments on large real world dataset and demonstrate a correlation between hate promoting tweets and discriminatory features. They also perform a leave-p- out strategy to examine the influence of each feature on classification model. In context to existing work, the study presented in this paper makes the following unique contributions extending our previous work [2]: 1. We present an application of topical crawler based ap- proach for locating extremism promoting bloggers on Tumblr. While there has been work done in the area of topical based crawling of social media platforms, to the best of our knowledge this paper is the first study on topical crawling for navigating connections between Tumblr bloggers. Figure 2: Flow Sequence of Exemplary Data Collection Process 2. We conduct experiments on large real world dataset to demonstrate the effectiveness of one class classifier and filtering hate promoting blog posts (text). We retrieve Tumblr blogger profiles and their links with other hate promoting bloggers and apply Social Network Analy- sis to locate strongly connected communities and core bloggers. 3. EXPERIMENTAL SETUP We conduct our experiments on an open source and real time data extracted from Tumblr micro-blogging website. In a social networking website, a topical crawler extracts the external link to a profile and returns the nodes that are relevant to a defined topic. We define the relevance of a node based on extent of similarity of it's activity feeds and training document. Topical crawler learns the features and characteristics from these training documents and classify a profile to be relevant. Figure 2 illustrates the general frame- work to obtain these documents. As shown in Figure 2, we implement a bootstrapping methodology to collect the training samples. We perform a manual search on Tumblr and create a lexicon of popular and commonly used tags as- sociated with hate promoting posts. Figure 3 shows a word cloud of such terms. To collect our training samples, we per- form a keyword (search tag) based flagging and extract their associated textual posts. We also acquire the related tags and the linked profiles (users who made these posts). We ex- pand our list of keywords by extracting associated tags from these posts and their related tags. We run this framework iteratively until we get a reasonable number of exemplary documents (400 training samples). As mentioned above, we train our classifier for only hate promoting users. Therefore, the training documents contain the content and caption of only extremist posts. We use these linked bloggers and posts to compute the threshold value for language modeling. We take a sample of 30 bloggers and compare their posts with the exemplary documents. For each blogger we get a relevance score. To compute the threshold value for similarity computation we take an average of these scores. Figure 4 illustrates the rel- evance score statistics of each blogger (Sorted in increasing order). We notice that 80% of the bloggers have relevance score between −2.7 and −1.5. We take average (turns out to be −2.58) of these scores to avoid the under-fitting and Figure 3: A Word Cloud of Key Terms Commonly Used by Extremist Bloggers Figure 4: Illustrating the Relevance Score Statistics of Positive Class Bloggers over-fitting of bloggers during classification. 4. RESEARCH METHODOLOGY In this section, we present the general research frame- work and methodology of proposed approach for classifying extremist bloggers on Tumblr (refer to Figure 5). The pro- posed approach is an iterative multi-step that uses a hate promoting blogger as a seed channel and results a connected graph where nodes represents the extremist bloggers and links represents the relation between two bloggers (like and re-blog). As shown in Figure 5, proposed framework is a multi-step process primarily consists of four phases: i) ex- Algorithm 1: Extracting Textual Posts on Tumblr Data: User U , Consumer Key Ck, Consumer Secret Cs, Search Tag tag name Result: Text based posts made by User U or associated with tag tag name 1 SetParameters() 2 TaggedPost() 3 BloggerPost() Generate URL of post to fetch post content and caption 4 for all postP ∈ P osts do 5 6 7 8 9 10 Slug=P.getSlug() id=P.getID() URL="http://blog name.tumblr.com/post/id/slug" Document=Jsoup.connect(URL).get() post content=Document.getDescription() post caption=Document.getTitle() end SetParameters() { 11 Authenticate the client via API Keys Ck and Cs 12 params.put("type", "text") 13 params.put("filter", "text") 14 params.put("reblog info", true) 15 params.put("notes info", true) } 16 Posts = client.tagged(tag name, params) } 17 Posts = client.tagged(tag name, params) } TaggedPost() { BloggerPost(){ gorithm. We use uniform distribution to select next blogger and extract it's frontiers. We extract these bloggers until the graph converges without re-visiting a blogger. The proposed framework results into a connected graph that represents a Tumblr network. We perform social network analysis on the output graph to locate hidden virtual groups and extremist bloggers playing major roles in community. 5. SOLUTION IMPLEMENTATION A topical crawler starts from a seed node, traverses in a graph navigating through some links and returns all relevant nodes to a given topic. In proposed solution approach we divide our problem into three sub-problems. First we clas- sify the given seed node S as hate promoting or unknown according to the published post (originally posted by blog- ger or re-blogged from other Tumblr users). Second, if the node is relevant then we extend this node into it's frontiers and it further leads us to more hate promoting bloggers. In third sub-problem, we perform topical crawling on Tumblr network and use random walk algorithm to traverse along the graph. 5.1 Retrieval of Published Posts Algorithm 1 describes the method to search Tumblr posts using keyword based flagging and extraction of posts pub- lished by a given blogger. The work presented in this paper focus on mining textual metadata on Tumblr therefore we set a few parameters and extract only text based posts for further analysis. For each blogger we set the limit of 100 posts published recently. Function SetParameters() (steps 12 and 13) filters the search results and displays only the tex- Figure 5: Proposed Architecture for Extremist Community Detection. Source: Agarwal et. al. [2] traction of activity feeds of a blogger, ii) training a text clas- sification model and filtering hate promoting and unknown bloggers, iii) navigating through external links to bloggers and extracting linked frontiers and iv) traversing through spider network for selecting next blogger. In Phase 1, we use a positive blogger Ui (annotated as hate promoting during manual inspection) called as 'seed'. We extract n number of textual posts (either re-blogged or newly posted by user)of Ui by using Tumblr API 3. We further use Jsoup Java li- brary 4 to extract the content and caption of these posts. Tumblr allows users to post content in multiple languages. However, our focus of this paper is to mine only English lan- guage posts. Therefore, we perform data-preprocessing on all extracted posts and by using Java language detection li- brary 5, we filter all non-English language posts. In Phase 2, we train our classification model over training samples (refer to Section 3). We perform character level n-gram language modeling6 on English language posts and compute their ex- tent of similarity against training samples. We classify a blogger as hate promoting based on the relevance score and computed threshold value (refer to Section 3). If a channel is classified as hate promoting or relevant, we further proceed to Phase 3 and extract the notes infor- mation for each posts (collected in phase 1). Notes in a Tumblr post contains the information about bloggers who liked or re-blogged a post. These user hits on a post indi- cates the similar interest among bloggers who may or may not be direct followers of each other. We extract the Tumblr ids of profiles from notes for the following reasons: i) due to privacy policy, Tumblr does not allow users/developers to extract the followers list unless the list is public and ii) Tumblr facilitates users to track any number of search tags or keywords. Whenever a new post is published on Tumblr containing any of these tags, it appears on the dashboard of user and a blogger no longer need to follow the origi- nal poster. We manage a queue of all extracted bloggers and traverse through the network using Random Walk al- 3https://www.tumblr.com/docs/en/api/v2 4http://jsoup.org/apidocs/ 5https://code.google.com/p/language-detection/ 6http://alias-i.com/lingpipe/index.html Algorithm 3: Graph Traversal Using Random Walk Algorithm Data: S, th, Ng, Sg, Wg, De Result: Directed Graph G 1 SetParameters() 2 Ui = S, F.add(S) TopicalCrawlerS{ 3 while (graphsize < Sg OR F.size > 0) do 4 Posts=ExtractPost(Ui) Relevance Score = LanguageModeling(De, P osts, Ng) if (score >th) then 5 6 7 8 9 10 11 12 13 14 15 16 17 Linked Users=ExtractFrontiers(Ui) ProcessedNodes PN.add(Ui) for all LU ∈ Linked U sers do if (!(F.contains(LU ) AND (PN.contains(LU ))) then F.add(LU ) else Discard the node LU end end else Discard the node Ui end Compute the Markov Chain over graph G New Blogger= node with maximum probability in Markov chain array F.remove(New Blogger) TopicalCrawler(New Blogger ) end} we extract 25 bloggers for each relation i.e. users who have liked and re-blogged that post recently. If a blogger B1 re- blog and as well as likes a post published by another blogger B2 then in the graph G, we create an edge with both labels i.e. (B1, B2, <like, re-blog>). To avoid the redundancy we extract one more frontier who have either liked or re- blogged the post recently. To extract the linked bloggers of a Tumblr user we first need to extract the posts made by U . We can extract notes information only when notes and re-blog information parameters are set to be true (refer to steps 14 and 15 of Algorithm 1). As described in Algorithm 2, in step 4, we extract notes for each textual post (hate promoting) made by User U . In steps 5 to 8, we extract the name of unique bloggers who liked and re-blogged the post P . In step 8, F represents the list of frontiers and relation of U with each frontier. We maintain a list of all processed bloggers and the number of hit counts on their recent 100 posts. These number of notes varied from 0 to 25K therefore we perform smoothing on data points and plot median of these values. Figure 6 shows the statistics of number of notes collected on 100 posts of each blogger extracted during topical crawler. Figure 6 reveals that overall number of hit counts (number of reblog and like) for extremism promoting users is very high. These hit counts reveals the popularity of extremist content and the number of viewers connected to such bloggers. 5.3 Topical Crawler Using Random Walk Figure 6: Illustrating the Number of Notes For Each Blogger Traversed in Topical Crawler tual posts (quote, chat, text, url). Function TaggedPost() with given parameters search for text posts that exclusively contain given tag name. BloggerPost() fetches the tex- tual posts published by given blogger ID. Both the functions make a Tumblr API request to fetch these data. Function ExtractPost() filters the response and extract body content & caption of each post. Tumblr API allows us to only ex- tract the summary of large posts. Therefore we use HTML parsing for extracting the whole message in blog post. In steps 4 to 7, we generate the URL from post summary and id to fetch the remaining post details. ID is a unique iden- tifier of Tumblr posts and slug is a short text summary of that post which is appended in the end of every URL. We invoke this URL using Jsoup library and parse the HTML document to get the post content. Algorithm 2: Extracting Frontiers of a Given Blog Data: Blogger U Result: Frontiers F < name, type > of U ExtractFrontiersU{ 1 SetParameters() 2 Posts=BloggerPost(U ) 3 for all postP ∈ P osts do 4 5 6 7 8 Notes=P.getNotes() for all N oteN ∈ N otes do Linked Blog Name=N.getBlogName() Note Type=N.getType() Frontiers F .add(Linked Blog Name, Note Type) Liked or Reblog end end} 5.2 Retrieval of External Links to Bloggers Algorithm 2 describes the steps to extract frontiers of a given node U . Due to the privacy policies, Tumblr API does not allow developers to extract subscriptions and followers of a Tumblr user. The link between two bloggers indicates the similar interest between them so that number of frontiers vary for every post published by a blogger. For each user, Algorithm 3 describes the proposed crawler for locating a group of hidden extremist bloggers on Tumblr. The goal of this algorithm is to compare each blogger against train- ing examples and then connecting all positive class (hate promoting or relevant) bloggers. Algorithm 3 takes several inputs: seed blogger (positive class user) S, size of the graph Sg i.e. maximum number of nodes in a graph, width of the graph Wg i.e. the maximum number of frontiers or adja- cency nodes for each blogger, a set of exemplary documents De, threshold th and n-gram value Ng for relevance compu- tation. We create a list of 30 positive class bloggers extracted during experimental setup (refer to section 3) and compute their relevance score against the exemplary documents. We take an average of these scores and compute the thresh- old value for language modeling. We use n-gram language modeling (Ng=3) to build our statistical model. Algorithm 3 is a recursive process that results into a cyclic directed graph. We run this algorithm until we get a graph of size S (1000 bloggers) or there is no node left in the queue for further extension. We perform a self-avoiding random walk that means we make sure a node is never being re-visited. If a node re-appears in the frontiers list then there are two possibilities: 1) the frontier has already been processed (ex- tended or discarded based upon the relevance score- Steps 4 to 7). If it exists in the processed nodes list then we create a directed edge between the node and it's parent and avoid further extension. 2) If the re-appearing node is in frontiers list and is not yet processed, we created a directed edge in the graph and continue the traversal. The topical crawler is a recursive process that adds and removes nodes after each iteration. The resultant graph is dynamic and not irreducible that means given a graph G(V, E), if there is a directed edge between two nodes u and v, it is not necessary that there exists a directed path from v to u. Consider that object (topical crawler) processed node i at time t − 1. In the next iteration object moves to an adjacency node of i. The probability that object moves to node j at time t is 1 when there exists a direct edge from d+ i i to j. Mij= 1 d+ i in one step where d+ i we can define: denotes the probability to reach from i to j is the out-degree of node i. Therefore  (1)  1 d+ i 0, Mi,j = , if (i, j) is an edge in digraph G otherwise Therefore for each vertex i, the sum of the probability to traverse an adjacency node of i is 1. (cid:88) j∈A(i) ∀i Mij = 1 (2) Where, A(i) denotes the list of adjacency nodes i. In random walk on graph G topical crawler traverse along the nodes ac- cording to the probability of Mij. Graph G is a dynamic so- cial networking graph, therefore we compute a Markov chain M after each iteration and compute the probability matrix over graph G. Markov chain is a random process where the probability distribution of node j depends on the current state of matrix. The probability matrix M k gives us a pic- ture of graph G after k iterations of topical crawler. Using this matrix, we compute the probability distribution P that object moves to a particular vertex. P k is the probability Table 1: Confusion Matrix and Accuracy Results for Unary Classification Performed During Topical Crawler. Source: Agarwal et. al. [2] (a) Confusion Matrix Predicted Positive Unknown Actual Positive Unknown 290 92 45 173 (b) Accuracy Results Precision Recall F-Score Accuracy 0.75 0.86 0.80 0.77 distribution of a node j after k iteration then probability of i to be traversed in k + 1th iteration is the following: P k+1 = P k.M where, P k = P 0 ∗ M k (3) Where P 0 is the initial distribution fixed for the seed node. 6. EXPERIMENTAL RESULTS 6.1 Topical Crawler Results We hired 30 graduate students from different depart- ments as volunteers to annotate all 600 bloggers processed or traversed during the topical crawling. We provided them guidelines for annotation and to remove the bias, we per- formed horizontal and vertical partitioning on the bloggers' dataset. We divided annotators into 10 different groups, 3 members each. We asked each group to to annotate 60 blog- gers. Therefore, we got 3 reviews for each blogger. We used majority voting approach (a blogger labeled as X by at least two annotators) for annotating each blogger as hate promot- ing or unknown. We compute the effectiveness of our classi- fication by using precision, recall and f-measure as accuracy matrices. Table 1 shows the confusion matrix and accu- racy results for unary classification performed during graph traversal. Table 1(a) reveals that among 600 bloggers, our model classifies 382(290+92) bloggers as hate promoting and 218(173+45) bloggers as unknown with a misclassification of 13% and 34% in predicting extremist and unknown bloggers respectively. Table 1(b) shows the standard information re- trieval matrices for accuracy results. our results shows that the both the precision and recall are high, as it is important to reduce the number of false alarms and also not to miss an extremist blogger in order to locate their communities. We use F-score as the accuracy metrics for our classifier and the results reveal that we are able to predict extremist blogger with an f-score of 80%. 6.2 Social Network Analysis We perform social network analysis on topical crawler's network resulted into a directed graph G(V, E), where V represent a set of Tumblr bloggers accounts and E represent a directed edge between two bloggers. We define this edge as a relation having two labels 'posts liked by' and 'post re- blogged by'. To examine the effectiveness of these relations we generate two independent networks exclusively for 'like' and 're-blog' links between bloggers. Figure 7 illustrates the Table 2: Illustrating The Network Level Measurements for Topical Crawler.Dia= Network Diameter, Mod= Modularity, ACC= Average Clustering Coefficient, IBC= In- Betweenness Centrality, CC= In- Closeness Centrality, #SCC= Number of Strongly Connected Components. Graph #Nodes #Edges Dia #SCC #ACC #Mod TC LB RB 382 27 355 275 60 215 4 1 6 137 21 185 0.026 0.0231 0.021 12.00 1.307 7.01 IBC ICC 0.20 11.36 0.38 0.40 6.284 0 (a) (b) (c) Figure 7: Cluster Representation of Social Network Graphs- Topical Crawler using Random Walk (a), 'Posts Liked by' (b) and 'Posts Re-blogged By' (c) representations of these networks. In each graph, size of the node is directionally proportional to its out-degree. A node with maximum number of adjacency vertices is biggest in size. Colours in the graph represents the clusters of nodes having similar properties. Here, we define the similarity measure as the ratio of out-degree and in-degree. We also perform several network level measurements on these graphs. Table 2 reveals that re-blogging is a strong indicator of links between two Tumblr profiles. Here, we ob- serve that the graphs generated for topical crawler and re- blogging link have same pattern in network measurements. Both graphs are dense (also evident from the Figure 7) and have higher modularity in comparison to the graph created for 'liked' link. Table 2 and Figure 7 also reveal that by nav- igating through re-blogging links we can locate large num- ber of connected components in a extreme right community. While following 'like' as a link we are able to detect small number of connected blogs. Though as illustrated in Figure 7(b), we can not completely avoid this feature as a set of blogs extracted using this link are irreducible. Table 2 also shows that the graph created for 'like' relation has slightly larger value for average clustering co-efficient. This is be- cause the number of nodes in the graph is very less and a major set of these nodes is strongly connected. Higher value of In-between centrality shows the presence of bloggers who are being watched by a large number of users. As the Figure 7(c) shows there are many users which are not directly con- nected to each other (shown in red colour) but has a huge network of common bloggers. These disjoint bloggers are two or three hop away and are connected via other bloggers (having second largest number of adjacency nodes). These bloggers are connected with maximum number of other blog- gers present in the graph and has a wide spread network in extreme right communities. These nodes have the maximum closeness centrality and play central role in the community. Nodes represented as black dots have minimum number of out-degree. They don't have a directed path to the central users or original source of extremist posts. Based upon our study we find these bloggers to be the target audiences who share these posts in their own network. These users are very crucial for such communities though they don't play a major role in the network. 7. CONCLUSIONS In this paper, we perform a case study on Jihadist groups and locate their existing extreme right communities on Tum- blr. We conduct experiments on real world dataset and use topical crawler based approach to collect textual data (pub- lished posts) from Tumblr users. We perform one class clas- sification and identify hate promoting bloggers according to the content present in their posts. We use random walk algo- rithm for graph traversal and extract exclusive links to these bloggers. We conclude that by performing social network- ing analysis on a graph (vertices are the Tumblr bloggers and edges are the links among these bloggers: re-blog and like) we are able to uncover hidden virtual communities of extremist bloggers with an accuracy of 77%. We compute various centrality measures to locate the influential bloggers playing major roles in extremist groups. We also investigate the effectiveness of link features (likes and re-blogs) in or- der to find the communities. Our results reveal re-blogging is a strong indicator and a discriminatory feature to mine strongly connected communities on Tumblr. We perform a manual inspection on Tumblr and perform a characterization on several hate promoting posts. Our study reveals that these posts are very much popular among extremist bloggers and get large number of hits. These posts are published targeting some specific audiences. Keywords present in the blog content, tags associated with post and comments by other bloggers are clear evidence of hate pro- motion among their viewers. 8. REFERENCES [1] S. Agarwal and A. Sureka. Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats. arXiv preprint arXiv:1511.06858, 2015. [2] S. Agarwal and A. Sureka. A topical crawler for uncovering hidden communities of extremist micro-bloggers on tumblr. In 5th Workshop on Making Sense of Microposts (MICROPOSTS), 2015. [3] S. Agarwal, A. Sureka, and V. Goyal. Big Data Analytics: 4th International Conference, BDA 2015, Hyderabad, India, December 15-18, 2015, Proceedings, chapter Open Source Social Media Analytics for Intelligence and Security Informatics Applications, pages 21 -- 37. Springer International Publishing, 2015. [4] R. A. Bates and M. Mooney. Psychological operations and terrorism: The digital domain. The Journal of Public and Professional Sociology, 6(1):2, 2014. [5] E. Bourlai and S. C. Herring. Multimodal communication on tumblr: "i have so many feels!". In Proceedings of the 2014 ACM Conference on Web Science, WebSci '14, pages 171 -- 175, New York, NY, USA, 2014. ACM. [6] R. Bury, R. Deller, A. Greenwood, and B. Jones. From usenet to tumblr: The changing role of social media. Participations, 10(1):299 -- 318, 2013. [7] Y. Chang, L. Tang, Y. Inagaki, and Y. Liu. What is tumblr: A statistical overview and comparison. CoRR, abs/1403.5206, 2014. [8] D. D´ecary-H´etu and C. Morselli. Gang presence in social network sites. International Journal of Cyber Criminology, 5(2), 2011. [9] M. R. DeVore. Exploring the iran-hezbollah relationship: A case study of how state sponsorship affects terrorist group decision-making. Perspectives on Terrorism, 6(4-5), 2012. [10] J. Gies and S. Martino. Uncovering ed: A qualitative analysis of personal blogs managed by individuals with eating disorders. The Qualitative Report, 19(29):1 -- 15, 2014. [11] D. Jurgens. That's what friends are for: Inferring location in online social media platforms based on social relationships. In ICWSM, 2013. [12] S. Mahmood. Online social networks: The overt and covert communication channels for terrorists and beyond. In Homeland Security (HST), 2012 IEEE Conference on Technologies for, pages 574 -- 579. IEEE, 2012. [13] E. Marquart. Microblog sensation: The growing popularity of tumblr. 3PM Journal of Digital Research and Publishing, Session, 2:70 -- 75, 2010. [14] D. O'Callaghan, D. Greene, M. Conway, J. Carthy, and P. Cunningham. Uncovering the wider structure of extreme right communities spanning popular online networks. In Proceedings of the 5th Annual ACM Web Science Conference, pages 276 -- 285. ACM, 2013. [15] L. Renwick. Audience research project: Tumblr study group research 'how do 'fandoms' on tumblr react to new media content?'. Enquiry-The ACES Journal of Undergraduate Research, 4, 2014. [16] A. Sureka and S. Agarwal. Learning to classify hate and extremism promoting tweets. In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint, pages 320 -- 320. IEEE, 2014. [17] A. S. Wilner and C.-J. Dubouloz. Transformative radicalization: Applying learning theory to islamist radicalization. Studies in Conflict & Terrorism, 34(5):418 -- 438, 2011. [18] J. Xu, R. Compton, T.-C. Lu, and D. Allen. Rolling through tumblr: Characterizing behavioral patterns of the microblogging platform. In Proceedings of the 2014 ACM Conference on Web Science, WebSci '14, pages 13 -- 22, New York, NY, USA, 2014. ACM. [19] J. Xu, T.-C. Lu, R. Compton, and D. Allen. Civil unrest prediction: A tumblr-based exploration. In Social Computing, Behavioral-Cultural Modeling and Prediction, pages 403 -- 411. Springer, 2014.
1710.11539
1
1710
2017-10-31T15:48:12
Local Core Members Aided Community Structure Detection
[ "cs.SI", "physics.soc-ph" ]
The relationship of friends in social networks can be strong or weak. Some research works have shown that a close relationship between friends conducts good community structure. Based on this result, we propose an effective method in detecting community structure in social networks based on the closeness of relations among neighbors. This method calculates the gravity between each neighbor node to core nodes, then makes judgement if the node should be classified in the community or not, and finally form the process of community detection. The experimental results show that the proposed method can mine the social structure efficiently with a low computational complexity
cs.SI
cs
Local Core Members Aided Community Structure Detection Xiaoping Fan 1.2 Zhijie Chen 2 Fei Cai 3 Jinsong Wu 4 Shengzong Liu2 Zhining Liao5 Zhifang Liao 3,* (1) School of Information Science and Engineering, Central South University, China (2) Information Management Department, Hunan University of Finance and Economics, Changsha, Hunan, China 1. (3) School of Information Science and Engineering, Central South University, China (4) Department of Electrical Engineering, Universidad de Chile,Santiago, Chile (5) Division of Health & Social Care Research, Faculty of Life Sciences &Medicine, King's College London, UK Correspondence Author: [email protected] Abstract: The relationship of friends in social networks can be strong or weak. Some research works have shown that a close relationship between friends conducts good community structure. Based on this result, we propose an effective method in detecting community structure in social networks based on the closeness of relations among neighbors. This method calculates the gravity between each neighbor node to core nodes, then makes judgement if the node should be classified in the community or not, and finally form the process of community detection. The experimental results show that the proposed method can mine the social structure efficiently with a low computational complexity. Key words: social network; community detection; core members 1 Introduction Community discovery is one of the core research areas in social network analysis [1] which is also benefit to other related research areas, such as public opinion monitoring, advertising precision delivery, impact analysis. As early as in 1927, Stuart Rice [2] proposed the discovery of small political groups based on voting patterns. Until 2002, Newman et al. proposed the GN algorithm [2], and community analysis began to flourish. The GN algorithm is a classical graph splitting algorithm, which uses the edge betweenness to measure the importance of the edge in the entire network, the larger betweenness the edge has, the edge is more likely to connect two different communities. Newman proposed a fast agglomeration algorithm based on the GN algorithm[3] via repeatedly calculating the network shortest path to update the edge betweennesses until the network is divided into appropriate community structures, for an unweighted graph with n nodes and m edges, the time complexity is as high as (𝑛3) . Through continuously merging nodes and communities, the highest modularity of the community is generated. The efficiency of the algorithm is greatly improved. In order to further reduce the computational complexity, many improved algorithms, such as CNM algorithm [4] and FastUnfolding algorithm [5] based on modularity optimization, have largely sacrificed the quality of the results in order to ensure the speed of computation. Rosvall et al. [6] proposed the Infomap algorithm, a method based on information theory and random walks, which uses Huffman coding optimized by the code length to encode the traveling path and the objective function. Raghavan et al. [7] proposed a Label Propagation Algorithm (LPA) based on the idea of message passing. Each member keeps transmitting the label information he or she obtains, and according to the most frequent occurrences in his or her neighbor tags to update their own labels, and finally the nodes with the same label is divided into the same community. The computational complexity of the LPA algorithm is (𝑘𝑚) , so the LPA algorithm can deal with a large-scale network efficiently. But the algorithm does not have a unique community division, and the quality of community partitioning is lower in low-density networks. Beyond LPA algorithm, there have been many improved algorithms, such as HANP algorithm[8], SLPA algorithm[9] and BMLPA algorithm[10]. In addition, there have been many research works using probability models to generate the target networks for community discovery issues. Yang et al. [11] proposed a community discovery algorithm (BigCLAM method) based on the node-community affiliation. By designing the probability function of the connection between nodes and using the EM algorithm to iterate the membership value of the node to the community until the algorithm converges, the algorithm is suitable for large-scale networks with millions of nodes, but it is necessary to change the value of K (the number of communities) and repeat the calculation, and get the best number of communities. Wang et al. [12] utilized multiple social features of the nodes' behaviors to quantify the nodes pairs' social links and these social links can be used to construct the friendship communities of the nodes. The algorithm shortens the routing delay and increases the successful delivery ratio, thereby improving the routing efficiency. Wang et al. [13] presented a trustworthy crowdsourcing model in SIoT(Social Internet of Things), social cloud provides compute and storage functions, and works as a service provider to bridge end users and sensing entities; sensing entities receive tasks and rewards from a service provider and feedback data. Then they incorporated a reputation-based auction mechanism into crowdsourcing to perform winner selection and payment determination by evaluating the reliability of crowdsourcing participants. However the algorithm mainly focus on availability threat issues relevant to designing trustworthy crowdsourcing in SIoT. In the process of community discovery, most of the previous algorithms have used modularity as the optimization function to divide the community, or measure the node's importance by the degree of nodes to discover the community[14]. These methods neglect the local community characteristics of neighborhood sets in the network, and the close neighborhood sets also can produce good community structure [14]. Meanwhile the core nodes in the community structure can affect the community structure and guide the community development trend. Under this consideration, in this paper, we propose a local core node-based diffusion method to discover the community structure in the network via analyzing the neighborhoods community importance of nodes in local networks and using the conductivity to measure the importance of nodes. The structure of the paper is as follows: Section 1 introduces the relevant content of community structure, and briefly discusses several community discovery methods; Section 2 gives the relevant definition and algorithm model of community discovery; Section 3 is the experimental results and analysis; Section 4 summarizes the full text. 2 NCB Algorithm In the real world, community always appears around some influential nodes of the social network at the beginning, so we can use these nodes and their neighborhoods to simulate the progress of community's appearance in order to explore the structure of social network. According to power-law distribution of the node degree, we experientially conclude three rules as follow: (1) Some nodes in a network are more important than others, and these nodes build connections between nodes with their significant influence, which contributes to the appearance of community. Thus, the key nodes in community play a decisive role in maintaining the stability of the community. (2) Community cannot be star-like structure, so the node with big degree may not be the core node. And nodes in the network follow the Long Tail Effect and the ternary closure. We assume that there are four people in the network, C is a friend of A and B, but A and B are strangers, D is a stranger of A, B and C. Then, A is more likely to be a friend of B than D. (3) The key nodes will appear in community, and they are not supposed to appear on the bridge which connects different communities. According to above rules, we proposed NCB(Community Detection Algorithm based on Core Members in Neighbourhood), a new model to describe the progress of community's appearance. NCB has three stages, including original, extension and update, which are shown in Figure 1. (a)Initial (b) Extension (c) Update Figure 1 Three Stages of NCB Initial stage: Find all the key nodes, and merge closer nodes into a community according to the connections between key nodes. For instance, nodes B and G are chosen to be the key nodes of community because they are most infective. Extension stage: Merge the direct neighbors of key nodes into community, and judge the degree of other nodes that are not directly connected to key node whether these nodes join in this community. In Figure 1, nodes C, E and H joined in community C1, and nodes L, M and N joined in community C2. D joined in C1 because D has a tighter connection with C1. Update stage: Choose the nodes from the expanded neighbor set of key nodes, merge the nodes that are most likely to join the current community into the network. As shown in Figure 1, node K joins in community C1 and node F joins in community C2. Expand the cover area from the center during all the process, if the node who has not merged into any community, we compute the closeness between the nodes of each community. NCB stimulates community's appearance via analyzing how closely a node connects to community. Three key questions in the stimulation progress are raised as follow: (1) How to find the key nodes in the network ? (2) How to judge which community the other common nodes want to join in ? (3) How to judge whether a community accepts a node ? 2.1 The node importance calculation Given a node set 𝑆,the set 𝑆 is a complement of 𝑆, 𝑉 = 𝑆 + 𝑆. For any disjoint of two node sets, such as 𝑆 and 𝑇, 𝐸(𝑆, 𝑇) represents the edges between set 𝑆 and 𝑇, 𝑐𝑢𝑡(𝑆) represents the size of the partition produced by the𝐸(𝑆, 𝑇), which is the number of edges between two node sets. We randomly select a node to start a random walk test. The conductivity is the probability that the point goes in and out of the node set, let 𝑑(𝑆) to represents the summation of degrees of all nodes in set 𝑆, and let 𝑒𝑑𝑔𝑒𝑠(𝑆) to represent twice of the total number of edges , The following expression can be obtained. 𝑒𝑑𝑔𝑒𝑠(𝑆) = 𝑑(𝑆) − 𝑐𝑢𝑡(𝑆) (1) 𝜙(𝑆) is the conductivity of the node set S, then 𝜙(𝑆) can be expressed as follows, 𝜙(𝑆) = 𝑐𝑢𝑡(𝑆) min (𝑑(𝑆),𝑑(𝑆)) ∈ [0,1] (2) The conductivity is measured by the smallest values of the set 𝑆 and 𝑆, 𝜙(𝑆) is the probability that an edge can be selected from a smaller set to cross the segmentation. Let the neighbor set of node 𝑣 is (𝑣) , then smaller 𝜙(𝑁(𝑣)) means closer the node 𝑣 with its neighbors, the more obvious the local community characteristics. 2.2 Notions Definition 1. Vertex Neighborhood. The neighborhood of a node can be defined as: 𝑁1(𝑣) = { 𝑤𝑑(𝑤, 𝑣) = 1}, and the neighborhood of a community can be described as: 𝑁1(𝐶) = { 𝑤𝑑(𝑤, 𝐶) = 1} . 𝑑(𝑤, 𝑣) stands for the shortest distance from node 𝑤 to 𝑣 , and 𝑑(𝑤, 𝐶) represents the shortest distance between 𝑤 and the community 𝐶. Take each node and the neighborhood of the node as a cut, and define the cut as a neighborhood community. If the neighborhood of a node has a less conductance score than all other neighbors, then the neighborhood is said to be a best local community. That is, each of the best local community to meet the following condition, ∀𝑤 ∈ 𝑁1(𝑣), 𝜙(𝑁1(𝑣)) ≤ 𝜙(𝑁1(𝑤)) (3) where 𝑁1(𝑣) stands for a set of neighbor nodes 𝑣 with a distance of 1. According to the definition of conductance and the best local community, smaller the conductivity of the local minimum community is, more obvious the community structure is, and the core node in the best local community can be regarded as the initial community. Definition 2. Community Gravitation. When studying the relationship between the node and the community, we can refer to the law of gravitation, take the community as a star and the node as an asteroid, the number of common neighbors between the community and the node can be used as an element to calculate the magnitude of the gravity between them. The greater the gravity is for 𝑣, the more desire to join the community for 𝑣 . As 𝑣 perhaps will be accepted the gravitation from multiple communities, it can be normalized by the degree (𝑑𝑢) of 𝑣 for gravitation attracted of 𝑣 as follows,. 𝐶𝐹𝑢(𝐶) = 𝑢 𝑒𝐶 𝑑𝑢 (4) where 𝑒𝐶 𝑢 is the number of edges from 𝑢 to 𝐶, and 𝑑𝑢is the degree of node 𝑢. Definition 3. Community Stability. The stability of a community is determined by the connection degree of its internal membership, the closer the membership is, the more stable the community is. Thus, the ratio of the twice number of edges within the community to the sum of degrees of the nodes can be used as the stability of the community. 𝑠(𝐶) = 𝑖𝑛 2∙𝑒𝐶 𝑑(𝐶) (5) where 𝑒𝐶 𝑖𝑛 represents the number of edges in the community 𝐶, 𝑑(𝐶) stands for the sum of degrees of all nodes in the community . In the social network, the size of the community is a small part relative to the entire network, that means that (𝑆) ≪ 𝑑(𝑆) , thus 𝑠(𝐶) = 1 − 𝑐𝑜𝑛𝑑𝑢𝑐𝑡𝑎𝑛𝑐𝑒(𝐶) . Definition 4 Capture Factor. If the community becomes more stable after trapping the node , then accepts that the node joins in the community, otherwise does not accepts 𝜀 = 𝑠(𝐶 ∪ {𝑣}) − 𝑠(𝐶) (6) If > 0 , node 𝑣 will increase the stability of the community, otherwise it will weaken. 2.3 The Description of Algorithm NCB algorithm is a kind of heuristic community detection algorithm based on local optimal neighbor set. Unlike other heuristic community detection algorithms, NCB algorithm does not select the degree of nodes as the seeds of community, but the nodes with the best conductivity as the core node. Then, the algorithm applies the community's gravitation to the node to measure whether the node is willing to join the community and adopts the community's stability as the capture factor to judge whether the community accepts the node. The pseudo-code of the algorithm is as follow: Input:The original Network(nodes and edges) CvCvC Output: Community structure 1: put all the nodes into the List 2: For each node in List do 3: Get the node's neighborhoods 4: Compute conductive 5: Find the smallest conductive node and neighborhood 6: End for 7: For each node not in do 8: select the node with the largest gravitation as candidate node 9: If the stability of community 10: accepts the node 11: End For 12: Return 2.4 The Analysis of Algorithm NCB algorithm applies a heuristic approach, which starts the search in the neighbor nodes set of the core nodes. The computational complexity for each output of a community depends only on the size of the community's neighbor set, not the size of the entire network. The analysis on the computational complexity of each step is provided as follows. We define the total number of nodes in the network is N, the total number of edges is E, the average degree of nodes is m, the number of communities is c, and the average number of nodes in the community is k. (1) The computational complexity on the process of node conductivity calculation is 𝑂(𝑁𝑚); (2) The computational complexity on constructing seed sequences by Minimum Heap is 𝑂(𝑁𝑙𝑜𝑔𝑁); (3) The average time spent in constructing the initial community and solving the gravitation of a neighbor(𝑐 ∙ 𝑚) ; (4) The total time complexity on the process of iterating the community's expansion and using the binary sort tree to update the node's neighbors and their gravitational value is 𝑂(𝑘 ∙ 𝑚 ∙ log(𝑘 ∙ 𝑚)).Owing to 𝑐 ∙ 𝑘 ∙ 𝑚 = 𝐸 ,𝑘 ∙ 𝑚 = 𝐸/𝑐 , 𝑂(𝑐 ∙ 𝑘 ∙ 𝑚 ∙ log(𝑘 ∙ 𝑚)) = 𝑂(𝐸 log(𝐸) − 𝐸 log(𝑐)), the time complexity of the NCB algorithm is 𝑂(𝐸 log(𝐸)) . Moreover, the NCB algorithm uses the core node to iteratively calculate in the local area, and the community size increases gradually, so 𝑂(𝐸 log(𝐸)) is only the complexity of the worst case. 3 Experiments 3.1 The dataset In this experiment, we explore two different genres of data: (1) Dataset with real community partition, it includes Karate Club Network and Dolphin SocialNetwork; (2) Real network dataset without community from Cond-matscientific collaboration network, Twitter network, Brightkite network. Detailed descriptions are shown in Table 1. Dataset Karate Dolphins Cond-mat Twitter Brightkite Table 1 The Data set Node message Edge message Node number Edge number member communication dolphin communication author cooperation user user follow friends 34 62 40,421 23,370 58,228 78 159 175,692 33,101 214,078 3.2 Result Analysis There exist obvious long tail effects in the social network, and degree of the node obeys the power law distribution. Figure 2 shows the scatter diagram of the node degree and the frequency of five networks, including Karate, Dolphin and so on. The size of Data in Karate and Dolphins is smaller and the data distribution is discrete, most of the nodes have lower degrees, and only a few nodes have higher degrees, which is consistent with power-law distribution. Fig.2.The scatter diagram of node degree Fig.3.The karate and dolphins Network node conduction scatter diagram Fig.3 shows the karate and dolphins Network node conduction, the horizontal axis denotes the nodes number, the vertical axis denotes the corresponding value of conductivity, and the area of scattered points relies on the degree. In the karate network, it is obvious that the maximum degree and minimum conduction prove the community structure, and node 0 and node3 could explain the situation. Meanwhile, it shows that the relationship between conductivity and degree is directly proportional in the strong community network, and both of them can be used to evaluate the importance of nodes. However, in the Dolphins network, there is no significant positive correlation between the node's degree and the node's conductivity. The node20 has a higher degree, when it has higher conductivity, which shows that the social circles with a large degree node may not necessarily have the obvious community characteristics. Therefore, the higher degree of a node may not necessarily lead to a higher quality of a community. Fig.4 shows the logarithmic distribution of the conductivity in Cond-mat scientific collaboration network, the Twitter network, and the Brightkite network. It shows that the degrees of nodes between 10 and 100 have lower conductivity values. If the degrees of nodes are large, but the conductivity value of its neighbor set is small, then it demonstrates the neighbor set with large degree gets less difference between the closeness of internal neighbor and the external neighbor set, and that is to say, the community structure is not obvious. Thus, selecting the seed that depends on the node degree will lead to a poor quality of the community division. Fig.4.The conductivity of neighbor sets In this paper, we choose FastUnfolding, CNM, LPA and Infomap algorithm for comparisons by the parameters of time complexity and the modularity. Table 2 shows the modularity about the NCB algorithm and the four algorithms on the Karate, Football and Dolphins data sets. FastUnfolding, CNM are the optimization algorithm based on the modularity, so the two algorithms achieve a high degree of modularity. And the result of the LPA algorithm is not unique, so we use the average degree of modularity which runs the LPA algorithm on three data sets for 5 times. The results of the LPA algorithm have high fluctuations. Infomap algorithm uses Huffman encoding by random walk for community structure detection, it can find a better community in the network if the community structure is obviously; and the NCB algorithm cannot produce the highest modularity, but the results perform closely to the FastUnfolding algorithm. Algorithm CNM LPA Infomap FastUnfolding NCB Table 2 The results of community division Karate 0.381 Football 0.550 Dolphins 0.495 0.345[0.132,0.402] 0.581[0.563,0.602] 0.458[0.373,0.502] 0.402 0.419 0.378 0.600 0.605 0.585 0.528 0.519 0.510 Fig.5 Comparison of NMI In this paper, we use normalized mutual information to evaluate the algorithm, Since the result of LPA algorithm is not stable, we will set the maximum value of the 5 operations. As shown in Figure 5 (NMI), the correct rate of the LPA algorithm and the NCB algorithm are the best, the accuracy rate of NCB algorithm on Karate data set is 100%, the second is LPA, the accuracy of the other three algorithms are below 80%. According to the NMI value, the FastUnfolding, CNM, and Infomap algorithms have achieved larger Q values but the accuracy are lower than the results with LPA and NCB. This shows a large difference between the cluster structure and the topology structure in the datasets with real background. In Figure 5, the overall score and performance of NCB algorithm are the best. Table 3 Compare the number of communities found by different algorithms on the three datasets. Algorithm Cond-mat Twitter Brightkite CNM LPA Infomap 1910 3590 3233 FastUnfolding 1667 NCB 2267 168 648 607 136 366 1034 1569 4829 951 1260 We use CNM, LPA, Infomap, FastUnfolding and NCB algorithms to do the experiments with three datasets (Cond-Mat-2005, Twitter, Brightkite) respectively,and try to calculate the number of communities, the degree of modularity of the community, and the time it takes (in seconds). Since the results of LPA are not unique, the results of LPA are the average value over the five times. Table 3 lists the communities numbers found by each algorithm. LPA algorithm is a label-based diffusion algorithm, so in the larger network, the smaller the number of iterations can get the results. Infomap algorithm takes random walk to get the optimization function, so the community size are small and the number of communities is large. As shown in Table 3, the number of community found by Infomap and LPA algorithm is more than twice as much as the number of community found by other three algorithms on the three data sets. This indicates that LPA and Infomap algorithms tend to find smaller communities when the network size is large. CNM and FastUnfolding algorithms are modularity optimization algorithm, so the number of communities found by them is closer. And the NCB algorithm is a heuristic algorithm based on a local best community, so it can both ensures the discovery of larger communities and prevents the small communities to annexe by large communities. Therefore, the number of communities found by the NCB algorithm is between the results of the two algorithms described above, and the number of communities found by the NCB algorithm on Cond-mat-2005, Twitter, and Brightkite datasets are 2267, 366, and 1560, respectively. On the Cond-mat-2005 dataset, there are not many differences in modularity for the community partitioning by each algorithm, but it can be seen that the modularity of CNM, FastUnfolding and NCB are slightly higher than that of LPA and Informap, as shown in Table 4. Table 4 Comparison with the Modularity Algorithm Cond-mat Twitter Brightkite CNM LPA Infomap FastUnfolding NCB 0.679 0.662 0.674 0.722 0.681 0.869 0.794 0.825 0.896 0.826 0.603 0.455 0.581 0.664 0.611 In Table 5, the theoretical time complexity of the five algorithms and their actual time spent on community discovery on three datasets are presented. Brightkite has 58,228 nodes and 214,078 edges, so the algorithm takes the longest time on this data set, and the shortest time on the Twitter. The Infomap gets the highest time complexity and the actual execution time is also the longest, the time is 869.767s; And the time complexity of NCB, LPA and FastUnfolding are all ο(n), the actual lengths of execution time are different. The running time of FastUnfolding algorithm is the shortest, the efficiency is obviously better than the other four algorithms. Table 5 Community partitioning results(time s) Algorithm Cond-mat Twitter Brightkite CNM LPA 250.7 72.40 68.15 358.88 49.74 151.63 Infomap 639.766 51.663 869.767 FastUnfolding NCB 45.39 56.19 18.79 127.60 23.64 161.30 Based on the three kinds of statistical data, the Fast Unfolding algorithm is the best in terms of time and modularity, but it is less effective for small-grained communities and has the least number of communities found. The NCB algorithm has less complexity in time complexity than FastUnfolding algorithm, and the modularity of community partitioning is closer to FastUnfolding, but NCB algorithm finds more communities than FastUnfolding algorithm, so NCB algorithm can be also applied to small-grained communities. 4 Conclusion In this paper, we have proposed a kind of community discovery algorithm based on local core members (NCB algorithm) to solve the problem of community detection in social networks. The NCB algorithm calculates the local core nodes in the network via computing the conductivity values. Then, through using the neighbor sets, the core nodes are processed to form the initial community. Finally, the nodes of the unmarked community are updated iteratively. The conductivity value of the community determines the community ownership. Experiments on Karate and Dolphins networks with real communities have shown that the community structure obtained by NCB algorithm is the closest to the true community structure, and the accuracy is the highest. In addition, although the NCB algorithm cannot produce the maximum Q value on Twitter and Cond-mat networks, the NCB algorithm can find small-sized and better- quality communities, and can complete the computation in a linear time complexity. Compared with other algorithms in terms of modularity, community number, running time and accuracy, NCB algorithm has the best overall performance. But we do not consider the influence of node attributes in the diffusion model, and will try to find such community structure in the future works. References [1] Y.F. Lin, T.Y. Wang, R.Tang. An efficient community network discovery model and algorithm [J] . Computer Research and Development,2012, 49(2):337-345. [2] Girvan M, Newman M E. Community structure in social and biological networks.[J]. Proceedings of the National Academy of Sciences of the United States of America, 2002, 99(12):7821. [3] Clauset A, Newman M, Moore C. Finding community structure in very large networks [J]. Physical Review E, 2004, 70(6):264-277. [4] Palla G, Derényi I, Farkas I, et al. Uncovering the overlapping community structure of complex networks in nature and society.[J]. Nature, 2005, 435(7043):814. [5] Blondel V D, Guillaume J L, Lambiotte R, et al. Fast unfolding of communities in large networks[J]. Journal of Statistical Mechanics Theory & Experiment, 2008, 2008(10):155-168. [6] Rosvall M, Bergstrom C T. Maps of random walks on complex networks reveal community structure[J]. Proceedings of the National Academy of Sciences of the United States of America, 2008, 105(4):1118-1123. [7] Raghavan U N, Albert R, Kumara S. Near linear time algorithm to detect community structures in large-scale networks[J]. Physical Review E Statistical Nonlinear & Soft Matter Physics, 2007, 76(2):036106. [8] Leung I, Hui P, Lio P, etal. Towards Real-time Community Detection in Large Networks[j]. Physical Review E, 2009, 79(6): 66107. [9] Xie J, Szymanski B K, Liu X. SLPA: Uncovering Overlapping Communities in Social Networks via a Speaker-Listener Interaction Dynamic Process[C]// IEEE, International Conference on Data Mining Workshops. IEEE Computer Society, 2011:344-349. [10] Wu Z H, Lin Y F, Gregory S. Balanced Multi-Label Propagation for Overlapping Community Detection in Social Networks[J]. Journal of Computer Science and Technology, 2012, 27(3):468-479. [11] Yang J, Leskovec J. Overlapping community detection at scale:a nonnegative matrix factorization approach[C]// ACM International Conference on Web Search and Data Mining. ACM, 2013:587-596. [12] Wang K, Guo H. An Improved Routing Algorithm Based on Social Link Awareness in Delay Tolerant Networks[J]. Wireless Personal Communications, 2014, 75(1):397- 414. [13] Wang K, Qi X, Shu L, et al. Toward trustworthy crowdsourcing in the social internet of things[J]. IEEE Wireless Communications, 2016, 23(5):30-36. [14] Gleich D, Seshadhri C. Neighborhoods are good communities[J]. Computer Science, 2011.
1711.00462
1
1711
2017-09-18T06:03:09
Early prediction of the duration of protests using probabilistic Latent Dirichlet Allocation and Decision Trees
[ "cs.SI", "cs.AI" ]
Protests and agitations are an integral part of every democratic civil society. In recent years, South Africa has seen a large increase in its protests. The objective of this paper is to provide an early prediction of the duration of protests from its free flowing English text description. Free flowing descriptions of the protests help us in capturing its various nuances such as multiple causes, courses of actions etc. Next we use a combination of unsupervised learning (topic modeling) and supervised learning (decision trees) to predict the duration of the protests. Our results show a high degree (close to 90%) of accuracy in early prediction of the duration of protests.We expect the work to help police and other security services in planning and managing their resources in better handling protests in future.
cs.SI
cs
Early prediction of the duration of protests using probabilistic Latent Dirichlet Allocation and Decision Trees 7 1 0 2 p e S 8 1 ] I S . s c [ 1 v 2 6 4 0 0 . 1 1 7 1 : v i X r a Satyakama Paul∗, Madhur Hasija† and Tshilidzi Marwala‡ ∗Oracle India Pvt. Ltd, Prestige Tech Park, Bengaluru, India - 560103 Email: [email protected] †WNS Global Pvt. Ltd, Whitefield, Bengaluru, India - 560048 ‡University of Johannesburg, Johannesburg, South Africa - 2006 Email: [email protected] Email: [email protected] Abstract-Protests and agitations are an integral part of every democratic civil society. In recent years, South Africa has seen a large increase in its protests. The objective of this paper is to provide an early prediction of the duration of protests from its free flowing English text description. Free flowing descriptions of the protests help us in capturing its various nuances such as multiple causes, courses of actions etc. Next we use a combination of unsupervised learning (topic modeling) and supervised learning (decision trees) to predict the duration of the protests. Our results show a high degree (close to 90%) of accuracy in early prediction of the duration of protests. We expect the work to help police and other security services in planning and managing their resources in better handling protests in future. I. INTRODUCTION Protests and agitations are an integral part of any democratic civil society. Not to be left behind when compared with the rest of the world, South Africa in recent years has also seen a massive increase in public protests. The causes of these protest were varied and have ranged from service delivery, labor related issues, crime, education, to environmental issues. While in the past multiple studies and news articles have analyzed the nature and cause of such protests, this research uses a combination of unsupervised (topic modeling using probabilistic Latent Dirichlet Allocation (pLDA)) and super- vised (single and ensemble decision trees) learning to predict the duration of future protests. We develop an approach in which an user inputting a description of a protest in free flowing English text, the system predicts the duration of the protest to a high (close to 90%) degree of accuracy . We expect that an early correct prediction of the duration of the protest by the system will allow police and other security services to better plan and allocate resources to manage the protests. II. PROBLEM STATEMENT The objective of this research is to provide an early prediction of the duration of a protest based on South African protest data. The master dataset is obtained from the website TABLE I IMPORTANT STATISTICAL FEATURES Whether Metro or not Coordinates End date Police station Start date Cause of protest Status of protest (Violent or not) Reason for protest (text data) PERCENTAGE OF PROTESTS VIS-A-VIS PROVINCES TABLE II Provinces Gauteng Western Cape Kwazulu Natal Eastern Cape North West % of protests 37 18 14 9 6 Provinces Limpopo Mpumalanga Free State Northern Cape % of protests 6 5 3 2 - Code for South Africa [1]. It consisted of 20 features (columns) describing 876 instances (rows) of protests over the period of 1st February 2013 to 3rd March 2014. Among the 20 features, the statistically important and hence selected ones are shown in Table I . The rest are repeated codification of the important features that convey the same statistical information as the important features. Hence they are ignored. Also detailed addresses of the location (Town or city name, First street, Cross street, Suburb area place name etc) of the protests are not considered. Instead the more accurate measures - Coordinates (latitudes and longitudes) are used. Table II, III, IV and V shows the overall descriptive statistics of the protests during the above mentioned period. From the 876 rows, three are removed for which the one or more columns are missing1. Thus our modeling exercise is based upon 873 instances of protests. Table II shows 1Since an insignificant percentage (0.34%) of our data is missing we conveniently remove them without doing missing value imputation. PERCENTAGE OF PROTESTS VIS-A-VIS ISSUES TABLE III Issue % of protests Service delivery Labour Crime Election Vigilantism Education 31 30 12 6 5 5 Issue Political Transport Xenophobia Individual causes Environment % of protests 4 3 2 1 1 PERCENTAGE OF PROTESTS VIS-A-VIS STATE TABLE IV State Peaceful Violent % of protests 55 45 PERCENTAGE OF PROTESTS VIS-A-VIS DURATION IN DAYS TABLE V Duration % of protests 0 (less than 24 hrs) 1 2 3 4 74.34 11.34 4.58 2.06 2.17 5-13,19, 21-23, 31, 34, 37, 39, 57, 65 less than 1% that Gauteng2 as the seat of commerce, and President and Cabinet; and Western Cape3 as the legislative capital has the largest concentration of protests, followed by the others. Table III shows that the three largest issues of protests are from service delivery, labor related issues, and crime related at respectively 31%, 30% and 12% of the total. From table IV it can be seen that the difference between peaceful and violent protests is low at 55% and 45% respectively. However the most interesting insight comes from the duration of protests4. From table V it can be observed that the majority of protests (at 74.34% of the total) last for less than 24 hours. Thus this feature is highly skewed. The idea behind this work is to use only the text description of the protests (predictor variable) to predict the duration of future protest(s) (response variable). Some typical exam- ples of the descriptions of protests are as follows. Flagged as service delivery and violent - "Residents of both towns Butterworths and Centane blockaded the R-47 between the two towns, accusing the Mnquma Municipality of ignoring their request for repairs to the road." Eyeballing the text does not indicate any violence. A second example flagged as 2Gauteng has in it Johannesburg and Pretoria. Johannesburg is the com- mercial hub of South Africa, and the office of President and Cabinet is in Pretoria. 3Cape Town as the seat of South African parliament is situated in Western Cape. Day of the protest. 4Duration of protests is the difference between the End day and the Start nor epistemologically. service delivery and peaceful protest is "ANGRY community leaders in four North West villages under the Royal Bafokeng Nations jurisdiction protested this week against poor services and widespread unemployment among the youth. Now they not only demand their land back, but want a 30% stake in the mines which are said to employ labour from outside the villages.". While the first line of the text referred to the cause of the protest as service delivery, the second line referred to political (demand for return of land) and labor issues (3% stake in mines and corresponding increase in employment). In this sense, we believe that strict flagging of protests into one category or another restricts the knowledge of the protests. We also believe that it is normal for human social concerns to spill from one area to another during protests that is not well captured by only one restrictive flag attached to one protest. Thus we drop the categorical features (with strict class labels) and consider only the text descriptions of the protests as a predictor of its duration. Another important advantage of using text descriptions is that they give flow/progress of events that occurred during a protest and other relevant details. Figure 1 shows the word cloud of the entire protest corpus. Prior building the word cloud the usual preprocessing on the text corpus such as removal of punctuation, numbers, common English stopwords, white spaces etc have been carried out. The cloud consists of 75 words5 and words that occur with a minimum of at least 25 times are included. The more the frequency of the words occurring in the text corpus, the bigger is its font size. Lastly due to word stemming, resid is created from words like residence and residing. III. THEORETICAL CONCEPT - PROBABILISTIC LATENT DIRICHLET ALLOCATION In this subsection we provide a short introduction to pLDA. LDA is an unsupervised generative probabilistic model pri- marily used for topic discovery. It states that for a collection of words in a large number of documents, each document is a mixture of a number of "latent topics" 6 and each word in a document is a result of a latent topic. Following [2], [3]; a document is a random mixture of latent topics and each topic7 in turn is created by the distribution of words. Mathematically the LDA model can be stated as follows. For each document w in a corpus D 1) Choose N ∼ P oison(ξ) 2) Choose θ ∼ Dir(α) 3) For each of the N words wn: a) Choose a topic wn ∼ M ultinomial(θ) b) Choose a word wn from p(wnzn, β), a multino- mial probability conditioned on the topic zn where a document w is a cobination of N words, for example w = (w1, w2, ...., wN ). A corpus D is a collection of M documents such that D = (w1, w2, ...., wM ). α and β are 5The number of words is kept low for better visibility. 6Note that the topics are latent because they are neither defined semantically 7Topic and latent topic are the same and used interchangeably Fig. 2. Setting of two class classification problem panel of figure 2 shows the percentage of protests falling in less than one day (74.34%) and one or more days (25.66%). Thus the binary classification problem now is to correctly predict the response variable (less than one day against one or more days) for the text corpus of the protest descriptions. However before getting into the classification exercise we need to perform two tasks. One, we need to find the optimal number of latent topics from the text corpus. Two, since classification algorithms per se cannot take text documents, we need to extract a set of latent topics for each text description of a protest. In the next section we discuss the above tasks and their results. V. RESULTS AND DISCUSSIONS Finding the optimal number of hidden topics from the text corpus is an important task. If the chosen number of topics is too low, then the LDA model is unable to identify the accurate classifiers. However if the number is too high, the model becomes increasingly complex and thus less interpretable [4] [5]. In contrast to the often used procedure of intelligently guessing the optimal number of topics in a text corpus, following [2] we use the perplexity approach to find the optimal number of topics. Often used in language/text based models, perplexity is a measure of "on average how many different equally most probable words can follow any given word" [6]. In other words its a measure of how well a statistical model (in our case LDA) describes a dataset [4] where a lower perplexity denotes a better model. It is mathematically denoted by: perplexity(Dtest) = exp{− d=1 logp(wd) } (4) (cid:80)M (cid:80)M d=1 Nd where the symbols have the same meaning as in section III. Using a trial number of topics that range between 2 to 308, we use perplexity to find the optimal number of topics from our text corpus. The text corpus is broken into a training and test set. A ten fold cross validation is carried out using 1000 iterations. The black dots show the perplexity score for each fold of cross validation on the test set for various numbers of topics. The average perplexity score is shown by the blue line in figure 3 and the score is least for 24 latent topics. Thus the optimal number of topics for our text corpus is 24. 8x axis of fig 3 shows the trial number of topics Fig. 1. Word cloud of the entire text courpus of the protests parameters of the Dirichlet prior on per document topic and per topic word distribution respectively. z is a vector of topics. The central idea of LDA is to find the posterior distribution (θ) of the topics (z) when the document (w) is given, i.e. p(θ, zw, α, β) = p(θ, z, wα, β) p(wα, β) (1) Since it is beyond the scope of this paper to derive the detailed formula, we summarize the two other important results that will subsequently be required in our analysis. The marginal distribution of a document is: (cid:90) (cid:88) N(cid:89) n=1 ) p(wα, β) = p(θα)( p(znθ)p(wnzn, β)dθ (2) The probability of a corpus is: m(cid:89) (cid:88) Nd(cid:89) p(wdnzdn, β)dθ) (3) p(Dα, β) = p(θdα)( d=1 IV. EXPERIMENTAL SETUP n=1 As seen in table V, our response variable - duration of protests is highly schewed. Protests lasting for less than 24 hours is 74.34% of the total number of protests. Protests above one day is less than 5% of the total number. In effect it means that in reality, South Africa rarely experiences protests that stretches beyond one day. So for practical purposes, we couple protests lasting above 24 hours into one class and compare it against protests lasting below 24 hours. The right 024681119233765Number of days% in total0204060less than one dayone or more daysClasses of number of days% in total0204060 AN EXAMPLE OF TEXT DESCRIPTION AND ITS ASSOCIATED HIGHEST PROBABILITY TOPICS TABLE VII Text LP The residents wanted municip 2nd LP march 3rd LP resid 4th LP hospit Sterkspruit to be moved from the Senqu municipality and be a municipality on its own Fig. 3. Finding the optimal number of topics *** P(Tn) refers to probability of the nth topic where n varies from 1 to 24. Here T1 = shop, T8 = march, T20 = municip and T24 = anc. AN EXAMPLE OF A TEXT DESCRIPTION AND ITS ASSOCIATED TABLE VI TOPIC PROBABILITIES P(T1).. 0.0027 ..P(T8) 0.15 ... ... ..P(T20) 0.79 ..P(T24) 0.0028 Text The residents wanted Sterkspruit to be moved from the Senqu municipality and be a municipality on its own PERFORMANCE METRICS OF VARIOUS ALGORITHMS ON THE TABLE VIII TEST SET Balanced accuracy Kappa Sensitivity Specificity C5.0 Treebag 79.38% 88.40% 0.590 0.769 87.03% 94.59% 72.41% 82.76% Random forest 89.69% 0.795 95.68% 84.24% *** P(Tn) refers to probability of the nth topic where n varies from 1 to 24. Here T1 = shop, T8 = march, T20 = municip and T24 = anc. *** P(Tn) refers to probability of the nth topic where n varies from 1 to 24. Here T1 = shop, T8 = march, T20 = municip and T24 = anc. Next we perform a LDA with 24 topics on our text corpus. Table VI shows an example of a text description and the probabilities associated with the various topics. The topic names are given in the bottom of the table. The topics court and resid have the highest probabilities for the text. It might also be noted that since the topics are multinomial distributed to the entire text corpus and the words in corpus, hence there is no direct or visible relationship that connects the topics with the text descriptions. We can only assume that the topics are complexly related to the text descriptions. Table VII shows the topics with four largest probabilities (largest, 2nd largest,... 4th largest) associated with a text description. With computational concerns in mind, we restrict the largest probabilities to only four. It might be recollected from the last paragraph of section IV where we stated that classification algorithms per se cannot take text documents as a predictor variable. Table VII shows a way in which a single text description can be represented as a set of most relevant9 topics. Thus for an entire corpus of 873 text documents, the predictor side of the classification model would consist of a topic matrix of 873x4 dimensions. Including the response variable, our modeling data would have 873x5 dimensions. 9The most relevant topics are the ones with highest probabilities. In addition, it might also be recalled that our response variable duration of protest is unbalanced with the percentage of values falling in the class - less than one day at 74.34% and one or more days at 25.66%. Since unbalanced classes are not learned well by decision trees, so we use both way balanced sampling strategies to balance the modeling data. Next the modeling data is split into a training and test set in the 7:3 ratio. The dimensions of the training and test sets are 910x5 and 388x5 respectively. In the next step we use decision tree based classification algorithms to model the relationship between the topic matrix and the duration of the protests. Specifically we use three algorithms - C 5.0, treebag, and random forest and do a ten fold cross validation with five repeated iterations. The prediction results for the class one or more days on the test dataset is shown in table VIII. Treebag with a number of decision trees is able to better predict the response variable than a single tree in C5.0 because multiple trees help in reducing variance without increasing bias. Again, random forest performs better than treebag because in addition to multiple trees it also randomly selects a subset of the total number of features at each node. Further best split feature from the subset is used to split each node of the tree. This salient feature of random forest is absent in treebag. The combination of a number of trees and random selection of a subset of features at each node of the tree helps in further reducing the variance of the model. 510152025301200130014001500160017001800Ten fold cross−validation to find the optimal value of kNumber of topicsPerplexity when fitting the trained model to the test set Thus in effect, random forest performs best in predicting the duration of the protests on the test dataset. The codes for the analysis are in https: //www.dropbox.com/s/dzyj2lviqnlgk5x/ dropbox_ieee_la_cci_2017.zip?dl=0 VI. LIMITATIONS The first limitation of this research is that LDA does not allow for evolution of topics over time. This means that if the nature and scope of the protests remain pretty stagnant over time then our model is expected to perform fairly well. Second, since it is a bag of words model, so sentence structures are not considered. And third, topics are not independent of one another. Thus it might happen that the same word represents two topics creating a problem of interpretability. VII. CONCLUSION This paper is an combination of unsupervised and super- vised learning to predict the duration of protests in South African context. Protests and agitations being social issues; have multiple nuances in terms of causes, courses of actions etc that cannot be very well captured by restrictive tags. Thus we discard the approach of restrictive characterization of protests and use free flowing English texts to understand its nature, cause(s), course of action(s) etc. Topic discovery (unsupervised learning using pLDA) and subsequent classifi- cation (supervised learning using various decision tree algo- rithms) provides promising results in predicting the duration of protests. We expect that the implementation of the framework can help police and other security services in better allocating resources to manage the protests in future. REFERENCES [1] Code for South Africa, Protest Data, https://data.code4sa.org/dataset/ Protest-Data/7y3u-atvk. [2] D.M. Blei, A.Y Ng and M.I Jordan, Latent Dirichlet Allocation, Journal of Machine Learning Research, Vol. 3, pp.993-1022, 2003. [3] C. Reed, Latent Dirichlet Allocation: Towards a Deeper Understanding, http://obphio.us/pdfs/ldatutorial.pdf. [4] W. Zhao, J.J Chen, R. Perkins, Z. Liu, W. Ge, Y. Ding and W. Zou, A heuristic approach to determine an appropriate number of topics in topic modeling, 12th Annual MCBIOS Conference, March, 2015. [5] W. Zhao, W. Zou, J.J Chen, Topic modeling for cluster analysis of large biological and medical datasets, BMC Bioinformatics, Vol. 15 (Suppl 11), 2014. [6] NCLab, Perplexity, http://nclab.kaist.ac.kr/twpark/htkbook/node218 ct. html.
1709.03777
2
1709
2017-10-01T15:40:33
Establishing Personal Trust-based Connections in Distributed Teams
[ "cs.SI", "cs.CY" ]
Trust is a factor that dramatically contributes to the success or failure of distributed software teams. We present a research model showing that social communication between distant developers enables the affective appraisal of trustworthiness even from a distance, thus increasing project performance. To overcome the limitations of self-reported data, typically questionnaires, we focus on software projects following a pull request-based development model and approximate the overall performance of a software project with the history of successful collaborations occurring between developers.
cs.SI
cs
DOI: 10.1002/itl2.6 L E T T E R (cid:34)(cid:86)(cid:85)(cid:73)(cid:80)(cid:83)(cid:104)(cid:84)(cid:1)(cid:81)(cid:70)(cid:83)(cid:84)(cid:80)(cid:79)(cid:66)(cid:77)(cid:1)(cid:68)(cid:80)(cid:81)(cid:90) Establishing personal trust-based connections in distributed teams Fabio Calefato1 Filippo Lanubile2 1Dipartimento Jonico, University of Bari, Bari, Italy 2Dipartimento di Informatica, University of Bari, Bari, Italy Correspondence Filippo Lanubile, Dipartimento di Informatica, University of Bari, Via Orabona, 4 – Dip. Informatica, 70125 Bari, Italy. Email: [email protected] Trust is a factor that dramatically contributes to the success or failure of distributed software teams. We present a research model showing that social communication between distant developers enables the affective appraisal of trustworthiness even from a distance, thus increasing project performance. To overcome the limitations of self-reported data, typically questionnaires, we focus on software projects following a pull request-based development model and approximate the overall performance of a software project with the history of successful collaborations occurring between developers. KEYWORDS collaboration, distributed software teams, project performance, pull request, social communication, trust 1 INTRODUCTION Computer-Supported(cid:1)Cooperative(cid:1)Work(cid:1)(CSCW)(cid:1)addresses(cid:1)collaboration(cid:1)problems(cid:1)faced(cid:1)by(cid:1)virtual(cid:1)teams,(cid:1)including(cid:1)com- munication(cid:1) breakdowns,(cid:1) coordination(cid:1) problems,(cid:1) and(cid:1) lack(cid:1) of(cid:1) knowledge(cid:1) about(cid:1) colleagues'(cid:1) activities.1(cid:1) Distributed(cid:1) software teams(cid:1)are(cid:1)no(cid:1)different.(cid:1)When(cid:1)developers(cid:1)work(cid:1)for(cid:1)large-scale,(cid:1)distributed(cid:1)projects,(cid:1)"distances"(cid:1)(ie,(cid:1)temporal,(cid:1)geographical,(cid:1)and socio-cultural)(cid:1)get(cid:1)in(cid:1)the(cid:1)way,(cid:1)aggravating(cid:1)collaboration(cid:1)problems(cid:1)between(cid:1)teams.(cid:1)Software(cid:1)development(cid:1)is,(cid:1)in(cid:1)fact,(cid:1)an(cid:1)intensely collaborative(cid:1)process(cid:1)where(cid:1)people(cid:1)are(cid:1)required(cid:1)to(cid:1)constantly(cid:1)interact(cid:1)with(cid:1)others(cid:1)to(cid:1)create,(cid:1)share,(cid:1)and(cid:1)integrate(cid:1)information. In their study on the challenges of distributed development caused by distance, Agerfalk and Fitzgerald2 stressed the negative impact of reduced trust faced by distributed teams. Trust within teams typically grows and reinforces through direct contact. Face-to-face communication is the most effective solution for team members to the problem of creating ties with others and becoming aware of both technical aspects, such as terminology and established procedures, and even more subtle aspects, such as existing social connections between team members, norms, and cultural differences. Despite being so vital for establishing connections between developers, face-to-face interaction is the activity that is mostly affected by distance in distributed devel- opment contexts. Over the last 2 decades, software development organizations have become more and more distributed and, yet, the following research question remains mostly unanswered: How do we establish personal, trust-based connections between members of distributed teams? 2 BACKGROUND The topic of trust has received a considerable amount of attention in several research domains, from cognitive science to economy and software engineering. To date, several definitions of trust have been given due to the complexity of the matter, which involves both interpersonal relationships (eg, cultural issues between trustee and trustor) and facets of human behavior (eg, personal traits). Trust may be defined as the belief that the trustee will behave as expected by the trustor.3 This definition explicates that the trustor decides to take the risk of trusting the trustee based on the judgment of existing information available from both direct and indirect observation. As such, trust is often modeled as of a 3-phase process that involves formation, dissolution, and Internet Technology Letters. 2017;e6. https://doi.org/10.1002/itl2.6 1 of 4 2 of 4 CALEFATO AND LANUBILE FIGURE 1 The proposed research framework to investigate how increasing social communication and trust can turn into increased project performance restoration, depending on whether the expectations of the trustor are met.4 In other words, positive trust emerges when others' actions meet our expectation; otherwise, negative trust (or mistrust) arises. Other definitions of trust distinguish between cognitive (or rational) and affective (or social) perspectives.5 Accordingly, cognitive trust is defined as the expectations about others' skills and reliability when executing critical tasks that the trustor cannot monitor. Conversely, affective trust relates to reciprocal emotional ties, concerns, and care between the trustee and the trustor. When affective trust is established, the trustee is pushed to do something for the trustor because the former feels responsible and perceives the action to take as a moral duty. Albeit important to teams of any kind, trust is vital to the well-being of distributed software teams as it prevents physical distance from leading to psychological distance too.6 Indeed, reduced trust exacerbates the feeling of being distinct teams with different and conflicting goals, affects benevolence toward others when settling differences, and decreases team members' disposition to share information and cooperate in solving issues.(7,8) RESEARCH MODEL 3 The existing literature has proposed several approaches for fostering trust.9 These models build on the underlying idea that trust develops along several dimensions called trust antecedents,10 that is, the properties that trigger the trustor's judgment when evaluating the trustworthiness of the trustee. Jarvenpaa and Leidner11 studied how trust evolves in global teams who only had chances of interaction through computer-mediated communication. They observed that teams who ended up establishing a low level of trust were those lacking in social communication at the beginning of projects. Instead, those teams who had an initial focus on social communication, which later reduced in favor of technical and task-focused interaction, were capable of establishing a high level of trust by the end of projects. Consistently, Wang and Redmiles12 studied the communication patterns of globally distributed software developers interacting over Internet Relay Chat (IRC) and found that positive, nonwork-related interactions promoted trust and cooperation within teams. Accordingly, in Figure 1 (see the blue box on the left), we depict a research model showing that social communication between distant developers helps to get access to trust antecedents, otherwise unavailable in distributed contexts, which enable the affective appraisal of trustworthiness even from a distance. One common limitation of prior research is that there is no explicit measure of how much improving trust contributes to project performance. Indeed, it is challenging to prove the existence of a cause and effect relations between the amount of trust established between developers and the performance of a software project as many confounding factors that are difficult or impossible to control (eg, project type, individual skills and experience, and company's culture) may interfere. Treinen and Miller-Frost13 studied how trust develops across remote sites of distributed software projects at IBM. They observed that distant sites with increased level of trust could resolve issues from afar (eg, through videoconferences) and even anticipate future difficulties, thus resulting in increased overall project efficiency. However, to the best of our knowledge, no previous study has provided evidence that directly connects and quantified the relation existing between the amount of trust established between developers and project performance. Besides, existing research on trust has so far relied mostly on self-reported data (ie, questionnaires) to measure trust levels.9 In our previous work,14 we proposed to overcome this limitation by approximating the overall performance of a software project (intended as broadly as possible) with the history of successful collaborations between developers, which constitute a large part of the project lifecycle. We called a successful collaboration any situation involving at least 2 software developers who cooperate successfully (eg, adding a new feature, refactoring poor-quality code, and fixing a bug), thus producing a project advancement. A successful collaboration is, therefore, a finer-grain unit of analysis that enables measuring the extent to which trust increases project performance more directly. Furthermore, recent work has found that the social distance between devel- opers (eg, history of previous interactions and the existence of connections in social coding platforms) is strongly predictive of whether a contribution will be accepted.15 Many open source software projects rely today on GitHub, a social-coding platform that enables developers to collaborate through pull requests. A pull request is a proposed set of source code changes submit- CALEFATO AND LANUBILE 3 of 4 TABLE 1 Breakdown of datasets and results from the Apache Groovy and Drill projects Analysis time window Core team Overall contributors Closed PRs Emails Effect of high propensity to trust on merging pull requests Apache Groovy Apache Drill March 2015–December 2016 November 2014–September 2017 Merged Rejected 6 211 200 18 4948 +34% 22 88 668 66 29 514 +26% ted by a potential contributor that is integrated upon inspection and acceptance by one or more core team members. As such, according to our definition, an accepted pull request represents a successful collaboration between the pull-request contribu- tor and the integration manager(s). Hence, we argue that trust catalyzes the process of reviewing and accepting pull requests, which, in turn, boost project performance (see the red box on the left in Figure 1). 4 DISCUSSION AND CONCLUSIONS As a first step, to assess the hypothesis that social communication may foster trust building in distributed software teams, we developed SocialCDE,(16–18) a tool that extends Microsoft Team Foundation Server and GitHub by disclosing information collected from popular social networks such as Facebook, Twitter, and LinkedIn. In our recent work,14 we took one further step toward collecting quantitative evidence that establishing trust between devel- opers contributes to project performance. Because trust has several facets, we focused initially on the propensity to trust, that is, the natural, personal disposition to perceive the others as trustworthy.19 We run an experiment where we used the IBM Watson Tone Analyzer service to measure the propensity to trust of Apache Groovy project's core team members through the analysis of their emails (see the first column in Table 1). Tone Analyzer has been built upon the Big-five personality model,20 a general taxonomy of personality traits including openness, conscientiousness, extraversion, agreeableness, and neuroticism. We focused on agreeableness, the personality trait associated with the tendency to trust others. In the experiment, we first identified the integration managers from the Groovy projects; then, we parsed the entire email archive to compute their agreeableness score and use it as a proxy measure of their high vs low level of propensity to trust. Finally, we built a logistic regression model to esti- mate the probability of pull requests being accepted after being reviewed by the project's integration managers. As compared to those with a low level of propensity to trust, we found that the distributed team members with a high propensity to trust are more likely (+34%) to accept external contributions in form of pull requests. To increase the validity of our findings, here we report the results from the analysis of Drill, another project from the Apache Software Foundation. In particular, we identified 22 core team members out of 88 overall contributors. As of this writing, the project counts almost 800 closed pull requests (ie, merged or rejected). Again, we mined the project's mailing lists archives to compute the agreeableness score for each of the core team members. In line with our previous findings, we found that pull requests reviewed by Drill integrators who have a high propensity to trust get accepted more often (+26%). To the best of our knowledge, this is the first attempt at quantifying the effects that trust or other developers' personal traits have on software projects that follow a pull request-based development model. As such, the main result of our work is the initial evidence that the personality traits of the integrators who perform the review of a code contribution are a strong predictor of the probability of its merge with the code base. This is a novel finding that highlights the role of trust in the execution of complex, software development tasks such as code review. As future work, first, we intend to replicate the experiment to compare several tools and assess their reliability in extracting personality from different types of technical text other than emails (eg, Q&A posts, commits messages, and error reports). Second, we intend to enlarge the dataset in terms of number and types of projects to understand whether developers' trust changes depending on the project, how it evolves over time, and whether negative events (eg, missed deadlines) recorded in project lifecycles can be traced back to observed cases of trust dissolution and restoration involving core team members. ORCID Fabio Calefato Filippo Lanubile http://orcid.org/0000-0003-2654-1588 http://orcid.org/0000-0003-3373-7589 4 of 4 CALEFATO AND LANUBILE REFERENCES 1. Schmidt K, Simonee C. Coordination mechanisms: towards a conceptual foundation of CSCW systems design. Comput Support Cooper Work. 1996;5(2–3):155–200. https://doi.org/10.1007/bf00133655. 2. Agerfalk J, Fitzgerald B. Flexible and distributed software processes: old petunias in new bowls. Comm ACM. 2006;49:27–34. 3. Jarvenpaa SL, Knoll K, Leidner DE. Is anybody out there? Antecedents of trust in global virtual teams. J Manage Inform Syst. 1998;14(4):29–64. https://doi.org/ 10.1080/07421222.1998.11518185. 4. Fulmer CA, Gelfand MJ. Dynamic trust processes: trust dissolution and restoration. Proceedings of the 23rd Annual International Association for Conflict 5. Wilson JM, Straus SG, McEvily B. All in due time: the development of trust in computer-mediated and face-to-face teams. Organ Behav Hum Decis Process. Management (IACM'10). 2010. http://dx.doi.org/10.2139/ssrn.1612497. 2006;99(1):16–33. https://doi.org/10.1016/j.obhdp.2005.08.001. 6. Marlow J, Dabbish L. Designing interventions to reduce psychological distance in globally distributed teams. Proceedings of Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2017) 2012. ACM Press; 2012. https://doi.org/10.1145/2141512.2141568. 7. Akgün AE, Keskin H, Cebecioglu AY, Dogan D. Antecedents and consequences of collective empathy in software development project teams. Inform Manag. 2015;52(2):247–259. https://doi.org/10.1016/j.im.2014.11.004. 8. Al-Ani B, Wilensky H, Redmiles D, Simmons E. An understanding of the role of Trust in Knowledge Seeking and Acceptance Practices in distributed development teams. Proceedings of 6th IEEE International Conference on Global Software Engineering; 2011. https://doi.org/10.1109/icgse.2011.25. 9. Calefato F, Lanubile F, Novielli N. The role of social media in affective trust building in customer supplier relationships. Electron Commerce Res. 2015;15(4):453–482. https://doi.org/10.1007/s10660-015-9194-3. 10. Rusman E, van Bruggen J, Sloep P, Koper R. Fostering trust in virtual project teams: towards a design framework grounded in a trust worthiness antecedents (TWAN) schema. Int J Human-Comput Studies. 2010;68(11):834–850. https://doi.org/10.1016/j.ijhcs.2010.07.003. Jarvenpaa SL, Leidner DE. Communication and trust in global virtual teams. J Comput Mediated Commun 2006;3(4): https://doi.org/10.1111/j.1083-6101.1998. tb00080.x. 12. Wang Y, Redmiles D. Cheap talk cooperation, and trust in global software engineering. Empir Software Eng. 2015;21(6):2233–2267. https://doi.org/10.1007/ 11. s10664-015-9407-3. 13. Treinen JJ, Miller-Frost SL. Following the sun: case studies in global software development. IBM Syst J. 2006;45(4):773–783. https://doi.org/10.1147/sj.454.0773. 14. Calefato F, Lanubile F, Novielli N. A preliminary analysis on the effects of propensity to trust in distributed software development. Proceedings of 12th IEEE International Conference on Global Software Engineering (ICGSE 2017). Piscataway, NJ, USA: IEEE Press; 2017:56–60. https://doi.org/10.1109/ICGSE.2017.1. 15. Tsay J, Dabbish L, Herbsleb J. Influence of social and technical factors for evaluating contribution in GitHub. Proceedings of 36th International Conference on Software Engineering-ICSE 2014. ACM Press; 2014. https://doi.org/10.1145/2568225.2568315. 16. Calefato F, Lanubile F. SocialCDE: a social awareness tool for global software teams. Proceedings of 9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'13). ACM Press; 2013: 587–590. https://doi.org/10. 1145/2491411.2494592. 17. Lanubile F, Calefato F, Ebert C. C. Group awareness in global software engineering. IEEE Software. 2013;30(2):18–23. https://doi.org/10.1109/MS.2013.30. 18. Calefato F, Lanubile F, Sanitate N, Santoro G. Augmenting social awareness in a collaborative development environment. Proceedings of the 4th International Workshop on Social Software Engineering (SSE'11); New York, NY, USA: ACM Press; 2011: 39–42. https://doi.org/10.1145/2024645.2024656 19. Wang Y, Redmiles D. The diffusion of trust and cooperation in teams with individuals- variations on baseline trust. Proceedings of 19th Conference on Computer-Supported Cooperative Work & Social Computing-CSCW 2016. ACM Press; 2016. https://doi.org/10.1145/2818048.2820064. 20. Costa PT, McCrae RR. The five-factor model, five-factor theory, and interpersonal psychology. Handbook of Interpersonal Psychology. Hoboken, NJ: John Wiley & Sons Inc.; 2012:91–104. https://doi.org/10.1002/9781118001868.ch6. How to cite this article: Fabio Calefato, Filippo Lanubile. Establishing personal trust-based connections in distributed teams, Internet Technology Letters, 2017;e2. https://doi.org/10.1001/itl2.6
1603.04643
1
1603
2016-03-15T11:32:10
Generalized threshold-based epidemics in random graphs: the power of extreme values
[ "cs.SI", "physics.soc-ph" ]
Bootstrap percolation is a well-known activation process in a graph, in which a node becomes active when it has at least $r$ active neighbors. Such process, originally studied on regular structures, has been recently investigated also in the context of random graphs, where it can serve as a simple model for a wide variety of cascades, such as the spreading of ideas, trends, viral contents, etc. over large social networks. In particular, it has been shown that in $G(n,p)$ the final active set can exhibit a phase transition for a sub-linear number of seeds. In this paper, we propose a unique framework to study similar sub-linear phase transitions for a much broader class of graph models and epidemic processes. Specifically, we consider i) a generalized version of bootstrap percolation in $G(n,p)$ with random activation thresholds and random node-to-node influences; ii) different random graph models, including graphs with given degree sequence and graphs with community structure (block model). The common thread of our work is to show the surprising sensitivity of the critical seed set size to extreme values of distributions, which makes some systems dramatically vulnerable to large-scale outbreaks. We validate our results running simulation on both synthetic and real graphs.
cs.SI
cs
Generalized threshold-based epidemics in random graphs: the power of extreme values Michele Garetto University of Torino [email protected] Emilio Leonardi Politecnico di Torino [email protected] Giovanni-Luca Torrisi IAC-CNR [email protected] 6 1 0 2 r a M 5 1 ] I S . s c [ 1 v 3 4 6 4 0 . 3 0 6 1 : v i X r a ABSTRACT Bootstrap percolation is a well-known activation process in a graph, in which a node becomes active when it has at least r active neighbors. Such process, originally studied on regular structures, has been recently investigated also in the context of random graphs, where it can serve as a simple model for a wide variety of cascades, such as the spreading of ideas, trends, viral contents, etc. over large social networks. In particular, it has been shown that in G(n, p) the final active set can exhibit a phase transi- tion for a sub-linear number of seeds. In this paper, we propose a unique framework to study similar sub-linear phase transitions for a much broader class of graph mod- els and epidemic processes. Specifically, we consider i) a generalized version of bootstrap percolation in G(n, p) with random activation thresholds and random node-to- node influences; ii) different random graph models, in- cluding graphs with given degree sequence and graphs with community structure (block model). The common thread of our work is to show the surprising sensitivity of the critical seed set size to extreme values of distribu- tions, which makes some systems dramatically vulnerable to large-scale outbreaks. We validate our results running simulation on both synthetic and real graphs. 1. INTRODUCTION AND RELATED WORK Many fundamental phenomena occurring in various kinds of complex systems, ranging from technological networks (e.g., transportation, communication, energy), to biologi- cal networks (e.g., neural, ecological, biochemical) and so- cial networks (in the real world or over the Internet) can be described by dynamical processes taking place over the underlying graph representing the system structure. Such processes modify over time the internal state of nodes and spread across the network following the edges of the graph. One of the most widely studied example of such dy- namical processes is the epidemic process, which starts from an initial set of infected nodes (usually referred to as seeds, chosen either deterministically or random) that Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. To appear at SIGMETRICS '16, June 14 -- 18, 2016, Antibes Juan-Les-Pins, France. c(cid:13) 2016 ACM. ISBN 978-1-4503-4266-7/16/06. . . $15.00 DOI: http://dx.doi.org/XXXX.XXXX can pass the infection to other (susceptible) nodes (under many possible models), possibly causing a major outbreak throughout the network. In our work we consider a generalized model for the spreading of an 'epidemic', in which nodes are charac- terized by an infection threshold r (either deterministic or random), and become infected when they collect from their neighbors an amount of influence larger than r. A special case of our model is the well known bootstrap per- colation process, in which r is an integer (r ≥ 2) and each edge exerts an influence equal to one: simply put, a node becomes infected when it has at least r infected neighbors. Bootstrap percolation has a rich history, having been initially proposed in the area of statistical physics [1]. Due to its many physical applications (see [2] for a survey) it has been primarily studied over the years in the case of regular structures (lattices, grids, trees), most notably in a series of papers by Balogh and Bollob´as (e.g., [3]). More recently, bootstrap percolation has been investigated also in the context of random graphs, which is the focus of this paper. In our work we are especially interested in epi- demics occurring on very large, irregular structures such as those representing friendship relationships among peo- ple. This interest is motivated by the great popularity gained by online social platforms (e.g., Facebook, Twit- ter, Instagram, etc.), which, coupled with the increasing availability of always-on connectivity through mobile per- sonal devices, has created an unprecedented opportunity for the rapid dissemination of various kinds of news, ad- vertisements, viral videos, as well as a privileged environ- ment for online discussion, creation and consolidation of beliefs, political opinions, memes and many other forms of collective reasoning. In this respect, bootstrap percola- tion provides a simple, primitive model that can be used to understand the diffusion of a generic 'idea' which re- quires a certain amount of 'reinforcement' from neighbors to be locally adopted. Some results have already been obtained for particu- lar random graph models. In particular, [4] first consid- ered bootstrap percolation in the random regular graph G(n, d), while [5] has extended the analysis to random graphs with given vertex degrees (configuration model). The above two papers assume that node degree is either fixed [4] or it has both finite expectation and finite sec- ond moment [5], implying that the cardinality of the seed set must scale linearly with n to observe a non-negligible growth of the epidemics. Both papers make use of the dif- ferential equation method to analyze the discrete Markov Chain associated with the epidemic process. The analysis in [5] also allows the threshold to vary among the nodes. A very different technique has been recently proposed in [6] to study bootstrap percolation in Erdos -- R´enyi G(n, p) graphs. This technique allows to analyze also scenarios in which a sharp phase transition occurs with a number of seeds which is sublinear in n: below a critical seed set size, for which one can get a closed-form asymptotic ex- pression, the infection essentially does not evolve, whereas above the critical size n−o(n) nodes get infected with high probability1. In G(n, p), this behavior is possible only when the average node degree itself grows with n (i.e., p ≫ 1/n). The technique proposed in [6] has been ap- plied by [7] to power-law random graphs generated by the Chung-Lu model (with power law exponent 2 < β < 3), obtaining the interesting result that, under bounded av- erage node degree, a sublinear seed set size is enough to reach a linear fraction of the nodes. Also our work started from the approach proposed in [6], which provides a simple and elegant way to explore phase transitions taking place at sub-linear scale. To op- erate at this scale, we let, if needed, the average node degree to grow with n, since this can be considered an acceptable assumption in many cases. Indeed, real social networks (and in particular online social networks), which evolve over time with the addition/removal of nodes/edges, often exhibit the so called densification phenomenon [8], meaning that the number of edges grows faster than the number of nodes (hence the average degree grows with time)2. The main thread of our work is to show the high 'vulner- ability' (in terms of critical number of seeds) that arises in networks when we add inhomogeneities in any one of many possible ways (i.e., by adding variability in thresh- olds, edge weights, node degree, or network structure). Although this effect has already been observed in epi- demic processes, the way in which inhomogeneities af- fect bootstrap percolation can be so dramatic that just extreme values of distributions (and not their particular shape) can determine the critical size of the seed set. We believe that this result, which apparently has not been recognized before, is of fundamental importance to better understand the dynamics of epidemics in complex sys- tems. 2. NOTATION AND PRELIMINARIES We start introducing some background material and notation taken from [6], which is necessary to follow the rest of the paper. As already mentioned, [6] provides a full picture of standard bootstrap percolation in Erdos -- R´enyi graphs G(n, p). Nodes are characterized by a common integer threshold r ≥ 2, and the process starts with an initial set A(0) of vertices (the seeds), of cardinality a, which are chosen uniformly at random among the nodes. 1Throughout this paper we shall use the following (stan- dard) asymptotic notation. Let f, g : R → R be two functions. We write: f (x) = o(g(x)) or f (x) ≪ g(x) f (x) and g(x) = ω(f (x)) or g(x) ≫ f (x) if limx→∞ g(x) = 0; f (x) = O(g(x)) if there exist K > 0, x0 ∈ R: f (x) ≤ f (x) Kg(x), for any x ≥ x0; f (x) ∼ g(x) if limx→∞ g(x) = 1. in this paper all limits are Unless otherwise specified, taken as n → ∞. 2in practice, asymptotic results provide very good predic- tions of what happens in large (but finite) systems when- ever the average degree is not too small, say significantly larger than r. We will use the same terminology adopted in [6], where infected nodes are called 'active', whereas non-infected nodes are said to be inactive. An inactive node becomes active as soon as at least r of its neighbors are active. Note that seeds are declared to be active irrespective of the state of their neighbors. Active nodes never revert to be inactive, so the set of active nodes grows monotonically. The bootstrap percolation process naturally evolves through generations of vertices that become active. The first gen- eration is composed of all those vertices which are acti- vated by the seeds. The second generation of active nodes is composed by all the nodes which are activated by the joint effect of seeds and first generation nodes, etc. The process stops when either an empty generation is obtained or all nodes are active. Now, it turns out that there is a useful reformulation of the problem that makes the process especially simple to analyze. This reformulation, which was originally pro- posed in [9], consists in changing the time scale, by in- troducing a virtual (discrete) time step t ∈ N, such that a single active node is 'explored' at each time step (if the process has not yet stopped). By so doing, we forget about the generations, obtaining a more amenable pro- cess which is equivalent to the original one, in terms of the final size of the epidemic. The above reformulation requires to introduce, besides the set A(t) of nodes which are active at time t, another set Z(t) ⊆ A(t), referred to as used vertices, which is the subset of active vertices, of cardinality t, explored up to time t. More precisely, at time zero the set A(0) is initialized to the seed set, while the set of used vertices is initialized to the empty set: Z(0) = ∅. Each node i is given a counter Mi(t) ∈ N, initialized to 0 at time t = 0. At time t = 1 we arbitrarily choose a node z(1) ∈ A(0) and we 'fire' its edges, incrementing by one the counter of all its neighbors. By so doing, we use node z(1), adding it to the set of used nodes, so that Z(1) = {z(1)}. We continue recursively: at each time t, we arbitrarily se- lect an active node which has not been already used, i.e., z(t) ∈ A(t−1)\ Z(t−1), and we distribute new 'marks' to its neighbors, which are not in Z(t−1), incrementing their counters. Node z(t) is added to the set of used vertices: Z(t) = Z(t− 1)∪{z(t)}. We then check whether there are some inactive vertices, denoted by set ∆A(t), that become active for effect of the marks distributed at time t (i.e., vertices whose counter reaches r at time t). Such newly activated vertices are added to the set of active vertices: A(t) = A(t − 1) + ∆A(t) (note that no vertices can be activated at time 1, being r ≥ 2). The process stops as soon as Z(t) = A(t), i.e. when all active nodes have been used. Let T = min{t : Z(t) = A(t)}. By construction, the final size A∗ of the epidemic is exactly equal to T : A∗ := A(T ) = Z(T ) = T . The above reformulation of the problem is particularly useful because the counter associated to each inactive node can be expressed as: Mi(t) = Ii(s) tXs=1 (1) i.e., as the sum of t independent Bernoulli random vari- ables Ii(s) of average p, each associated with the exis- tence/non existence of an edge in the underlying graph, between the node used at time s and node i. Indeed, it is perfectly sound to 'reveal' the edges going out of a node just when the node itself is used (principle of deferred decision). Moreover we can, for convenience, express the counters of all of the nodes at any time t ≥ 1 just like (1), without affecting the analysis of the final size of the epidemics. Indeed, by so doing we introduce extra marks that are not assigned in the real process (where each edge is revealed at most one, in a single direction), specifically, when a used node is 'infected back' by a neighboring used node. However, this 'error' does not matter, since it has no impact on the percolation process. Note that counters Mi(t) expressed in such a way are independent from node to node. The dynamics of the epidemic process are determined by the behavior of the number A(t) of 'usable' nodes (i.e., active nodes which have not been already used): A(t) = A(t) \ Z(t) = a − t + S(t) where S(t) represents the number of vertices, which are not in the original seed set, that are active at time t. Note that the final size of the epidemics equals the first time T at which A(T ) = 0. Moreover, by construction, the number of used vertices at time t equals t. Now, let π(t) := P(M1(t) ≥ r) = P(Bin(t, p) ≥ r) be the probabil- ity that an arbitrary node not belonging to the seed set is active at time t. There are n − a such nodes, each active independently of others, hence S(t) ∈ Bin(n − a, π(t)). In essence, we need to characterize trajectories of pro- cess A(t) which, besides a deterministic component a − t (decreasing with time), includes a random variable S(t) which is binomially distributed, with time-dependent pa- rameter π(t) (increasing with time): A(t) = a − t + Bin(n − a, P(Bin(t, p) ≥ r)) (2) In particular, whenever we can prove that, for a given t, P((inf τ ≤t A(t)) < 0) → 0, then we can conclude that at least t vertices get infected w.h.p. Similarly, if, for a given t, P(A(t) < 0) → 1, we can conclude that the percolation terminates w.h.p. before t, thus the final number of in- fected vertices will be smaller than t. We now present a simplified form of the main theorem in [6], together with a high-level description of its proof. Theorem 2.1 (Janson [6]). Consider bootstrap per- colation in G(n, p) with r ≥ 2, and a number a of seeds selected uniformly at random among the n nodes. Let p = p(n) be such that p = ω(1/n), p = o(n−1/r). Define: tc ac := (cid:18) (r − 1)! npr (cid:19)1/(r−1) r(cid:19) tc := (cid:18)1 − 1 (3) (4) If a/ac → α < 1 (subcritical case), then w.h.p. the final size is A∗ < 2a. If a/ac → α ≥ 1 + δ, for some δ > 0 (supercritical case), then w.h.p. A∗ = n − o(n). Note that, under the above assumptions on p(n), the 'crit- ical time' tc is such that both tc = ω(1) and tc = o(n), and the same holds for the critical number of seeds ac, which differs from tc just by the constant factor (1− 1/r), i.e., we get a phase transition for a sublinear number of seeds. The methodology proposed in [6] to obtain the above result is based on the following idea: A(t) is sufficiently concentrated around its mean that we can approximate it as A(t) ≈ E(A(t)) = a − t + (n − a)π(t). Now, for a wide range of values of t (i.e., whenever pt → 0, and in particular around tc), π(t) can be expressed as π(t) = tr pr r! (1 + O(pt + t−1)). Therefore function E(A(t)) has a clear trend: it starts from a at t = 0 and first decreases up to a minimum value reached at t ≈ tc, after which it grows to a value of the order of n. Hence, time tc acts as a sort of bottleneck: if E(A(tc)) is positive (negative), we are in the supercritical (subcritical) case. Finally, we can compute the asymptotic value of tc by finding the minimum of function f (t) = n tr pr The result then follows considering that, starting from a seeds, we get E(A(tc)) = a − ac + o(ac), and that by changing a we deterministically move up or down the pro- cess A(t). Hence, if we assume that a/ac is asymptotically bounded away from 1 we obtain a sufficient 'guard factor' around the trajectory of the mean process to conclude that the real process is either supercritical or subcritical (see Fig. 1). r! − t. ] ) t ( A [ E , s e d o n e l b a s u f o r e b m u n e g a r e v A a > ac a = ac a < ac 0 tc time step, t Figure 1: Example of (asymptotic) trajectories of the mean number of usable nodes, E(A(t)), with r = 3. The plot also illustrates by shaded regions the concept of 'guard zone'. We emphasize that in [6] authors use a martingale ap- proach to show that A(t) is sufficiently concentrated around its mean, which allows them to establish their results w.h.p. As last premise, it is better to clarify why we assume r ≥ 2. The reason is that the case in which a node can be infected by just a single neighbor is degenerate, and leads to the trivial fact that a single seed is enough to infect the entire connected components it belongs to. Hence, one has to apply a totally different set of tools [10] to characterize the final size of the epidemic. This case, however, is not interesting to us, since the networks of many real systems are connected by construction, or they at least have a giant connected component. Hence, no phase transitions occur here in the number of seeds. 3. SUMMARY OF CONTRIBUTIONS In this work we extend the approach of [6] along three 'orthogonal' directions that allow us to study more gen- eral threshold-based epidemic processes in inhomogeneous scenarios. 1. We consider a generalized version of bootstrap per- in which thresholds of nodes colation in G(n, p), are i.i.d. random variables Ri > 0, and infected nodes transmit a random amount of infection to their neighbors. Specifically, we assume that i.i.d. weights Wij are assigned to the edges of the graph, representing the amount of infection transmitted through P[W ] ij D1 D3 D 2 P[R ]i D 4 −3 −2 −1 0 1 2 3 4 5 6 7 8 9 10 11 Figure 2: Examples of distributions of Wij and Ri leading to the same (asymptotic) critical number of seeds ac. the edge. For this case, we obtain the asymptotic closed form expression of the critical number of seeds, and an exponential law for the probability that the process is supercritical or subcritical, strengthen- ing the results in [6] (where results hold, instead, w.h.p.). The most significant outcome of our analy- sis is that the critical number of seeds typically does not depend on the entire distribution of Ri and Wij, but just on values taken in proximity of the lower (for Ri) and upper (for Wij) extreme of their sup- port. For instance, in Figure 2 we show examples of two (discrete) distributions for Wij, labelled D1 and D2, and two (discrete) distributions for Ri, la- belled D3 and labelled D4. It turns out that any combination of them (Da, Db), with a ∈ {1, 2} and b ∈ {3, 4} leads to the same asymptotic critical num- ber of seeds ac. Note that the various distributions have different means, and that one of them (D2) has even negative mean. 2. We extend the problem reformulation originally pro- posed in [9], where a single node is used at each time, to a similar reformulation in which a single edge is used at a time. This view is more conve- nient to apply the approach of [6] to other random graph models. In particular, we consider graphs with given degree sequence (configuration model), obtaining a closed-form expression of the asymp- totic critical number of seeds. We then compute the scaling order of ac for the particular (but most significant) case of power-law degree sequence, con- sidering a wider range of parameters with respect to the one studied by [7]. Again, we observe the inter- esting phenomenon that in some cases the precise shape of the degree distribution (i.e., the power law exponent) does not matter, since ac is determined by the largest degree. 3. We extend the analysis to the so-called block model, which provides a simple way to incorporate a com- munity structure into a random graph model while preserving the analytical tractability of G(n, p). We observe once more the interesting effect that the critical number of seeds might be determined by a single entry of the matrix of inter- (or intra-) com- munity edge probabilities (i.e., the most vulnerable community). Although we consider (for simplicity) the above three forms of inhomogeneity 'in isolation', it is not particu- larly difficult to combine them, if desired. Indeed, we show that all extensions above can be studied within a unique framework. We emphasize that in this paper we generally assume that seeds are selected uniformly at ran- dom among the nodes, without knowledge of thresholds, weights, degrees, network structure. This differentiates our analysis from existing works addressing the so called influence maximization problem, i.e., finding the seed set that maximizes the final size of the epidemic (e.g., [11]). We observe that in the influence maximization frame- work many authors have already considered generalized models taking into account the impact of edge weights, node-specific thresholds, etc. (e.g., variants of the linear threshold model proposed in [12]). However, to the best of our knowledge, asymptotic properties of such generalized models are still not well understood. This paper makes a step forward in this direction analysing sublinear phase- transitions occurring when seeds are allocated uniformly at random in the network. Interestingly, in all cases that we consider the epidemic is triggered among the most vulnerable nodes, and then it spreads out hitting less and less vulnerable components of the network. This fact can have dramatic consequences on the minimum number of seeds that can produce a network-wide outbreak. In the following sections we present the above three contributions one at a time. Simulation experiments are presented along the way, to validate and better illustrate our analytical results. 4. GENERALIZED BOOTSTRAP PERCO- LATION IN G(n, p) 4.1 System model We start considering Erdos -- R´enyi random graphs G(n, p), extending basic bootstrap percolation to the case in which node thresholds and/or node-to-node influences are i.i.d random variables. We denote by Ri > 0 the (real-valued) threshold associated to node i. We then assign a (real- valued) random weight Wij to each edge of the graph, representing the influence that one node exerts on the other (see later). Node i becomes active when the sum of the weights on the edges connecting i to already active neighbors becomes greater than or equal to Ri. Recall that each edge of the graph is 'used' by the process at most once. Hence our analysis encompasses both the 'symmetric' case in which the influence (possi- bly) given by i to j equals the influence (possibly) given by j to i, and the 'asymmetric' case in which weights along the two directions of an edge are different (i.i.d.) random variables. In both cases, we can consider a single random weight on each edge. We do not pose particular restrictions to the distribu- tions of Ri and Wij , except for the following one, which avoids the degenerate case in which a node can get in- fected by a single edge (the case r = 1 in basic bootstrap percolation): ess inf Ri > ess sup Wij > 0. (5) Note that we can also allow Wij to take negative values, which could represent, in the context of social networks, neighbors whose behavior steers us away from the adop- tion of an idea. This generalization produces, indeed, rather surprising results, as we will see. However, nega- tive weights require to introduce some extra assumptions on the dynamics of the epidemics process, which are not needed when weights are always non-negative. Specifi- cally, with negative weights we must assume that i) once a node becomes infected, it remains infected for ever; ii) some random delays are introduced in the infection pro- cess of a node and/or on the edges, to avoid that a node receives the combined effect of multiple (simultaneous) influences from active neighbors. We argue that assump- tion ii) is not particularly restrictive, since in many real systems influences received by a node take place atomi- cally (e.g., a user reading ads, posts, twits, and the like). Assumption i) instead is crucial, because with negative weights counters no longer increase monotonically, and thus they can traverse the threshold many times in oppo- site directions. Assumption i) can be adopted, however, to study many interesting epidemic processes whose dy- namics are triggered by nodes crossing the threshold for the first time3. The analysis of the general case can be carried out by exploiting the same problem reformulation described in Sec. 2, in which a single active node is used at each time step. Indeed, we can associate to inactive nodes a (real-valued) counter, initialized to 0 at time t = 0, which evolves according to: Mi(t) = tXs=1 Ii(s)Wi(s) (6) where Ii(s), ∀s,∀i, is a Bernoulli r.v. with average p re- vealing the presence of edge (z(s), i) and Wi(s), ∀s,∀i, is the random weight associated to the same edge. Simi- larly to the basic case, the above expression of Mi(t) can be extended to all nodes and all times, without affecting the results. By so doing, counters Mi(t) are independent from node to node. We then re-define π(t), as the probability that an ar- bitrary node which is initially inactive (take node 1), has become active at any time τ ≤ t: π(t) := P(M1(τ ) ≥ R1, τ ≤ t) With the above definition, the system behavior is still determined by trajectories of process (2). We have: τ ≤t π(t) = P sup I1(s)W1(s) ≥ R1! τXs=1 ρ!pρ(1 − p)t−ρ · P sup tXρ=0 t ρ!pρ(1 − p)t−ρqρ tXρ=0 t (a) = = m≤ρ W1(s) ≥ R1! mXs=1 (7) where equation (a) is obtained by conditioning over the number ρ of variables I1(s) = 1, and we have defined qρ: qρ := P sup m≤ρ mXs=1 W1(s) ≥ R1! which can be interpreted as the probability that a node, which has sequentially received the influence of ρ infected neighbors, has become active. Let q∞ := limρ→∞ qρ. 3For example, on some online platforms, notifications that a user has watched a given viral video, bought a product, expressed interest for an event, etc., might be sent im- mediately (and once) to his friends, no matter if the user changes his mind later on. Note that, as consequence of elementary properties of ran- dom walks, q∞ = 1 when E[Wij ] ≥ 0 (recall also (5)). We introduce the following fundamental quantity: ρ∗ := min{ρ ≥ 2 : qρ > 0} (8) In words, ρ∗ is the minimum number of infected neigh- bors that can potentially (with probability qρ∗ ) activate a node. Note that, as consequence of (5), it must be ρ∗ ≥ 2. For example, under the distributions shown in Fig. 2, we have ρ∗ = 3, qρ∗ = P(Ri = 6) · P(Wij = 2)3. 4.2 Main results We are now in the position to state our main results for the generalized bootstrap percolation model in G(n, p). First, we define: tc :=(cid:18) (ρ∗ − 1!) npρ∗qρ∗ (cid:19) 1 ρ∗−1 ; ac :=(cid:18)1 − 1 ρ∗(cid:19) tc Moreover, we shall consider the function: H(x) := 1 − x + x log x, H(x) := +∞, x < 0 x > 0, H(0) := 1, Theorem 4.1 C1(ρ∗, α) := min x∈[α ρ∗−1 (Super-critical case). Under the as- ), a/ac → α for sumptions: 1/(np) → 0, p = o(n−1/ρ∗ some α > 1. Then, A∗ α(ρ∗ − 1) For the sub-critical case, we define the function ∀ δ > 0, P(cid:18)(cid:12)(cid:12)(cid:12) where C1(ρ∗, α) is the constant: xρ∗ n − q∞(cid:12)(cid:12)(cid:12) > δ(cid:19) = O(cid:16)e−C1(ρ∗,α)a+o(a)(cid:17) , H(cid:18) xρ∗ − α(ρ∗ − 1) (cid:19) . h(x) := x − (ρ∗)−1xρ∗ − α(1 − (ρ∗)−1), for x ∈ [0, 1], α ∈ (0, 1), and we we denote by ϕ(α) the only4 solution of h(x) = 0, x ∈ [0, 1]. Furthermore, having defined the interval I :=(cid:0)0, (1 − α)(1 − (ρ∗)−1)(cid:1), it holds: ∀δ > 0, ∃εδ ∈ I : [−δ, δ] ⊇ [h−1(−εδ) − ϕ(α), h−1(εδ) − ϕ(α)] (Sub-critical case). Under the as- ) and a/ac → α for sumptions: 1/(np) → 0, p = o(n−1/ρ∗ some α ∈ (0, 1). Then, ∀δ > 0, Theorem 4.2 ρ∗ ,∞) xρ∗ A∗ a − ρ∗ ρ∗ − 1 P(cid:18)(cid:12)(cid:12)(cid:12) ϕ(α) α (cid:12)(cid:12)(cid:12) > δ(cid:19) = O(cid:16)e−C2(ρ∗,α,εδ)a+o(a)(cid:17) , where εδ and ϕ(α) are defined as above, and C2(ρ∗, α, ε) := H (1 + ερ∗) . 1 α(ρ∗ − 1) We shall provide here a sketch of the proof of Theorems 4.1 and 4.2. The complete proofs, including all mathemat- ical details, can be found in [14]. At high level, we can show that almost complete per- colation occurs under super-critical conditions, by: i) analysing the trajectory of the mean of process (2), E[A(t)] = a − t + (n − a)π(t), finding conditions under which the above quantity is positive (with a sufficient guard factor) for any t < (q∞ − δ)n, for arbitrarily small δ > 0. 4Function h is ing h(1) = (1 − (ρ∗)−1)(1 − α) > 0. continuous on [0, 1] with h(0) = −α(1 − (ρ∗)−1) < 0 and strictly increas- and ii) showing that the actual process A(t) is sufficiently concentrated around its mean that we can conclude that A(t) > 0 w.h.p. for any t < (q∞ − δ)n. For the sub-critical regime we can use similar arguments, showing that E[A(t)] becomes negative at early stages, and that A(t) is sufficiently concentrated around its av- erage that we can claim that the actual process stops at early stages w.h.p. We start from the asymptotic approximation of π(t): π(t) = (pt)ρ∗ ρ∗! (qρ∗ + O(pt + t−1)). (9) which holds for any t such that pt → 0. The above ap- proximation allows us to write, for any t ≪ p−1: E[A(t)] = a−t+(n−a)π(t) = a−t+n under the further assumption that a = o(n). Thus, having defined for any t ∈ R+ function f (t) = a − t + (pt)ρ∗ ρ∗! qρ∗ , for n large enough we can determinate the sign of E[A(t)] for any t ≪ p−1 by analysing the behavior of f (t). Ele- mentary calculus reveals that f (t) has a unique minimum at: (pt)ρ∗ ρ∗! qρ∗ (1+o(1)) tc =(cid:18) (ρ∗ − 1!) with f (tc) = a−ac, ac =(cid:16)1 − 1 npρ∗ qρ∗ (cid:19) 1 ρ∗−1 ρ∗(cid:17) tc. Thus, we obtain an 1 n ≪ p ≪ n asymptotic closed-form expression for the critical number of seeds ac (one can easily verify that, under the assump- tion 1 ρ∗ , it holds tc → ∞, ac → ∞, ptc → 0, ac n → 0). The difficult part of the proofs is to show that A(t) is sufficiently concentrated around its expectation that we can establish exponential bounds (as n → ∞) on the probability that the final size of the epidemics falls outside the intervals stated in Theorems 4.1 (super-critical case) and 4.2 (sub-critical case). For the super-critical case, we adapt a methodology proposed in [6], which separately considers four time seg- ments5: i) segment6 [a, Ktc] (where K is a constant); ii) segment [Ktc, p−1]; iii) segment [p−1, cn] (where c is a constant); iv) segment [cn, n(q∞ − δ)]. Note that segment i) contains the most crucial, initial phase of the process. The following lemma provides a fundamental property related to segment i), which provides the key to obtain the result in Theorem 4.1: Lemma 4.3. Under the assumptions of Theorem 4.1, let K > α(1 − (ρ∗)−1) be an arbitrarily fixed constant. P(cid:18) inf t∈[a,Ktc]{a − t + S(t)} ≤ 0(cid:19) = O(cid:16)e−C1(ρ∗,α)a+o(a)(cid:17) , where C1(ρ∗, α) is given in the statement of Theorem 4.1. The detailed proof is reported in Appendix A. We outline here the three main ingredients to prove Lemma 4.3: i) we exploit standard concentration results for the binomial distribution, providing exponential bounds to P (S(t) − E[S(t)] > ǫtc) at any t in the considered do- main; ii) we employ the union bound to upper bound the probability P (supt S(t)− E[S(t)] > ǫtc) byPt P (S(t)− iii) we use the property E[S(xtc)] = E[S(t)] > ǫtc); xρ∗ tc ρ∗ + o(tc). We emphasize that in this paper we employ different techniques with respect to those used in [6], where au- thors rely on concentration results for supt S(t)− E[S(t)] derived from Martingale theory (Doob's inequality). In- stead, we combine deviation bounds specifically tailored to the binomial distribution (see Appendix A) with the union bound, obtaining a conceptually simpler approach which also permits us to obtain explicit exponential laws for probabilities related to the final size of the epidemics (i.e., a stronger result with respect to main Theorem 3.1 in [6], which holds just w.h.p.). As immediate consequence of Lemma 4.3 we can say that the process does not stop before Ktc with probability 1 − ζ(n), being ζ(n) = O(cid:16)e−C1(ρ∗,α)a+o(a)(cid:17). Considering that E[S(xtc)] ∼ xρ∗ tc ρ∗ quickly (super- linearly) increases after Ktc (as long as approximation (9) holds), we can expect that the process is extremely unlikely to stop in segment [Ktc, p−1], if it survives the first bottleneck segment. The proof of this fact is reported in Appendix A, where we also handle segment [p−1, cn]. Here we focus instead on the last temporal segment, where the value of q∞ comes into play determining the final size of the epidemics. Indeed, we are going to show that q∞n + o(n) are infected with probability 1− ζ(n). In general, we can assume that qρ = q∞−v(ρ) with v(ρ) → 0. Given an arbitrary ρ such that ρ∗ ≤ ρ < cnp, we make use of concentration inequality (20) to write: π(cn) ≥ ≥ cnXρ= ρ cn cnXρ= ρ cn ρ!pρ(1 − p)cn−ρqρ ρ!pρ(1 − p)cn−ρ(q∞ − v(ρ)) = P(Bin(cn, p) ≥ ρ)(q∞ − v(ρ)) ≥ (q∞ − v(ρ))(1 − e−cnpH( ρ/(cnp))) ≥ q∞ − (v(ρ) + e−cnpH( ρ/(cnp))) ≥ q∞ − ǫ 2 (10) for any arbitrary ǫ > 0 (and n large enough). We have: P(cid:18) inf t∈[cn,n(q∞−ǫ)] a − t + S(t) ≤ 0(cid:19) ≤ P(S(cn) + a ≤ n(q∞ − ǫ)) ≤ P (Bin(n, 1 − π(cn)) ≥ n(1 − q∞ + ǫ)) Exploiting (21), the above probability goes to 0 faster than ζ(n) for any ǫ > 0, proving that at least n(q∞ − ǫ) nodes are infected. When q∞ < 1, we can similarly show that no more than n(q∞ + ǫ) nodes are infected. Indeed, considering that π(n(q∞ + ǫ)) < q∞, we can apply (20) to show that P(S(n(q∞ + ǫ) + a − n(q∞ + ǫ) < 0) goes to 1 faster than ζ(n), for any ǫ > 0. 4.3 Validation 5The boundaries of all segments are to be meant as inte- gers. However, to simplify the notation, we will omit ⌊·⌋ and ⌈·⌉ symbols. 6note that the process cannot stop at t < a. To validate our analysis, and understand how well asymp- totic results can predict what happens in large (but fi- nite) systems, we have run Monte-Carlo simulations of our generalized bootstrap percolation model. In each run s e d o n d e t c e f n i f o n o i t c a r f e g a r e v a 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 D1 D2 D3 n = 105, ¯d = 20 n = 108, ¯d = 200 125 500 1250 number of seeds, a 5000 Figure 3: Phase transitions in G(n, p) for different threshold distributions D1, D2, D3, averaging the results of 10, 000 simulations. Analytical predictions are shown as vertical dotted lines. we change both the identity of the seeds and the structure of the underlying G(n, p) graph. We compute the aver- age fraction of nodes that become infected, averaging the results of 10,000 runs. We first look at the impact of random thresholds, while keeping equal weight Wij = 1 on all edges. We consider three different distributions of Ri: i) constant threshold equal to 2 (denoted D1); ii) uniform threshold in the set {2, 3, 4, 5}, (denoted D2); iii) two-valued threshold, with P(Ri = 2) = 1/4 and P(Ri = 10) = 3/4 (denoted D3); Note that all three distributions have ρ∗ = 2, but their expected values are quite different. Moreover, qρ∗ = 1 for D1, whereas qρ∗ = 1/4 for both D2 and D3. The asymptotic formula for the critical number of seeds gives in this scenario ac = n/(2 ¯d2qρ∗ ). We consider either a 'small' system, in which n = 105, ¯d = 20, or a 'large' sys- tem, in which n = 108, ¯d = 200. Results are shown in Fig. 3 using a log horizontal scale on which we have marked the values of ac derived from the asymptotic formula. We use the same line style for each threshold distribution, and different line width to distinguish the small system (thick curves) from the large system (thin curves). We make the following observations: i) the position of the phase transition (i.e., the critical number of seeds) is well estimated by the asymptotic formula; ii) despite hav- ing quite different shapes, distributions D2 and D3 lead asymptotically to the same critical number of seeds, as suggested by results obtained in the large system, where the corresponding curves are barely distinguishable (at ac = 5000); iii) phase transitions become sharper for higher values of the critical number of seeds, confirming that the probability law by which the process is supercrit- ical/subcritical depends strongly on ac itself (as stated in Theorems 4.1 and 4.2). We next move to a scenario in which the threshold is fixed, Ri = 2, and we vary the weights on the edges. We will consider, for simplicity, a simple case in which the influence exerted between two nodes can take just two values: +1, with probability z, and -1, with probability 1−z. Note that the average influence, E[Wij ] = 2z−1, can even be negative, if we select z < 1/2. In this scenario, we have ρ∗ = 2, qρ∗ = z2, hence ac = n/(2( ¯dz)2). We consider either a 'small' system, in which n = 105, ¯d = 20, or a 'large' system, in which n = 107, ¯d = 200, which produce the same value of ac, for any z. Results are shown in Fig. 4 (left plot), using a log horizontal scale on which we have marked the values of ac derived from the asymptotic formula. We use the same line style for each value of z, and different line width to distinguish the small system (thick curves) from the large system (thin curves). We observe that in the small system the average fraction of infected nodes saturates to a value s e d o n d e t c e f n i f o n o i t c a r f e g a r e v a 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 z=0.8 z=0.6 z=0.4 195 347 781 number of seeds, a y t i l i b a b o r p n o i t p r o s b a 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 z 100 90 80 70 60 50 40 30 20 10 0 n o i t p r o s b a o t e m i t n a e m Figure 4: (left plot) Phase transitions in G(n, p) for fixed threshold Ri = 2, and random weights ±1, with P(Wij = 1) = z. (right plot) results for the corresponding simple random walk. significantly smaller than one for z = 0.6, although we expect that, as n → ∞, all nodes should get infected in this case (for which q∞ = 1). In the large system, the discrepancy between simulation and asymptotic results disappears. This phenomenon can be explained by considering that the counter of inactive nodes behaves as a simple random walk (i.e., with steps ±1) with an absorbing barrier at ρ∗ = 2. Recall [13] that for this simple random walk the absorption probability is 1 for z ≥ 1/2, while it is equal to (z/(1 − z))2 for z < 1/2. Moreover, the mean time to absorption (conditioned to the event that the walk is ab- sorbed) is 2/1−2z (see right plot in Fig. 4). On the other hand, the time horizon of this equivalent random walk is limited by the node degree, since a node cannot receive a number of contributions to its counter greater than the number of its neighbors. In the small system the average degree ( ¯d = 20) is too small to approach the asymptotic prediction, whereas in the large system the average de- gree ( ¯d = 200) is large enough (i.e., much larger than the mean time to absorption) to observe convergence of the final size to the asymptotic prediction obtained with q∞. Interestingly, a finite fraction of nodes (asymptotically, around 0.44) gets infected with z = 0.4, a case in which the average node-to-node influence is negative! 5. RANDOM GRAPHS WITH ARBITRARY DEGREE DISTRIBUTION Up to now we have considered the G(n, p) random graph model, and we have followed the same problem reformu- lation adopted in [6], in which a single node is used at a time, revealing all its outgoing edges. This approach is especially suitable to G(n, p), since marks Mi(t) are i.i.d binomial random variables. We introduce now an alter- native description of the percolation process, in which a single edge is used at a time. This approach is more con- venient to analyze other random graph models, such as G(n, M ) (graphs with pre-established number of edges), G(n, d) (where all nodes have the same degree), or the configuration model. 5.1 Edge-based reformulation for G(n, M ) We consider the (multi)-graph G(n, M ) in which, start- ing from a graph with no edges, M edges are sequen- tially added, each connecting two nodes selected (inde- pendently) uniformly at random. Note that by so doing we can generate parallel edges, as well as self loops. How- ever, following the same approach as in Corollary 3 of [5], it is possible to show that sequences of events that occur w.h.p. over G(n, M ), occur w.h.p. also over G(n, M ), with G(n, M ) denoting the class of (simple)-graphs hav- ing M edges, with associated uniform probability law. Therefore our results apply to G(n, M ) as well. To analyze bootstrap percolation in G(n, M ), we con- sider the following dynamical process: when a node be- comes active, all edges connecting this node to other nodes which are still non active are denoted as 'usable', and added to a set B of usable edges. At a given time step t, one usable edge is selected uniformly at random from B(t − 1), adding one mark to the endpoint that was in- active (when the edge became usable), provided that this endpoint is still inactive. The selected edge is then re- moved from B(t). Set B(0) is initialized with the edges connecting seeds to non-seeds. By construction, at most one node can become active at each time instant. Hence, denoting with A(t) the number of active nodes at time t (initialized to a), we have A(t) ≤ a + t. Let π(t) be the probability that a node, which is not a seed, has been activated at time τ ≤ t. While it is not easy to write an exact expression of π(t), we can provide asymptotically tight bounds on π(t), as follows: 1 − 1 − 1 r−1Xj=0 t j!(cid:16) 1 n(cid:17)j(cid:16)1 − n(cid:17)t−j j!(cid:16) r−1Xj=0 t n − a − t(cid:17)j(cid:16)1 − 1 ≤ π(t) ≤ 1 n − a − t(cid:17)t−j 1 This because we can reveal the endpoint of an active edge only when this edge is used, by choosing uniformly at random one of the nodes that were non active at the time instant τ ′ at which the considered edge became active. Hence, an inactive node i receives a mark at time τ with probability n−A(τ ′) (independently from other previously collected marks). Furthermore, by construction, we have n−a−τ ≤ 1 1 n ≤ n−a−t . At timescale t = o(n), we can approximate π(t) as: n(cid:17)t−j j!(cid:16) 1 r−1Xj=0 t n(cid:17)j(cid:16)1− r!(cid:18) t n(cid:19)r (11) The dynamics of B(t) (whose size is denoted by B(t)) π(t) = 1− n−A(τ ′) ≤ n−A(τ ) ≤ +o(1) = 1 1 1 1 1 +o(1) obey the following equation: B(t) = B(0) + Σ(t) − t where Σ(t) represents the (cumulative) number of edges activated at τ ≤ t. The process stops at time T = min{t : B(t) = 0}. Similarly to the G(n, p) case, the number S(t) of nodes that have become active by time t is the sum of n − a identically distributed Bernoulli random variables Note that by construction marks are distributed only to inactive nodes, therefore a node i stops receiving marks as soon as Mi(t) = r. Differently from G(n, p), however, variables 11Mi(t)=r are not independent, given that at most with average π(t). Indeed, S(t) =Pi∈V\A(0) 11Mi(t)=r. t marks have been distributed by time t (i.e.,Pi Mi(t) ≤ t). Note that we still have E[S(t)] = (n − a)π(t). For what concerns the total number of edges activated by time t, Σ(t), we can express it as the sum of random variables Xk associated with nodes in A(t), representing the numbers of edges activated along with node k (i.e. the number of edges connecting node k with inactive nodes): Σ(t) = Xk. A(t)Xk=1 2 2 We can evaluate Xk by dynamically unveiling, for every inactive edge, whether node k is one of its endpoints (but not both). It turns out Xk = Bin(cid:16)M − Σ(τk − 1)− B(0), (n−A(τk−1))2(cid:17) where τk is the time instant at n−A(τk−1) − which the k-th node was activated. Indeed, M − Σ(τk − 1) − B(0) represents the number of edges still to be ac- tivated at time τk, while (n−A(τk −1))2 is the probability that node k is an endpoint (but not both) of any such edges. Observe that variables Xk are not inde- pendent, as consequence of the fact that that sum of all edges in the graph is constrained to be M . However, Xk is conditionally independent from Xk′ , with k′ < k, given Σ(τk − 1) and A(τk − 1). Moreover, for any k we have: n−A(τk −1) − 2 2 Bin(cid:16)M − Σ(t) − B(0), 2 n − ≤st Bin(cid:16)M, n − a − t − 2 2 2 n2(cid:17) ≤st Xk (n − a − t)2(cid:17). A(t)(cid:21) ≤ E[Σ(t)] ≤ (12) In particular, the expectation of Σ(t) satisfies: n2 E(cid:20) 2(n − 1)(M − Σ(t) − B(0)) 2M E[A(t)] n − a − t Moreover, under the assumption a ≪ n, since for t ≪ n, A(t) ≤ a + t ≪ n and Σ(t) + B(0) = o(M ), we have: E[A(t)](1 + o(1)) = 2M π(t)(1 + o(1)) E[Σ(t)] = . 2M n while B(0) = 2M conclusion: n a(1 + o(1))). Recalling (11), we have in E[B(t)] =(cid:18) 2M n a + 2M r! (cid:18) t n(cid:19)r − t(cid:19) (1 + o(1)) Now, similarly to the case of G(n, p), we can determine the critical number of seeds by: i) determining sufficient and necessary conditions under which E[B(t)] > δ M n a for some arbitrary δ > 0 and any t ≪ n; so doing we determine the critical number of seeds ac. ii) Exploiting the fact that B(t) is sufficiently concentrated around its mean for t ≤ K M n ac, where K > 1 is a properly defined n ac < t < M (1 − ǫ), constant. B(t) can be bounded from below away from 0. iii) Showing that for K M For what concerns point i) we follow the same lines as nr − t, for G(n, p), defining function g(t) = 2 M and finding the minimum of g(t), which is achieved at: n a + 2M tr r! r−1 r−1 2M = 2M n ( 2M 2M (cid:19) 1 n (r − 1)! n2 )r−1! 1 tc =(cid:18) (r − 1)!nr with tc = o(n) as long as M ≫ n. Observe that 2M n is the average node degree (replacing np in the expression of tc obtained for G(n, p)) while 2M n2 can be interpreted as the probability that two specific vertices are connected by at least an edge (replacing p for G(n, p)). Evaluating g(tc) and imposing g(tc) = 0, we obtain the critical number of seeds: ac =(cid:18)1 − 1 r(cid:19) (r − 1)! n2 )r−1! 1 n ( 2M 2M r−1 (13) which is exactly the same as what we get in G(n, p) through the substitution 2M n → np and 2M n2 → p. n ac) = o(M ) and A(K M For what concerns ii) and iii) we can proceed in analogy with the case of G(n, p), exploiting standard concentra- tion results. In particular, we first focus on time instants t ≤ K M n ac for suitable K > 2. We need to show that B(t) > 0 w.h.p. provided that E[B(t)] > ǫac for arbitrary ǫ > 0 (i.e., a > (1 + ǫ)ac). To this end observe that from (12), the fact that Σ(K M n ac) = o(n), and recalling the above mentioned property of con- ditional mutual independence of variables Xk, it descends that w.h.p., for any t ≤ K M n ac: P (Σ(t) ≤ t − B(0)) ≤ P (PA(t) 1 X k ≤ t − B(0)) with X k mutually independent and X k = Bin(cid:16)M (1− ǫ), 2 ǫ > 0. At last observe that P (PA(t) 1 X k ≤ t − B(0)) can For what concerns iii) we adopt arguments conceptually similar to the case of G(n, p), exploiting the fact that E[B(t)] quickly (super-linearly) increases after K M n2(cid:17) for an arbitrarily small be easily bounded using inequalities (20) and (21). n − 2 n ac. 5.2 Configuration Model The edge-based problem reformulation described in pre- vious section can be easily extended to the configuration model G(n, p(d)), in which we specify a given degree se- quence (possibly dependent on n) with associated empiri- cal distribution function p(d). For simplicity, we limit our- selves to describing the computation of the critical num- ber number of seeds ac. However, the approach can be made rigorous by following the same lines as for G(n, M ). As before, properties of multi-graphs G(n, p(d)) apply as well to simple-graphs G(n, p(d)). Similarly to what we have done for G(n, M ), we focus on the evolution of the number of activable edges: B(t) = B(0) + Σ(t) − t and compute the critical time tc by finding the minimum of E[B(t)]. The impact of node degree can be taken into account by evaluating the probability π(t, d) that a node with degree d has been activated by time t. Moreover, we need to consider the amount of edges that a node contributes to B after being activated. There are in total n ¯d 'end-of-edges' in the network, so the probability that a given end-of-edge is active at time t is t/(n ¯d). Hence, we can write: π(t, d) = 1− n ¯d(cid:19)j(cid:18)1 − t n ¯d(cid:19)d−j + o(1), (14) r−1Xj=0 d j!(cid:18) t n ¯d(cid:19)r r!(cid:18) dt 1 Since t/(n ¯d) is small, we can approximate it as π(t, d) = + o(1) (d ≥ r) Observe that since, by construction, a node gets activated thanks to exactly r active edges, it contributes d − r new edges to B. Then for t ≪ n since A(t) ≤ t + a ≪ n we can approximate the average value of B(t) as: 1 ¯d p(d) Now, if we define E[B(t)] ∼ B(0) + nXd≥r d∗ =Xd≥r(cid:18) d we obtain E[B(t)] ∼ B(0) + ¯dntr tc = n(cid:18) (r − 1)! derive the critical time tc: (d − r)p(d) − t. n ¯d(cid:19)r r!(cid:18) dt ¯d(cid:19)r d − r r!nr d∗− t, from which we can ¯d d∗ (cid:19) 1 r(cid:19) n(cid:18) (r − 1)! ¯dr d∗ (cid:19) 1 ac =(cid:18)1 − and the critical number of seeds: (16) (15) r−1 r−1 1 One can easily check that the above formula is consis- tent with what we get in G(n, p) or G(n, M ), for which d∗ ∼ 1. The above formula holds when seeds are selected uniformly at random. However, note that our analysis could be immediately extended to the important case in which seeds are chosen on the basis of the node degree. Indeed, what really matters is only the cardinality of the initial set of edges connecting seeds to non-seeds. s e d o n d e t c e f n i f o n o i t c a r f e g a r e v a 1 0.8 0.6 0.4 0.2 0 100 248 555 595 G(n,M) G(n,d) 10-50 200 300 400 500 600 700 number of seeds, a Figure 5: Phase transitions of basic bootstrap per- colation with r = 2, in different random graph models with n = 106, ¯d = 30. Figure 5 reports simulation results for three different random graph models having n = 106 nodes, and aver- age node degree ¯d = 30. We consider basic bootstrap percolation with r = 2. We compare the G(n, M ) model, the regular G(n, d) (in which nodes have constant degree), and a configuration model in which half of the nodes have degree 10 while the other half have degree 50 (curve la- belled '10-50'). Analytical results obtained by (13) (for G(n, M )), and by (16) (for the other two graph models) are marked on the top margin. As expected, for fixed average degree, the critical number of seeds decreases for increasing variance of the degree distribution. We experimented also with a real online social net- work, considering user-user friendship relations of Orkut, a former social networking site run by Google. In par- ticular, we have used a crawled sub-graph of Orkut with n = 3, 072, 441 nodes [15], hereinafter referred to as Orkut graph, although it represents only a small percentage (11%) of the entire social network. The average node degree of this graph is ¯d = 76.3, and the maximum degree is dmax = 33, 313. An interesting question that arises here is the following: does a configuration model with the same number of nodes as the Orkut graph, and exactly the same degree sequence, produce also a similar value of ac? If the answer is affirmative, it would tell us that the degree distribution alone, and not the entire network structure, could be used to predict (even analytically) the onset of large-scale outbreaks in this kind of systems (as suggested also by [16]). We partially answer this question by run- ning simulations on both the original Orkut graph and the matched configuration model, as well as by analyti- cally evaluating ac using (16). Besides basic bootstrap percolation, we explored also the interesting variation in which r is a deterministic func- tion of the node degree. Indeed, note that (14) can be im- mediately generalized to r = r(d), although in this case we do not get a closed-form expression for ac, and the minimum of E[B(t)] has to be computed numerically (we omit the details of this computation). s e d o n d e t c e f n i f o n o i t c a r f e g a r e v a 1 0.8 0.6 0.4 0.2 0 r=2 10 94 852 16800 r=5 log law square root law 10000 100 number of seeds, a 1000 Figure 6: Phase transitions in the Orkut graph and the matched configuration model, for different threshold functions. Results are shown in Fig. 6, where thick lines refers to the real Orkut graph, while thin lines refers to the matched configuration model. We use different line styles for i) basic bootstrap percolation with r = 2 or r = 5; ii) the logarithmic law r(d) = max{2,⌈log2(d)⌉}; iii) the square root law r(d) = max{2, ⌈√d⌉}; Analytical pre- dictions of ac are shown as vertical dotted lines (except for r = 2, for which (16) provides a value of ac even smaller than r = 2). We observe similar phase transi- tions in the Orkut graph and the associated configuration model, while the analysis captures quite well the point after which a major outbreak occurs. 5.3 Impact of power-law degree distribution Large networks observed in a variety of different do- mains (social, technological, biological networks) are char- acterized by the scale-free property, which implies a power law degree distribution. Hence, it is interesting to under- stand the impact of power-law degree distributions on the critical seed set size. We will consider here power-law de- gree distributions of the form p(d) = C dβ for dmin ≤ d ≤ dmax (17) where β is the power-law exponent (typically larger than 2), and C is the normalization factor. We will further assume that dmax → ∞, while dmin = o(dmax). Note that by letting dmin scale up with n we can obtain an increasing average node degree (graph densification) in the most common case in which β > 2. by solving the inequalityR ∞ The reason why we introduce a maximum node degree dmax is instead more subtle, and has to do with the fact that p(d) must be the limiting distribution function of a sequence of empirical distribution function (for each n) as- sociated with the configuration model. Clearly, we cannot have in any case a degree larger than n−1, but it turns out that, for the common case of β > 2, nodes with very large degree are so rare that is preferable to avoid them at all, setting to zero p(d) after a given dmax = nζ , with ζ < 1. The maximum value of ζ, for β > 1, can be obtained nζ Cx−β dx > n−1. For exam- ple, when β > 1, dmin = Θ(1), we have ζ ≤ 1/(β − 1). In practice, we never see nodes with extremely large degree7, and it is actually customary in many random graph mod- els to assume that the maximum degree is smaller than, say, n1/2. In our model, we try to be more flexible by allowing a generic dmax = nζ ≪ n, satisfying the above constraint (if β > 1). In practice, one can starts with a desired distribution p(d) of the form (17), having chosen dmin and dmax (de- pending on n), and construct a sequence {di}n of degrees for the configuration model by assigning to node i the de- gree di = inf{d : 1− Fn(d) < i/n}, where Fn(d) is the cdf of p(d). Under our assumptions we have, asymptotically, 1−β d1−β max β−1 dβ−1 min if β < 1 if β > 1 C ∼ β−1 β−k−1 The following expression for the generic k-th moment of p(d) will come in handy in the following: E[dk] ∼ dk min dβ−1 min dk+1−β dk max max 1−β k+1−β β−1 k+1−β if β > k + 1 if 1 < β < k + 1 if β < 1 (18) Note that moments of order k < β − 1 depend only on dmin (e.g., the average node degree (k = 1), when β > 2). Instead, moments of order k > β − 1 may depend also (or exclusively) on dmax. Recall that our methodology to compute the critical seed set size requires that ac is both ω(1) and o(n). This regime implies that the average node degree ¯d cannot be either too small nor too large. Recall that in the G(n, p) r−1 model we need that ¯d ≫ 1 and ¯d ≪ n r . Under a general degree distribution, it is not stricly necessary that ¯d ≫ 1, since (look at formula (16)) we could just have d∗ → ∞, resulting into a number of seeds o(n). To better understand how the critical number of seeds depends on parameters of the power-law distribution, we evaluate its scaling order with n, assuming for simplicity that dmin = nγ , with 0 ≤ γ < ζ. When β > 1, we further assume ζ ≤ 1 β−1 − γ to avoid rare nodes having very large degree. We see from (15) that d∗ depends essentially on the (r + 1)-th moment of p(d), i.e., d∗ = Θ(cid:16) E[dr+1] (E[d])r+1(cid:17) 7In many real systems the tail of the degree distribution exhibits an exponential cut-off, and often the degree can- not exceed a maximum value imposed by physical or tech- nological constraints. (assuming E[d] > r). We can thus use the expressions in (18), and obtain that the scaling exponent of ac is 8 e(ac) = r−1 1 − γr 1 − γ(β−2)+ζ(r+2−β) 1 − ζr r−1 r−1 γ > 0 if β > r + 2, if 2 < β < r + 2, γ ≥ 0 if β < 2, γ ≥ 0 (19) s e d o n d e t c e f n i f o n o i t c a r f e g a r e v a 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 β = 2.5 dmax = 104 r = 2 ac = 2 β = 3 dmax = 103 r = 2 ac = 53 β = 0 dmax = 300 r = 4 ac = 981 β = 2.5 dmax = 104 r = 6 ac = 112 β = 1 dmax = 300 r = 4 ac = 1152 10 100 1000 number of seeds, a Figure 7: Phase transitions of basic bootstrap per- colation in random graphs with n = 106 nodes and power-law degree. We should mention that our results are only partially aligned with those obtained for Chung-Lu graphs9 with power-law degree distribution in [7], where authors con- sider the case 2 < β < 3, γ = 0. In particular, in [7] they suggest that, when dmax = Θ(n1/(β−1)), ac is of the order of n β−2 β−1 , independently of r. Figure 7 reports simulation results under our power- law configuration model. The number of nodes is always n = 106, dmin = 10, and we try different combinations of β, dmax and r. The values of ac computed by (16) are also shown on the plot. We see that, with β = 2.5, dmax = n1/(β−1) = 104, very few seeds are needed with r = 2, and many more with r = 6. We also consider two cases with β < 2, dmax = 300, r = 4, to show that, in accordance with (19), when β < 2, ac depends essentially only on the extreme value of the node degree distribution (i.e., dmax), on not on its shape. Indeed, the phase transitions obtained with β = 0 and β = 1 are not that far away, as predicted by our computed values of ac, despite the fact that the average degree is quite different in the two cases (i.e., 84 (β = 1) vs 155 (β = 0)). 6. COMMUNITY BASED GRAPHS: THE BLOCK MODEL Another important feature of many graphs represent- ing real systems is the presence of a community structure (i.e., a non-negligible clustering coefficient). This feature is not captured by any of the random graph models con- sidered so far. In this section, we extend the analysis of basic bootstrap percolation to the so called block model, which naturally extends the G(n, p) model to incorporate a community structure. We will start from the simple case of just two communities, and then extend our results to K < ∞ communities. 8The scaling exponent of a generic function f (n) is defined as e(f ) := limn→∞ 9Interestingly, our scaling exponent in (19), for 2 < β < 3, γ = 0, perfectly matches quantity a+ c in [7] (Theorem 2.3). log(f (n)) log(n) . 6.1 The case of two communities We consider a G(n1, n2, p1, p2, q) block model compris- ing two communities of n1 and n2 nodes, respectively (with n1 + n2 = n). The sub-graph induced by nodes be- longing to community i (with i = 1, 2) is an Erdos-R´enyi's graph G(ni, pi). Pairs of nodes belonging to different com- munities are independently connected with probability q. We assume q < min(p1, p2) and q = Ω(max( 1 )). We n1 denote by Vi the set of nodes belonging to community i. Bootstrap percolation in G(n1, n2, p1, p2, q) can be re- formulated in two different ways, which allow us to obtain different (complementary) results. We explain here our first approach. An alternative reformulation is described in Appendix B. , 1 n2 In our first approach we assume that, at each discrete time step t, two active nodes (one in community 1 and one in community 2) are simultaneously used, whenever they are both available. If a community runs out of (ac- tive) usable nodes, while the other still has some available (active) usable nodes, a single node is used at a time. We denote by Ai(t) and Zi(t), respectively, the set of active nodes and the set of used nodes in community i at time t. Let Ai(t) = Ai(t) \ Zi(t) be the cardinality of the set of active usable nodes in community i. Observe that it is entirely possible that, say, A1(t) hits zero at some point, but later on it increases again for effect of marks received by inactive nodes in V1 from nodes used in V2. This event makes an exact analysis of the system partic- ularly difficult. Note that the process definitely dies at time T : T := min{t ∈ N+ : A1(t) = 0, A2(t) = 0}. We introduce a new quantity Ti(t), representing the number of nodes that have been used in community i up to time t: Ti(t) := Zi(t). From the above discussion, observe that Ti(t) is not necessarily equal to t, for t ≤ T , in constrast to what happens in G(n, p), where Zi(t) = t, ∀t ≤ T . The number S1(t) of initially inactive nodes in V1 that are active at time t can then be expressed as: S1(t) = Bin(n − a1,bπi(T1(t), T2(t)) where bπ1(t1, t2) = P (Bin(t1, p1) + Bin(t2, q) ≥ r). For p1t1 ≪ 1 we have: r! ρ=0 tr, as in G(n, p). (similar expressions can be written for S2(t) andbπ2(t1, t2) provided that p2t2 ≪ 1). Note that, whenever t1 = t2 = t, previous approximation simplifies to: bπ1(t, t) ∼ Pr pρ 1 qr−ρ ρ!(r−ρ)! tr. Moreover, if q ≪ p1, the latter further simplifies tobπ1(t, t) ∼ (p1)r To characterize the system behavior, we stochastically upper and lower bound Si(t), for i = 1, 2, by two virtual processes Si(t) and S i(t) obtained in the following shadow systems: a shadow reduced system, in which inter-community edges are removed, and thus each community evolves as in isolation. Note that process Si(t) associated to the reduced system is equivalent to what we would get in a G(ni, pi) model; a shadow augmented system (viewed by community i), in which we assume that a new node can always be used in the other community (if the other com- munity has no usable nodes, an arbitrary inactive node in the other community is selected and used). rXρ=0 bπ1(t1, t2) ∼ (p1t1)ρ ρ! (qt2)r−ρ (r − ρ)! It immediately descends from their definitions that: S1(t) = Bin(n1 − a1,bπ1(T 1(t), 0)) S1(t) = Bin(n1 − a2,bπ1(T 1(t), t)) Furthermore, by induction over time, it can be immedi- ately shown that: S1(t) ≤st S1(t) ≤st S1(t), where ≤st indicates the less or equal operator under usual stochas- tic ordering (also known as 'first order stochastic domi- nance'). Now, under the joint conditions A1(τ ) 6= Z1(τ ) and A2(τ ) 6= Z2(τ ) for any τ < t, by construction S1(τ ) = S1(τ ) and S2(τ ) = S 2(τ ) for any τ < t, which allows us to conclude that also at time t: S1(t) = S1(t) and S2(t) = S2(t). Then, by induction over time: {A1(τ ) 6= Z1(τ ), A2(τ ) 6= Z2(τ ),∀τ ≤ t} τ <t =(cid:26)inf =(cid:26)inf τ <t min(S1(τ ) − τ + a1, S2(τ ) − τ + a2) > 0(cid:27) min(S1(τ ) − τ + a1, S2(τ ) − τ + a2) > 0(cid:27) . In particular, whenever S1(t) and S2(t) both satisfy su- percritical conditions, then necessarily Ai(t) 6= Zi(t) and Si(t) = Si(t), for any t < max(n1, n2) − o(max(n1, n2)). More formally, exploiting the results in 4.2, we get: Theorem 6.1. Suppose 1/(nipi) → 0 , pi = o(n−1/r c → αi, for some αi > 1 with i = {1, 2}, and: i ai/a(i) ), a(i) c =(cid:18)1 − where bpi = rq(r!) ·Pr ∀ε > 0, P(cid:18)1− maxi(ni) T 1 pρ i qr−ρ ρ!(r−ρ)! . Then, having defined ni(bpi)r(cid:19)(r−1)−1 r(cid:19)(cid:18) (r − 1)! > ε(cid:19)= O(cid:16)e−C1(r,mini(αi))a+o(a)(cid:17) T = inf t{mini(ai − t + Si(t)) < 0} we have: ρ=0 where C1(r, α) is the same function as in Theorem 4.1. Theorem 6.1 provides sufficient (but not necessary) con- ditions for almost complete percolation of G(n1, n2, p1, p2, q). To complement previous result, suppose that S1(t) sat- isfies supercritical conditions (while to avoid trivialities we assume S2(t) to be sub-critical). In this case complete or almost complete percolation occurs in V1 as immedi- ate consequence of Theorem 4.1 applied to community 1 in isolation, and the fact that S1(t) ≤ S1(t). Then, under the assumption that q ≥ Ω(max( 1 )), we obtain com- plete or almost complete percolation also in community 2, since any node in V2 would have finite probability of having at least r neighbors in V1 , 1 n2 10. n1 It remains to analyze the case in which S1(t) is super- critical (but S1(t) is sub-critical), and S2(t) is not super- critical (or viceversa). This case, which can occur only when q and p1 are of the same order, is more involved and we leave it to future study. 6.2 Extension to the general block model Results obtained for the case of two communities can be rather easily extended to a more general block model with 10More in general, for q ≪ 1 , we could study percolation in community 2 in isolation after: i) adding to a2 the nodes in V2 that have at least r neighbors in V1; ii) reduce the threshold r for all inactive nodes in V2 to a stochastic threshold R ≤ r accounting for marks received from V1. n2 K < ∞ heterogeneous communities, specified by a sym- metric matrix P , whose element pjk represents the proba- bility that a node belonging to community j is connected to a node belonging to community k (with i.i.d. proba- bilities for all such pairs). Note that diagonal elements of P provide inter-community edge probabilities. In Ap- pendix C, besides our system assumptions, we present two different upper bounds on the critical number of seeds. Interestingly, both bounds depends critically on extreme values of the model parameters, and in some cases a sin- gle community can determine the phase transition of the entire system. 7. CONCLUSIONS We proposed a unique framework to study sub-linear phase transitions of threshold-based 'activation processes' in random graphs, adding inhomogeneities in the system along different (orthogonal) directions. We found that in several cases the critical seed set size depends critically just on extreme values of distributions, providing novel insights into the dynamics of epidemic processes in com- plex systems. 8. REFERENCES [1] J. Chalupa, P.L. Leath, G.R. Reich, "Bootstrap percolation on a Bethe lattice," J. Phys. C, Vol. 12, L31 -- L35 (1979). [2] J. Adler, U. Lev, "Bootstrap percolation: visualizations and applications," Braz. J. Phys, 33(3), (2003). [3] J. Balogh, B. Bollob´as, H. Duminil-Copin, R. Morris, "The sharp threshold for bootstrap percolation in all dimensions," Trans. A. Math. Soc., 36, (2012). [4] J. Balogh, B.G. Pittel, "Bootstrap percolation on the random regular graph," Random Struct. Algor., 30(1 -- 2), 257 -- 286 (2007). [5] H. Amini, "Bootstrap percolation and diffusion in random graphs with given vertex degrees," Electron. J. Combin. 17, R25 (2010). [6] S. Janson, T. Luczak, T. Turova and T. Vallier. Bootstrap percolation on the random graph Gn,p. Ann. Appl. Probab., 22(5):1989 -- 2047, 2012. [7] H. Amini and N. Fountoulakis, "Bootstrap percolation in power-law random graphs", Journal of Statistical Physics, 155:72 -- 92, 2014. [8] J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graphs over time: Densification and shrinking diameters," ACM Trans. on Knowledge Discovery from Data, 1(1), 2007. [9] G. Scalia-Tomba, "Asymptotic Final-Size Distribution for Some Chain-Binomial Processes", Advances in Applied Probability, 17(3), 477 -- 495, 1985. [10] A. Martin-Lof, "Symmetric Sampling Procedures, General Epidemic Processes and Their Threshold Limit Theorems", Journal of Applied Probability 23(2), 265 -- 282, 1986. [11] D. Kempe, J. Kleinberg, E. Tardos, "Maximizing the spread of influence in a social network," in Proc. ACM SIGKDD, 2003. [12] D. Watts, "A simple model of global cascades in random networks," In Proc. Natl. Acad. Sci, pp. 5766 -- 71, 2002. [13] W. Feller, "An Introduction to Probability Theory and its Applications," Wiley, 1968. [14] Companion technical report, available at https://www. dropbox.com/s/o01wx3a2cg0nx4x/Techrep.pdf?dl=0. [15] A. Mislove, M. Marcon, K.-P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and analysis of online social networks," IMC '07. [16] P. Brach, A. Epasto, A. Panconesi, P. Sankowski, "Spreading rumours without the network," in Proc. ACM COSN, 2014. [17] M. Penrose. Random Geometric Graphs. Oxford University Press, Oxford, 2004. APPENDIX A. THEOREM 4.1 First we introduce the following concentration inequal- ities for the binomial distribution Bin(n, p), taken from [17]: Let H(b) = 1 − b + b log b, for b > 0. Let µ = np. If k ≤ µ then: If k > µ then: µ(cid:19)(cid:19) P(Bin(n, p)) ≤ k) ≤ exp(cid:18)−µH(cid:18) k µ(cid:19)(cid:19) P(Bin(n, p)) ≥ k) ≤ exp(cid:18)−µH(cid:18) k (20) (21) Proof of Lemma 4.3. For any δ > 0, We have a = α ac + o(1) > (α − δ)ac, and so, by the definition of ac, for any t = a, . . . , ⌊Ktc⌋, {S(t) − t + a ≤ 0} ⊆(cid:8)S(t) − t + (α − δ)(1 − (ρ∗)−1)tc ≤ 0(cid:9) =(cid:8)S(t) ≤ t − (α − δ)(1 − (ρ∗)−1)tc(cid:9) (cid:26) inf ⊆ [t∈[a,⌊Ktc⌋](cid:8)S(t) ≤ t − (α − δ)(1 − (ρ∗)−1)tc(cid:9) S(t) − t + a ≤ 0(cid:27) = [t∈[a,⌊Ktc⌋] {S(t) − t + a ≤ 0} Hence: t[a,⌊Ktc⌋] Moreover, defining x = t/tc, it can be be proved that: have {a − t + S(t) < 0 for some t ∈ [tj , tj+1]} ⊆ {S(tj ) < tj+1}. In conclusion, under super-critical conditions the process never stops before p−1 with probability 1 − ζ(n). Segment [p−1, c n]. Beyond time p−1 we can no longer use (9). However, we can easily handle segment [p−1, cn] and already conclude that, in all cases, the process reaches at least a constant fraction of the nodes (if it survives the bottleneck). For this, we exploit the fact that π(⌈p−1⌉) ≥ qρ∗ P (Bin(p−1, p) > Ri) > 2c for some constant c > 0. Using again union bound and concentration inequalities, we then show that the process never stops before cn with probability 1 − ζ(n). B. ALTERNATIVE APPROACH FOR TWO COMMUNITIES We introduce a different approach for the G(n1, n2, p1, p2, q) block model, which allows us to understand how seeds should be optimally partitioned between the two com- munities in order to minimize their number and achieve almost complete percolation in the whole system. This time, we assume that at each time step t a single active node, selected uniformly at random among all usable ac- tive nodes in the system, is used. To simplify the exposition, we will focus on a perfectly symmetric scenario in which p1 = p2 and n1 = n2 = n/2. However, the same approach can be easily extended to the general case G(n1, n2, p1, p2, q). Differently from our first reformulation, now we have, E[S(xtc)] = xρ∗ tc ρ∗ + o(tc). Using (22) and (20), we have for any δ > 0, P (S(t) ≤ t − (α − δ)(1 − (ρ∗)−1)tc) <  −(1−δ)xρ∗ tc  e xtc −(α−δ)(1−(ρ∗ )−1 )tc ρ∗ H  (1−δ)xρ∗ tc ρ∗ Thus, by sub-additivity of probability: (22) for any t < T : T1(t) + T2(t) = t where Ti(t) denotes the (random) number of nodes used in community i up to time t. Now, if we consider any two different sequences in which active nodes are selected, such that T1(t) in one sequence is larger than T ′ 1(t) in the other sequence, we easily see that, S(t) − t + a ≤ 0(cid:19) ≤ −(1−δ)xρ∗ tc e ρ∗ H  xtc −(α−δ)(1−(ρ∗ )−1 )tc (1−δ)xρ∗ tc ρ∗   t[a,⌊Ktc⌋] P(cid:18) inf Xt∈[a,⌊Ktc⌋] ≤ α(1 − (ρ∗)−1)(1 + δ) (1−δ)xρ∗ a α(1−(ρ∗ )−1)ρ∗ (1+δ) − infx∈[a/tc,K] e K   H  x−(α−δ)(1−(ρ∗ )−1) (1−δ) xρ∗ ρ∗     (23) the assertion descends immediately taking the inf of (23) with respect to δ > 0 and letting K → ∞. Segment [Ktc, p−1]. We basically follow [6], choosing K = 8 and defining a sequence of time instants tj = 8 · 2j tc for j = {0, 1, 2··· J} with J = min{j : ptj ≥ 1}. We first show that E[S(tj )] > (1 + δ)tj+1 for every j and a properly specified δ > 0. Then, applying again union bound and concentration inequality (20) we can prove that P (S(tj) ≤ tj+1, for some j) goes to zero faster than ζ(n). This implies P (S(t) − t ≤ 0, for some t ∈ [8tc, ⌈p−1⌉]) goes to 0 faster than ζ(n) under super-critical Indeed, given the monotonicity of S(t), we conditions. (24) (25) = (26) 2(t)) 2(t)) (pT1(t))ρ(qT2(t))r−ρ S1(T1(t), T2(t)) ≥st S1(T ′ S2(T1(t), T2(t)) ≤st S2(T ′ 1(t), T ′ 1(t), T ′ Furthermore, for 1 ≪ t ≪ p−1 we have: E[S1(T1(t), T2(t)) + S2(T1(t), T2(t))] ∼ rXρ=0 f(cid:18)T1(t) t (cid:19) being f (x) =Pρ[ (ptx)ρ(qt(1−x))r−ρ ρ!(r − ρ)! rXρ=0 ρ!(r−ρ)! + (qT1(t))ρ(pT2(t))r−ρ ρ!(r − ρ)! a continuous function over [0, 1], indefinitely derivable in (0, 1) and satisfying the following properties: i) f (x) = f (1 − x); ii) f (x) decreases for x ∈ [0, 1/2) (and increases for x ∈ (1/2, 1]). Previous observations lead to: Theorem B.1. To minimize the number of seeds that are needed to achieve complete or almost complete per- colation in the symmetric graph G(n/2, n/2, p, p, q), with q < p and q = Ω( 1 n ), all seeds have to be placed within the same community. The proof is reported in the companion technical report [14]. At high level, the result descends from the fact that, + (qtx)ρ(pt(1−x))r−ρ ρ!(r−ρ)! ] of the assumptions that: i) the graph is connected at com- munity level; ii) for non null off diagonal elements of P , pik = Ω( 1 ). In particular, note that if we get (al- ni most) complete percolation in just one community, the infection propagates to the entire system. , 1 nk We can also ask ourselves which is the optimal seed allocation in the system, in the case in which we know the community membership of the nodes. A straightfor- ward extension of Theorem B.2 provides the answer to this question: Theorem C.2. Consider a general block model graph with K < ∞ communities as defined before; assume that 1/(npk,k) → 0 , pk,k = o(n−1/r) for any k. In order to minimize the number of seeds that produce (almost) complete percolation of the entire graph, all seeds must be placed within a single community that maximizes quantity nk(pk)r. As consequence, it turns out that a number of seeds: a = (1 + ǫ)(cid:18)1 − 1 r(cid:19) min k (cid:18) (r − 1)! nk(pk,k)r(cid:19)(r−1)−1 (28) for any ǫ > 0, is enough to guarantee an almost complete percolation of the graph. Indeed, by placing these a nodes all within a single community that maximizes quantity nk(pk)r, let this community be k0, we have that process Sk0 (t), and thus process Sk0 (t) is super-critical, which is enough to trigger system-wide percolation. At last, we can exploit Theorem C.2 also to get a differ- ent upper bound to the critical number of seeds in the case in which seeds are selected uniformly at random among all nodes. Indeed, it turns out that a n seeds, where a nk0 is the same as in (28), are enough, since w.h.p. at least a(1 − ε/2) seeds will fall within community k0, produc- ing super-critical conditions in community k0 (and then in the entire system). In the case of very heterogeneous communities, this last bound might be tighter than (27). for any given total number of seeds, extremal trajectories of T1(t) and T2(t) are obtained when all seeds are placed in the same community, as a consequence of (24), (25), and properties of (26). Theorem B.1 can be easily generalized to the asymmet- ric case (see [14]): Theorem B.2. To minimize the number of seeds that are needed to achieve complete or almost complete perco- lation in G(n1, n2, p1, p2, q) with q = Ω( 1 n ), all seeds have to be placed in the community having the maximum value of ni(pi)r. C. GENERAL BLOCK MODEL Let nk(n) be the number of nodes in community k (k = 1, . . . , K), with n =Pk nk. We will assume that nk(n) ≫ 1, for any k. We focus on a community structure in which pik < min(pii, pkk) for any (i, k). Moreover, whenever pik 6= 0, we will assume that pik = Ω( 1 ). At last, but without loss of generality, we assume the graph to be connected at the community level; i.e. we assume P to be of maximal rank (equal to K − 1). Indeed, if this in not true we can always partition the community-level graph into connected components and apply our results to each connected component. , 1 nk ni We first generalize the result in Theorem 6.1: Theorem C.1. Consider a block model with K < ∞ communities as defined before; suppose, for any k, that 1/(n pk,k) → 0 , pk,k = o(n−1/r), ak/a(k) c → αk > 1, with: where: 1 ¯a(k) c =(cid:18)1 − nk(bpk,k)r(cid:19)(r−1)−1 r(cid:19)(cid:18) (r − 1)! bpk,k =(r!) · Xρ1 ···ρk ···ρK  k,kQj6=k p ρk!Qj6=k ρj! with P ρj =r pρk 1 r ρj jk Let T = inf t{mink(ak − t + Sk(t)) < 0}. We have: ∀ε > 0, P(cid:18)1 − T maxk(nk) > ε(cid:19) = O(cid:16)e−C1(r,mink(r,αk ))a+o(a)(cid:17) where C1(r, α) is the same function as in Theorem 4.1. Theorem C.1 can be used to derive a simple upper bound to the minimum number of seeds that can produce super-critical conditions in all communities, in the case in which seeds are selected uniformly at random among all nodes. Indeed, Theorem C.1 coupled with standard concentration arguments lead to the result that a global number of seeds: a = (1 + ǫ)n max k ¯a(k) c nk (27) for any ǫ > 0, is enough to guarantee (almost) complete percolation of the entire graph. More in general, given an arbitrary allocation of seeds among communities, Theorem C.1 can be used to check whether the considered seed allocation is able to trigger system-wide percolation. On this regard, note that Theo- rem C.1 can be applied to any community-level connected sub-graph of the entire system: if at least one sub-graph satisfies the conditions of Theorem C.1, we get (almost) complete percolation of the entire system, as consequence
1607.00537
2
1607
2016-07-05T02:02:52
Badge System Analysis and Design
[ "cs.SI", "cs.GT" ]
To incentivize users' participations and steer their online activities, online social networks start to provide users with various kinds of rewards for their contributions to the sites. The most frequently distributed rewards include account levels, reputation scores, different kinds of badges, and even material awards like small gifts and cash back, etc. Attracted by these rewards, users will spend more time using the network services. In this paper, we will mainly focus on "badges reward systems" but the proposed models can be applied to other reward systems as well. Badges are small icons attached to users' homepages and profiles denoting their achievements. People like to accumulate badge for various reasons and different badges can have specific values for them. Meanwhile, to get badges, they also need to exert efforts to finish the required tasks, which can lead to certain costs. To understand and model users' motivations in badge achievement activities, we will study an existing badge system launched inside a real-world online social network, Foursquare, in this paper. At the same time, to maximize users' contributions to online social networks, social network system designers need to determine the optimal badge system mechanism carefully. Badge system mechanism describes various detailed aspects of the system and can involve many parameters, e.g., categories of existing badges, number of badges available as well as the minimum contributions required to obtain the badges, which all need to be designed with meticulous investigations. Based on the model of users' badges accumulating activities, in this paper, we will also study how to design the badge system that can incentivize the maximum users' contributions to the social networks.
cs.SI
cs
Badge System Analysis and Design University of Illinois at Chicago Worcester Polytechnic Institute Jiawei Zhang Chicago, IL, USA [email protected] Xiangnan Kong Worcester, MA, USA [email protected] Philip S. Yu University of Illinois at Chicago Chicago, IL, USA [email protected] 6 1 0 2 l u J 5 ] I S . s c [ 2 v 7 3 5 0 0 . 7 0 6 1 : v i X r a ABSTRACT To incentivize users' participations and steer their online activities, online social networks start to provide users with various kinds of rewards for their contributions to the sites. The most frequently dis- tributed rewards include account levels, reputation scores, different kinds of badges, and even material awards like small gifts and cash back, etc. Attracted by these rewards, users will spend more time using the network services. In this paper, we will mainly focus on "badges reward systems" but the proposed models can be applied to other reward systems as well. Badges are small icons attached to users' homepages and pro- files denoting their achievements. People like to accumulate badge for various reasons and different badges can have specific values for them. Meanwhile, to get badges, they also need to exert ef- forts to finish the required tasks, which can lead to certain costs. To understand and model users' motivations in badge achievement activities, we will study an existing badge system launched inside a real-world online social network, Foursquare, in this paper. At the same time, to maximize users' contributions to online social networks, social network system designers need to deter- mine the optimal badge system mechanism carefully. Badge sys- tem mechanism describes various detailed aspects of the system and can involve many parameters, e.g., categories of existing badges, number of badges available as well as the minimum contributions required to obtain the badges, which all need to be designed with meticulous investigations. Based on the model of users' badges accumulating activities, in this paper, we will also study how to design the badge system that can incentivize the maximum users' contributions to the social networks. Categories and Subject Descriptors H.2.8 [Database Management]: Database Applications-Data Min- ing Keywords Badge System, Social Network, Game Theory, Data Mining 1. INTRODUCTION TO BADGE SYSTEM Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00. (a) shared badge distribution (b) peer pressure distribution Figure 1: Statistical information: (a) #shared badges between pairs in a randomly sampled pair set; (b) fraction of badges obtained at a certain friend ratio. Figure 2: Power law distribution of user fraction and number of achieved badges. Social networks, e.g., Facebook, Twitter and Foursquare, have achieved remarkable success in recent years. These social networks are mostly driven by user-generated content, e.g., posts, photos and location checkins. To incentivize users' participations and steer their online activities, many social networks start to offer users var- ious rewards for their contributions to the networks. In this paper, we will mainly focus on "badge reward systems" but the proposed models can be applied to other reward systems as well. Badge sys- tems have been adopted by a wide range of social networks: (1) Foursquare1, a famous location-based social network (LBSN), is distributing different badges to users for their geo-location check- ins; (2) Weibo2, a social media in China, launches a badge system to give users badges for writing posts and replies; (3) Stack Over- 1https://foursquare.com 2http://www.weibo.com 0.02.04.06.08.010.012.0# Pairs0.020.040.060.080.0100.0120.0140.0160.0# Shared Badges103103peernon peer0.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.35Fraction of Badges10-1100101102103104# Badges10-410-310-210-1Fraction of Users Table 1: Properties of the Badge System Dataset nodes links property user badge follow achieved level number 4,240 1,431 81,291 176,301 47,342 flow3, a popular question and answer (Q&A) site for computer pro- gramming, adopts a system where users can get badges by answer- ing questions in the site; and (4) In Khan Academy4, a popular mas- sive open online course (MOOC) site, users are awarded badges for watching course videos and answering questions. 1.1 User Activity Observations People like to accumulate badges for various reasons and dif- ferent badges can have specific values for them. Extensive anal- yses have been done on a real-world badge system launched in Foursquare. The badge system dataset was crawled from Foursquare during the April of 2014. We collected 4, 240 users together with all the 1, 430 categories of badges achieved by them. These users are crawled with BFS search from several random seed users via the social connections in Foursquare, who are connected by follow links of number 81, 291. To denote that a user has achieved certain badges, we add achieve links between users and badges, whose to- tal number is 176, 301 in the crawled dataset. On average, each user has achieved 42 badges in Foursquare. In addition, each cat- egory of badges can involve different badge levels, where badges of consequential levels can be connected by the level links. For ex- ample, badges of higher level, e.g., l (l > 1), can have level links pointing to badge of level l−1 and the number of level links among badges is 47, 342. A more detailed information about the dataset is available in Table 1. The statistical analyses results about the badge system dataset are available in Figure 1 and Table 2, from which many interesting phenomena can be observed: 1. Generally, users who are friends are more likely to share common badges. We randomly sample a certain number of user pairs who are (1) friends (i.e., connected by social links) and (2) not friends from Foursquare, and count the number of common badges shared by these user pairs respectively. The results are given in Figure 1(a), where the x axis is the num- ber of randomly sampled user pairs and the y axis denotes the number of shared badges between these sampled pairs. From Figure 1(a), we can observe that online badge achievement in social networks is correlated with social connections among users and friends are more likely to have common badges. 2. In many cases, users are likely to obtain badges which have never been achieved by his friends. As shown in Figure 1(b), for each badge bj, obtained by user ui, we get the timestamp when ui get bj and the ratio of ui's friends who obtain bj before ui. The distribution of the percentage of badges ob- tained at different ratios is given in Figure 1(b), from which we can observe that a large proportion of badges are obtained at small ratios, i.e., few of ui's friends have achieved the badge before ui. 3http://stackoverflow.com 4https://www.khanacademy.org Figure 3: Top 10 badges achieved by most users Figure 4: Tasks needed to unlock "JetSetter" badges. 3. In some cases, users will follow their friends when most of their peers have obtained a certain badge. Still in Figure 1(b), when the ratio is close to 1.0, i.e., almost all the peers have obtained a certain badge, the fraction of badge obtained will increase to 0.1, representing that about 10% of the badges are obtained by users when all his friends have achieved the badge. As a result, users' badge achievement activities in on- line social networks are highly related to those of their peers. These three observed effects of peers' badges on users' ac- tivities are called the peer leadership value of badges in Sec- tion 3.1. 4. Users are keen on getting badges that are to their interests. In Table 2, we extract top 10 popular badges achieved by the most users in Foursquare and each of these badges has 10 different levels. Numbers of users who have obtained certain levels of each kind of badge as well as the total number of badges achieved (i.e., summation of each row of the table) are provided. The corresponding icons of these badges are shown in Figure 3. Generally, higher-level badges require more efforts from the users, but from Table 2, we observe there are still a large number of users are willing to devote such high efforts to get the badges due to their personal in- terests. For example, among the 2, 468 users who achieved the "Fresh Brew" badge of level 1, 22.5% of them will con- tinue to get badge of level 5, which may denote these users like drinking coffee a lot. Similarly, for users who get differ- ent levels of "Mall Rat" badges, they should like shopping a lot; users who get the "JetSetter" badges are those who travel frequently. As a result, badges can reveal users personal in- terests, especially higher-level badges. Such a kind of effects Fresh BrewMall RatJetSetterFresh OutdoorsPizzaioloHot TamaleSwimmiesBentoZoetropeFlame Broiled badge name Fresh Brew Mall Rat JetSetter Hot Tamale Great Outdoors Pizzaiolo Swimmies Bento Zoetrope Flame Broiled Table 2: Number of users achieving top 10 badges obtain it by checking-in at Coffee Shops Shopping Malls Airport Terminals Mexican Restaurants Parks and Outdoors Pizza Restaurants Lake/Pond/Beach Sushi Restaurants Movie Theaters Burger Restaurants 1 2468 2545 2357 2305 2119 2192 1888 1741 1985 1944 3 # users achieving badges of different levels 8 144 81 102 58 95 16 47 21 6 3 1235 1076 972 989 801 605 538 459 309 337 4 817 624 564 583 468 267 281 209 103 105 6 374 224 210 191 200 62 107 63 16 13 5 555 366 339 336 295 116 159 104 34 40 7 255 130 147 105 132 26 74 34 12 6 2 1914 1907 1703 1733 1535 1450 1214 1121 1106 1044 total number 7878 7028 6468 6355 5728 4746 4361 3774 3580 3494 9 78 46 63 37 53 8 36 14 5 1 10 38 29 11 18 30 4 17 8 4 1 of badges for users is defined as the personal interest value of badges in Section 3.3. 5. Users in online social networks are enthusiastic in earning badges. As shown in Figure 2, the distribution of user frac- tions obtaining a certain number badges follows the power law [5] and the majority of the users in Foursquare have obtained more than 50 badges in Foursquare. In Table 2, we observe that over 2, 000 have ever obtained the "Fresh Brew", "Mall Rat", "JetSetter", "Hot Tamale", "Great Out- doors" and "Pizzaiolo" badges. Considering that there are only 4, 240 users in the dataset, we can observe that most users in Foursquare have achieved these badges. One poten- tial explanation of the observation can be that: initially, peo- ple use social network services independently of the badges; meanwhile, after using the network for a while, users start to lose interesting, and the badges start to play their roles in keeping users within the network. Such a kind of effects of badges on users is defined as the network trend value of badges in Section 3.2. 1.2 Badge System Analysis To get badges, users in online social networks are required to finish certain tasks, which can be (1) finishing a certain number of checkins at required locations in Foursquare, (2) answering a num- ber of questions proposed by other users in Stack Overflow, and (3) publishing required numbers of posts in Weibo. These tasks of higher-level badges are usually more challenging. For instance, as shown in Figure 4, by checking at 20 different airports, users can get the "JetSetter" badges from level 1 to level 5. However, to unlock the "JetSetter" badge of level 6, users need to check in at an- other 5 new airports. Obviously, these tasks can yield some costs, which can be time, money or knowledge spent on the tasks. The payoff of achieving certain badges is defined as "(value - cost)", i.e., the utility of badges for users. Besides the above badge val- ues, users can also get other benefits from the network, e.g., enjoy the social network services. With the same model to be proposed in this paper, such benefits can be handled by either incorporat- ing them into the above corresponding badge value categories or introducing a new value category. Since we mainly focus on the badges system design problem in this paper, we will only consider the above badge values to simplify the problem settings. When the value of badges can exceed the cost, users may try to get the badge; otherwise, they will not devote their efforts as they can get no pay- offs from these badges. Costs of obtaining badges are fixed but the value of badges can be influenced by other users' badge achieve- ment activities. Each user in online social network is assumed to be "selfish" and wants to maximize his payoff (i.e., the utility) and the badge achieving activities will form a game with other users in the network. Meanwhile, badges in online social networks are used to incen- tivize users' contributions to the sites. To achieve such a goal, the system designer needs to determine the optimal settings for a badge system, which is formally defined as the badge system mechanism in this paper. Badge system mechanism covers every aspect of the system and contains many parameters, which include: • Categories of Badges: A badge is said to be contributing if it can attract lots of users' contributions to the social net- work. We will study the contributions attracted by different categories of badges from users and find the most contribut- ing ones in online social networks. This problem is helpful for badge designer to determine which categories of badges should be placed in social networks. • Number of Badges: The number of badges to be placed in on- line social networks is very important for an effective badge system. If a large number of badges are placed in social net- works, users can always get badges to their interests or have never be obtained by others before very easily, which will make the system fail to work in steering users' online activi- ties. • Badge Threshold: Setting the badge contribution threshold (i.e., the minimum required contribution to get the badge) is very tricky. If the threshold is set too low, most users will get the badge easily with little efforts and the total amount of contributions drawn by these badges will be low. On the other hand, if the threshold is set too high, very few people will devote their effort to getting the badge as these badges are difficult to obtain and the total amount of users' contri- butions will be low as well. 1.3 Badge System Modeling Challenges The badge system analysis and design problem studied in this paper is a new research problem and it is very challenging to solve due to the following reasons: • Badge Value Definition: The value of badges for users in online social networks is unclear. Formal definition, quan- tification and inference of the badge values for users can be the prerequisite for a comprehensive modeling users' badge achievement activities. • User Utility Function: Users can get reward from the achieved badges, i.e., the value of badges, but also needs devote their efforts, i.e., the cost. Formal definition of the payoff by achieving badges, i.e., the utility, is still an open problem. • Game Among Users: Each user aims at maximizing his over- all utility, which can be influenced by other users' activities at the same time. As a result, users' online badge achieving activities can lead to a game involving all users. Formulation and analysis of such a game among users in online social networks is very difficult. • Optimal Badge Mechanism: Users' utility in badge achieve- ment is determined by the badge system mechanism set by the designer. Users aim at maximizing their overall utility with as few efforts as possible, while the designer aims at maximizing users' overall contribution to the network. As a result, there also exists a game between users and the de- signer, which will make the problem more challenging. The following parts of this paper are organized as follows. Sec- tion 2 is about the definitions of many important concepts. Various value functions of badges for users will be introduced and com- bined in the comprehensive value function in Section 3. Users' utility function is given in Section 4. In Section 5, we study the game among users in online social network. In Section 6, we solve the badge system design problem by formulating it as a game be- tween users and the designer and provide basic simulation analysis about various aspects in the badge system design problem. The re- lated works are introduced in Section 7. Finally, we conclude the paper in Section 8. 2. TERMINOLOGY DEFINITION Users in social networks can be gifted in different areas and they can finish the tasks required to get badges corresponding to their gifts effortlessly. For instance, in Foursquare, sports enthusiasts can get Gym Rat badges easily as they do sports in gyms regularly, while travel lovers can obtain JetSetter or Trainspotter badges by checking in at train stations and airports frequently. However, for users who want to get badges of areas that they are not good at, it would be very difficult to finish the required tasks. For exam- ple, a sports enthusiast may need to spend lots of time and money to get the JetSetter or Trainspotter badges by travelling. Simi- larly, gourmets who seldom do sports may suffer a lot to get Gym Rat badges by visiting gyms. Let U = {u1, u2,··· , un} and B = {b1, b2,··· , bm} be the sets containing n users and m badges respectively in the network. To depict such phenomena, we for- mally define the concepts of ability, effort and contribution of users in U as well as contribution threshold of badges in B as follows. Definition 1. (Ability): User ui's talents or advantages in fields corresponding to badges in B can be represented as the ability vec- tor ai = [ai,1, ai,2,··· , ai,m], where ai,j ≥ 0 denotes ui's ability in the field of badge bj or simply ui's ability to get badge bj. All people are assumed to be created equally talented. People can be talented at different aspects but the total intelligence each people have can be quite close. For simplicity, we assume the total abilities of different users are equal, i.e., ai1 = aj1, for ∀ui, uj ∈ U. Besides talents, to make achievements in certain ar- eas, every people need to devote their efforts and passion, which can be either money, time, energy or knowledge. In this paper, the resources users will devote to the system is time and the formal definition of unit time effort is available as follows. Definition 2. (Unit Time Effort): Vector ei = [ei,1, ei,2,··· , ei,m] denotes user ui's efforts devoted to the field corresponding badges in B in unit time, where ei,j ≥ 0 represents ui's effort devoted in the area of badge bj, or simply ui's effort in getting badge bj. Users' unit time effort can vary with time and can be represented as a function on time, e.g., ei,j(t). The total amount of unit time effort in different areas of all users are assumed to be equal, i.e., ei1 = ej1, for ∀ui, uj ∈ U. Meanwhile, the more time people devote to certain area, the more cumulative efforts he will devote to the area. Definition 3. (Cumulative Effort): Term ei,j = (cid:82) t t ei,j(t) dt is defined as the cumulative effort that user ui devotes to badge bj during time period [t, t]. For both users and designer, cumula- tive effort is more meaningful as they only care about the total amount of effective efforts devoted to the system. Vector ei = [ei,1, ei,2,··· , ei,m] is defined as the cumulative efforts that user ui pays to the network. In this paper, active users are assumed to have more cumula- tive efforts as they spend more time using the social network. The achievements people obtain depend on not only their ability in a certain area but also the efforts the devoted to the area, which can be formally defined as their contributions to the network. Definition 4. (User Contribution): The effectiveness of users' cumulative efforts devoted to a social network is formally defined as their contributions. Vector ci = [ci,1, ci,2,··· , ci,m] is defined to be user ui's contributions to the whole system, where ci,j is the contribution of user ui devoted to the network in getting badge bj during [t, t]: (cid:90) t (cid:90) t ci,j = ai,jei,j(t) dt = ai,j ei,j(t) dt = ai,j ei,j. t t As a result, the more effort people devote to areas they are gifted at, the more remarkable achievements they can get in the areas. In social networks, whether a user can receive a badge depends on not only the contributions he/she make but also the contribution threshold of the badge. Definition 5. (Badge Threshold): A badge's threshold denotes the minimum required contributions required for users to get the badge. For badges in B, their threshold can be represented as θ = [θ1, θ2,··· , θm]. For a given user ui, if his/her contribution to badge bj, i.e., ci,j, is greater than bj's threshold θj, then ui will get bj, which can be represented with the following badge indicator function: (cid:40) I(ci,j ≥ θj) = if ci,j ≥ θj, 1, 0, otherwise. Furthermore, the badges that user ui have received can be repre- sented as the badge indicator vector Ii = [I(ci,1 ≥ θ1), I(ci,2 ≥ θ2),··· , I(ci,m ≥ θm)]. Before the system starts to operate and players begin to invest their efforts, the badge system designer needs to specify the badge system settings in advance, which is formally defined as the badge system mechanism in this paper. Definition 6. (Badge System Mechanism): Badge system mech- anism describes various detailed aspects of the system. In addition to badge thresholds, the mechanism of badge system in online so- cial networks can also involve the categories, number, names, IDs, levels of badges, as well as methods to get the badges, etc. (a) linear value function (b) quadratic value function (c) cubic value function Figure 5: Estimated value functions by fitting the data. (d) exp. value function 3. BADGE VALUE FUNCTIONS The motivation of users being willing to devote efforts to get badges in online social networks is because these badges are valu- able to them. Depending on the specific scenarios, the value of badges for users can be quite different. According to the observa- tions in Section 1, the effects of badges on users' social activities can be models as three different kinds of values of these badges. In this section, we will introduce three different value functions which can capture the badge values from different perspectives: (1) per- sonal interest value function, (2) peer leadership value function, and (3) network trend value function. 3.1 Peer Leadership Value Function In our daily life, on the one hand, people want to be different from the public, but, on the other hand, they may also want to fol- low the mainstream as well. We have similar observations about users badge achieving activities in online social networks. Users in online social networks want to be the first to win certain badges in their communities, which can show their uniqueness and make them stand out from his/her peers. Meanwhile, if most of the peers have obtained a certain badge, users will follow their friends to get the badge to extract themselves from the backward position. To depict the effectiveness of badges to make users be either more su- perior to his peers or closer to other leading peers, we formally define the peer leadership badge value in this part. 3.1.1 Peer Leadership Value Function Definition Definition 7. (Peer Leadership Value): The peer leadership value of badge bj for a user ui is defined as a function about the ratio of ui's peers who have obtained badge bj already. Let Γ(ui) be the neighbor set of user ui ∈ U, in which users who have achieved badge bj before ui can be represented as Ψ(ui, bj) = {um(um ∈ Γ(ui)) ∧ (Im(j) = 1)}. The peer leadership value function of badge bj for user ui can be represented as function vps(ui, bjΓ(ui)) = f ( Ψ(ui, bj) Γ(ui) ), Ψ(ui, bj) ⊂ Γ(ui). The concrete representation of the peer leadership value func- tions can be quite diverse depending on the selected function f (·). In this paper, we try 4 different functions, and the corresponding peer leadership value functions are listed as follows: • linear peer leadership value function (cid:18)Ψ(ui, bj ) Γ(ui) • quadratic peer leadership value function (cid:19)2 l (ui, bjΓ(ui)) = a vps (cid:18)Ψ(ui, bj ) p (ui, bjΓ(ui)) = a vps + b Γ(ui) (cid:19) + b, (cid:18)Ψ(ui, bj ) Γ(ui) (cid:19) + c, • cubic peer leadership value function (cid:19)3 (cid:18)Ψ(ui, bj ) (cid:19) (cid:18)Ψ(ui, bj ) c (ui, bjΓ(ui)) = a vps Γ(ui) (cid:18)Ψ(ui, bj ) Γ(ui) (cid:19)2 + b + c Γ(ui) + d, • exponential leadership value function −b e (ui, bjΓ(ui)) = a × e vps (cid:18) Ψ(ui,bj ) Γ(ui) (cid:19) + c, where a, b, c and d are the coefficients in the functions which can be learnt from the historical data. Given the real peer leadership value function of badges in the social network, f (x), the optimal parameters can be learnt by min- imizing the following objective function: (cid:90) 1 0 ω = arg min ω f (x) − vps(x) dx where ω is the vector of coefficients (e.g., ω = [a, b] in the linear Ψ(ui,bj ) Γ(ui) ∈ [0, 1]. To peer leadership value function) and x = resolve the function, we propose to learn the coefficients by fitting the 11 discrete points shown in Figure 1(b) and can get different estimated peer leadership value functions in Figures 5(a)-5(d) re- spectively. 3.1.2 Peer Leadership Value Function Evaluation Experiment Settings The higher peer leadership value a badge has, the more likely a user will try to obtain it. To test the effectiveness of the above intro- duced peer leadership value functions, we conduct an experiments on the Foursquare badge system dataset introduced in Section ??. In the experiment, badges achieved by less than 100 users are re- moved and the remaining badges achieved by users are organized in a sequence of (user, badge) pairs according to their achieving timestamps. These (user, badge) pairs are divided into two subse- quences according to their relative timestamps order: the training set and testing set, the proportion of whose sizes is 9 : 1. In addi- tion, a set of non-existing (user, badge) pairs which is of the same size as the positive test set are randomly sampled from the network as the negative test set, which together with the positive test set are used to form the final testing set. Pairs in the training set are regarded as the historical data, based on which we calculate the values of pairs in the testing set and output them as the confidence scores of these pairs. The evaluation metrics applied in the experiment is AUC. In statistics, a receiver operating characteristic (ROC), or ROC curve, is a graphical plot that illustrates the performance of a binary clas- sifier system as its discrimination threshold is varied. The curve is created by plotting the true positive rate (TPR) against the false positive rate (FPR) at various threshold settings. The area under 0.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.35Fraction of Badgesf(x)=−0.19x+0.180.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.35Fraction of Badgesf(x)=0.4x2−0.58x+0.240.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.35Fraction of Badgesf(x)=−0.35x3+0.92x2−0.78x+0.260.00.20.40.60.81.0Ratio of Peers0.050.000.050.100.150.200.250.300.350.40Fraction of Badgesf(x)=0.24e−6.39x+0.05 the ROC curve is usually quantified as the AUC score. When using normalized units, the area under the curve (i.e.„ AUC) is equal to the probability that a classifier will rank a randomly chosen posi- tive instance higher than a randomly chosen negative one (assum- ing "positive" ranks higher than "negative"). Generally speaking, larger AUC score corresponds to better performance of the predic- tion model. Experiment Results We learn the coefficients of different value functions with the training set and apply the learnt function to calculate the peer lead- ership values of pairs in the testing set. The results are available in Figure 6. From the results, we observe that AUC achieved by the quadratic peer leadership function is 0.65, which is slightly bet- ter than other value functions, and the AUC scores obtained by the linear, cubic and exponential peer leadership functions are 0.58, 0.63, and 0.62 respectively. Here, quadratic function can outper- form cubic and exponential functions can because of the reason that cubic function may suffer from the overfitting problems a lot. Next, we will use the quadratic peer leadership function as the only peer leadership function, which will be compared with other value functions in Figure 7. 3.2 Network Trend Value Function 1, bi 2, ..., b1 1, b2 2, ..., b2 p before bi 2,··· , bi Besides the effects of personal interests and peer pressure, there exists some global trend about the network steering users badge achievement activities in the whole network. In online social net- work, users achieve badges in a sequential time order. For exam- ple, badges achieved by user ui can be organized into a sequential l(cid:105) according to the achieving timestamps, transaction (cid:104)bi q if p < q. For all users in U, we can where ui got badge bi represent the badge achievement sequential transactions as {u1 : (cid:104)b1 o(cid:105),··· , un : (cid:104)bn l (cid:105), u2 : (cid:104)b2 1, b1 The network influence can be captured by extracting the fre- quent badge achieving sequential patterns from the transactions and many different pattern extraction methods have been proposed so far. In this paper, PrefixSpan proposed by Pei et al. [15] is applied. Consider, for example, we extract two frequent sequence patterns: pattern 1: (cid:104)bl, bo,··· , bp(cid:105) and pattern 2: (cid:104)bl, bo,··· , bp, bq(cid:105) with supports support(pattern 1) and support(pattern 2) respectively from the network. Rule r can be generated based on pattern 1 and pattern 2 representing that for users who have obtained badges in (cid:104)bl, bo,··· , bp(cid:105) has a chance of conf to get badge bq: 1 , bn 2 , ..., bn q (cid:105)} r : (cid:104)bl, bo,··· , bp(cid:105) → (cid:104)bq(cid:105), conf = support(pattern 2) support(pattern 1) , where (cid:104)bl, bo,··· , bp(cid:105) is called the antecedent of rule r (i.e., ant.(r)) and (cid:104)bq(cid:105) is named as the consequent of r (i.e., con.(r)). Score conf (r) = support(pattern 2) is called the confidence of rule r. support(pattern 1) Various rules together with their confidence scores can be gener- ated based on the frequent sequence pattern mining results, which can be represented as set R, based on which we can define the net- work trend value function as follow. Definition 8. (Network Trend Value Function): For a given user ui, who has achieved a sequence of badges H = (cid:104)bi1 , bi2 ,··· , biH(cid:105) already, the network trend value function of badge bj for ui is de- fined as the maximal confidence score of rules that can be applied to badges in H and badge bj, i.e., vnt(ui, bjH) = max{conf (r)r ∈ R, ant.(r) ⊂ H, con.(r) = bj}. We evaluate the effectiveness of the introduced network trend value of badges based on the same experiment setting introduced in Section 3.1.2. As shown in Figure 7, network trend value based badge predictor along can achieve an AUC score of 0.68 in infer- ring potential badge achievement activities. 3.3 Personal Interest Value Function Users can have their personal interests, which can steer their so- cial activities in online social networks. For example, sport enthusi- asts may visit gyms and outdoor places frequently, while gourmets tend to go to good restaurants on the other hand. Users' personal interests can be revealed from the badges obtained in the past. For example, for a given user ui who has already achieved the "Gym Rat" badges of levels from 1 to 4, it can show that ui can like doing sports a lot and "Gym Rat" of level 5 can meet his interest and can be of great value to him. Viewed in this way, the value of badges can be evaluated with the badges that users obtained in the past. Definition 9. (Personal Interest Value): For a given user ui and the set of badges obtained by ui in the past, i.e., H, the personal interest value of badge bj for user ui is defined to be (cid:80) vpi(ui, bjH) = bk∈H s(bj, bk)vpi(ui, bk) , H where s(bj, bk) denotes the similarity score between badge bj and bk and vpi(ui, bk) represents the personal interest value of badge bk for user ui. For badge bk ∈ H that ui has obtained in the past, we define the personal interest value of ui to badge bj as 1.0 (i.e., vpi(ui, bk) = 1.0, for ∀bk ∈ H). The similarity score between any two badges, e.g., bj and bk, is defined as the Jaccard's Coefficient score [14] of user sets who have achieved bj and bk (i.e., Γ(bj) and Γ(bk)) respectively in the network: s(bj, bk) = Γ(bj) ∩ Γ(bk) Γ(bj) ∪ Γ(bk) . Based on the above descriptions, the personal interest value of badge bj for user ui can be represented as (cid:80) bk∈H Γ(bj )∩Γ(bk) Γ(bj )∪Γ(bk) H . vpi(ui, bjH) = The effectiveness of the personal interest value of badge is eval- uated with a similar experiment setting, whose result is available in Figure 7. We can observe that ranking badges according to their personal interest values for each user can achieve an AUC score of 0.66. 3.4 Comprehensive Value Function Definition and Evaluation To capture the information from all the three aspects in calculat- ing badge values, we define the comprehensive value value function as a combination of the personal interest value, peer leadership value and network trend value functions: vc(ui, bj ) = α · vpi(ui, bj ) + β · vpp(ui, bj ) + (1 − α − β)vns(ui, bj ), where parameters α, β are assigned with value 1 this paper. 3 for simplicity in To show the effectiveness of the above defined badge value func- tions in modeling users' badge obtaining activities, we also com- pare their performance in inferring users' badge achieving proba- bilities in the Foursquare badge system dataset. For the peer leader- ship value function, the quadratic function is used as it can achieve Figure 6: Comparison of peer leadership value functions the best performance in Figure 6. Experiment setting here is iden- tical to that introduced in Section 3.1.2 and the results is available in Figure 7. From the result we observe that network trend value function performs better than personal interest and peer leadership value functions, which can achieve AUC scores about 0.68, 0.66, and 0.65 respectively. Meanwhile, the comprehensive value func- tion that merge the isolated value functions together can improve the performance greatly and can obtain AUC score is 0.77, which is 13.2%, 16.7%, and 18.5% higher than the AUC scores achieved by personal interest, peer leadership and network trend value func- tions. 4. USER UTILITY FUNCTION Value of badges is the reward that users can receive from the sys- tem. Meanwhile, to get the reward, they also need to afford certain costs introduced when finishing the required tasks. Generally, if the reward is greater than the cost, the badge will deserve the efforts. For example, if user ui can get badge bj eventually, then ui can get a reward, i.e., the value of bj to ui (e.g., vc(ui, bj)) and also needs to pay some costs, i.e., his cumulative efforts ei,j devoted to bj. The payoff user ui can receive by devoting efforts to badge bj is defined to be the utility of bj for ui. The formal definitions of the reward, cost and utility functions of badges for users are available as follows: 4.1 User Utility Function Definition Definition 10. (Reward Function): The reward function of user ui in achieving badge bj is defined as reward(ui, bj) = I(ci,j ≥ θj)vc(ui, bj). If ui can obtain bj, then the reward ui can achieve will be the comprehensive value of badge bj for ui; otherwise, the reward will be 0. Definition 11. (Cost Function): To achieve a certain badge, e.g., bj, the cost that ui needs to pay is defined as the cumulative effort that ui invests on bj: cost(ui, bj) = ei,j. The minimum efforts ei,j required for user ui to get badge bj is determined by ui's ability in achieving bj as well as the badge threshold of bj, which can be represented as ei,j = arg min e (ai,j ei,j ≥ θj) = θj ai,j Figure 7: Comparison of comprehensive value function and other isolated value functions Definition 12. (Utility Function): The utility function of ui in achieving bj is defined as utility(ui, bj) = reward(ui, bj) − cost(ui, bj) = I(ci,j ≥ θj)vc(ui, bj) − ei,j. If ui can get bj, i.e., ai,j ei,j ≥ θj, then utility(ui, bj) = vc(ui, bj)− ei,j; otherwise, utility(ui, bj) = −ei,j. The overall utility function of users ui over all badges in B is represented as (cid:88) utility(ui) = utility(ui, bj) bj∈B (cid:62) i vc = I i − (cid:107)ei(cid:107)1 , where I(cid:62) i denotes the transpose of the badge indicator vector of i,m) is the comprehensive value vector ui, vc of all badges for ui, ei is the cumulative effort vector of ui and i,2,··· , vc i,1, vc i = (vc (cid:107)ei(cid:107)1 =(cid:80)m j=1 ei,j is the L1 norm of vector ei. 4.2 User Utility Function Evaluation To demonstrate the effectiveness of the utility in modeling users' badge achieving activities, we conduct the experiments to show the performance of user utility function in inferring users badge achiev- ing activities. Experiment settings here is identical to those intro- duced before but, to calculate the utilities of different badges for users, we need to know users' total cumulative efforts, ability dis- tributions, and badge thresholds in advance. Inference of Cumulative Effort: Active users in online social net- works are assumed to have more cumulative efforts. In our dataset, the activeness measure can be defined as the number of badges users achieved. And the cumulative effort of user, e.g., ui, can be obtained by normalizing the badge numbers to the range of [0, 1] with equation #(ui)−#min #max−#min , where #(ui) is the number of badges achieved by ui and #max and #min are the maximal and mini- mal number of badges achieved by users in U respectively. Inference of User Ability Vector: In the training set, user ui's in- = (ai,1, ai,2,··· , ai,m) ferred ability vector is defined to be ainf er of length m = B, where ai,j is the number of times that ui ob- tained badge of category bj in the training set. Each user is assumed to have the same amount of ability but can be distributed differ- ently. Vector ainf er is normalized by the total number of achieved i badges to ensure = 1. Considering that users can have (cid:12)(cid:12)(cid:12)ainf er i i (cid:12)(cid:12)(cid:12)1 0.560.580.600.620.640.660.68AUC0.580.650.630.62linearquadcubicexp0.550.600.650.700.750.800.85AUC0.770.660.650.68comprehensivepersonal interestpeer leadershipnetwork trend as well. Meanwhile, what users can do in the game is to deter- mine the distribution of their cumulative efforts, which is formally defined as the strategy as follows. Definition 13. (Strategy): A user's strategy refers to the options that he chooses in a setting where the outcome depends not only on his own actions but also on the actions of other users. A user's strategy can determine the actions the user will take at any stage of the game. In badge systems, users strategy can cover various aspects of their social activities but, in this paper, we refer to the strategy of users as the way how they distribute their cumulative efforts for simplicity. In game theory, strategy can be divided into two cat- egories: (1) pure strategy, and (2) mixed strategy. The strategy which is to select one single action in the game is referred to as the pure strategy. In the given badge set B, a user ui can choose to get one badge only, e.g., bj ∈ B, and devote all his/her efforts to obtaining that badge, the strategy of which is a pure strategy. Meanwhile, let Π(X ) be the set of all possible distributions over set X . Then the set of mixed strategies for user ui is si = Π(Ai), where Ai is the set of all possible actions that ui can take. The set of all possible mixed strategy that ui can apply is represented as set Si. For simplicity, we can just regard the cumulative effort distri- bution vector ei = [ei,1, ei,2,··· , ei,m] as the action distribution Π(Ai), i.e., user ui's strategy si = ei. Given the user set U, we can represent the strategies of all users in U except ui as s−i = (s1, s2,··· , si−1, si+1,··· , sn). Thus we can write the strategies of all users in U as s = (si, s−i), where sk = ek, k ∈ {1, 2,··· , n}. Meanwhile, depending on users' various mixed strategies, different kinds of social activities will be exerted in achieving badges, which can lead to different utilities. Definition 14. (Strategy Utility Function): Given user ui's and other users' strategies: si and s−i, the utility that ui can get based on si and s−i can be represented as: u(si, s−i) = utility(uisi, s−i) m(cid:88) = utility(ui, bjsi, s−i). j=1 Definition 15. (Strategy Domination): Let si and s(cid:48) i be two mixed strategies of user ui and s−i be the strategies of all other users in U except ui. Then, • Strict Domination: for ui, si strictly dominates s(cid:48) i, s−i) for ∀s−i ∈ S−i, where S−i represents the set of u(s(cid:48) all potential strategies of other users except ui; • Weak Domination: for ui, si weakly dominates s(cid:48) i iff u(si, s−i) ≥ i, s−i) ∀s−i ∈ S−i and ∃s−i ∈ S−i, such that u(si, s−i) > i, s−i); i iff u(si, s−i) > u(s(cid:48) u(s(cid:48) • Very Weak Domination: for ui, si very weakly dominates s(cid:48) iff u(si, s−i) ≥ u(s(cid:48) i, s−i) for ∀s−i ∈ S−i. i Definition 16. (Dominant Strategy): Let si be a mixed strat- egy of user ui, si is a (strictly, weakly, very weakly) dominant strategy iff si can (strictly, weakly, very weakly) dominate s(cid:48) i for i ∈ Si, s(cid:48) i (cid:54)= si, regardless of other users' strategies (i.e., s−i). s(cid:48) The optimal distribution of ui's cumulative efforts is identical to the dominant strategy of ui, which can be obtained by solving the following maximization objective function: si = arg max si u(si, s−i), Figure 8: Comparison of utility function and comprehensive value function i i i 1, uj 1, uj 2,··· , uj 2,··· , uj + (1.0 − α) · arandom their hidden abilities, a random ability vector arandom of length m is generated whose cells contain random numbers in [0, 1] and α · ainf er is used as the final ability vector of user ui. In this paper, we set parameter α = 0.85. Inference of Badge Threshold: Badges which are hard to achieve will be obtained later. For each badge bj ∈ B, we get all the users who have achieved bj from the training set: {uj k}. For i ∈ {uj k}, we organize all the badges obtained user uj by uj i from the training set in a sequence according to their achiev- ing timestamps, the index of bj in uj i 's achieved badge list is ex- tracted to calculate bj's threshold. For example, if ui have achieved p badges in all and the index of bj in the list is q, then the thresh- q . The threshold of badge old of bj for ui is estimated as θj,i = p bj is defined as the average of thresholds calculated for all these users: θj = ηj where ηj is a scaling parameter. Value ηj is selected as large as possible but, at the same time, ηj needs to ensure that for all users who have obtained badge bj in the training 2,··· , uj set (i.e., ∀uj 1, uj i devotes all his cumu- lative effort to get bj, uj i 's contribution can obtain bj in our model and, in other words, his contribution can exceed θj. k}). When uj i ∈ {uj (cid:80)k o=1 θj,o k Based on the above inferred cumulative efforts, ability of users as well as badge thresholds, we show the results achieved by the user utility function in Figure 8 and also compare it with the compre- hensive value function introduced before. From the results, we can observe that the introduced user utility function can perform very well in modeling users badge achieving activities. The AUC score achieved by the user utility function is 0.83, which is 7.8% larger than the AUC score achieved by comprehensive value function (i.e., 0.77). As a result, user utility function can provide a more compre- hensive modeling about users' badge achievement activities. 5. GAME AMONG USERS In social networks, every user wants to maximize his/her util- ity in achieving badges and the value of different badges for cer- tain user may depend on other users social activities. As a result, the badge achieving activities in online social networks can form a game among users. In traditional game theory, all the agents (e.g., users in social networks) are all assumed to be self-interested, which means that they have their own description about the states of world they like the most and they will act in an attempt to bring about these states of the world. "Self-interested" doesn't neces- sarily mean that users tend to harm other users to maximize their payoff, as it can also include good things happening to other users 0.600.650.700.750.800.850.90AUC0.830.77utilitycomprehensive Table 3: Contributions of top 10 badges badge name Fresh Brew Mall Rat JetSetter total contributions 27.6 26.2 24.5 23.2 21.8 17.8 16.4 13.7 12.9 12.6 total # 7878 7028 6468 6355 5728 4746 4361 3774 3580 3494 Hot Tamale Great Outdoors Pizzaiolo Swimmies Bento Zoetrope Flame Broiled where si is the dominant strategy of ui and other users strategies s−i ∈ S−i can take any potential value. The above objective function is very hard to solve mathemati- cally, as we may need to enumerate all potential strategies of all the users (including both ui and other users) in the network to obtain the global optimal strategy of ui. Based on the assumption that all users are "self-interested", in this paper, we propose to calculate the equilibrium state of all users strategy selection process instead as follows: We let the users to decide their optimal strategies in a random order iteratively until convergence. At first, in the 1st round, we let users to decide their optimal strategies in a random order. For ex- ample, if we let ui be the first one to choose his "optimal strategy" when other users are not involved in the system (i.e., s−i = 0), we can represent strategy selected by ui's as: si = arg max si u(si, 0). Based on ui's "optimal strategy", other users in U −{ui} (e.g., uj) will take turns to decide their own "optimal" strategies by utilizing the selected strategies of other users. For example, let uj be the 2nd user to decide his/her strategy right after ui. The "optimal strategy" of uj can be represented as sj = arg max sj u(sj,{si} ∪ 0). And let uk be the last user to select the "optimal strategy" in the 1st round. Based on the known strategies selected by all the other users, the "optimal strategy" of uk can be represented as sk = arg max sk u(sk,{s1, s2,··· , sk−1, sk+1,··· , sU}). After finishing the 1st round, we will start the 2nd round and all users will decide their strategies in a random order. Such a process will continue until all users' "optimal strategies" selected in round k is identical to those in round k − 1 (i.e., the stationary state), which will be outputted as the final optimal strategies of all users. 6. BADGE SYSTEM DESIGN In addition to the game among users, there also exists a game between users and badge system designer. Users in online social networks want to maximize their utilities with as few efforts as pos- sible. Meanwhile, badge system designer who decides the badge system mechanism aims at maximizing all users contributions to the network on the other hand. In this section, we will study how to determine the optimal badge system mechanism, and provide de- tailed simulation analysis about the designed badge system based on the model of user badge achievement activities learnt from the previous sections. Figure 9: Simulation analysis of contributions achieved by badge mechanisms containing different numbers of badges For simplicity, we define the amount of contribution attracted by a badge as the contribution of the badge as follows: Definition 17. (Badge Contribution): For a given badge mecha- nism M, where the placed badge set is B, the contribution of badge bj ∈ B is defined as the total amount of contributions that users de- voted to getting bj. Based on the optimal strategy si of user ui obtained from the game objective function proposed in the previ- ous section, badge bj's contribution can be represented as c(bjM) = ai,j si,j, (cid:88) ui∈U where si,j is the optimal strategy ui selected to get badge bj. Furthermore, for a given badge mechanism M, where the badge set is B, the contribution of badge set B(cid:48) ⊂ B selected in badge mechanism M can be represented as c(B(cid:48)M) = ai,j si,j. (cid:88) (cid:88) bj∈B(cid:48) ui∈U Different badge system mechanisms can lead to different amounts of contributions from users and the optimal one that can attract the maximum contribution is defined as the dominant badge mecha- nism. Definition 18. (Dominant Badge Mechanism): Given a badge mechanism M, in which the placed badge set is B, if M can lead to more user contributions to the system than all the other badge mechanisms, then M is defined as the dominant badge mechanism: M = arg maxM c(M) = arg maxM c(BM). Badge Mechanism can cover lots of different aspects, e.g., badge categories, the total number of badges, tasks required to get these badges, etc. In the following parts, we will analyze these aspects one by one. Definition 19. (Dominant Badge Category) For the given badge mechanism M (in which the badge set is B), the dominant badge category is defined as the badge category that can lead to the max- imal contribution to the social network, bj = arg max bj∈B c(bjM). According to the experiment settings introduced in Section 4, users decide their optimal strategies with methods proposed in the previous section. Based on users' optimal strategies, the top 10 most badge categories that can lead to the maximum contribution are available in Table 3. In the table, we show the badge names, number of times that users have obtain certain kind of badges and 123451020304050100200300400500Badge Number0100200300400500600700Contribution21.5941.7760.2777.5293.34187.53251.72307.24345.58380.67453.24474.41508.32520.25528.73 Reward systems, e.g., badge system, have been widely employed in online social networks, like Foursquare [3, 1, 4]. Antin et. al. study the badges in online social networks from a social psycho- logical perspective and give some basic introduction of badges in Foursquare [3]. Large amount of badges are placed in Foursquare and a complete list of Foursquare badges is available [1]. To ob- tain badges in Foursquare, users need to reveal their locations by checking in at certain locations. Carbunar et. al. study the problem between privacy preservation and badge achievement in Foursquare [4]. Users are all assumed to be "selfish" and want to maximize their payoff, which will form a game among users in online social net- works to compete with each other. There has been a growing litera- ture on analyzing the game among users in online social networks. Ghosh et. al. [10, 7, 9] provide a game-theoretic model within which to study the problem of incentivizing high quality user gen- erated content, in which contributors are strategic and motivated by exposure. Jain et. al. [13] present a simple game-theoretic model of the ESP game and characterize the equilibrium behavior in their model. Their equilibrium analysis supports the fact that users ap- pear to be coordinating on low effort words. To achieve the maximal contribution to the sites, many works have been done on designing the badge system for online social networks. Jain et. al. [12] study the problem of incentive design for online question and answer sites. Anderson et. al. [2] study how badges can influence and steer users behavior on social networks, which can lead both to increased participation and to changes in the mix of activities a user pursues in the network. Ghosh et. al. [8] study the problem of implementing a mechanism which can lead to optimal outcomes in social computing based on a game- theoretic approach. Immorlica et. al. [11] study the badge system design whose goal is to maximize contributions. Easley et. al. [6] take a game-theoretic approach to badge design, analyzing the incentives created by badges and potential contributors as well as their contribution to the sites. The badge system analysis and design problem studied in this paper is a novel problem and different from existing works on re- ward system analysis: (1) "steering user behavior with badges" [2], which studies the incentives of badges in guiding users online ac- tivities without considering the effects of social connections among users; (2) "social status and the design of optimal badges" [11], which provides theoretical derivations of the optimal badge system design problem but fails to consider the game among users and the game between users and badge system designer; and (3) "imple- menting optimal outcomes in social computing: a game-theoretic approach" [8], which tries to use a game theory based method to analyze the motivations of users in getting badges but doesn't con- sider the "badge system design" problem. 8. CONCLUSION In this paper, we study the badge system analysis and design problem, which covers (1) badge system analysis and (2) badge system design problem. We introduce the three different categories of badges value functions for users in online social networks. To depict users' payoff by achieving badges in online social networks, we formally define the utility function for users. We solve the "badge system analysis" problem as a game among users in so- cial network and address the "badge system design" problem as a game between badge system designer and the users. Experiments conducted on real-world badge system dataset demonstrate that our model can capture users' motivations in achieving badges online very well and design badge system mechanism that can lead to maximal contributions. Figure 10: Simulation analysis of contributions achieved by badge mechanisms of different badge thresholds the contributions of each badge. Generally, popular badges (i.e., badges achieved by many users) can attract more contributions from users according to the results. Definition 20. (Dominant Badge Category Set) For the given badge mechanism M and badge set B, the dominant badge cat- egory set of size K is defined as the badge subset B', B(cid:48) = K, which can lead to the maximal contribution to the social network, B(cid:48) = arg max B(cid:48)⊂B,B(cid:48)=K c(B(cid:48)M). To analyze the effects of badge numbers on the global contribu- tions of badge system, we select the top K, K ∈ {1, 2,··· , 5, 10, 20, ··· , 50, 100, 200,··· , 500} categories of badges from the network and calculate the contribution of these badges. The simulation re- sults are given in Figure 9, where the total contribution of all these top K badges will increase as K increases, but the speed of the growth will slow down when K is large enough (e.g., K ≥ 100). It supports that small number of badges are already enough to ap- proximate the optimal revenue as introduced in [11]. Another key factor in badge system design is the badge thresh- olds and the optimal badge thresholds is formally defined as the dominant badge threshold as follows. Definition 21. (Dominant Badge Threshold) For the given badge mechanism M and badge set B, the dominant badge threshold θ is defined as θ = arg max θ c(BM, θ). We also study the effects of badge thresholds on the overall con- tributions of these badges to the network and the simulation analy- sis results are given in Figure 10. To simplify the experiment set- ting, we set the thresholds of all badges with the same value in {0.0, 0.1,··· , 0.9, 1.0} and get the contributions obtained by the badges. As shown in Figure 10, the contribution of all these badges is 0 when the threshold is 0 and 1.0, where threshold 0 denotes that users can get badges without paying any efforts; threshold 1.0 means that users need to devote all their efforts on getting the badge corresponding to the area that all their ability lies in (i.e., ability in this area is 1.0). Contributions made to the network will increases fast as badge threshold increase at the beginning and can achieve the maximal contribution when threshold is 0.3 and 0.4 and then it will decreases. 7. RELATED WORK 0.00.10.20.30.40.50.60.70.80.91.0Badge Threshold0100200300400500600700Contribution0.0258.47476.98559.34534.92352.14219.46113.7943.2112.560.0 9. REFERENCES [1] Foursquare badge list. Badge list available at http://www.4squarebadges.com/ foursquare-badge-list/. [2] A. Anderson, D. Huttenlocher, J. Kleinberg, and J. Leskovec. Steering user behavior with badges. In WWW, 2013. [3] J. Antin and E. Churchill. Badges in Social Media: A Social Psychological Perspective. In CHI, 2011. [4] R. Potharaju B. Carbunar, R. Sion and M. Ehsan. Private badges for geosocial networks. TMC, 2013. [5] A. Clauset, C. Shalizi, and M. Newman. Power-law distributions in empirical data. SIAM Review, 2009. [6] D. Easley and A. Ghosh. Incentives, gamification, and game theory: An economic approach to badge design. In EC, 2013. [7] A. Ghosh and P. Hummel. A game-theoretic analysis of rank-order mechanisms for user-generated content. In EC, 2011. [8] A. Ghosh and P. Hummel. Implementing optimal outcomes in social computing: A game-theoretic approach. In WWW, 2012. [9] A. Ghosh and P. Hummel. Learning and incentives in user-generated content: Multi-armed bandits with endogenous arms. In ITCS, 2013. [10] A. Ghosh and P. McAfee. Incentivizing high-quality user-generated content. In WWW, 2011. [11] N. Immorlica, G. Stoddard, and V. Syrgkanis. Social status and the design of optimal badges. arXiv:1312.2299v2, 2013. [12] S. Jain, Y. Chen, and D. Parkes. Designing incentives for online question and answer forums. In EC, 2009. [13] S. Jain and D. Parkes. A game-theoretic analysis of the esp game. TEAC, 2013. [14] D. Liben-Nowell and J. Kleinberg. The link prediction problem for social networks. In CIKM, 2003. [15] J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U. Dayal, and M. Hsu. Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth. In ICDE, 2001.
1606.08103
2
1606
2017-10-10T01:04:51
State power and elite autonomy in a networked civil society: The board interlocking of Chinese non-profits
[ "cs.SI", "nlin.AO", "physics.soc-ph" ]
In response to failures of central planning, the Chinese government has experimented not only with free-market trade zones, but with allowing non-profit foundations to operate in a decentralized fashion. A network study shows how these foundations have connected together by sharing board members, in a structural parallel to what is seen in corporations in the United States and Europe. This board interlocking leads to the emergence of an elite group with privileged network positions. While the presence of government officials on non-profit boards is widespread, government officials are much less common in a subgroup of foundations that control just over half of all revenue in the network. This subgroup, associated with business elites, not only enjoys higher levels of within-elite links, but even preferentially excludes government officials from the NGOs with higher degree. The emergence of this structurally autonomous sphere is associated with major political and social events in the state-society relationship. Cluster analysis reveals multiple internal components within this sphere that share similar levels of network influence. Rather than a core-periphery structure centered around government officials, the Chinese non-profit world appears to be a multipolar one of distinct elite groups, many of which achieve high levels of independence from direct government control.
cs.SI
cs
State power and elite autonomy in a networked civil society: The board interlocking of Chinese non-profits Ji Maa,b, Simon DeDeoc,d,∗ aIndiana University Lilly Family School of Philanthropy, 301 N. University Boulevard, Indianapolis, IN 46202, USA bIntetix Institute, Beijing 100875, PRC cSocial and Decision Sciences, Carnegie Mellon University, 5000 Forbes Avenue, dSanta Fe Institute, 1399 Hyde Park Road, Santa Fe, NM 87501, USA Pittsburgh, PA 15213, USA Abstract In response to failures of central planning, the Chinese government has exper- imented not only with free-market trade zones, but with allowing non-profit foundations to operate in a decentralized fashion. A network study shows how these foundations have connected together by sharing board members, in a structural parallel to what is seen in corporations in the United States and Europe. This board interlocking leads to the emergence of an elite group with privileged network positions. While the presence of government officials on non-profit boards is widespread, government officials are much less com- mon in a subgroup of foundations that control just over half of all revenue in the network. This subgroup, associated with business elites, not only enjoys higher levels of within-elite links, but even preferentially excludes govern- ment officials from the NGOs with higher degree. The emergence of this structurally autonomous sphere is associated with major political and so- cial events in the state-society relationship. Cluster analysis reveals multiple internal components within this sphere that share similar levels of network influence. Rather than a core-periphery structure centered around govern- ment officials, the Chinese non-profit world appears to be a multipolar one of distinct elite groups, many of which achieve high levels of independence from direct government control. Keywords: board interlock, NGO, civil society, elites, state corporatism, state power, state-society relationship, social network, People's Republic of 1 China, non-profit foundations, common knowledge ∗To whom correspondence should be addressed. Email addresses: [email protected] (Ji Ma), [email protected] (Simon DeDeo) Preprint submitted to Social Networks October 11, 2017 1. Introduction 1.1. Board Interlock and State Power When the boards of different organizations have members in common- when their boards interlock -they can synchronize both their values and behaviors in the absence of explicit central control [1, 2, 3, 4, 5]. Organiza- tions that share key members in this fashion can reap the benefits of network connections and solve coordination problems [6, 7]. Board interlock is widespread in free-market societies, where it emerges in the business sector as means for coordinating decisions and building social influence [8]. In many countries, it spans multiple sectors, and links together the nonprofit, commercial, and political worlds [9, 10]. In the donation- based charity sector, board interlock helps coordinate of efforts and share of information [11], and enhances both a nonprofit's perceived legitimacy and its capacity to acquire resources [12]. Among ethnic associations, the "broker function" of board interlock generates and spreads political trust, helping to build stronger civic communities and strengthening trust towards government [13]. Much less is known about the political implications of board interlock under authoritarian governments. For a government concerned with the dan- gers of independent agents, interlock may be a benefit, because the resulting coordination reduce the independence between organizations and make non- government agents easier to control. However, these benefits exist only if the government maintains control of the most central organizations in the result- ing network. If it does not, board interlock may shift from an opportunity to a threat: organizations may not only reap the benefits of coordination, but now do so by coordinating around an independent agent. Board interlock is crucial to understanding "infrastructural" forms of state power [14]. Infrastructural power refers to the capacity of the state to act through civil society, by penetrating, and thereby influencing, its in- stitutions. Infrastructural power is often contrasted with despotic power: the ability of state elites to act without formal negotiations with civil soci- ety, through top-down, unilateral action. The coordination enabled by board interlock provides an important means by which a state might amplify infras- tructural power-or, conversely, a means by which non-governmental actors may reduce it. The world of non-profit foundations in the People's Republic of China provides a key test case for how a central authority confronts the challenges 3 of an emergent network of non-governmental organizations. In short: how does an authoritarian regime deal with the counter-power that may develop when agents of a putative civil society connect together? 1.2. How Much Autonomy? A Brief Introduction to Civil Society and the Chinese Nonprofit Sector While charities and "social organizations" appear early in China's history, the majority were closed down during the Cultural Revolution in the 1960s and 1970s [15]. The nonprofit sector only re-emerged during the reform era of the 1980s, as part of the government's push to decentralize and devolve power away from direct state control [16, 17]. In the following decades, the sector has expanded so rapidly that scholars today ask whether or not it represents the rise of a Chinese civil society: a dense network of groups that bring together citizens to accomplish activities outside of government control. That concept, civil society, has its origin in the 19th Century, when Alexis de Tocqueville connected the early stages of American democracy to the growth of voluntary associations of ordinary citizens for everything from the promotion of temperance to the founding of schools [18]. Ever since, political theorists and sociologists have tried to understand the role that these associ- ations might play in the liberalization of authoritarian regimes and the early stages of democratic rule [19]. The concept of civil society has continued to evolve; in a recent study of the "illegal" NGO sector within China, Ref. [20] quotes Ref. [21] to describe a neo-Tocquevillian concept of civil society as "an autonomous sphere of social power within which citizens can pressure author- itarians for change, protect themselves from tyranny, and democratize from below". For these reasons, hard-line members of the Chinese government are liable to view the very concept of civil society as a "trap" [22]. A central theme of research on the Chinese nonprofit world is thus how autonomous organizations can be in presence of state control [16, 23]. Yet the existence of non-governmental associations does not necessarily imply a civil society in the Tocquevillian mode or even a threat to authori- tarian rule. While countries in the West have accepted nonprofits that oper- ate independent of government control, foundations in China must contend with a one-party system potentially intolerant of organizations that might hold it accountable or draw attention to its deficiencies, and that therefore strives to control and monitor it. Concerns about the lack of autonomy in the nonprofit sector have led many observers to talk in terms of state- corporatism [24, 16], where the nonprofit sector is an auxiliary and dependent 4 system of the state. In the classic definition of Ref. [25], the relevant orga- nizations in state-corporatism parallel those of government agencies, being "singular, noncompetitive, hierarchically ordered, sectorally compartmental- ized, interest associations exercising representational monopolies". In general, civil society can be understood through a paradigm focused ei- ther on conflict, or on contingent cooperation. Theories that focus on conflict assume that the state and non-state organizations have goals that are in fun- damental tension. These theories leave little room for extensive cooperation between the two sectors. The neo-Tocquevillian conception of civil society is the most explicit form of this conception, while, in the particular case of Chinese non-profits, the idea of civil society as a challenge to state power can be found in Ref. [26] which describes a "system of graduated control" where the state exerts different control strategies over different types of nonprofits, depending on the level of threat these extra-government organizations are seen to pose. By contrast, the contingent cooperation paradigm sees non-profits as po- tential service arms of the state, at times able to implement the state's goals in a more efficient and effective fashion. Spires' 2011 paper [20] popularized an account of this form, based around the idea of a "contingent symbiosis" between government and civil society, in which illegal NGOs are allowed to operate as long as they relieve the state's responsibilities for social welfare. Another example is provided by Ref. [17], which describes a "consultative authoritarianism" that promotes at one and the same time an "operationally autonomous civil society" and a "sophisticated authoritarianism that uses more indirect tools of social control". 1.3. Networked Civil Society Because of the power of the Chinese state, research into its nonprofit world tends to focus on how much autonomy can exist in the presence of state con- trol [16, 26, 23, 27]. Previous studies have documented the strategies and tactics of individual nonprofits, either through case studies or the identifica- tion of qualitative patterns of behavior across multiple cases [28, 29, 30, 17]. Civil society, however, is more than just the existence, and even the au- tonomy, of non-governmental organizations. It is how these organizations connect together, in a horizontal fashion, to form something more than a catalog of distinct endeavors [31]: organized "multiple, overlapping, and in- tersecting sociospatial networks of power" [32]. 5 To understand civil society in China, in other words, we must study not only how the state acts on individual foundations, but also how it interacts with the networks through which these foundations share personnel, infor- mation, and resources. The infrastructural power the state exercises may be both enhanced, and dissipated, by the horizontal connections between the or- ganizations it penetrates. Board interlock is one of the primary mechanisms for this self-organization to take place, and yet we know next to nothing about how this process has unfolded, and the implications of this evolution for civil society in twenty-first century China. We will study the Chinese state-society relationship by looking at the evolution of the non-profit board interlock network. To do this, we draw on a large dataset of officially-registered nonprofit foundations. This dataset records not only important information about each foundation, but also the list of board members, enabling us to construct the board interlock network. Our analysis can then operate at two levels simultaneously: (1) at the level of the individual foundation, and (2) at the level of the network, where edges between foundations are defined by the sharing of board members. At the level of individual foundations, our data show the high level of presence of government officials on foundation boards. Examination of how the number of government officials varies by working areas and foundation type shows how the presence of government officials correlates with activities, and legal status, that the government is expected to be most concerned to control. At the network level, we find that board appointments connect together a significant fraction of legal Chinese foundations into a single network. Our results show the existence of network elites, associated with business en- trepreneurs and their foundations, that form preferential ties to each other. This subnetwork appears to preferentially exclude government officials from its most central nodes, providing evidence that the network acts in part to frustrate the magnification of state control that might be expected to arise in the presence of board interlock. The sharing of board members not only connects foundations together, it also appears to preferentially connect them into clusters: groups of nodes that, taken together, tend to preferentially connect to each other rather than the other nodes in the network. This phenomenon has been studied quan- titatively by Ref. [33], for the case of the board interlock network among large corporations. In that study, the authors were particularly interested to determine whether the interlock network showed either a classical "core- 6 periphery" structure based around a single hegemon, or evidence for a the existence of a more "multipolar global order". Such an analysis has a natural analog to the question of the extent of civil society within a nation: do foundations interlock with a government- controlled core, or do they associate into independent structures with central positions that rival that of any putative hegemonic core? We find strong evidence for the latter, detecting distinct clusters at the very center of the network. These clusters show a strong bimodaility in levels of government control, either preferentially excluding, or including, government officials. The Chinese non-profit world is a multipolar one, with different groups at the center showing distinct relationships to government control. Taken together, our findings suggest the emergence of a form of network autonomy that exists despite high levels of individual-level government ap- pointments to nonprofit boards. At the same time, the association of this network autonomy with the business elite-rather than "ordinary" citizens- means that this autonomy may not lead to the kind of pluralism associated with a Tocquevillian civil society. 2. Methods 2.1. Dataset and Network Construction Our primary dataset is the Research Infrastructure of China Founda- tions (RICF [34]; the underlying data is available at Ref. [35], and addi- tional, processed files including the networks derived for this analysis are available at [36]). The RICF database contains the records of the 3,344 legally-registered foundations within mainland China between 1981 and 2013. Information about each foundation is drawn from six different sources, in- cluding both official government reports and information submitted to the government, or reported on websites, by the foundations themselves. Com- paring RICF's counts to other reference sources, the RICF's data appears to be at least 90% complete. The data is restricted to foundations allowed to conduct fundraising; while these foundations are outnumbered by the much larger number of less formal "associations", they are the most developed form of non-profit institution, and control just over 76% of all non-profit funding in the nation.1 1The 3,344 foundations in the RICF database control approximately 35.3 billion RMB (B(cid:85)); this amounts to a large fraction of the 45.9 B(cid:85) of non-profit funding, tracked by 7 RICF strives to be as comprehensive as possible; it includes foundations that may, for example, may be essentially defunct. Within RICF data is a subset of foundations that have undergone an evaluation process, which rates the foundations according to a set of criteria including governance structure, financial transparency, and program effectiveness. Foundations which receive a "3A" or above (3A+) are considered to have passed this evaluation. Be- cause the 3A+ evaluation includes checks on transparency and reporting, we expect the data associated with 3A+ foundations to be more reliable; because it also includes checks on effectiveness and governance, we expect these foundations to be more active. Comparing our analyses with the 3A+ set allows us to test for unexpected sensitivities to both data quality, and foundation activity levels, in the database as a whole. For each foundation, RICF logs the names, gender, and date of birth of the board members. This allows us to resolve name collision and therefore construct the board interlock network: two foundations are connected when they share one (or more) board members. For simplicity in this analysis, our network is unweighted: we consider only the presence or absence of at least one shared member, and do not distinguish whether links are created by sharing presidents, secretaries, or ordinary members. Extensions to the study of weighted ties are certainly possible: one could, for example, con- sider weighting the edge by the number of board members shared. Such a weighting would add additional methodological complexities, however, since foundations with larger boards will have the ability to form stronger ties with each other. This may or may not correctly represent the underlying social dynamics: if two foundations with very large boards share two members, it may not make sense to represent them has having stronger ties to each other compared to two foundations with very small boards and only a single mem- ber in common. One could attempt to normalize the weights by board size; in the case, however, that the two foundations so connected have different sizes, we now have asymmetric edge weights. More sophisticated models yet could be constructed, on the basis of a probabilistic model for connection formation: for example, one could consider edge weight relative to a null model where ties are formed at random. In this analysis, for both simplicity and to allow direct comparison to prior literature in other areas of the world, the Ministry of Civil Affairs of China in 2013, for all "associations" and related classifica- tions [37]. 8 we follow the standard choice of unweighted edges. The RICF data also contains the date of incorporation for each foun- dation, allowing us to study how the final network assembled over time. Inconsistencies in historical reporting rates and availability of data make it difficult, if not impossible, to produce an exact history of entrances and de- partures over time. We can, however, approximate this process by seeing how the network would have assembled if the foundation's board had remained unchanged to the present. This is only an imperfect tracer of the more detailed question that includes both the formation of a foundation, and the ways in which the network might be altered by the addition or removal of board members. However, prior work suggests that this approximation may not be that bad. A study of non-profits in Spain found that initial boards were usually assembled by the founders, and that while nonprofits needed a period of development to attract outsiders as potential board members [38], this early growth appeared to stop when the non-profit reached maturity. A study in the United Kingdom found that the majority of nonprofit boards remained unchanged on timescales of three years, and that it was difficult for to recruit new board members [39]. Little is known about the Chinese case, however; where relevant, we draw attention to cases where "the structure at time t, given board compositions in 2015" is only an approximation, at best, to "the structure at time t, given board compositions at time t". In general, our dynamical analysis is limited to asking questions of the form "when did organizations responsible for the current trend join the system?". 2.2. Variables Four critical variables help us characterize foundations at the individual level. Public Fundraising vs. Non-Public Fundraising. The main legal distinc- tions in the Chinese nonprofit sector governs the scope of fundraising. "Pub- lic fundraising" foundations are allowed to raise money from the general public-for example, through fund drives and advertising-while "non-public fundraising" foundations may not (as shorthand, we refer to these as "pub- lic" and "non-public" hereafter). Moreover, public foundations are further constrained by geography; "central-level" foundations may raise funds at the national scale, while province-level and city-level foundations are restricted geographically. The Chinese Charity Law, effective from 1 September 2016, 9 will nullify the distinction between public and non-public fundraising; how- ever, the ability of organizations to raise funds from general public will still be controlled by license issued from the state.2 Politically Sensitive vs. Politically Non-Sensitive. We supplement the RICF by hand-coding the foundations' mission statements by whether or not they are involved in a potentially controversial or politically sensitive area ("sensitive" vs. "non-sensitive"). Tracking this variable allows us to look for systematic attempts to selectively control certain topics. If a foundation has one or more of the following characteristics it is coded as "sensitive," otherwise it is coded as "non-sensitive" [20, 26, 40, 41]: 1. Involving advocacy, e.g., human rights, labor issues, and environmental policy. 2. Involving international affairs, e.g., programs promoting international cultural exchanges. 3. Involving religious or ethnic issues, e.g., Christian activities and Tibet issues. 4. Involving the police or the legal system, or related "social stability" (weiwen) issues. In order to control the researchers' bias toward coding, two assistants, who were unaware of the research purpose, were asked to independently classify foundations, solely according to the information provided in their mission statements. Discrepancies between the two assistants were finalized by a third person who is a doctoral candidate in China studies. State Power. Our main tracker of state penetration into the non-profit sector is the number of government officials in senior management positions. The presence of government officials on a foundation board is a clear mech- anism by which the state can exercise control; at the same time the state, at least explicitly, forbids government officials from serving on these boards. Official law (Article 23) is that "principals" (the board chair (president), deputy chair, or secretary general) should not be currently employed by the state.3 2Xinhua News Agency: NPC hopes charity law can help poverty fight, available at http://news.xinhuanet.com/english/2016-03/09/c_135172544.htm, last accessed June 14, 2016. 3"Regulations on the Management of Foundations" (4 February 10 Law against direct government involvement are commonly violated. The standard annual reporting forms even asks foundations to report the number of principals who are government staff; a non-negligible fraction (18%) report non-zero numbers of current government officials. As a different measure of state influence, we hand-coded the 3A+ foundations, noting whether or not the board president is a current or retired government official. Hand-coding is a difficult and laborious task; because it can be difficult to ascertain the current status of individual, our 3A hand-coding includes both retired and currently-serving government officials, and is thus not directly comparable to the self-reporting set. We thus count the number of government officials in three different ways. The RICF counts the number of current government officials who serve as principals; it also counts the number of simultaneously retired and senior government officials who serve as principals; and (for a hand-coded subset) it counts the number of either current or retired government officials who serve as the board president. Note that the Article 23 law does not forbid retired government officials from serving as board principals, and these people may well still represent government influence [42]. Registration Level. Depending on their scope of operation, foundations may be registered at the city level, the province level, or the central level. Central-level registrations enable the foundation to operate on a national scale. Registration level gives us information on both the scope of foundation operation, and also allow us to look for preferential interlocking as a function of both scope (e.g., do central-level foundations preferentially connect to each other) geography (e.g., do same-city registrations connect preferentially versus different-city). 3. Results 3.1. Individual-Level Statistics and the Presence of State Power Table 1 shows the breakdown of the foundations in the RICF data. Col- lectively, the 3,344 foundations in our data have a combined income of 35.3 Article 23; original text 2004), cn/article/yw/shjzgl/fgwj/201507/20150700850200.shtml, glish regulations-on-the-management-of-foundations-chinese-text, 18 April 2016. http://www.mca.gov. En- http://www.cecc.gov/resources/legal-provisions/ accessed translation available at see last at 11 Total Numbers Yearly Income Public Non-Public Non-sensitive Sensitive 954 (28%) 1913 (57%) 356 (11%) 121 (3%) Public Non-Public Non-sensitive Sensitive 13.9 B(cid:85) 3.2 B(cid:85) 0.7 B(cid:85) 17.5 B(cid:85) Table 1: Foundation status, activity, and yearly budgets (in billions of yuan; 1 B(cid:85) ≈ 150 M$ in 2016) for the 3,344 foundations in our database. The majority of the foundations are concerned with neutral (non-sensitive) activities, and the majority are restricted to private fundraising. Despite the fact that non-public foundations can not raise money from the general public, they actually control the majority of nonprofit revenue in the network. Official or Retired-Official President (Hand-coded subset) Official Principal (Self-reports) Public Non-Public Non-Sensitive Sensitive 74% ± 3% 79% ± 5% 41% ± 3% 29% ± 9% Public Non-Public Non-Sensitive Sensitive 34% ± 1% 54% ± 3% 9% ± 2% 19% ± 4% Table 2: Government presence on foundation boards is widespread, but variable. Despite explicit laws against the practice, foundations often have government officials as board principals. Hand-coding of a subset of 520 foundation presidents (left panel) shows that the practice of incorporating current or retired government officials is widespread. In both hand-coded data, and self-reports in annual filings (right panel), foundations able to raise funds from the general public, and foundations concerned with government unfavorable activities, are more likely to be controlled in this fashion. billion RMB; approximately 5.5 billion USD at current exchange rates. Par- alleling Tocqueville's accounts of the diverse initiatives of citizens in 19th Century America, foundations in contemporary China range in activity in everything from the promotion of the board game w´eiq´ı (Go) to legal aid for the indigent. The majority are restricted to non-public fundraising, and work in non-sensitive areas. These non-public foundations control just over half of the total yearly nonprofit revenue in the country. Despite laws to the contrary, our results confirm persistent and high levels of state involvement in the governance of foundations. Table 2 shows the relationship between fundraising scope and activity, relying on both the hand- coded 3A subsample that tracks the affiliations of board presidents, and official self-reports in the full database. Because the 3A hand-coding includes 12 Central Provincial City Public Non-Public 82% ± 1% 72% ± 1% 47% ± 2% 36% ± 2% 67% ± 1% 24% ± 1% Table 3: The fraction of nodes of each type that share board members with other foun- dations. The board interlock network extends to a significant fraction of all Chinese non- profits. Both public and non-public fundraising foundations are highly integrated into the overall network, with central-level foundations able to raise from the general public the most connected of all. retired officials, the two methods track slightly different phenomena. Both methods confirm that the presence of government officials is less for non-public foundations. The government is most involved in foundations that are able to raise funds from the general public. (Self-reports, but not our hand-coding, show additional supervision when the foundation itself is associated with sensitive activities. Because this signal does not appear in the hand-coded subset, it may be best-explained by differing incentives: public foundations involved with sensitive activities may be more willing to report government officials on their boards, despite the fact that this violates Article 23.) 3.2. Board Interlocking: Super-Connectors and Elites Board interlock is widespread. A significant fraction of the foundations are integrated into the network: of the 3,344 foundations, 1,411 (42%) share board members with at least one other foundation, for a total of 1,863 links. As shown in Table 3, foundations at the central level are the most likely to be connected. Both public and private foundations show significant network integration. A large fraction of this network is connects together, into a single giant component that contains 1,022 foundations (see Fig. 1). While the existence of board interlock parallels the dominant corporate cases studied in the West, there are significant differences. Most notably, the network is not small world: the average path length between nodes in the giant component is 7.71, and the network diameter is 27; in both cases much larger than the corporate board interlock seen in the United States [43]. The board interlock network in Chinese foundations, in other words, has a tendency to isolate nodes from each other. Even if we restrict to the 77 central-level foundations in the giant component, the diameter remains large (9 steps); by comparison, the network of Fortune 800 firms in the 1970s, 13 Figure 1: The giant component of the board interlock network, containing 1022 nodes and 1626 edges; 75% of the nodes with non-zero degree, and 30% of the full database. A simple spring loaded network layout algorithm allows us to visualize which nodes are tightly coupled to many others (end up at the center), and which are connected to the main network by only a small number of links to peripheral nodes. At the center are a small number of interlinking elite super-connectors with high degree (Fig. 2; Fig. 3). Node size is scaled by PageRank; node colors label the top ten largest clusters found using the Louvain algorithm (see Table 7). 14 Figure 2: The degree distribution of the board interlock network. The distribution is log-normal (dashed-line fit), and a small fraction of the nodes have unusually high degree. nearly ten times larger, had a diameter of five [44]. Chinese foundations connect to each other, but the existence of these long paths shows that board interlocks are fundamentally limited in their ability to coordinate action on the very largest scales. While the network has few shortcuts and hubs that connect otherwise distant nodes, it is also the case that a small number of foundations have very high degree-they share an unusually large number of board members with other foundations. We show the network degree distribution in Fig. 2. The existence of these "super-connectors" can be empirically confirmed by testing for heavy-tailed degree distributions; standard methods strongly prefer a log- normal distribution to both an exponential (i.e., random-graph) and power- law fit [45, 46]. These super-connectors appear to preferentially connect to each other, suggesting the existence of highly connected elite groups (the "rich-club phe- nomenon", first noted by Ref. [47]). Fig. 3 shows the rich-club coefficient in the full, the public, and the non-public subnetworks. To read this figure, first follow the solid line; that this line is rising as a function of k shows that, in the full network, nodes with higher degree are more likely to connect to each other than in a null model that preserves the node degree distribution but otherwise shuffled connections. Now follow the dashed line, which considers just the internal connections of the non-public subnetwork. This line shows that this same phenomenon, seen in the full network, is even stronger here: non-public elites are even more likely to preferentially connect within this 15 Figure 3: The rich-club coefficient as a function of k-core. High-degree organizations ("network elites") preferentially connect to other network elites, particularly in the non- public network. This is apparent in how the rich-club coefficient grows as a function of k-core level for the full network (solid line), the public network (dotted line), and the non- public network (dashed line); 95% confidence ranges are shown. Nodes with high degree are far more likely to connect to each other, compared to a null model that preserves the degree distribution but otherwise breaks interlock correlations [74]. Taken separately, the non-public network shows a stronger rich club effect than the network as a whole. Meanwhile, the majority of high-degree links in the public network are due to cross-links with the non-public foundations; the maximal degree for the public network in isolation is much smaller. 16 subnetwork. Finally, note the (very short) dotted line. This shows at best weak evidence for a rich-club effect when restricting to the public network. The line is much shorter, because the public network, considered in isolation, has few high-degree nodes: if a public foundation has high-degree in the full network, it is usually because it connects to non-public foundations. If we code nodes by the board president's profession, we find that the highest degree nodes include both the government and the business elite. Of the ten highest-degree foundations, six are associated with businesses, four with government. For example, the most connected foundation is the YouChange China Social Entrepreneurs Foundation, set up to encourage philanthropic giving by wealthy entrepreneurs; the second is the Forbidden City Cultural Heritage Conservation Foundation, which manages the state- owned historical treasure. The top ten most connected board members are also a mixture of both government and business elites; three are business elites, six are current government officials, including members of the National People's Congress, the CPPCC, and the Guangzhou People's Congress; and one is a retired government official. Considering the public and non-public networks separately allows us to see how different groups dominate. In the public network, the highest-degree nodes are nearly all associated with the government: of the top ten high- est degree foundations, only two have a president with a non-governmental background (a television celebrity, and the head of a hospital). By contrast, six of the ten highest degree nodes in the non-public network are associated with business elites. The highest degree node, for example, the YouChange Foundation, is run by the businesswoman Ping Wang, whose background is in international finance and law. Board interlock is influenced by both geography and registration level; see Table 4, paralleling classic results for corporate networks, co-located founda- tions are far more likely to connect [48, 49, 50]. We also find evidence for preferential connections between sensitive foundations; there are 70% ± 10% more links between sensitive foundations than found in the null. However, public- and non-public foundations appear to intermix freely and preferences (though detectable) are weak; public foundations are only 16% ± 3% more likely to link to each other than null, and only 17% ± 3% less likely to link to non-public foundations. 17 Province Central ×2.1 ± 0.1 ×0.73 ± 0.03 ×1.2 ± 0.2 Central ×7.05 ± 0.08 ×4.7 ± 0.5 - Province (same) ×0.42 ± 0.01 ×0.46 ± 0.05 Province (different) - ×14.6 ± 0.9 - - City (same) 0 City (different) - - City Table 4: The number of links found between nodes of each type, compared to a degree- preserving null. Foundations in the same region, and at the same registration level, tend to cross link. Centrally-registered foundations are more than twice as likely to connect to each other than in the null; province-level foundations connect to others in the same province at rates seven times higher than the null, and city-level foundations are the most cross-linked of all, linking to other city-level foundations in the same place at rates 14 times higher than expected. Predictor (Legal Status) Central Level Evaluation 3A+ Public (State Power) Current Official Retired, Senior Official (Intrinsic) Board Size (z) Income (z) Age (z) Sensitive Area Non-Public Network Public Network 0.72 ± 0.15(cid:63)(cid:63)(cid:63) 0.90 ± 0.16(cid:63)(cid:63)(cid:63) 0.33 ± 0.12(cid:63)(cid:63)(cid:63) 0.55 ± 0.12(cid:63)(cid:63)(cid:63) - 0.17 ± 0.08(cid:63) 0.0 ± 0.1 0.31 ± 0.04(cid:63)(cid:63)(cid:63) 0.28 ± 0.04(cid:63)(cid:63)(cid:63) 0.19 ± 0.04(cid:63)(cid:63)(cid:63) 0.16 ± 0.04(cid:63)(cid:63)(cid:63) 0.00 ± 0.04 −0.03 ± 0.05 0.33 ± 0.16(cid:63) −0.10 ± 0.08 R = 0.34 R = 0.42 - −0.44 ± 0.13(cid:63)(cid:63)(cid:63) −0.15 ± 0.11 0.1 ± 0.2 Joint Network 1.6 ± 0.2(cid:63)(cid:63)(cid:63) 0.66 ± 0.12(cid:63)(cid:63)(cid:63) −0.1 ± 0.1 0.2 ± 0.2 0.52 ± 0.04(cid:63)(cid:63)(cid:63) 0.40 ± 0.04(cid:63)(cid:63)(cid:63) −0.06 ± 0.04 0.13 ± 0.11 R = 0.44 Table 5: Predictors of node degree, in public and non-public fundraising networks, and in the joint network, in a multiple linear regression. Non-public foundations preferentially exclude current government officials from the highest degree nodes, even when controlling for other variables. (z) indicates z-scored transformed real variables; all other variables are binary for presence/absence. (cid:63) superscripts label significance: (cid:63) (p < 0.05); (cid:63)(cid:63) (p < 0.01); (cid:63) (cid:63) (cid:63) (p < 0.001). 18 3.3. Network Effects: Penetration of State Power We next consider how the presence or absence of government officials predicts node degree. We use a multiple linear regression model, with node degree as the dependent variable and nine independent variables: three vari- ables describing the node's legal status (public vs. non-public; registration level; evaluation level), four "nuisance" variables describing the intrinsic properties of the foundation (board size, income, sensitive area, and age), and two variables operationalizing the state power: (1) current government officials, and (2) retired, senior-level government officials, the two fields in the main RICF database. We consider both the full network, and the two public and non-public networks separately. The results are shown in Table 5. The most surprising results concern the relationship between the pres- ence or absence of government officials, and node degree. Foundation de- gree is (weakly) positively correlated with government presence in the public foundations: nodes with higher degree are more likely to have government officials. However, in the non-public network, high degree is strongly (and significantly, p < 10−3) correlated with reduced government presence. When the two networks are joined together, the two effects compete against each other, partially canceling out. Significantly, we find no correlation for the presence or absence of retired senior officials; only the absence of currently- serving officials is predicted by node degree. To allow comparisons between different networks, we use z-score transformed data; for example, in Table 5, the presence of a current official as board principal in the non-public network shifts node degree down by roughly 0.44 standard deviations (controlling for other factors), where a standard deviation is measured for all the nodes in the non-public degree distribution. Because Table 5's results rely on self-reports, it is possible that these effects may be driven in part due to differences in self-reporting. We can check for this effect by using the hand-coded 3A subset; these results are shown in Table 6; because the 3A hand-coding tracks only presidents, and includes both current and retired officials, our results here are not strictly comparable to the Table 5 case. The smaller size of this set also means that our signal-to-noise is lower. In this subset, the weaker correlation in the public data is no longer detectable, but we still see the negative correlation between network position and state presence. 19 Predictor (Legal Status) Central Level Public (Government Control) President Official (Intrinsic) Board Size (z) Income (z) Age (z) Sensitive Area Joint Network 2.6 ± 0.4(cid:63)(cid:63)(cid:63) −0.3 ± 0.3 Public Non-Public Network Network 1.06 ± 0.26(cid:63)(cid:63)(cid:63) 1.0 ± 0.5(cid:63) - 0.06 ± 0.25 0.42 ± 0.09(cid:63)(cid:63)(cid:63) 0.60 ± 0.19(cid:63)(cid:63) 0.28 ± 0.09(cid:63) 0.38 ± 0.18(cid:63) −0.04 ± 0.09 0.0 ± 0.2 0.4 ± 0.6 −0.40 ± 0.20 R = 0.32 R = 0.48 - −0.68 ± 0.37(cid:63) −0.65 ± 0.34(cid:63) 0.81 ± 0.16(cid:63)(cid:63)(cid:63) 0.75 ± 0.15(cid:63)(cid:63)(cid:63) 0.0 ± 0.15 −0.4 ± 0.4 R = 0.44 Table 6: Predictors of node degree, in public and non-public fundraising networks, and in the joint network; hand-coded 3A. Use of a different, hand-coded dataset for government presence confirms the results of Table 5: non-public foundations preferentially exclude current government officials from the highest degree nodes. The "president official" code includes retired officials. 3.4. Network Clusters: Multipolarity Following Ref. [33], we use the Louvain algorithm [51] to detect clustering among the foundations in the network. The Louvain algorithm groups nodes into clusters that maximize the total modularity, Q; informally, the modular- ity for a cluster is defined the fraction of edges within that cluster, minus the fraction of edges expected under a degree-preserving null model. When the modularity is close to one, nodes in a cluster are strongly connected to each other, and only weakly connected to nodes outside. When the modularity is close to zero, by contrast, there is little evidence for the existence of clusters of nodes that preferentially interconnect. The foundation network shows strong modularity: the average Q for the network is 0.816, and we find a total of 29 clusters. The top ten clusters by membership include just over 50% of all foundations in the network. They are shown, using different colors, in Fig. 1. The strong modularity of the network points to the existence of structurally independent groups, a precondition for multipolarity. However, it is possible for clusters to exist in the presence of a strong core-periphery structure: a core hegemonic cluster could be at the center of a set of more peripheral clusters. To test for this effect, we 20 Cluster Size (Nodes) Average Degree PageRank Government Presence 1 2 3 4 5 6 7 8 9 10 2.1%(cid:63)(cid:63)(cid:63) (low) 2.9%(cid:63)(cid:63)(cid:63) (low) 11% 15% 30%(cid:63)(cid:63)(cid:63) (high) 16% 24% 28%(cid:63) (high) 28%(cid:63) (high) 34%(cid:63)(cid:63)(cid:63) (high) 91 68 66 55 53 50 46 43 39 38 5.4 ± 0.6 3.3 ± 0.4 3.9 ± 0.4 4.3 ± 0.6 2.7 ± 0.4 3.1 ± 0.4 2.6 ± 0.2 2.9 ± 0.3 2.7 ± 0.2 2.6 ± 0.4 11% 7.0% 6.5% 5.7% 5.2% 5.1% 4.2% 4.0% 3.7% 3.5% Table 7: Size (in nodes), average degree, total PageRank, and rates of government presence on boards, in the ten largest clusters of the foundation network. Network power, as measured by PageRank, is shared reasonably equally among the clusters. Six of the ten networks show anomalously high or low levels of government presence compared to the baseline rate of 17%. consider the average degree of nodes within the cluster, as well as the total PageRank of each cluster; PageRank provides an independent measure of network centrality, based on a random-walker model, and can be interpreted as a consensus measure of attention [52] or power [53]. The results argue for the multipolarity hypothesis. While the largest cluster has higher average degree, and larger PageRank than the others in the top ten, the effect is not strong, and power is shared remarkably evenly among the largest clusters. We can quantify this using the Gini coefficient, which for the top-ten clusters is 19%, where zero is perfect equality. Put another way, the distribution of PageRank among the top ten clusters is more equal than the famously egalitarian income distribution in Denmark (Gini coefficient 25% [54]), and far less than seen in PageRank distributions found in networks among pages in the world-wide web [52]. The existence of multiple clusters with high degree and high PageRank is consistent with the rich club effect found above: these highly central clusters preferentially link within themselves. Finally, for each cluster, we compute the fraction of nodes within the system that have government officials on the board. This allows us to test whether or not the clusters are defined by characteristic levels of government involvement. For the top ten clusters, we find strong evidence for bimodality 21 in levels of government control. Clusters are much less likely to show "av- erage" levels of government presence on boards, and tend to either extreme, either strongly excluding government officials, or having far more than ex- pected given the base-rate. Cluster-by-cluster in the top ten, we have four cases where rates of government presence are either anomalously high, or low, at the p < 10−3 level, and two more at the p < 0.05 level. The largest and most central cluster of all has the lowest rates of government presence: 2.1%, eight times lower than the expected (null) rate of 17%. The exis- tence of these extreme values in either direction allow us to reject the null hypothesis-that rates of government presence are independent of cluster membership-at p (cid:28) 10−6 in the standard Fisher test. A Bayesian model, which explicitly models clusters as draws from one of two binomials with dif- ferent values for the probability of government control, is strongly preferred over a single binomial distribution at similar levels. These relationships are shown in Table 7. Taken together, these results suggest that the foundation network is a fundamentally multipolar structure, where clusters have roughly equal levels of network power and are subject to distinct levels of government control. These clusters are further defined both by geography (since foundations with provincial or city-level registrations tend to strongly associate, see Table 4) and public/non-public status. 3.5. Longitudinal Analysis: the Emergence of Autonomy How did these network effects evolve over time? Because board member- ship changes over time, a full answer to this question would require knowledge of the dates of both joining and departure for each member. In the absence of this information, we can conduct an analysis of the evolution of this net- work using the board compositions observed in 2015. This amounts to a longitudinal analysis of civil society growth rather than a direct study of network dynamics since we expect, particularly for the older organizations, some changes in board composition due (at the very least) to retirement. While this is, on short timescales and under the assumption that most or- ganizations have relatively stable compositions year to year, a potentially good approximation, such an analysis is better understood as answering the question "when did the organizations responsible for the current structure join the network". Fig. 4 shows the three critical metrics over time, under these assumptions: (1) the size of the public and non-public network over time; (2) the changing 22 Figure 4: Network evolution over time. As the non-public network grew (top panel), it reported lower levels of government presence (middle panel); this contrasts with the growth of the public network which began to report increasing levels of government presence in the same period. In the years after 2008 (see text), the formation of new non-profits leads to the emergence of a detectably negative relationship between node degree and government presence in the non-public network (bottom panel): the highest degree nodes now appear to preferentially exclude government presence. 23 levels of government presence on boards; and (3) the evolution of the node degree–government presence relationship. Overlaid on these panels are five critical dates in the recent history of the non-profit sector: (1) 4 June 1989, the Tiananmen Square protests, and the emergence of civil society in China [16]; (2) 15 September 1995, the Fourth World Conference on Women, associated with the accelerating development of civil society in China [55]; (3) 1 June 2004, the day the Regulations on the Management of Foundations, including the above-discussed Article 23, took effect; (4) the Sichuan Earthquake of 12 May 2008, according to Ref. [56], a critical date in the expansion of the non-profit sector's horizontal linkages; and (5) the 12th Five-Year plan for 2011–2015, introduced March 2011, which devoted a full chapter to "social management innovation" as a key govern- ment target. Fig. 5 shows the same plots, but now for the 3A+ hand-coded subset, as discussed above. Significant numbers of non-public foundations appear soon after the Tianan- men Square protests, though none of the foundations from that year retain 3A+ status today. The effect of the 2004 Regulations on the growth rate is clear: for at least the next five years, it led to literally exponential growth in the number of both public and non-public foundations. The growth rate in the non-public sector was significantly stronger, so that, by 2011, the non-public sector was larger than the public one. The effect of these same regulations on the levels of government super- vision is more complex. The 2004 regulations meant that new organizations reported lower levels of government principals in the non-public network. This is consistent with new foundations becoming aware of, and responding to, the restrictions of Article 23. This decline does not appear as strongly in the 3A+ hand-coded subset, however, which suggests one of two explana- tions: that new foundations are continuing to include government officials, but staying within the letter of the law by including only retired officials, or, that new foundations are continuing to include currently-serving government officials, but under-reporting their presence in official paperwork. The effects of Article 23 are inconsistent: the decline in reported government presence does not occur in the public network; indeed, after 2008, reported government presence starts to rise. Most interesting are the effects of network growth on the relationship between node degree and government presence. In both the full network, and the 3A+ hand coded subset, we see that organizations responsible for the current negative relationship between degree and government presence 24 Figure 5: Network evolution over time; hand-coded 3A+ subset. Differences in overall levels of supervision are do both to reporting effects, and the necessary inclusion of retired officials in this set. Despite these coding differences, we see the same emergence of elite autonomy signal (bottom panel) as in the full network; here the signal becomes detectably negative after the introduction of the 2011 "Five Year Plan". 25 joined only late in the network history. Today the non-public network acts to systematically exclude government officials from high degree nodes. In the full network, the negative relationship becomes strong enough to detect soon after the Sichuan earthquake. In the 3A hand-coded subset, the down- ward trend towards increasingly negative relationships between degree and government presence becomes detectable only after the 2011 Five Year Plan. 4. Discussion Our quantitative work here confirms the unusual nature of the state- society relationship in contemporary China, one that appears to give signif- icant network powers to independent, non-governmental agents. There are high levels of network clustering and autonomy, and a strong, inverse rela- tionship between network centrality and government supervision. The world of Chinese non-profits is not simple one of command-and-control, where gov- ernmental agents dictate by direct presence the actions of the most important players in the network. The nature and strength of these ties may allow for the kinds of decentralized decision-making and policy influence seen in a recent qualitative study of civil society organizations in the country [57]. At the same time, our analysis shows that these foundations are hardly a free-wheeling sector beyond the reach of government power. Our most basic results confirm the persistent and high levels of state presence throughout the non-profit world. The appointment of government officials to high-level positions on foundation boards means that the government continues to hold significant levels of direct influence. In Tocqueville's account of civil society in the 19th Century United States, citizens formed voluntary associations independent of the government itself. Whatever they are doing, the non- profits of 21st century China are far from this 19th Century model, and far, also, from models of post-Soviet democratization in Eastern Europe [19]. Our quantitative results fit with what is widely seen in case studies and fieldwork in China itself: state power may not be complete, but it cannot be ignored. 4.1. Inconsistent Control Our results show significant differences in the level of governmental pene- tration of the non-profit sector. This is most apparent among the non-public foundations where, at least officially, only one in ten foundations have a cur- rent government official as board principal. The government's relationship to its foundations is bimodal, with public foundations showing the highest 26 levels of government involvement; not surprisingly, of this more supervised group, the public foundations engaged in politically-sensitive topics receive the greatest levels of supervision of all. The unusual nature of these less-supervised, non-public foundations be- comes apparent at the network level. A set of network elites are at the center of the non-public network. These elites not only serve as hubs for large numbers of other foundations, but preferentially connect to each other. Examination of the profiles of the highest degree nodes shows that, in a par- allel to the United States [9], the nodes responsible for these interconnections are, primarily, the business elites. Detection of this rich club effect provides a new view on the development of horizontal relationships that can enable communication and cooperation- a process captured in fieldwork studies of horizontal connections during the 2008 Sichuan Earthquake [56], and a missing piece for understanding the development of state that increasingly devolves government functions to non- government agencies [29]. That business elites play such a central role in the NGO network fits with recent work that shows an increasing importance of non-corporate venues as corporate networks fragment [58, 59, 60]. Our results go beyond a simple demonstration of elite homophily, however, in showing how elites in an au- thoritarian regime manage relationships with government officials. In particular, our network analysis reveals an unexpected negative re- lationship between node degree and government presence in the non-public network. Not only is government penetration much lower overall in the non- public foundations, it appears to have even less penetration to the founda- tions at the network's center. Horizontal relationships between foundations appear to selectively exclude the top-down "vertical" control of the state in a form of structural autonomy. These horizontal relationships are arranged in such a way to create a mul- tipolar structure at the heart of the foundation network. Rather than a set of core-periphery relationships, the network's high levels of clustering suggest that the world of Chinese NGOs is fundamentally multipolar [33]. Distinct clusters appear to share central places in the network, and the largely equal share of network power given to each cluster means that there is little ev- idence of a dominant hegemon to which all other clusters uniquely attach. What inequality in network power exists appears, if anything, to be asso- ciated with reduced levels of government presence: the two largest clusters in the network have significantly lower levels of government presence than 27 expected. 4.2. Emergence of Elite Autonomy A dynamical analysis of network formation, shows how recent the cre- ation of this partially autonomous sphere has been. Negative relationships between network power and government control appeal soon after the 2008 Earthquake (the downward trend in the 3A subset appears around this time as well, but only becomes statistically significant in 2011). This result lends new support to the qualitative studies of Ref. [56], which associated the earth- quake to lasting cultural, political, and social changes in the non-profit world that led to new forms of autonomous civil society. Ref. [61] supports these re- sults from a different angle, suggesting the increasing importance of private, as opposed to state-controlled, organizations in non-profit relief. In a com- parative of study of how government-controlled and private firms responded to the 2008 Earthquake, they found that private firms donated to relief more rapidly, and at greater levels of financial assistance, that state-owned firms. Even many years after the 2008 Earthquake, these effects persist. One more recent political change comes from the government: the pro- motion of "social management innovation" (chuangxin shehui guanli), a core concept of state policy first introduced in the 4th Plenum of the 16th CCP Congress in 2004 [62, 63]; the 12th Five-Year plan for 2011–2015 elabo- rated the policy as a governance target, proposing "party leadership, govern- ment responsibility, societal cooperation, public participation" as key princi- ples [64], the use of civil society to provide social services, and a correspond- ingly less rigid approach to controlling it [65]. Our results confirm the impact of these further reforms: in the post-plan era, the negative relationship be- tween government presence and node degree has persisted. Crucially, our data does not include the so-called "grassroots", or illegal NGOs that, while tolerated by the state, operate without legal sanction [20]. These NGOs sometimes include Communist party members on staff, are largely tolerated by the state and often seen as socially legitimate organiza- tions, and often provide essential services in cases where the state can not. Despite their technical illegality, government officials sometimes even lend explicit support to their mission. This qualitative work further suggests that members of illegal NGOs are largely uninterested in organizing independently in ways that might appear to threaten the state. Taken at face value, these suggest that were data on the staff or board members of illegal NGOs to 28 be incorporated into our networks, we would find them in a core-periphery relationships to the officially-sanctioned actors we study here. 4.3. Civil Society and the Meaning of Network Connectivity Network connectivity is associated with the ability to form common knowl- edge [66], and both simulations and theory suggest that nodes of high degree play a crucial role when common knowledge is required for joint action [67]. The negative relationship between node degree and government presence ob- served in our data then amounts to a form of structural autonomy. Taken at face value, these results seem to suggest that foundations within this non- public subset may be part of the emergence of a new civil society, whose interlocks occur increasingly independently of the state, and whose resul- tant capacity for independent coordination might even be seen as a threat to authoritarian control. The identification of these links with a Tocquevillian civil society is com- plicated, however, by the fact that when the most connected of the non-public foundations are not government in origin, they appear, instead, to be drawn from the business elite. The extensive ties between the state and business then suggest that this civil society is something less than might be expected; ever since the reforms of the 1980s, scholars have suggested that the business elite act as an agent of the government itself [68]. Indeed, this provides a clear alternate explanation: if the highest degree nodes are sufficiently aligned with the government to begin with, they can be allowed to operate without direct supervision-precisely as we see in our data. Whether or not the elite are truly independent of the government, their special position in society, and their ability to influence the government financially [69] suggests that this civil society, such as it is, is far from the pluralist Tocquevillian world of the ordinary citizen. Understood in this context, and with the caveat that our work here is able to cover only the official NGOs, and not the illegal sector, these results are perhaps more consistent with the theory of "consultative authoritarianism", argued for by Ref. [17], in which the government tolerates increasing levels of autonomy among non-governmental organizations while developing new strategies of indirect control. Networks of state power may overlap with ones defined by economic exchange, but need not be coextensive [32]. Our results show that the government has come to tolerate communities of interlocking associations that operate with lower levels of direct government presence. Today, the total number of these organizations is small. The new 29 Charity Law, effective from 1 September 2016, allows a far greater number of associations-potentially in the hundreds of thousands-to raise funds from the general public. We expect the rapid expansion in both the size and scale of the Chinese non-profit sector will radically increase its impact on the state-society relationship. 4.4. Networked Civil Society and Multipolar Structure Finally, our cluster analysis suggests that the social actors in civil society are organized into larger clusters by horizontal relationships, and arranged in such a way to creature a relatively equal relationship between the most important clusters in the network: a multipolar world [33] of Chinese NGOs. Distinct clusters appear to share central places in the network, and the equal shares of network power given to each cluster is very different from a system with a dominant hegemon to which all other clusters uniquely attach. The clusters are not perfectly equal in network power. The inequality in network power that does exist appears to be associated with reduced levels of government presence: the two largest clusters in the network have sig- nificantly lower levels of government presence than expected. This result, concerning the most powerful clusters of individual nodes, parallels the re- sults on elite autonomy among the nodes with greatest network power on the individual level. By allowing these more egalitarian, more horizontal structures to emerge- and, further, by allowing the most important of these structures to operate with increased independence from central monitoring-the state may have made it possible for organizations to make more efficient use of local and dis- tributed knowledge [70]. The patterns in which these new structures arrange themselves call to mind classic theories of decentralized decision-making in liberal societies that draw attention to autonomous, spontaneous, and "poly- centric" orders [71, 72]. At the same time, persistently high levels of state involvement in the sector frustrate a simple analogy to descriptions of liberal states. Our account of Chinese civil society here, in terms of the simultaneous presence of both horizontal (group-to-group), and vertical (group-to-state) linkages, and the structural tensions between the two, finds parallels in re- cent work on collective action in rural China [73], which identifies a new class of "semi-integrated" organizations that can mobilize both horizontal and vertical linkages at once. Remarkably, the Chinese government does not appear to be combating the emergence of a potential civil society counter-power either through direct 30 monitoring, or through disruption of network ties. There is plenty of evidence that individual foundations in the official Chinese non-profit sector today are relatively tame, with a strong tendency to align their goals with that of the state [17]. Yet the underlying network structures that these organizations have implicitly created have the potential to enable more independent ac- tion and decision-making than one would expect; they are certainly very far away from the highly centralized social structure and planned economy that characterized mainland China during Mao's rule. Our work suggests that the government will either increasingly employ less-visible strategies of con- trol, or, conversely, come to accept the delivery of social and economic needs through a rapidly-growing, complex, and increasingly autonomous sphere. 31 Acknowledgments J.M. thanks Dr. Zhaonan Zhu and Bin Chen for assistance with coding; Qun Wang and the RICF data quality team for data collection and data quality control. S.D. thanks the Santa Fe Institute and the Alan Turing Institute for their hospitality while this work was completed. We thank Dr. Peter Frumkin and the 2016 Penn Summer Doctoral Fellows Program fellows, Dr. Richard Steinberg, Dr. Lehn Benjamin, Dr. Bin Chen, Dr. Xinsong Wang, Xunyu Xiang, Xiaoyun Wang, Bradi Heaberlin, and Torrin Liddell for their valuable comments. The RICF project is supported in part by the Dunhe Foundation. 32 References References [1] M. Fennema, H. Schijf, Analysing interlocking directorates: Theory and methods, Social Networks 1 (4) (1978) 297 – 332. doi:http://dx.doi. org/10.1016/0378-8733(78)90002-3. [2] B. Mintz, M. Schwartz, Interlocking directorates and interest group for- mation, American Sociological Review (1981) 851–869. [3] M. S. Mizruchi, What do interlocks do? an analysis, critique, and as- sessment of research on interlocking directorates, Annual Review of So- ciology (1996) 271–298. [4] G. F. Davis, H. R. Greve, Corporate elite networks and governance changes in the 1980s, American Journal of Sociology 103 (1) (1997) 1– 37. [5] D. D. Michael Dreiling, Corporate unity in American trade policy: A network analysis of corporate-dyad political action, American Journal of Sociology 116 (5) (2011) 1514–63. URL http://www.jstor.org/stable/10.1086/657524 [6] C. Pombo, L. H. Guti´errez, Outside directors, board interlocks and firm performance: Empirical evidence from Colombian business groups, Jour- nal of Economics and Business 63 (4) (2011) 251–277. [7] L. Faulk, J. Willems, J. McGinnis Johnson, A. J. Stewart, Network connections and competitively awarded funding: The impacts of board network structures and status interlocks on nonprofit organizations foun- dation grant acquisition, Public Management Review (2015) 1–31. [8] G. F. Davis, The significance of board interlocks for corporate gover- nance, Corporate Governance: An International Review 4 (3) (1996) 154–159. [9] G. Moore, S. Sobieraj, J. A. Whitt, O. Mayorova, D. Beaulieu, Elite interlocks in three u.s. sectors: Nonprofit, corporate, and government, Social Science Quarterly 83 (3) (2002) 726–744. URL http://www.jstor.org/stable/42955819 33 [10] R. C. Barnes, Structural redundancy and multiplicity within networks of us corporate directors, Critical Sociology 43 (1) (2017) 37–57. doi: 10.1177/0896920515580177. [11] J. Galaskiewicz, W. Bielefeld, M. Dowell, Networks and organizational growth: A study of community based nonprofits, Administrative Science Quarterly 51 (3) (2006) 337–380. [12] N. Esparza, S. H. Jeon, Interlocking boards of trustees and grant ac- quisition among homeless service organizations, Public Performance & Management Review 36 (4) (2013) 637–664. [13] M. Fennema, J. Tillie, Civic community, political participation and po- litical trust of ethnic groups, in: Multikulturelle Demokratien im Ver- gleich, Springer, 2001, pp. 198–217. [14] M. Mann, The autonomous power of the state: its origins, mechanisms and results, European Journal of Sociology 25 (02) (1984) 185–213. [15] Z. Ye, China's emerging civil society, Brookings Institution Center for Northeast Asian Policy Studies, 2003. [16] Q. Ma, The governance of NGOs in China since 1978: how much auton- omy?, Nonprofit and Voluntary Sector Quarterly 31 (3) (2002) 305–328. [17] J. C. Teets, Let many civil societies bloom: The rise of consultative authoritarianism in China, The China Quarterly 213 (2013) 19–38. doi:10.1017/S0305741012001269. URL S0305741012001269 http://journals.cambridge.org/article_ [18] A. de Tocqueville, Democracy in America, University of Chicago Press, Chicago, IL, USA, 2000, edited and translated by Harvey C. Mansfield and Delba Winthrop. Book II, Chapter 5. [19] M. Walzer, The civil society argument, in: C. Mouffe (Ed.), Dimen- sions of Radical Democracy: Pluralism, Citizenship, Community, Verso, London, 1992, pp. 89–107. [20] A. J. Spires, Contingent symbiosis and civil society in an authoritarian state: Understanding the survival of Chinas grassroots NGOs, American 34 Journal of Sociology 117 (1) (2011) 1–45. URL http://www.jstor.org/stable/10.1086/660741 [21] M. W. Foley, B. Edwards, The paradox of civil society, Journal of Democracy 7 (3) (1996) 38–52. [22] M. C. Keith Zhai, Provincial chiefs named as a new generation steps up, South China Morning Post. URL provincial-chiefs-named-new-generation-steps http://www.scmp.com/news/china/article/1195746/ [23] C. Hsu, Beyond Civil Society: An Organizational Perspective on State– NGO Relations in the People's Republic of China, Journal of Civil So- ciety 6 (3) (2010) 259–277. doi:10.1080/17448689.2010.528949. URL http://dx.doi.org/10.1080/17448689.2010.528949 [24] S. H. Whiting, The politics of NGO development in China, Voluntas: International Journal of Voluntary and Nonprofit Organizations 2 (2) (1991) 16–48. [25] P. C. Schmitter, Still the century of corporatism?, The Review of Politics 36 (01) (1974) 85–131, quotation from pp. 99-100. [26] X. Kang, H. Han, Graduated Controls The State-Society Relationship in Contemporary China, Modern China 34 (1) (2008) 36–55, c48. doi: 10.1177/0097700407308138. URL http://mcx.sagepub.com/content/34/1/36 [27] J. Y. Hsu, C. L. Hsu, R. Hasmath, NGO strategies in an authoritarian context, and their implications for citizenship: The case of the People's Republic of China, Available at SSRN 2657187. [28] R. J. Estes, Emerging Chinese foundations: The role of private philan- thropy in the new China, Regional Development Studies 4. [29] T. Saich, Negotiating the state: The development of social organizations in China, The China Quarterly 161 (2000) 124–141. URL http://www.jstor.org/stable/655983 [30] L. Yiyi, The autonomy of Chinese NGOs: a new perspective, China: An International Journal 5 (02) (2007) 173–203. 35 [31] T. Salmenkari, Theoretical Poverty in the Research on Chinese (2013) 682–711. Civil Society, Modern Asian Studies 47 (02) doi:10.1017/S0026749X12000273. URL S0026749X12000273 http://www.journals.cambridge.org/abstract_ [32] M. Mann, The Sources of Social Power: Volume 1, A History of Power from the Beginning to AD 1760, Cambridge paperback library, Cam- bridge University Press, Cambridge, UK, 1986. [33] E. M. Heemskerk, F. W. Takes, The corporate elite community structure of global capitalism, New Political Economy 21 (1) (2016) 90–118. [34] J. Ma, Q. Wang, C. Dong, H. Li, A Database for Chinese Civil So- ciety Studies: The Research Infrastructure of Chinese Foundations, SSRN Scholarly Paper ID 2673879, Social Science Research Network, Rochester, NY (Oct. 2015). URL https://papers.ssrn.com/abstract=2896414 [35] J. Ma, Q. Wang, C. Dong, H. Li, The research infrastructure of Chinese foundations, a database for Chinese civil society studies, Scientific Data 4 (2017) 170094. doi:10.1038/sdata.2017.94;. URL http://dx.doi.org/10.1038/sdata.2017.94 [36] S. DeDeo, J. Ma, The Chinese NGO Board Interlock Network, http: //bit.ly/china_ngo. Last accessed 18 August 2017 (2017). [37] Ministry of Civil Affairs statistics bulletin, available at http://www.mca.gov.cn/article/zwgk/mzyw/201406/ 20140600654488.shtml; last accessed 25 June 2016. of China, 2013 [38] P. de Andr´es-Alonso, V. Azofra-Palenzuela, M. E. Romero-Merino, De- terminants of nonprofit board size and composition the case of spanish foundations, Nonprofit and Voluntary Sector Quarterly 38 (5) (2009) 784–809. [39] C. Cornforth, C. Simpson, Change and continuity in the governance of nonprofit organizations in the united kingdom: The impact of or- ganizational size, Nonprofit Management and Leadership 12 (4) (2002) 451–470. 36 [40] M. Dai, Policing in the People's Republic of China: a review of recent literature, Crime, Law and Social Change 50 (3) (2008) 211–227. [41] A. Y. Jiao, Police and culture: A comparison between China and the United States, Police Quarterly 4 (2) (2001) 156–185. [42] D. D. Li, Changing incentives of the Chinese bureaucracy, The American Economic Review 88 (2) (1998) 393–397. URL http://www.jstor.org/stable/116954 [43] G. F. Davis, M. Yoo, W. E. Baker, The small world of the American corporate elite, 1982–2001, Strategic organization 1 (3) (2003) 301–326. [44] J. H. Levine, The network of corporate interlocks in the United States: An overview, in: American Sociological Association Annual Meeting, 1977, cited in Ref. [43]. URL http://www.dartmouth.edu/~jlevine/Corporate1977.pdf [45] A. Clauset, C. R. Shalizi, M. E. Newman, Power-law distributions in empirical data, SIAM Review 51 (4) (2009) 661–703. [46] J. Alstott, E. Bullmore, D. Plenz, powerlaw: A python package for analysis of heavy-tailed distributions, PLoS ONE 9 (1) (2014) 1–11. doi:10.1371/journal.pone.0085777. [47] S. Zhou, R. J. Mondrag´on, The rich-club phenomenon in the internet topology, IEEE Communications Letters 8 (3) (2004) 180–182. doi: 10.1109/LCOMM.2004.823426. [48] T. E. Stuart, Network positions and propensities to collaborate: An in- vestigation of strategic alliance formation in a high-technology industry, Administrative Science Quarterly (1998) 668–698. [49] O. Sorenson, T. E. Stuart, Syndication networks and the spatial distri- bution of venture capital investments, American Journal of Sociology 106 (6) (2001) 1546–1588. [50] J. Owen-Smith, W. W. Powell, Knowledge networks as channels and conduits: The effects of spillovers in the boston biotechnology commu- nity, Organization Science 15 (1) (2004) 5–21. 37 [51] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfold- ing of communities in large networks, Journal of Statistical Mechanics: Theory and Experiment 2008 (10) (2008) P10008. [52] B. Heaberlin, S. DeDeo, The evolution of Wikipedia's norm network, Future Internet 8 (2) (2016) 14. doi:10.3390/fi8020014. URL http://www.mdpi.com/1999-5903/8/2/14 [53] E. R. Brush, D. C. Krakauer, J. C. Flack, A family of algorithms for com- puting consensus about node state from network data, PLoS Computa- tional Biology 9 (7) (2013) 1–17. doi:10.1371/journal.pcbi.1003109. URL http://dx.doi.org/10.1371%2Fjournal.pcbi.1003109 [54] Central online Intelligence Agency, The World Factbook 2013–14, available https://www.cia.gov/library/publications/ the-world-factbook/rankorder/2172rank.html. Last accessed 25 September 2016 (2013). [55] Q. Ma, Non-Governmental Organizations in Contemporary China: Paving the Way to Civil Society?, Routledge Contemporary China Se- ries, Taylor & Francis, 2005. URL https://books.google.com/books?id=07KTtSVH2hUC [56] S. Shieh, G. Deng, An Emerging Civil Society: The Impact of the 2008 Sichuan Earthquake on Grass-roots Associations in China, The China Journal 65 (2011) 181–194, c48. URL http://www.jstor.org/stable/25790563 [57] J. Teets, The power of policy networks in authoritarian regimes: Chang- ing environmental policy in China: Teets, Governancedoi:10.1111/ gove.12280. URL http://doi.wiley.com/10.1111/gove.12280 [58] G. Domhoff, Who Rules America? Challenges to Corporate and Class Dominance, McGraw-Hill, New York, NY, USA, 2009. [59] W. Carroll, The Making of a Transnational Capitalist Class: Corporate Power in the 21st Century, Zed Books, London, United Kingdom, 2010. 38 [60] N. de Graaff, Oil elite networks in a transforming global oil market, International Journal of Comparative Sociology 53 (4) (2012) 275–297. doi:10.1177/0020715212460042. [61] R. Zhang, Z. Rezaee, J. Zhu, Corporate philanthropic disaster response and ownership type: Evidence from chinese firms response to the sichuan earthquake, Journal of Business Ethics 91 (1) (2010) 51–63. [62] F. N. Pieke, The Communist Party and social management in China, China Information 26 (2) (2012) 149–165, c20. URL http://cin.sagepub.com/content/26/2/149.short [63] J. Schlaeger, M. Jiang, Official microblogging and social management by local governments in china, China Information 28 (2) (2014) 189–213. doi:10.1177/0920203X14533901. URL http://cin.sagepub.com/content/28/2/189.abstract [64] S.-J. Shi, The bounded welfare pluralism: public–private partnerships under social management in China, Public Management Review (2016) 1–16doi:10.1080/14719037.2016.1183700. [65] W. Shan, Social Management: China Goes beyond Maintain- (2013) 36–46. ing Social Stability, East Asian Policy 05 (02) doi:10.1142/S1793930513000147. URL S1793930513000147 http://www.worldscientific.com/doi/abs/10.1142/ [66] M. S.-Y. Chwe, Structure and strategy in collective action, American Journal of Sociology 105 (1) (1999) 128–156. [67] T. M. Liddell, arXiv:1507.08282. URL https://arxiv.org/abs/1507.08282 S. DeDeo, Common knowledge on networks [68] M. M. Pearson, China's New Business Elite: The Political Consequences of Economic Reform, University of California Press, 1997. [69] D. Ma, W. L. Parish, Tocquevillian Moments: Charitable Contributions by Chinese Private Entrepreneurs, Social Forces 85 (2) (2006) 943–964. URL http://www.jstor.org/stable/4494945 39 [70] F. A. Hayek, The use of knowledge in society, The American Economic Review 35 (4) (1945) 519–530. URL http://www.jstor.org/stable/1809376 [71] M. Polanyi, The Logic of Liberty, Routledge & Kegan Paul, 1951. [72] F. A. v. Hayek, The Constitution of Liberty: The Definitive Edition, University of Chicago Press, Chicago, 2011, edited by Ronald Hamowy. Originally published 1960. URL http://site.ebrary.com/id/10578472 [73] Y. Lu, R. Tao, Organizational structure and collective action: Lineage networks, semiautonomous civic associations, and collective resistance in rural China, American Journal of Sociology 122 (6) (2017) 1726–1774. [74] J. J. McAuley, L. da Fontoura Costa, T. S. Caetano, Rich-club phe- nomenon across complex network hierarchies, Applied Physics Letters 91 (8) (2007) 084103. 40
1205.1456
1
1205
2012-05-07T16:45:09
Dynamic Multi-Relational Chinese Restaurant Process for Analyzing Influences on Users in Social Media
[ "cs.SI", "cs.LG", "physics.soc-ph" ]
We study the problem of analyzing influence of various factors affecting individual messages posted in social media. The problem is challenging because of various types of influences propagating through the social media network that act simultaneously on any user. Additionally, the topic composition of the influencing factors and the susceptibility of users to these influences evolve over time. This problem has not studied before, and off-the-shelf models are unsuitable for this purpose. To capture the complex interplay of these various factors, we propose a new non-parametric model called the Dynamic Multi-Relational Chinese Restaurant Process. This accounts for the user network for data generation and also allows the parameters to evolve over time. Designing inference algorithms for this model suited for large scale social-media data is another challenge. To this end, we propose a scalable and multi-threaded inference algorithm based on online Gibbs Sampling. Extensive evaluations on large-scale Twitter and Facebook data show that the extracted topics when applied to authorship and commenting prediction outperform state-of-the-art baselines. More importantly, our model produces valuable insights on topic trends and user personality trends, beyond the capability of existing approaches.
cs.SI
cs
Dynamic Multi-Relational Chinese Restaurant Process for Analyzing Influences on Users in Social Media Himabindu Lakkaraju IBM Research - India [email protected] Indrajit Bhattacharya Indian Institute of Science [email protected] Chiranjib Bhattacharyya Indian Institute of Science [email protected] 2 1 0 2 y a M 7 ] I S . s c [ 1 v 6 5 4 1 . 5 0 2 1 : v i X r a ABSTRACT We study the problem of analyzing influence of various fac- tors affecting individual messages posted in social media. The problem is challenging because of various types of influ- ences propagating through the social media network that act simultaneously on any user. Additionally, the topic composi- tion of the influencing factors and the susceptibility of users to these influences evolve over time. This problem has not studied before, and off-the-shelf models are unsuitable for this purpose. To capture the complex interplay of these var- ious factors, we propose a new non-parametric model called the Dynamic Multi-Relational Chinese Restaurant Process. This accounts for the user network for data generation and also allows the parameters to evolve over time. Designing inference algorithms for this model suited for large scale social-media data is another challenge. To this end, we propose a scalable and multi-threaded inference algorithm based on online Gibbs Sampling. Extensive evaluations on large-scale Twitter and Facebook data show that the ex- tracted topics when applied to authorship and comment- ing prediction outperform state-of-the-art baselines. More importantly, our model produces valuable insights on topic trends and user personality trends, beyond the capability of existing approaches. 1. INTRODUCTION Social networking sites, such as Twitter, Facebook, MyS- pace etc, have proven to be extremely popular platforms for users for sharing views and opinions using short posts1. Un- derstanding and analyzing topics in social media has become immensely important for a variety of stakeholders, such as companies advertising products and identifying customer segments, social scientists and national security agencies, leading to a surge in research interest [15, 12, 14, 21, 1, 17, 23]. There are two major distinguishing features of social media data. First, users are influenced by a variety of fac- tors when posting messages. The four major factors have been identified to be personal preferences of the users, their immediate network of friends on the network, geographic or regional issues and events and world-wide happenings [23]. While all factors typically affect all users, different users have different 'personalities', in that they are influenced by these factors in different degrees. Secondly, social media data is inherently dynamic. Topics follow different 'trends'; individual interests of influential users, or issues starting off within a small network of friends, sometimes lead to global 1Our work focuses on such micro-blogging sites. upheavals, while other enjoying global popularity are slowly relegated to individual favorites. Similarly, user personali- ties also evolve and show trends over a geography or sub- network. Owing to these multitude of factors, and the intrinsic in- terplay between them, analysis of social media data has been a major challenge. Most existing approaches fall short of ad- dressing the problem in its entirety, and only model isolated factors and their interactions [17, 21, 1]. A major hurdle for sophisticated models is the scale of the data; the associated inference algorithms need to be scalable and efficient. In this paper, we propose a non-parametric probabilistic approach for analyzing social media data. Specifically, we first propose an augmentation of the Chinese Restaurant Process[16], called the Multi-Relational Chinese Restaurant Process (MRelCRP), that accommodates users and multi- ple relationships over them, for assigning topics to posts. By using relationships, the MRelCRP defines a new and differ- ent family of distributions compared to the traditional non- parametric processes such as the Dirichlet Process [4], and its hierarchical versions [20]. We further propose a dynamic version of the MRelCRP (D-MRelCRP) that allows tempo- ral evolution of the model parameters to capture topic and personality trends. The rich interactions of various parame- ters in the model are able to capture the various interplays in social media data. Crucially, we propose an efficient and multi-threaded algorithm, based on online collapsed Gibbs sampling, for performing learning and inference for Dynamic MRelCRPs. We evaluate the proposed model on two large scale datasets. The first dataset consists of 360 million posts from Twitter. The second dataset consists of 300K posts from Facebook. We demonstrate both qualitatively and quantitatively the goodness of the topics discovered by our model. When em- ployed for predicting authorship and user activity, models using these topics significantly outperform state-of-the-art baselines. More importantly, our model is able to discover interesting and insightful topic and personality trends. For example, our analysis shows that users posts are mostly in- fluenced by personal preferences, rather than global, regional or social-network factors, except in times of major world events, when users become swayed by global influences at the cost of personal preferences. We are not aware of any existing model that can perform such a wide array of anal- yses effectively on social media data. The rest of the paper is structured as follows. We discuss related work on social media analysis and topic models in Section 2. We describe our proposed model in Section 3 and the associated inference algorithm in Section 4. Experimen- tal results are presented in Section 5 and we conclude in Section 6. 2. RELATED WORK Here, we discuss our contributions in the light of related work in non-parametric probabilistic modeling and social media analysis. Non-parametric models: The Dirichlet Process (DP) [4] is a prior over a countably infinite set of atoms, and is popularly used as a prior for mixture models (DP Mixture Model) in applications, where the number of clusters is dif- ficult to provide as a parameter. The Chinese Restaurant Process [16] provides a generative description for the Dirich- let Process, and is useful for designing sampling algorithms for DP mixture models. The distributions defined by these models are exchangeable, in that different permutations of the data are equally probable. CRPs have been extended to handle distances and rela- tions. The distance dependent CRP (DD-CRP) [7] takes into account a distance matrix over the input data points. Unlike the DP-HDP family, this results in a distribution that is not exchangeable, which is a feature of many applications. In comparison, the RelCRP uses an additional non-unique label for each data point, and a general graph defined over them. The resultant distribution is exchangeable. As such, the DD-CRP and the RelCRP define different families of distributions, and one cannot be represented by the other. There is different body of work that use CRPs for modeling relations [13] and their dynamic evolution [11]. These are unsuitable for our current application, where we do topical analysis of the data points, based on relations between their (user) labels. Many applications require multiple coupled Dirichlet Pro- cesses. The Hierarchical Dirichlet Process (HDP) [20] is one way to introduce coupling using a two level structure. The HDP can be useful, for example, for extending the popular Latent Dirichlet Allocation (LDA) model [8], for countably infinite number of topics [1]. The HDP can be equivalently represented by an extension of the CRP called the Chinese Restaurant Franchise (CRF) [20]. Just as the CRF intro- duces coupling between CRPs, the MultiRelCRP introduces coupling between RelCRPs. However, the nature of the cou- pling in the MultiRelCRP can be much richer, depending on the relationships, as we explain in Section 3.2. Temporal evolution has been addressed in the context of non-parametric models [2, 3, 1], where the parameters of the the corresponding static model become functions of time. Some of the approaches are amenable to scalable inference, while others are not. For the Dynamic MRelCRP, we use the dynamic evolution of the parameters proposed in the con- text of Recurrent CRF [3, 1], because of the scalability of the associated inference problem. Note, however, that the similarity between the Recurrent CRF and the Dynamic- MRelCRP is only in the temporal evolution of model pa- rameters. The static model is a HDP/CRF, as compared to the RelCRP in our case. Social Media Analysis: There has been a surge of lit- erature on problems involving social media content. Work has mostly been focused around (a) Content analysis on mi- croblogs, (b) Inferring user interests and (c) Mining patterns of variation on social media, as we discuss below. (a) Most content analysis papers [10] use standard topic models such as LDA [8] or basic metrics like tf-idf. Focusing on the specific content of miroblogs, Ramage et. al. [17] pro- posed an LDA variant that accounts for hashtags in content analysis. One problem with this approach is that hastags are not general features of social media data, and are of- ten unreliable. There is little modeling work that takes into account the rich features of social media such as network, geography, etc. (b) In the context of microblogging sites, content recom- mendation approaches [15, 12, 14] assessing user interests based on their activities. Recently, Wen et. al [21] have pro- posed an approach which studies the influence of the network on users. Ahmed et. al. [1] model the dynamics of user in- terest and also the account generic popularity of a particular item, but do not consider the influence of various external factors like network of users and geography. Thus most of related work either deals with the influence of a single factor or user preferences. (c) Yang et. al. [23] made one of the first attempts at understanding the temporal evolution of patterns on social networking sites like Twitter. Apart from temporal dynam- ics, study of such patterns with respect to geography and other factors has not been explored for content on social networking sites. 3. MODEL FOR SOCIAL MEDIA In this section, we describe our Dynamic Multi-Relational Chinese Restaurant Process model, which we employ to study the interplay of world-wide, geographic, network and user specific factors, and their dynamics, in social media. We build up our model in steps, first describing the static Rela- tional Chinese Restaurant Process, then incorporating mul- tiple relations, and finally adding temporal evolution to it. In our application, the basic task is to associate topics with individual posts or tweets. The topics correspond to con- cepts such as 'movies', 'sports', 'politics' etc. Unlike topic models such as LDA [8], which associate a distribution over topics with each document, we assume that each post, con- sidering its shortness, corresponds to exactly one topic. This makes the model simpler and the associated inference algo- rithm more efficient and scalable. 3.1 Relational Chinese Restaurant Process The Dirichlet Process [4] has become a popular non-parametric prior in clustering applications, where the number of clus- ters is not needed to be specified apriori, but instead grows with the data size. The Chinese Restaurant Process (CRP) [16] provides a fanciful description of the Dirichlet Process, by imagining data points as customers being seated at ta- bles, which represent clusters, as they enter the restaurant. Let wi denote the ith data point, or post in our case, and zi denote the cluster (or table assignment) for the post. Then, given the assignments z1:i−1 of the first i − 1 customers to K tables, the conditional distribution for the table assignment of the ith customer is given by the CRP as follows: P (zi = kz1:(i−1), α) ∝ nk α k ≤ K k = K + 1 (1) where nk is the number of customers already assigned to table k. Note that this a 'rich gets richer' model, where tables with more customers have a higher probability of get- ting new customers, but new tables also have a non-zero probability (α) of getting customers. When each table i is associated with a (topic) distribution, with parameters φi drawn iid from an appropriate base dis- tribution H, the CRP can be used as a prior for mixture distributions. Once the ith customer is seated at a table zi, the corresponding data item wi can be drawn independently from the distribution φzi associated with the table. For a generative model for posts, each topic distribution can be a multinomial M ult(φi) over the post vocabulary, so that each word wij of the post is generated independently from that topic, and the base distribution H can be chosen to be a Dirichlet Dir(β), since it is conjugate to the multinomial. Though defined as a sequential process, the CRP mix- ture model can be easily shown to be exchangeable, which means that all permutations of observed data {wi} have the same probability under the model. The Chinese Restaurant Process has been widely used in generative models for dif- ferent applications [20, 19, 22]. However, it is unsuitable for social media data, since it ignores a fundamental aspect - the social network over users who generate the content. Specifically, each post has associated with it a user variable ui, that takes values from a finite set of users U. These users are further connected by a network of relationships. To accommodate this, we augment the Chinese Restaurant Process to handle such relationships. In the Relational Chinese Restaurant Process (RelCRP), each customer (data point) is associated with a label ui ∈ U. In the context of social media data, we will refer to each element in U as a user, and say that each data point or post has a user label. In addition, we have a relationship R, such that each element r ∈ R is a subset of U. We can imagine R as defining a set of hyper-edges over elements in U. Note that we do not fix the candinality of the elements in R. We will see the need for this shortly. Using R, we can define the neighbors N (u, R) of an element u ∈ U as all other elements that share a relation with u: N (u, R) = {u′ ∈ U : ∃r ∈ R, u ∈ r, u′ ∈ r}. Given the additional ui labels and the relationship R, the conditional distribution of the table assigned to the ith cus- tomer is defined in RelCRP as follows: P (zi = kz1:(i−1), u1:i, R, α) ∝ nN(R,ui) k α k ≤ K k = K + 1 (2) where nN(R,ui) assigned to table k. k is the number of neighbors of ui in R already Let us now look at some example uses of the RelCRP in the context of social media data. We start from the trivial case, where the RelCRP reduces to the CRP, and then move on to more interesting ones. Influence of World-wide Factors: Very commonly users are influenced by globally popular events or entities when choosing a post topic. For example, users who are not fans of Michael Jackson tweeted on this topic in the event of his unexpected death. This can be captured in the RelCRP by associating a unique label ui with each data point, along with a 'complete' relationship Rw, that contains a single relation (hyper-edge) over all u ∈ U. In this case, Equation (2) reduces to: Pw(zi = kz1:(i−1), u1:i, Rw, α) ∝ nk α k ≤ K k = K + 1 (3) where nN(Rw ,ui) = nk is the number posts by all users (which is the neighbor set of ui) already assigned to table k (topic) k. Note that this is the same as Equation (1). Thus the RelCRP is able to recover the traditional CRP, using unqiue data labels and a 'complete relationship'. User's Personal Preferences: One of the most sig- nificant factors influencing the content of a post is the pref- erence of the associated user. A specific user may be more interested in 'movies' that in 'sports' or 'politics'. Evidence of this can be found in the topics of this user's earlier posts - a user is more likely to post on a topic that she has used more frequently. To capture this in the RelCRP, we set ui to be user identifier, and simply construct an empty relation Ru over U. Given (U, Ru), Equation (2) reduces to: Pu(zi = kz1:(i−1),u1:i , Ru, α) ∝ nui k α k ≤ K k = K + 1 (4) k = nui k where nN(Ru,ui) is the number of posts by user ui (who is her only neighbor) already been assigned to table k. Note that even the case of the empty relation Ru cannot be captured by the traditional CRP. Influence of Friend Network: A user is often influ- enced by the post topics of her friends. To capture this, as before, we set the label ui of the post to be the user id, and construct Rn based on the friendship network: for each follower or friendship relation between users ui and uj , we add a tuple (ui, uj ) to Rn. Note that in this case all el- ements of Rn have cardinality 2. Given (U, Rn), Pn(zi = kz1:(i−1), u1:i, Rn, α) has the same form as Equation (2), where nN(Rn,ui) is now the number of times followees or friends of user ui have posted on topic k. k Influence of Geography: As a final example, a user's posts may also be influenced by geographic trends. For in- stance, an national election draws a lot of attention from cit- izens of that country. This can be captured by the RelCRP, by again associating labels ui with user id's, and construct- ing Rg to capture geographic locations: adding a hyper- edge in Rg over all users in a specific country. Typically, the geographic location can be known from the profile of the user, and we assume such a construction to be possi- ble. Note that in this case every edge has a different car- dinality, and most will be extremely large. Interestingly, the RelCRP does not require maintaining the explicit rela- tions, but only simple statistics over them. Given (U, Rg), Pg(zi = kz1:(i−1), u1:i, Rg, α) again takes the form of Equa- tion (2), where nN(Rg ,ui) is now the number of times users in the same geography as user ui have posted on topic k. k Thus, the RelCRP can be used to capture the different posting patterns in social media within a single framework, in a way that the traditional CRP cannot. Just like the CRP, however, the RelCRP can be used to define a mixture model by associating a topic with each table. It can be shown that the resultant distribution remains exchangeable. 3.2 Multi-Relational CRP We have seen that the RelCRP is able to model the in- dividual effect of the world-wide factors, user preferences, friend network and geographic factors when the labels and relationships are appropriately defined. However, in real- ity, all of these influences act simultaneously on any user, and their interplay determines the content of each of her posts. Further, this aggregate influence pattern is user- specific. For example, different users are affected differently by the same combination of world and geographic events. We now present the Multi-Relational Chinese Restaurant Process (MRelCRP) that captures such aggregate influences using multiple relations defined over the same user labels. The MRelCRP is characterized by a set of labels U, along with m relations {Ri}m i=1 defined over U. With the ith data point (post), we associate an additional variable fi, which takes values from {1 . . . m}, indicating the relation- ship that influenced this data point. This depends on the associated label (user) ui. For each label u ∈ U, there is a m-dimensional multinomial distribution M ult(πu). Each πu is assumed to be generated iid from a Dirichlet Dir(α). We interpret πuj as the probability of label u being influenced by the jth relationship Rj , i.e. P (fi = jui = u). We may imagine πu as reflecting the 'personality' of user u. Given these parameters, and the assignment of the first i − 1 posts to K topics, the MRelCRP defines the conditional distribu- tion of the topic assignment of the ith post with label ui as follows: P (zi = kzi:i−1, u1:i, α, {Rj }, {πu}) = X j πuijP (zi = kzi:i−1, u1:i, α, Rj ) (5) which is a mixture of m individual RelCRP distributions, defined according to Equation (2). This can be interpreted as first selecting a particular RelCRP from a prior distribu- tion specific to the label ui, and then selecting a table using the selected RelCRP. The aggregated influences in the post generation process can now be captured by the MRelCRP framework, by con- sidering the set of 4 relationships {Rw, Ru, Rn, Rg}. A 4- dimensional influence factor πu is sampled for each user u from Dir(αw, αu, αn, αg). This can be imagined to reflect the personality of the user. Then, for each post, a topic is selected for it, in two steps, using Equation (5). Finally, the individual words in the post are sampled iid from this selected topic. This is described in Table 3.2. Table 1: Generative Process for MRelCRP 1. For each topic k a. Sample φk ∼ Dir(β) 2. For each user u a. Choose πu ∼ Dir(αw, αu, αn, αg) 3. For each post i a. Choose fi ∼ M ult(πui ) b. Choose zi ∼ P (ziz1:i−1, u1:i, α, Rfi ) c. For the each word j of post i i. Choose wij ∼ M ult(φzi ) Couplings in the MRelCRP: It is important to ob- serve the coupling that the MRelCRP creates between dif- ferent RelCRPs, that helps capture the interplay of various factors for social media. (a) First, we analyze the dependen- cies for a single relationship Ri. Observe that there are N RelCRPs, one for each user (label). However, all of these N RelCRPs need not be distinct. This depends on the nature of the relationship. For example, in the setting above, Rw is a 'complete' relationship. As a consequence, the neighbor sets are the same for all users, and the world-wide RelCRP is identical for all users. For the geographic relationship Rg, since the individual relations do not overlap, the ge- ographic RelCRP is identical for all users from the same country. This creates one type of dependence across users. In contrast, for the friend relationship Rn, in general dis- tinct users have different sets of friends, and their RelCRPs are distinct. However, they are still coupled, since the un- derlying topics are the same, and a post by user u on topic k increases the count nN(Rn,u′)k for all friends u′ of u. Thus, for all of these three relationships, evidence can flow between users over hyper-edges in the relationship. Finally, for the user preference relationship Ru, the RelCRP for each user is distinct, and there are no dependencies. (b) Now, we an- alyze the new dependencies that are created when multiple relationships are coupled in the MRelCRP. Observe that for m relationships, there is a total of m × N RelCRPs, m for each user, but all of these need not be distinct, as above. The m distinct RelCRPs for each user are now coupled; ev- idence can flow between relationships through the users. In the context of social media, this leads to interplay between world-wide, geographic, network factors and personal pref- erences. 3.3 Dynamic Multi-relational CRP The two key distinguishing aspects of social media data are the network structure, and the dynamic nature of the topics and user influence patterns or personalities. The MRelCRP captures the network aspect, but falls short on the second count. Before extending our model, we first enu- merate the different aspects of the data that evolve with time. (a) The number of topics changes as old topics die out and new topics are born. (b) Popularity of topics change, world-wide, in specific geographies, sub-networks and in the preferences of individual users. We call these topic trends. (c) User personalities change, and they become more or less susceptible to being influenced by world-wide, geographic, network and individual preferences. (d) Existing topics also evolve as new words enter the vocabulary and existing words go out of fashion. We now propose the Dynamic Multi- relational Chinese Restaurant Process (D-MRelCRP) that accounts for all of these temporal evolutions. In reality, the number of users also change over time and the network grows or shrinks, but we do not consider this aspect in our current model. We assume that the data has been segmented into epochs, or in other words, each data element is labeled with a time- stamp that takes values from {1 . . . T }. In practice, epochs may be appropriately defined (eg. hour, day, week, etc) de- pending on the application. The Dynamic MRelCRP con- sists of one MRelCRP for each epoch. We introduce depen- dencies between the parameters of the MRelCRPs across epochs to capture the different aspects of temporal evolu- tion, as we describe next. We use additional subscripts on parameters to indicate epochs. Note that individual RelCRP's naturally allow the num- ber of topics to change. We do not need to address this separately in the D-MRelCRP. 3.3.1 Topic Trends Different topics have different trends, in that some start out being popular in certain geographies, to being global hits. Some others may start as preferences of influential individual users and evolve to regional or world favorites. To capture this, topic popularities in our model need to change over epochs. Since we have modeled popularity of topics using counts, to make this approach dynamic, topic counts of specific epochs are made dependent on those of earlier epochs, following the approach of [1]. We extend the basic RelCRP conditional distribution (Equation (2)) with epoch indices as follows: Pt(zi = kz1:(i−1), u1:i, R, α) ∝ nN(R,ui) + ¯nN(R,ui) k ≤ K k,t k,t α k = K + 1 k,t is the number of neighbors of u in R already where nN(R,u) assigned to table k in the tth epoch, while ¯nN(R,u) captures the historical counts in recent epochs, with exponentially decaying weights, as follows: k,t ∆ ¯nN(R,u) k,t = X e−δ/λnN(R,u) k,t−δ δ=1 where λ is the decay factor. The MRelCRP for tth epoch is now defined using a mixture of such RelCRP conditionals as in Equation (5). 3.3.2 User Personality Trends It is natural for user personalities to be time dependent as well. A user may become more susceptible to the influence of her friends and deviate from her earlier personal preferences. In the MRelCRP framework, this corresponds to the mixture distribution πu for each user u being a function of the epoch. Recall that each πu is sampled iid from a Dirichlet prior Dir(αw, αu, αn, αg). We introduce a temporal dependence by adding a dynamic component to the prior parameter, in the spirit of [1], as follows: the topic distributions φk and the personalities πu of the users. The two problems are coupled, and solving them exactly is intractable [8]. We resort to approximate tech- niques based on collapsed Gibbs sampling. However, the traditional approach [9], where the topic and influence la- bels of each post are repeatedly sampled until convergence from the conditional distributions given all other labels, is infeasible for us given the size of the data. Even Sequen- tial Monte Carlo methods [9], that rejuvenate a few older labels, are infeasible. We adopt the online algorithm [6], which was proposed for parametric models, and modify it appropriately for our model. In this approach, earlier labels are not revisited. This allows the algorithm to scale, at the expense of sub-optimal estimates at the beginning, and is also concordant with the online nature of social media data [1]. Before describing the details, we first describe the con- ditional distributions that are required by the algorithm. Conditional Distributions: In the online setting, the distribution for the influence factor fi for the ith post is conditioned on the topic and influence labels of all earlier posts, their user labels and the content of the current post. For the Dynamic MRelCRP, this looks as follows: ∝ (mu,f,t + ¯αu,f,t + αf ) × (n P (fi = f α, ui, z1:i, f1:(i−1), w1:i, R) N(Rf ,ui) k,t N(Rf ,ui) k,t + ¯n ) (6) where, α ≡ {αw, αu, αn, αg}, and the counts are as defined in Section 3. The conditional distribution for topic label zi, additionally conditioned on influence factor fi, is given by: πu,t ∼ Dir(αw + ¯αu,w,t, αu + ¯αu,u,t, αn + ¯αu,n,t, αg + ¯αu,g,t) ¯αu,f,t = P∆ δ=1 e−δ/λmu,f,t−δ ∝ (n N(Rfi k,t P (zi = kfi, β, z1:(i−1), u1:i, w1:i, R, α) nk,v,t + ¯βk,v,t+β r=1(nk,r,t+ ¯βk,r,t+β) k ≤ K ) QNi N(Rfi k,t + ¯n ,ui) ,ui) k = K + 1 (7) for f ∈ {w, u, n, g}, and mu,f,t being the number of times user u was influenced by relationship f in epoch t. 3.3.3 Evolving Topic Distributions The topic-word distributions φj also evolve with time. To capture this, we again introduce a temporal dependence in the prior distribution. Specifically, each topic distribution φk,t is now sampled from Dir(βk,t + β). The element βk,w,t of dynamic component βk,t depends on how frequently the word w in the vocabulary has been historically observed un- der topic k until epoch t − 1: ¯βk,w,t = ∆ X δ=1 e−δ/λmk,w,t−δ where mk,w,t corresponds to the number of times word w is associated with the topic k in epoch t. These three dynamic dependences introduced between the parameters of the MRelCRPs corresponding to different epochs, defines our complete D-MRelCRP. 4. INFERENCE In this section, we discuss the key challenges in performing inference for the proposed D-MRelCRP model, and present our inference algorithm addressing these challenges. The inference problem involves determining the posterior dis- tribution over the two latent variables variables, the topic label zi,t and the influence variable fi,t, for all posts i in all epochs t. The parameter estimation problem involves finding the posterior distribution of the model parameters, ∝ α QNi l=1 l=1 PV nk,v,t + ¯βk,v,t+β PV r=1(nk,r,t+ ¯βk,r,t+β) where, wil corresponds to the vth word of the vocabulary, nk,v,t corresponds to the number of times vth word in the vocabulary is associated with topic k during epoch t. Note that online inference, the counts in the equations above cor- respond to the data instances (posts) which have arrived before the ith instance. Also, the conditional distributions for the static model (MRelCRP) can be obtained by remov- ing the historical counts in the above expression, specifi- cally by setting ¯αu,f,t = ¯nN(R,ui) = 0 in Equation (6), and ¯nN(R,ui) = ¯βk,v,t = 0 in Equation (7). Similarly, the condi- k,t tional distribution for RelCRP, which has a single relation- ship R can be obtained as a special case of the MRelCRP, by taking counts nN(R,ui) with respect to R. k,t Parallel Inference Algorithm: A straight-forward online algorithm, that makes a single sequential pass over the data, is infeasible considering the scale of social media data. This necessitates a parallelized inference algorithm. Sampling based parallel inference algorithms for hierarchi- cal bayesian models has received attention in the literature [5, 18]. These approaches split data across threads or pro- cessors, execute Gibbs iteration on them independently, and finally, consolidates labels across threads asynchronously at the end of each iteration. In contrast, parallelization of our algorithm results in independent, online updates in each thread. Additionally, D-MRelCRP being a non-parametric model, new topics are created by each thread, and in the absence of repeated Gibbs iterations, are not sufficiently k,t consolidated. As a result, we require a synchronous archi- tecture, where all new topics are explicitly consolidated by a master thread at the end of each iteration. Our multi- threaded inference algorithm is described in Table 2. Table 2: Parallel Inference Algorithm For each post i, sample zi, fi Read first N posts Iterate t times Update joint counts Iterate until no new post Master Thread 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Wait until child threads complete 11. 12. 13. Update joint counts Iterate t times Read next N posts For child thread j=1 to K Send posts j(N/K) + (j+1)N/K, joint counts Receive labels {zi, fi} for N/K posts For each post with new label zi, sample zi, fi Child Thread 1. 2. 3. 4. 5. Sleep until invoked by Master Thread Receive N/K posts, joint counts Iterate t times For each post i, sample zi, fi Return N/K labels {zi, fi} to Master Thread After an initial batch phase (master thread: steps 1-4), the algorithm iterates over three phases: data access (master thread: step 6), computation (child threads: steps 2-5) and synchronization (master thread: steps 8-9, 11-13). The ini- tial batch phase is necessary to prevent creation of too many new topics at the beginning by different child threads. Note that the computation phase happens in parallel across the K child threads. Each child thread creates multiple new top- ics, whose counts are maintained locally. These counts are passed back to the master thread, along with other counts at the end of the computation phase. After receiving back labels from all child threads, the master thread re-samples labels for all posts assigned new topics by child threads. This helps in the consolidation of new topics, many of which may otherwise be quite similar. The iterations continue until all posts have been processed. 5. EXPERIMENTAL RESULTS In this section we discuss in detail the experiments that we carried out using the proposed D-MRelCRP model on multiple large real social media datasets. We evaluate the following aspects of the model: (a) Model goodness: Ability to explain unseen data (b) Topics and topic labels: Our inference and learning al- gorithms assign a topic to each post, and also finds a distri- bution over words for each topic. We evaluate both aspects qualitatively and quantitatively. (c) User personalities and their trends: The major distinc- tive feature of our model is the influence label associated with each post. Using this label, we are able to estimate the user personalities, or the susceptibility of the user to various influencing factors, and their dynamics. We discuss various insights that we were able to find from personality trends. (d) Scalability: One of the main strengths of our inference algorithm is the ability to scale to hundreds of millions of data samples. We evaluate how the running time of our multi-threaded implementation scales with data size. (e) Relative importance of factors: The MRelCRP and D- MRelCRP models are able to combine together various influ- ence factors and their dynamics. We analyze the usefulness of the different factors for social media analysis. We would like to point out that no other single model is able to perform such a wide array of tasks in social me- dia analysis. Wherever possible, we make use of available ground truth or surrogates of it for quantitative evaluation and compare against best available baselines. However, as regards our main contribution - discovering user person- ality trends - there does not exist any existing algorithm that can perform this. Datasets: We carried out all our experiments on two different datasets: (1) Twitter: a collection of 360 million tweets crawled between June and December 2009, and (2) Facebook: a collection of about 300,000 posts obtained by extracting feeds from publicly available profiles over a span of three months. Default Parameter Settings: The hyper-parameters of our online Gibbs Sampler were initialized as : α = 0.1/K+1 and β = 0.1. Baselines: We compare the performance of our models against the following state of the art models that have been shown to be effective for analyzing microblogs. (a) Latent Dirichlet Allocation (LDA) [8] (b) Labeled LDA [17], and (c) Timeline [3]. Labeled LDA is not very generally applicable since it makes use of hashtags assigned to the posts to identify topic labels. While this meta-information is available on Twitter, Facebook does not support it. The Timeline model is the closest to our model in that it is a non- parametric topic model that also captures topic dynamics. 5.1 Model Goodness Goodness of a model is evaluated by how well it is able to fit previously unseen data. Perplexity is a commonly used to measure generalization ability of topic models [8]. It is defined as the inverse of the geometric mean per-word likelihood: Per(Dt) = exp{− PM d=1 Nd(cid:9),where Nd is the number of words in the dth post in the held-out test set Dt, and logP (wd) is its log-likelihood. Lower values of perplexity indicate better generalization ability. d=1 logP (wd)/ PM We consider two different datasets for this experiment. For each model under consideration, we first train it on Twit- ter data, and then consider as test set a sample of 8 million tweets from the last one month in our dataset. Similarly, each model is trained on Facebook data, and evaluated on a sample of 40K posts from the last month's activity. Perplex- ities of various models are recorded in Table 3. Note that unlike our model, LDA requires the number of topics to be specified. We set it to the average number of topics discov- ered by our model across epochs. Labeled-LDA cannot be applied for Facebook data, since it requires hashtags. It can be seen that D-MRelCRP has the least perplexity in both the cases.Among baselines, Timeline has the best perplexity. This demonstrates that capturing both temporal evolution and relationships is important for explaining future data. 5.2 Quality of topics The D-MRelCRP model assigns a topic label to each post, indicating its category, and also finds a distribution over vo- cabulary words for each unique topic label, indicating the semantics of the topic. Our hypothesis is that by modeling the different influences on the users, D-MRelCRP is able to Table 3: Perplexity and Clustering Accuracy. Model DMRelCRP Timeline L-LDA LDA Perplexity Twitter 1188.29 1582.86 1982.76 2932.06 Facebook 1562.34 1802.9 NA 3602.0 Clustering Acc. (Twitter) nMI R-Index 0.93 0.81 F1 0.86 0.73 0.88 0.72 1 0.55 1 0.52 1 0.48 Table 4: Prediction Task Accuracies. Facebook Facebook Model DMRelCRP Timeline LDA L-LDA Authorship Prediction Commenting Prediction Twitter 0.793 0.718 0.521 0.647 Twitter 0.683 0.582 0.429 0.542 0.648 0.579 0.482 NA 0.734 0.669 0.432 NA better identify topics. To evaluate this, we check topic qual- ity in different ways. We directly evaluate the topic labels of posts by comparing against a reasonable gold-standard. Then, we indirectly evaluate the topic labels of posts by us- ing them as features in two prediction tasks. Finally, we identify significant topic trends and compare them qualita- tively with world knowledge. We provide more details on these three evaluations next. Clustering posts using topic labels. In our proposed models, there is a single topic label asso- ciated with each post. This results in a hard clustering of the posts according to topics. Therefore, one way to evalu- ate the topic assignment quality is to evaluate the clustering accuracy. Gold standard clusters of posts is typically hard to obtain. As an alternative, in the case of Twitter data, we consider hastags as cluster indicators. Since it is well known that hashtags are often poor indicators of post clusters, we consider only a few authoritative hasgtags as follows. We collected ∼ 16K posts with hashtags corresponding to highly specific topics, such as #NIPS2009, #ICML2009, #bolly- wood, #hollywood, #www2009 etc. We consider this as the test set with gold-standard labels for evaluation. We use three standard metrics to evaluate clustering ac- curacy - Normalized mutual information, Rand index and F-measure. In Table 3, we record the performance of our D-MRelCRP model, and those of the three baselines on the Twitter dataset. Not surprisingly, labeled LDA correctly identifies the clusters all the time, by virtue of taking hash- tags as inputs. DMRelCRP comes close, in spite not using knowledge of hashtags at all, and performs better than all other models across all the three evaluation metrics. Fur- ther, on closer inspection, we found that the Labeled LDA clustering is not as good as the numbers indicate, and the two proposed models are often better. For example, DM- RelCRP splits the ∼3K posts corresponding to the #movies hashtag into two topics, and separates out posts originat- ing from India. Comparison using KL-divergence shows this topic to be very similar to the #bollywood hashtag. The #sports hashtag shows a similar split. Such fine-grained dis- tinction is not possible for Labeled LDA, or Timeline, which do not capture geographic or other influencing factors. Prediction Tasks. Since the cluster gold-standards for posts are unreliable for Twitter, and unavailable for Facebook, we additionally perform the following indirect evaluation of topic assignment to posts. Topic labels are commonly used as reliable low- dimensional features for learning classifiers [8]. We use the topic labels for posts for two representative prediction tasks in social media with reliable gold-standards: predicting post authorship and predicting commenting activity. Predicting Authorship: Given a post p and user u, this task is to predict if user u is the author of post p. We con- struct a Twitter test set having 20M tweets from the last 15 days, and a Facebook test set having 40K posts from the last one month. For each user, we create training sets for Twitter and Facebook by including as positives all posts au- thored by that user, and as negatives a equal-sized random sample from posts authored by other users in the recent past. As features, we use the topic label of the post in- ferred by a specific algorithm, and the time-stamp. We use k-nearest neighbor classifier (k=5), where we consider mini- mum distance between the post p posts authored by u, with KL-divergence as topic distance and number of in-between days as the time difference. Predicting Commenting Activity: Given a post p by some user v, the task is to predict if user u comments on the post. We similarly construct test and training sets from Twitter and Facebook. As an additional feature, we consider the number of past interactions between users u and v. We again use a k − N N classifier (k=5) for prediction. The accuracies for both prediction tasks for different al- gorithms are recorded in Table 4. It can be seen that DM- RelCRP performs significantly better on both datasets. The standard topic model baselines, and also Timeline, do not perform very well on this task. This shows the usefulness of topics inferred by considering both relationships and tem- poral evolution. Labeled-LDA performs better than LDA, but in spite of using hash-tags, is significantly outperformed by our proposed approaches. In summary, the topics inferred using our model are signif- icantly more useful for prediction tasks involving users and posts compared to state of the art topic models. Topic Trending and Major Event Detection. The inferred topic label for each post, in conjunction with the user label, can be used to identify various topic trends. From the joint counts nk,u,t of the number of posts by user u at time epoch t on topic k, the probability pk,u,t of user u posting on topic k at epoch t can be estimated by normal- ization. By subsequent aggregation over subsets of users, popularities of different topics across different user segments can be plotted against epochs. When a particular topic k dominates over all others in an epoch, we flag that topics as a major event, and analyze it using the dominant words in the topic distribution φk. We were able to identify several break-out events using DMRelCRP topics labels, as we de- scribe below. World-wide Events: World wide popularity of a topic k at epoch t is estimated by aggregating pk,u,t over all users u. The major world-wide events discovered by D-MRelCRP in- clude the demise of Michael Jackson (Jun 30) (top words: mj, michael, dead, singer, jackson, pop), the Fifa World Cup (Sep 15-30) (football, soccer, fifa, worldcup) and the launch of Google Wave (Dec 1-15) (wave, invite, google, launching) Geographic Events: The popularity of a topic k in a specific geography at epoch t is estimated by aggregating pk,u,t only over all users u in that geography. Jeff Goldblum's demise (Jul 1-15) (death, jeff, actor, goldblum, dies, end, era) was detected as major event in Australia and the UK. We were able to verify these world-wide and geographic major events using Google Insights2. The words from the specific topics appeared in the top searches during these spe- cific intervals, world-wide or in the specific geographies. We were similarly able to find major events for small networks of users (e.g. official page for Microsoft on Twitter @MSFT- News and its followed pages) and for important individual users (such as @ICML2009). In summary, DMRelCRP en- ables us to discover interesting topic trends and major events at different levels of granularity. 5.3 Analysis of Influences The distinctive aspect of our model is the label fi indicat- ing the influencing factor behind the ith post. It is difficult to evaluate the accuracy of these inferred factors directly. Instead, we focus on aggregate analysis that can performed using this label, and the rich insights that we were able to unearth using this. Using the joint counts nk,u,f,t of topics (k), users (u) and influence factors (f ) in each epoch (t), we can estimate the probability pk,u,f,t of a specific user u posting on a topic k af- ter being influenced by a factor f in epoch t, by normalizing appropriately. On aggregating over topics k, the distribution pu,f,t (corresponding to model parameter πu,t) over factors f indicates the personality of the user u at epoch t. Plotting these distributions over epochs t shows the personality trend for user u. Since trends over individual anonymous users are not insightful, below we plot aggregate trends over different interesting user subsets. For this, we use heat-maps, where the matrix rows correspond to influence factors, columns to epochs and hotter colors indicate higher probability values. World-wide Personality Trends: First, we aggregate pu,f,t over all users to estimate the world-wide susceptibil- ity of users to specific factors at a specific epoch (15 day period). This trend is shown in the heat-map of Figure 1 (best viewed in color). The positions of the hotter colors and the color gradients are of interest. We can observe that the world-wide factor has the largest variance, followed by personal preferences, while the other trends are largely flat. Also, we can see that surges in world-wide influence happens mostly as the expense of personal preference. The largest such surge happens around Jun 30. This is when the news of Michael Jackson's death broke on Twitter, and we can see that users discarded their personal preferences and posted about this event. The strength of world-wide influence then subsides gradually, and users return to their personal pref- erences. We can see that world-wide influence rises again around Sep 15 and Dec 1, again at the expense of personal preference. The most popular topics at these times were FIFA World Cup and Google Wave. In summary, users are usually influenced mostly by their personal preferences and friend network, apart from times of significant world-events. Personality trends in specific geographies: Next, we aggregate pu,f,t over users in specific geographies to es- timate susceptibility of users to specific factors in different parts of the world. Personality trends for 5 different geogra- phies, USA, UK, Australia, China, India, are shown using heat-maps in Figure 2. We can see many interesting pat- terns. The personality trends in USA, UK and Australia are largely similar, apart from the geographic influences which 2http://www.google.com/insights/search/ User Global Geo s r o t c a F e c n e u l f n I Network World Wide Time 0.6 0.55 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 Figure 1: World-wide personality trends USA UK 0.6 0.55 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.6 0.55 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 s r o t c a F e c n e u l f n I s r o t c a F e c n e u l f n I User World Geo Network User World Geo Network s r o t c a F e c n e u l f n I User World Geo Network User 0.6 0.55 0.5 Time China Time Australia 0.45 0.4 s r o t c a F e c n e u l f n I World Geo 0.35 0.3 0.25 0.2 0.15 Network 0.1 Time Time User World Geo s r o t c a F e c n e u l f n I Network India Time 0.6 0.55 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 Figure 2: Personality trends in specific geos are high at different epochs. For USA, one such high occurs around Sep 15, when US Open is a dominating topic. For UK, we can see at high around Aug 15 (Football, Premiere League) and for Australia around Jul 1 (Jeff Goldblum's demise). For India, the relative strengths of world-wide and geographic influences are somewhat weaker. For China, the pattern looks different. The strengths of the various influ- ences stay relatively stable, and geographic influence is much stronger than the other 4 cases. Topic Character Trends: As a final example of the variety of analysis that D-MRelCRP can perform, we look at trends in topic characters. By aggregating pk,u,f,t over all users and then using Bayes rule, we can find the pos- terior distribution pf k,t over different influence factors for each topic k at epoch t. By plotting this over epochs, we can see how a topic changes its 'character', and moves from a 'geographic' topic to a 'world-wide' topic, for example. We illustrate this in Figure 3 (best viewed in color), using 3 top- ics. Japan Earthquake evolved from a geographic topic to a world-wide topic, Google Wave from a personal preference topic to a world-wide topic, and Tiger Woods from a per- sonal preference topic, to a geographic topic, and finally a world-wide topic. In summary, DMelCRP enables a wide variety of analysis of influences, leading to many interesting insights, beyond the capability of existing models. 5.4 Other Experiments In our experiments, we have employed a Java-based multi- threaded framework over an 8-core, 32 GB RAM machine. We employed K = 7 child threads, read N = 35K posts in a mini-batch, and used t = 100 Gibbs iterations per batch. In Figure 4, we plot the time taken (in micro-secs) to process one post by the multi-threaded version and a sequential ver- Japan Earthquake Google Wave User World Geo Network 0.6 0.5 0.4 0.3 0.2 0.1 User World Geo Network 0.55 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 s r o t c a F e c n e u l f n I s r o t c a F e c n e u l f n I Jun15Jun30Jul15Jul30Aug15Aug30Sep15Sep30Oct15Oct30Nov15Nov30Dec15 Jun15Jun30Jul15Jul30Aug15Aug30Sep15Sep30Oct15Oct30Nov15Nov30Dec15 Time Time Tiger Woods s r o t c a F e c n e u l f n I User World Geo Network Jun15Jun30Jul15Jul30Aug15Aug30Sep15Sep30Oct15Oct30Nov15Nov30Dec15 Time 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 Figure 3: Character trends of 3 topics . s c e s i o r c m n i t s o p e n o r o f n e k a t e m T i 5000 4500 4000 3500 3000 2500 2000 1500 1000 500 0 Multi-threaded Sequential 100 500 2K 10K 100K 500K 1M 50M 100M 200M 300M 380M Number of posts seen Figure 4: Scalability of inference algorithms sion, after having processed N posts. This time increases as the number of living topics increases with N . The two plots clearly demonstrate that superior scalability of our multi- threaded inference algorithm. Finally, in Table 5, we analyze the contributions of the dif- ferent aspects to DMRelCRP's final performance. We can see that the model improves (both in terms of perplexity and prediction accuracy) through the addition of more rela- tionships and the interplay between them, which is the main strength of the model. 6. CONCLUSIONS In this paper, we have made a first attempt at studying the important problem of analyzing user influences in gen- eration of social media data. We have proposed a new non- parametric model called Dynamic Multi-Relational CRP that incorporates the aggregated influence of multiple relation- ships into the data generation process as well as dynamic evolution of model parameters to capture the essence of so- cial network data. Our multi-threaded online inference al- gorithm allowed us to analyze a collection of 360 million tweets. Through extensive evaluations, we demonstrated that the topic trends discovered by our model are superior to those from state-of-the-art baselines. More importantly, Table 5: Importance of Model Factors. Ru corre- sponds to user preferences, Rw, Rn, Rg to world-wide, friend-network and geographic factors, resp. we found insightful patterns of influence on social network users, beyond the capability of existing models. 7. REFERENCES [1] A. Ahmed, Y. Low, M. Aly, and V. Josifovski. Scalable distributed inference of dynamic user interests for behavioral targeting. In SIGKDD, 2011. [2] A. Ahmed and E. Xing. Dynamic non-parametric mixture models and the recurrent chinese restaurant process: with applications to evolutionary clustering. In SDM, 2008. [3] A. Ahmed and E. Xing. Timeline: A dynamic hierarchical dirichlet process model for recovering birth/death and evolution of topics in text stream. In UAI, 2010. [4] C. Antoniak. Mixtures of Dirichlet Processes with applications to Bayesian nonparametric problems. Ann. Statist., 2(6):1152–1174, 1974. [5] A. Asuncion, P. Smyth, and M. Welling. Asynchronous distributed learning of topic models. In NIPS, 2008. [6] A. Banerjee and S. Basu. Topic models over text streams: a study of batch and online unsupervised learning. In SDM, 2007. [7] D. Blei and P. Frazier. Distance dependent chinese restaurant processes. In ICML, 2010. [8] D. Blei, A. Ng, and M. Jordan. Latent dirichlet allocation. JMLR, 3, 2003. [9] K. Canini, L. Shi, and T. Griffiths. Online inference of topics with latent dirichlet allocation. In International Conference on Artificial Intelligence and Statistics, 2009. [10] L. Hong and B. Davidson. Empirical study of topic modeling in twitter. In KDD Workshop on Social Media Analytics, 2010. [11] K. Ishiguro, T. Iwata, N. Ueda, and J. Tenenbaum. Dynamic infinite relational model for time-varying relational data analysis. In NIPS, 2010. [12] J.Chen, R.Nairn, L.Nelson, M.Bernstein, and E.Chi. Short and tweet: experiments on recommending content from information streams. In International Conference on Human Factors in Computing Systems, 2010. [13] C. Kemp, J. Tenenbaum, T. Griffiths, T. Yamada, and N. Ueda. Learning systems of concepts with an infinite relational model. In AAAI, 2006. [14] H. Lakkaraju, A. Rai, and S. Merugu. Smart news feeds using joint latent factor models. In World Wide Web, 2011. [15] O. Phelan, K.McCarthy, and B.Smyth. Using twitter to recommend real-time topical news. In ACM Conference on Recommender Systems, 2010. [16] J. Pitman. Combinatorial stochastic processes. Lecture Notes for St. Flour Summer School, 2002. [17] D. Ramage, S. Dumais, and D. Liebling. Characterizing microblogs with topic models. In International AAAI Conference on Weblogs and Social Media, 2010. [18] A. Smola and S. Narayanamurthy. An architecture for parallel topic models. In VLDB, 2010. [19] E. Sudderth, A. Torralba, W. Freeman, and A. Willsky. Tdescribing visual scenes using transformed dirichlet processes. In NIPS, 2005. [20] Y. Teh, M. Jordan, M. Beal, and D. Blei. Hierarchical dirichlet processes. JASA, 2006. [21] Z. Wen and C. Lin. On the quality of inferring interests from social neighbors. In SIGKDD, pages 373–382, 2010. [22] E. Xing, M. Jordan, and R. Sharan. Bayesian haplotype inference via the dirichlet process. Journal of Computational Biology, 14(3), 2007. [23] J. Yang and J. Leskovec. Patterns of temporal variation in online social media. In WSDM, 2011. Perplexity Commenting Pred Facebook Model DMRelCRP(all) MRelCRP(all) MRelCRP(Ru, Rn, Rw ) MRelCRP(Ru, Rn) MRelCRP(Ru, Rw) RelCRP(Ru) RelCRP(Rw) RelCRP(Rn) RelCRP(Rg) Twitter 1188.29 1345.76 1602.86 1878.29 1802.31 1946.48 2008.59 1958.64 2212.83 Facebook Twitter 1562.34 1762.01 1890.72 2245.63 2100.01 2189.56 2400.45 2248.90 2890.02 0.683 0.602 0.653 0.567 0.512 0.461 0.289 0.478 0.329 0.648 0.538 0.602 0.556 0.54 0.508 0.187 0.423 0.201
1510.04411
2
1510
2015-11-15T06:47:17
Reimagining Internet Geographies: A User-Centric Ethnological Mapping of the World Wide Web
[ "cs.SI" ]
We propose a new user-centric imagery of the WWW that foregrounds local usage and its shaping forces, in contrast to existing imageries that prioritize Internet infrastructure. We construct ethnological maps of WWW usage through a network analysis of shared global traffic between 1000 most popular websites at three time points and develop granular measures for exploring global participation in online communication. Our results reveal the significant growth and thickening of online regional cultures associated with the global South. We draw attention to how local cultural identity, affirmative state intervention and economic contexts shape regional cultures on the global WWW.
cs.SI
cs
User-Centric Ethnological Mapping of the WWW 1 Reimagining Internet Geographies: A User-Centric Ethnological Mapping of the World Wide Web Angela Xiao Wu & Harsh Taneja1 Suggested Citation: Wu, A. X. & Taneja, H. (Forthcoming.) Reimagining Internet Geographies: A User-Centric Ethnological Mapping of the World Wide Web. Journal of Computer-Mediated Communication. Abstract We propose a new user-centric imagery of the WWW that foregrounds local usage and its shaping forces, in contrast to existing imageries that prioritize Internet infrastructure. We construct ethnological maps of WWW usage through a network analysis of shared global traffic between 1000 most popular websites at three time points and develop granular measures for exploring global participation in online communication. Our results reveal the significant growth and thickening of online regional cultures associated with the global South. We draw attention to how local cultural identity, affirmative state intervention and economic contexts shape regional cultures on the global WWW. Keywords Cross-cultural Comparison; Internet Studies; Media Choice; Network Analysis; Regional Cultures; Web Use. 1 Both authors contributed equally to this work. James Webster and Wendy Griswold provided generous feedback on earlier drafts and Jan Servaes pointed to relevant literature. Acknowledgments are also due to Sushant Tripathy for his programming support and Manu Bhandari for proofreading the draft at a short notice. This project was made possible by the research grants from the Internet Policy Observatory at the University of Pennsylvania, the Journalism Library of the University of Missouri, and the C-Centre at the School of Journalism and Communication at the Chinese University of Hong Kong User-Centric Ethnological Mapping of the WWW 2 Reimagining Internet Geographies: A User-Centric Ethnological Mapping of the World Wide Web Our study is a conceptual and methodological endeavor to bring about newer imageries of the World Wide Web (WWW) based on web usage. This approach signals a shift in perspective from prioritizing Internet infrastructure1 (including technical connectivity) to focusing on local user engagements. We empirically account for local communication flows enabled by the WWW, making visible, on an unprecedented scale, aspects of Internet use that remain “largely invisible” when “viewed from the perspective of network centers” (Burrell, 2012). To achieve this, we develop a research method that we call “user-centric ethnological mapping of the WWW,” which empirically examines global web usage in terms of the scale, cultural distance and thickening of local communication landscapes or “online regional cultures.” We implement this mapping by analyzing shared audience traffic between the world’s top 1000 sites, which generally draw over 99% of total web traffic, in 2009, 2011 and 2013. Our analyses show significant changes in global web use. Specifically, changes in the composition of various online regional cultures as well as their size, distance and thickness scores—measures we develop and compute in this study—demonstrate the rise of the global South along the decentralization or de-Americanization of the WWW. Our study challenges the predominant imaginations of the WWW and contributes to a fuller understanding of actual user behavior online by documenting the recent development of the WWW into distinct but interconnected regional cultures. We highlight the possible role of local cultural identity and political economy, particularly specific types of government interventions, in this evolution. Reimagining the WWW: From Technical Features to User Practices User-Centric Ethnological Mapping of the WWW 3 Searching for the images of the “Internet” on the Internet, one sees myriad portrayals, some artistic illustrations and some based on certain empirical evidence. These maps reveal “architectural plans, engineering blueprints, anatomical drawings, and statistical graphics;” all attempt at providing a factual reality of the Internet (Dodge, 2008, p 352). Apart from providing fascinating diverse images of the Internet, they provide insights into “how people imagine the virtual territory” that aligns with certain “interests and desires” (Dodge, 2008, p. 13). More importantly, popular representations of the Internet, like representations of other kinds of space, may function to legitimize the status quo without our being aware of it (Graham, 2014). Numerous studies have mapped the WWW based on hyperlinks between websites (De Maeyer, 2013), and these consistently find that websites based in the US (and other G7 countries) receive links from websites based in the rest of the world, but few Western sites link to sites in the non-Western world (e.g., Park, Barnett & Chung, 2011). Likewise a large proportion of websites in most other languages link to sites in English, but few English language websites link to other language sites (Daniel & Josh, 2011). This literature considers a country’s position on the hyperlinks graph a proxy for its potential for development, and predictors of their interactions with other countries (e.g, Schumate & Dewitt, 2008; Park et al., 2011). Studies find similar results from mapping the WWW using connections between countries based on Internet Service Providers (Ruiz & Barnett, 2014) and webpages’ content (Chung, Barnett & Park, 2013). These maps, consistent with other representations of the global digital divide (e.g., Graham, 2014) suggest that the Internet replicates the modern world system, with the Western world at its “core” and the rest of the world at its “peripheries.” Similarly, representations based on global Internet governance by transnational civil society organizations (e.g., Reporters without Borders) typically highlight the “balkanization” of this global medium due to nationally imposed regulations such as User-Centric Ethnological Mapping of the WWW 4 access blockage, and developing countries that are not formal liberal democracies are portrayed as the Internet’s “black holes.”2 All these imageries of the Internet - based either on technological infrastructure or content—instantiate a “media-centric” view of communication. When communication is premised on media technologies, there underlie unwarranted presumptions about usage. For instance, a hyperlink may exist but few users may click on it (Wu & Ackland, 2014)3. Providing more hyperlinks from Western sites to non-Western sites—making them less peripheral in the process—does not guarantee actual information exchange between the West and the Rest. Therefore, a core-periphery hyperlink structure does not equal to asymmetric information flows (see Barnett & Park, 2014). In a similar vein, certain governments may block some foreign websites, but most users may not access those sites even if they weren’t blocked. What these media-centric maps share in common is not factoring, but taking technical features as proxies for, actual Internet use usage. They tend to imagine the WWW as a global medium upholding a constellation of undifferentiable masses and thus spaceless and without geography (Graham, 2013, 2014). Media-centric representations also allow certain ideological bias, in particular, the championing of “Internet freedom” in US-led Western policy-making and popular media discourses. Importantly, Internet freedom here refers to access without political interference (Cramer, 2013; Mansell, 2014), and Internet governance debates thus center on state censorship, especially state imposed access blockage, practices associated with countries with political systems at odds with the US ideal of liberal democracy (McCarthy, 2011). Therefore in the US-led popular understanding, these countries are the problematic troublemakers at the margin, forming “black holes” that obstruct the realization of a web “without geography” (e.g., Reporters without Borders, 2007). Some emerging scholarship has begun to recognize the limitations of media-centric User-Centric Ethnological Mapping of the WWW 5 imageries and discussions of the WWW. Without mapping actual user activities one cannot envision changes in the WWW resulting from the rapid online adoption of the vast populations’ from the “peripheral” Global South. For example, Burrell (2012) contests the influential vision of the WWW as global system with a “universal digital language” (Castells, 1996, p. 2) and points out that the “Internet’s interoperability rests on what is more aptly labeled a technical protocol,” which is “not the same thing as a human language” (p. 185). During her ethnographic study of Ghanaian Internet use, Burrell (2012) realizes that “as divergent social groups go online, they make over the cultural topography of the Internet unevenly and heterogeneously” (p. 185). Barnett & Park (2014), finds the web to be an aggregation of many “small world” networks based on language, geography and history a trend which resembles how the world television landscape, once dominated by US produced imports, now appears as a mosaic of vibrant “culturally defined markets,” rooted in regional production centers (Straubhaar, 2007). What is perceived as politically coerced balkanization of the Internet is in fact a fuller expression of linguistic and geographic boundaries, a consequence of the global spread of web use (Taneja & Wu, 2014). Further, a media-centric perspective that presumes media use upon technical access is even more limited for the web than for traditional media. This is because, unlike in the days of broadcast media when people were left with limited and spatially-bounded options, today having access to the Internet means they could consume content from any corner of the WWW, irrespective of where they reside. Hence, having mere technological access to the “whole web” does not automatically imply that people would access everything they can; rather, users inhabit a rather narrow slice of the WWW shaped by various social structures. It is more inaccurate than ever to treat technologies as “proxies for the knowledge people draw upon in order to make sense of their world” (Mansell, 2013, p. 15) and to attribute to technical access the lack of use (e.g., of the Western web) at analytical levels such as User-Centric Ethnological Mapping of the WWW countries or societies. 6 To summarize, when explaining global online communication, we propose a shift in focus from Internet infrastructure such as hyperlinks (i.e., purported proxy of global connectivity) and state-imposed blockage (i.e., denial of access to foreign information through firewalls) to people’s actual web use globally—especially in non-Western societies. In particular, our empirical examination of web usage by non-Western communities avoids ascribing an a priori preference for their connection to the “world,” which in the dominant discourse essentially implies the Western web. To “reimage” the Internet, we introduce methodological innovations to not only capture the online presence of various communities worldwide but also to gauge, separately, the relative location and level of horizontal connectivity within such communities.4 Ethnological Mapping of the WWW: Distance and Thickness of Online Regional Cultures As the foundation of anthropology, ethnology is concerned with the characteristics of different cultures measured as “clusters of common concepts, emotions and practices” (de Munck & Korotayev, 2000, p. 338) and the relationships between them. Depending on the research questions, ethnologists study the corresponding “traits that may be distributed among the cultures that are included in the sample” (p. 347) and seek to evaluate and explain the “similarity or dissimilarity” between, as well as “the distinctiveness of” these cultures (Thomas, 1989, p. 27). Although nominally ethnology became marginalized in anthropology, ethnological thinking remains embedded in hidden assumptions of many research endeavors that aim to generalize and compare because it characterizes how human beings understand cultures, identities, and the world (MacRae, 2006, p. 118). Our ethnological mapping of the WWW is based on actual web usage and it consists of three steps. A major obstacle to ethnological analysis is finding like entities to compare User-Centric Ethnological Mapping of the WWW 7 (MacRae, 2006), as cultural or social practices, discourses and even material objects, rarely come ready made for large-scale systematic comparison. Hence, we first identified traffic to the globally most used websites as a usage-based trait distributed among the plural cultures that reside within the global WWW. Accordingly, to gauge cross-cultural similarity (dissimilarity) we rely on shared traffic between websites measured by audience duplication, a metric we describe in the following section. Having identified an appropriate measure of shared web traffic, our second step involved developing an analytic technique to determine the various online cultures as distinct “clusters of practices.” For ethnological cross-cultural comparisons, it is important to refrain from assigning units of culture based on a priori attributes other than the traits used to arrive at them (Munck & Korotayev, 2000). Our units of culture are essentially social structures we identify through a user-centric network analysis of shared traffic between websites, an approach that we adapt from Webster and Ksiazek (2012). Taneja and Wu (2014) refer to such structures as “culturally defined markets,” which are clusters of “culturally proximate” websites. We avoid the term “markets” due to the associated commercial overtones and instead interpret these clusters using the conceptual lever of “online regional cultures,” as the concept of “region” is theoretically and empirically consistent with the ethnological method. Conventionally, regional cultures are characterized by place-based language traditions and other cultural commonalities arising from shared climates, natural resources, and historical experiences (Griswold, 2008). Emerging empirical research on global online user behavior indicates that online cultures too have their origins in specific physical places (e.g., Taneja & Wu, 2014; Takhteyev, Gruzd & Wellman, 2012; Hecht & Gergle, 2010), which justifies our accent on the term “regional” when identifying cultures associated with the usage of the (potentially global) WWW. Moreover, a region’s designated geography may not be congruent with a sovereign User-Centric Ethnological Mapping of the WWW 8 territory but instead above, below, or intersecting it ; it has fuzzy boundaries dependent upon the viewer’s perspective (Griswold, 2008), which inevitably implicates the ethnological thinking of generalization and comparison (MacRae, 2006). For example, the region associated with the music created by singers from the holy Indian city of Varanasi could be Varanasi, the North Indian Plains, India, or even the Hindustani speaking South Asia comprised of parts of North India, Pakistan and Afghanistan. In addition to such contextual malleability, geographers increasingly conceptualize places "as constellations of connections that form, reform and disperse in space and over time" (Cosgrove, 2008, p. 47). All these characteristics lend the concept well to a network analytic approach, which simultaneously accounts for both the inherent and the relational traits of entities (Monge & Contractor, 2003)—a perfect iteration of ethnological thinking in examining the WWW. In addition, representing the web using network analysis avoids the construction of essentialized ethnological maps, a common pitfall in ethnology where boundaries are drawn based on static traits. Having identified clusters of regional cultures, the final step is to measure their various characteristics in relation to each other and attempt to theoretically explain their emergence in the real-world. This step involves locating, at a specific point in time, online regional cultures in relation to one another by measuring their relative distances and discerning the strength or thickness of each. To begin, we map each culture’s relative location using force-directed network visualizations; these place websites sharing more traffic closer to each other and enable us to “see” distinct cultures identified through formal cluster analysis. Next, for cross-comparison, we measure how far a regional culture (cluster) stands from the rest of the world. We term this measure “distance” (a more neutral term in place of “isolation,” used by Taneja and Wu (2014), which conventionally bears negative User-Centric Ethnological Mapping of the WWW 9 connotations of being backward and unsettling). Distance may result from political interventions such as access blockage. It may also be a consequence of the local society operating in a cultural system at a high “cultural distance” ––a concept introduced by Hoskins and Mirus (1988) to calculate pair-wise distance between countries for studying international trade of cultural objects and other related aspects of globalization. Cultural distance reflects commonalities between cultures based on many dimensions such as language, religion, political system, and ethnic/racial composition (Shenkar, 2001), making the concept highly compatible with that of regional cultures, which are distinguished based on cultural commonalities. For example, the specific cultural and linguistic affinities established via former colonial ties may make the online regional culture rooted in India and Pakistan less distant from the rest of the WWW than one that originates in Japan. Distance or the lack of it may not necessarily mean that the local communication landscape in point exhibits rich and meaningful connectivity within itself. Hypothetically, if China pushes access blockage to an extreme and makes its online regional cultures as distant as that of North Korea, China’s online regional culture, housed by the Internet infrastructure already ridiculed as the “Chinternet,” may nonetheless exhibit rich internal vibrancy and diversity (Taneja & Wu, 2014), whereas North Korea’s Intranet, also characterized by the lack of international linkages, provides meager online resources for its users (Warf, 2015). To assess this separate trait of an online regional culture, we introduce the concept of thickness. Initially used in critical transcultural media research, the concept of “thickening” refers to the intensification of patterned connectivities “at the level of thinking, discourse, and practices” that distinguishes media cultures from one another (Couldry & Hepp, 2012, p. 99). Pertinent to our approach, a media culture’s thickness is judged by people’s habitual usage of various media offerings associated with it, in addition to their content and formats (p. 101). It is individuals’ patterned usage in fulfilling their economic, cultural, political, and leisure User-Centric Ethnological Mapping of the WWW 10 needs that fundamentally structures and consolidates the local communication landscape (Couldry & Hepp, 2012). In this light, by thickness of an online regional culture, we mean the level of concentrated reliance on the set of web content that represents this regional culture. The growth of locally relevant cultural products and e-services, the expansion of a region’s online population which usually accompanies a bridging of the digital divide and the prosperity of online interaction between users associated with this regional culture, all potentially contribute to thickening. Examining such links, our ethnology of the WWW provides insights on the empirical consequences of various factors on patterns of web usage globally. Creating a Cross-cultural Dataset Method We analyzed shared user traffic between the world’s top 1000 web domains at three time points (September of 2009, 2011 and 2013). We obtained web usage (traffic) data from comScore, a panel-based service that provides metered Internet audience measurement data once a month from 2 million users worldwide in 170 countries. We obtained from comScore traffic data for the top 1000 web domains globally (ranked by monthly unique users), as these domains not only attract 99% of all the web users at all times but also ensure an adequate representation of different languages and different geographies. ComScore reports data on websites at the level of web domains as well as for subdomains for many large websites. This in part depends on the architecture of the website. Google, for instance, has its different geo- linguistic variants as separate web domains (e.g., www.google.es, www.google.de, etc.) and comScore reports them as such. On the contrary Wikipedia language versions are sub- domains of the main domain (e.g., es.wikipedia.org). In such cases, we considered these sub- domains as separate websites in our final sample instead of including only higher level domains. We captured these data at three time points, September 2009 (1018 websites User-Centric Ethnological Mapping of the WWW 11 included in the final sample), September 2011 (1022 websites included), and September 2013 (1031 websites included). As already noted, we draw on web traffic as a shared trait of online users across cultures and identifying shared web traffic allows cross-cultural comparisons. To facilitate such analysis, we utilize a measure called “audience duplication,” which simply put is the extent to which two media outlets (e.g., websites) are consumed by the same set of people in a given time period. In a hypothetical universe of 100 people, if on a given day 20 people accessed both CNN.com and Baidu.com, the audience duplication between these two websites would be 20 or 20%. For all possible pairs of media outlets under consideration, calculating duplication in this manner results in a symmetric audience duplication matrix, which can then be partitioned to identify communities of media outlets with similar audience duplication patterns. Generally, any two websites have some audience duplication, which may be due to random chance. Therefore we calculated a measure called above random duplication (also used by Webster and Ksiazek, 2012), which is the audience duplication between two websites after accounting for expected duplication due to chance. As an example, if in a given month 80% of all web users visit Facebook.com and 70% visited Google.com, the expected duplication between them would be 56% (80% * 70%). The duplication of interest then is a measure termed “above random duplication,” the residual value obtained by subtracting the observed duplication from the expected duplication. The resulting matrix with above random duplication as the cell value can be analyzed as a valued network (negative values are treated as zero; in other words, ties are considered absent). These values can also be converted to dichotomized data by regarding any positive value of above random duplication as ‘1’ (tie present) and a zero or negative value as ‘0’ (tie absent). For each website in our sample, we obtained its audience duplication with all other User-Centric Ethnological Mapping of the WWW 12 websites from the same annual sample. Thus in the final dataset, we have 517,653 ((1018 *1017)/2) pairs of audience duplication in 2009, 521,731 ((1022*1021)/2) pairs in 2011, and 529,935 ((1030*1029)/2) pairs in 2013. Using the method described above we calculated the above random duplication for each pair and then obtained two sets of matrices (graphs), one with valued ties and the other with dichotomized ties. A coder visited each website to note all the languages in which the website offered content. Analysis Force-directed Network Visualization: Ethnological Mapping of WWW usage For ethnological mapping, we employed the Fruchterman and Reingold (1991) visualizing algorithm, which belongs to a class of visualization techniques known in graph theory as force-directed graphs. The basic mechanism is that there are repulsive forces between all nodes and nodes with edges have attractive forces and hence are placed topologically adjacent to each other. Therefore, in the final visualization, all nodes that tend to have ties with one another are placed in close vicinity to form tightly knit clusters; such clusters are relatively separated from other similarly formed clusters. Figure 1(a), 1(b) and 1(c) represent the visualizations of the 2009, 2011 and 2013 graphs, where the dots are the nodes (websites) and the lines represent (dichotomized) ties between them based on audience duplication. These “show” fair evidence that global web usage clusters itself into many communities of websites based on similarities in audience duplication. We conducted cluster analysis to identify these communities, which confirmed them to be expressions of online regional cultures. FIGURE 1 ABOUT HERE Cluster Analysis: Identifying and Measuring Online Regional Cultures The clustering coefficient of a graph indicates the presence of tightly knit groups of nodes that have disproportionately high ties with each other relative to nodes in other groups. User-Centric Ethnological Mapping of the WWW 13 Theoretically, this varies between 0 and 1 and the clustering coefficient of a random network is equal to its density and a value higher (lower) than the density indicates more (less) clustering than a random graph of the same size and density. Our datasets had a density of 0.43, 0.40 and 0.35 and clustering coefficients of 0.86, 0.85 and 0.86 in 2009, 2011 and 2013 respectively. Therefore, overall the network had a high tendency to cluster into subgroups, which increased over time (the clustering coefficient remained high even as the density reduced). Thus websites clustered into groups based on high audience duplication among sites within the group and relatively low duplication between sites that belong to different groups. We divided these graphs (with valued ties) into clusters using a hierarchical clustering approach, using Pearson correlation coefficient between any two pairs of sites as measure of similarity. In other words, a high correlation between any two sites suggests that they tend to share audiences with the same sets of sites. Consequently, groups of sites with high inter- correlations tend to cluster together. Simply put, these clusters are groups of websites that share audiences with one another to a greater extent than with websites outside their groups. Further, we assigned each cluster with a unique color for easy identification, consistent across all visualizations. Following the same approach used by Taneja and Wu (2014), we estimated the distance of each cluster from the rest of the WWW using a basic node-level network measure termed closeness (or farness) centrality, an indicator of the average closeness (or distance) of a node from all other nodes in the network. Each cluster in our WWW networks is basically a group of nodes. In order to calculate the distance of each cluster, we treated the entire cluster as one node, and computed its average shortest distance from all other nodes in the network. We calculated this distance for each cluster we observed in 2009, 2011 and 2013. A high distance score suggests that even users of a cluster’s most well-connected (i.e., widely used) User-Centric Ethnological Mapping of the WWW 14 website tend to engage with fewer websites outside the said cluster compared to a similar website in a cluster with a lower distance score. Distance as measured here indicates little about the connectivity within a cluster, or its thickness. For estimating the thickness of each cluster, we utilize a measure called the E-I index, which is typically used in social network analysis to indicate relative cohesion within social groups (Krackhardt & Stern, 1998). It is calculated as the ratio of the difference and the sum of external and internal ties of a cluster. Thus a cluster with only one actor can only have external ties and hence its E-I index would be ‘1,’ indicating no cohesion. On the contrary, a cluster of nodes with all internal ties and no external ties would have an E-I score of ‘-1,’ indicating perfect cohesion. If these usage-based clusters indeed represent online regional cultures as we expect, we believe that an E-I index can be used to observe the intensity of the intra-community connectivity, or the “thickness” of the local regional culture. We use the valued ties to obtain these scores to account for the volume of shared audience traffic between sites rather than just the presence or absence of a connection. Although E-I scores indicate relative cohesion of clusters within a given network, in our present case, changes in relevant E-I scores provide evidence of cultural thickening over time. This is because the graphs generated for the three different time points share substantive similarities and, across the years, we are able to identify a homologous set of major clusters—that is, clusters representing the same regional cultures over time. Since most clusters in our data have all possible internal ties (due to the design of the clustering algorithm), a reduction in the E- I index indicates relative decrease in connections between nodes within and those outside the cluster. In terms of global web use, this suggests that from 2009 to 2013, the extent of audience duplication among sites within a regional culture (cluster) increased relative to their duplication with sites in other cultures (clusters). This indicates a declining tendency of the average regional sites’ user to visit websites unaffiliated User-Centric Ethnological Mapping of the WWW 15 to the said region culture. If accompanied by an overall increase in the number of sites affiliated to this regional culture, a reduction in E-I index indicates cultural thickening. FIGURE 2 ABOUT HERE In Figure 2, we report these key measures associated with each of the major clusters. Each graph is a scatterplot with the distance score in the X-axis and the thickness (E-I index) score in the Y-axis. The diameter of the circle corresponds to the cluster size, measured as the number of websites in that cluster. Figure 3 shows the relative E-I scores (standardized) across a few clusters that were comparable across the year 2009, 2011 and 2013. FIGURE 3 ABOUT HERE Contextualizing the Evolution of Online Regional Cultures In this section, we interpret the evolution in global user behavior in relation to local cultural identity, state intervention, and larger economic and social processes. Web User Behavior and Cultural Identity In all three years, we find that the WWW as a network of shared usage between websites largely clusters on linguistic and geographical lines, affirming the importance of local cultural identity stressed in previous literature. To begin, we notice different categories of clusters dependent on the interaction between language and geography. This is consistent in each of the three years’ traffic data we analyzed and in line with findings from other recent studies using similar traffic data collected at a different time point (Barnett & Park, 2014, Taneja & Wu, 2014). State imposed access blockage plays at best a limited role in the formation of these fault lines.5 In many cases, clusters could be linked explicitly to contiguous geographical spaces defined by nation states such as China (which sometimes coalesce with sites on Taiwan and Hong Kong),6 Poland, Korea, Italy and Japan where the principal language is exclusive to the geography. We also witness distinct clusters for certain countries (such as United Kingdom and Canada) despite their languages being spoken very User-Centric Ethnological Mapping of the WWW 16 widely in many other countries. In other cases, websites focusing on multiple countries cluster together based on a common language, as seen for Spanish language sites from Spain, Mexico and Argentina. Yet another category of geo-linguistic clusters we observe is comprised of global sites (such as Facebook, Youtube and Ikea) that are present in multiple languages and have specific variants focusing on different countries. Finally, we find some evidence of genre based clusters, with two salient examples being porn sites and file/video sharing platforms. Such websites rely minimally on language and hence apparently transcend regions more easily. Our analyses further reveal the primary role of language in the landscape of horizontal communication online. First, the more specific a cluster’s linkage to a language, the more distant it is from the rest of the WWW. We find that the distance increases if a language is exclusive to geography. For instance, clusters corresponding to Japan and Korea are consistently more distant than the ones corresponding to Spanish or English speaking sites. The cluster which we term as “US / Global” in 2009 is the least distant from the rest of the WWW, due to the presence of many “global” sites in this group. However, the distance of the cluster of US-focused sites increases in 2011 and 2013 (where we accordingly term this cluster “US / English”) as in these years, many of the “global” sites (such as Facebook and Twitter), probably as the proportion of non-US user participation increases, separate from the US cluster to form a cluster of their own. There is an overall increase in cluster distance in 2013, which is consistent with the finding that compared to previous years, the network is more clustered in 2013 (the least distant cluster in 2013 has a higher distance score than that of its equivalent in both 2009 and 2011). Relatedly, a regional culture formed with one primary language is likely to be more distinctive, as well as thickens faster, than one formed in a geographically contiguous region with linguistic plurality. For instance, in our analysis, certain clusters such as that of Spanish User-Centric Ethnological Mapping of the WWW 17 language sites and that rooted in former USSR countries have formed mainly due to shared regional languages transcending geographic or political boundaries. We also observe the opposite for India where linguistic plurality, despite geographic contiguity, has probably impeded the process of thickening among an otherwise large online regional culture. That the region has not thickened as much as others with a comparable user base may be partly explained by the fact that, although being the primary (and common) language of most sites in the Indian cluster, English is only spoken by upper class Indians that make up about 10% of the total population. Another important observation is that, although major geo-linguistic clusters are largely consistent across years, our analyses show an overall increase in the number of distinct regionally oriented online cultures, resulting from the relative expansion of the web usage in the global South. This trend holds for China, India, Brazil, and former USSR countries: the Chinese cluster, which nearly doubled in size between 2009 and 2013, showed the most phenomenal growth. Given the similar sample size in each year (approx. top 1000 sites), the growth of certain clusters is balanced by the decline in others. The Korean cluster, while prominent in 2009 and 2011, is missing from the 2013 visualization (it had 34 sites in 2009 to 33 in 2011 and only 4 in 2013). Germany, France and Japan are other prominent clusters that shrank in size. In general, we notice that regions where Internet penetration has grown significantly during the observation period witness cultural thickening online. This is a likely outcome of local users’ increasing reliance on regional websites, which manifests as intensification of horizontal communication within the regions, when seen in the aggregate. Likewise, the cluster of US-based sites also thickened once they segregated from the major “global” sites into a cluster of their own. The stable or increasing thickness scores of clusters corresponding to regions with stagnant Internet population numbers such as Korea, Japan, Germany and France support this interpretation, as the proportion of web users from these User-Centric Ethnological Mapping of the WWW countries most likely declined from 2009 to 2013 in our sample. 18 Connected to the Internet penetration rate is the social and economic status of the regional online population and its level of regional orientations. In developing countries, Internet use is a privilege of the elite segment marked by higher cultural capital for navigating and making sense of cultures outside of the region. In these countries, as the Internet penetrates down the social ladder, it accommodates more users who likely lack the capacities of and/or interests in making use of foreign websites. Thus over time the growth of the percentage of users from lower strata is associated with the emergence of distinct regional orientations, which simultaneously contributes to the distance and thickening of the online regional cultures in point. In 2013, for instance, India and Japan both had about 100 million Internet users each. Yet, our data show Japan has a far thicker online culture than India. This is because Indian users who constituted the top 10% of the national populace belonged to very privileged social groups that are at ease with the established “global” and English cyberspace. As Internet usage picks up among India’s lower social strata, newer regional cultures based on India’s many languages may emerge over and above the currently visible national culture relying on the English lingua franca. Web Use Behavior and Local Political Economy A closer look at the thickening trajectories of various online regional cultures in relation to state policies and other economic and social contexts suggests the critical relevance of local political economy to web use behavior. Such relevance can be understood in terms of, on the one hand, the structural environment facilitating local consumption––that is, to enable more members of the community to engage with cyberspace. The uneven Internet penetration levels are themselves affected by state policy. For instance, in South Korea government policy has been instrumental in achieving near ubiquitous broadband access that is both fast and of low cost. In stark contrast to South Korea, Internet user base in User-Centric Ethnological Mapping of the WWW 19 Brazil and India has taken much longer to grow. Brazil had only 24 million Internet users (13% of its population) in 2003 (compared to Korea at more than 60% in the same year), and it surpassed 100 million Internet users (50% of its population) only in 2013, a fact consistent with the growth of the Brazilian cluster in 2013 seen in our data. Much of the growth in the Brazilian Internet user base in the last 3 years seems to be from Internet use on mobile devices. In 2004, India had less than 2% of its population online. In 2013, even though only 10% Indians are online, this corresponds to about 120 million users.7 On the other hand, the politico-economic contexts also affect the dimension of local production, or inclusion of local communities in designing and producing content that populates the part of WWW they inhabit. In this regard, we notice the connection between the changes in thickness scores and the conditions of homegrown Internet industries. For local horizontal connectivity to develop, Internet users should grow in tandem with online content focusing on the region and web tools that enable people to discover such content. Generally speaking, local producers are more successful in fulfilling such needs, especially when embedded in a healthy innovation culture that is supported by friendly state policies. Taking South Korea again as an example; its high Internet penetration is supplemented by an innovation culture fostering startup enterprises. Launched five years before Facebook, CYworld remained South Korea’s most popular SNS for a decade (The Economist Explains, 2014). The cultivation of China’s vivacious online regional culture can also be attributed to its robust local Internet industry and the key presence of various government interventions. Chinese users have witnessed the development of corporations such as Tencent technologies which, now leading competition worldwide in innovations on the mobile web, far preceded US-based corporations in creating innovative digital platforms for online social networking (Elliot, 2014). Likewise, Japan, Russia and Brazil all have massive local Internet portals that cater to regional needs. User-Centric Ethnological Mapping of the WWW 20 The preceding discussion on the relations between the web use of local societies and the political economies governing these societies also provides a timely critique of the dominant “Internet freedom” rhetoric, which in effect adds to the entitlement of multinational Internet companies that demand free operation both in the US and abroad without government intervention (Cramer, 2013). In fact, media policy scholars suggest that US foreign policies serve the interests of large corporations by equating the goal of “liberalizing foreign polities with the values of human rights and democracy” to that of “opening [foreign] markets to US capital,” (McCarthy, 2011, p. 89; also see Nordenstreng, 2011; Schiller & Sandvig, 2011). This one-dimensional conception of Internet freedom as the absence of political intervention explains why US policy-making and popular media discourses have little recognition of the role of active government interventions, particularly in numerous developing states, in providing Internet access and local content. Similarly, while obsessed with the detail and scales of state imposed blockage (Taneja & Wu, 2014), they are indifferent to Internet companies’ targeted blockage of users from poor countries as the latter may adversely impact their revenues (Burrell, 2012). In contrast to the prevalent emphasis on political constraints, our study draws attention to the generally ignored but significant economic constraints to the global inclusion in online communication (see also Cramer, 2013). Portraying the online activities and cultures of developing countries in a more balanced light, it foregrounds the development and ecology of online regional cultures based in the global South and recognizes that in many cases it is local government interventions that eliminate economic barriers, which in effect expand the Internet freedom of their citizenry. For instance, certain initiatives and regulations may foster high growth in both domestic usage and homegrown Internet industries, thus enabling more people in these countries to benefit from rich lives on the Internet and to at once shape their own online habitat. People thus get to enjoy indigenous cultural content, User-Centric Ethnological Mapping of the WWW 21 interact with their communities, and utilize various e-services tailored to the locality. This is consistent with a UNESCO-directed study of multi-country data, which suggests strong correlations between the development of local network infrastructure, the lowering of access prices, and the growth of local content (Internet Governance Forum, 2014). Conclusion Our study contributes, conceptually and methodologically, to the research, documentation and evaluation of the development of the WWW. Through a network analysis of shared global traffic between 1000 most popular websites at three time points, we have advanced the approach of ethnological mapping to better understand worldwide web use and its association with local cultural identity and politico-economic contexts. With methodological innovations tailored to data of a new nature, our approach generates a new imagery of the WWW that foregrounds usage and its shaping forces, in contrast to the existing imageries that are based on technical features of the Internet. It also provides granular measures for exploring local communities’ engagements with the Internet. Our major findings are as follows. First, the locations of online regional cultures in relation to one another and with their underlying geo-linguistic linkages lend support to the common perception of cultural adjacency. Second, regional orientations--that is, tendency to use webpages in local languages--strengthen as Internet use expands beyond globalized elites. Third, in terms of intra-community vis-à-vis inter-community connectivities, online regional cultures associated with the global South have significantly grown and thickened. To the best of our knowledge, our analysis is the first imaging exercise of the WWW on a website level at a global scale that conceives and demonstrates that “the Internet is not an abstract space or digital global village, but rather a network that enables selective connections between people and information” (Graham, 2013, p. 180). Geographers emphasize that, “representations of place are never neutral or objective and are always User-Centric Ethnological Mapping of the WWW 22 created in order to serve particular purposes” (Graham, 2014, p. 103). Compared to the prevalent media-centric Internet maps, our user-centric ethnological mapping method stands to challenge, rather than reinforce, the status quo presumption of a WWW that is anchored by Western knowledge, norms, and activities. It encourages the (Anglophone, especially) general public to confront the narrowness of the online world with which it is familiar. Further, the trend our maps capture may stimulate popular imaginations to envision a future cyberspace of vast heterogeneity, where one needs to get out of one’s way to comprehend. Moreover, these user-centric maps may inform policy-makers around the world in deliberating how to better empower the global South by introducing political, economic, and social opportunities with new technologies. By linking our empirical findings about online regional cultures to contextual indicators, we draw attention to the role of cultural identity, affirmative state intervention and the economic conditions of various countries in the formation of and changes in the global web use landscape. Our ethnological maps provide powerful visuals that support previous analyses in this realm; in recent years in international Internet governance discussion, this corpus of evidence has been the basis for the growing advocacy for affirmative government intervention in fostering local production of web content (e.g., Internet Governance Forum, 2014). In this sense, our analyses not only provide substance to this advocacy, but also serve as an initial step to move beyond concerns for cultural, particularly linguistic, diversity in web content to also address diversity in the dimension of web usage (see Napoli & Karppinen, 2013). Finally, our imaging exercise gives sustenance to a conception of Internet freedom broader than what is commonly conceived in US-led Internet governance discourse. This broader conception emphasizes the elimination of not only political, but also economic barriers for users around the globe so that they may shape and make use of online content they find appealing, contributing to the horizontal connectivity of our expanding WWW. User-Centric Ethnological Mapping of the WWW References 23 Barnett, G., & Park, H. (2014). Examining the international Internet using multiple measures: new methods for measuring the communication base of globalized cyberspace. Quality & Quantity, 48(1), 563–575. doi:10.1007/s11135-012-9787-z Burrell, J. (2012). Invisible users: Youth in the Internet cafés of urban Ghana. Cambridge, MA: MIT Press. doi:10.7551/mitpress/9780262017367.001.0001 Castells, M. The rise of the network society. Malden, MA. Blackwell Publishers,., 1996. Chung, C., Barnett, G., & Park, H. (2014). Inferring international dotcom Web communities by link and content analysis. Quality & Quantity, 48(2), 1117–1133. doi:10.1007/s11135-013-9847-z Cramer, B. W. (2013). The two Internet Freedoms: Framing victimhood for political gain. International Journal of Communication 7, 1074-1092. Daniel, F., & Josh, B. (2011). Languages of the World (Wide Web). Research Blog, Google. Retrieved from http://googleresearch.blogspot.com/2011/07/languages-of-world- wide-web.html Cosgrove, D. 2008. Geography and Vision. London and New York: I.B. Taurus. De Maeyer, J. (2013). Towards a hyperlinked society: A critical review of link studies. New Media & Society , 15 (5 ), 737–751. doi:10.1177/1461444812462851 DeNardis, L. (2012). Hidden levers Of Internet control. Information, Communication & Society, 15(5), 720–738. doi:10.1080/1369118X.2012.659199 Dodge, M. (2008). Understanding Cyberspace Cartographies : A Critical Analysis of Internet Infrastructure Mapping (Unpublished doctoral dissertation). UCL, London. Elliot, D. (2014, April 17), Tencent the secretive, Chinese tech giant that can rival Facebook and Amazon. Fast Company. Retrieved from http://www.fastcompany.com/3029119/most-innovative-companies/tencent-the- User-Centric Ethnological Mapping of the WWW 24 secretive-chinese-tech-giant-that-can-rival-facebook-a#! Fruchterman, T. M. J., & Reingold, E. M. (1991). Graph drawing by force-directed placement. Software: Practice and Experience, 21(11), 1129–1164. doi:10.1002/spe.4380211102 Georgiou, M. (2012). Watching soap opera in the diaspora: cultural proximity or critical proximity? Ethnic and Racial Studies, 35(5), 868–887. doi:10.1080/01419870.2011.628040 Graham, M. (2013). Geography/internet: ethereal alternate dimensions of cyberspace or grounded augmented realities? The Geographical Journal, 179(2), 177–182. doi:10.1111/geoj.12009 Graham, M. (2014). Internet Geographies: Data Shadows and Digital Divisions of Labor. In M. Graham & W. H. Dutton (Eds.), Society and the Internet (pp. 99–116). Oxford: Oxford University Press. Griswold, W. (2008). Regionalism and the reading class. Chicago, Ill: University of Chicago Press. doi:10.7208/chicago/9780226309262.001.0001 Hanneman, R. A., & Riddle, M. (2005). Introduction to social network methods. Riverside, CA: University of California, Riverside. Hecht, B., & Gergle, D. (2010). The tower of Babel meets web 2.0. In Proceedings of the 28th international conference on Human factors in computing systems - CHI ’10 (pp. 291-300). New York, USA: ACM Press. doi:10.1145/1753326.1753370 Hoskins, C., & Mirus, R. (1988). Reasons for the US dominance of the international trade in television programmes. Media, Culture & Society, 10(4), 499–504. doi:10.1177/016344388010004006 Internet Governance Forum (2014). Best Practice Forum on Creating an Enabling Environment for the Development of Local Content (Executive Summary). Retrieved User-Centric Ethnological Mapping of the WWW 25 from http://www.intgovforum.org/cms/documents/best-practice-forums/creating-an- enabling-environment-for-the-development-of-local-content Inkeles, A., & Smith, D. H. (1974). Becoming modern. Cambridge, MA: Harvard University Press. doi:10.4159/harvard.9780674499348 Krackhardt, D., & Stern, R.N. (1988). Informal Networks and Organizational Crises: An Experimental Simulation, Social Psychology Quarterly, 123-140. Kraidy, M. M. (2002). Hybridity in Cultural Globalization. Communication Theory, 12(3), 316–339. doi:10.1111/j.1468-2885.2002.tb00272.x Lerner, D. (1958). The passing of traditional society: Modernizing the Middle East. Glencoe, Il: Free Press. MacRae, G. (2006). Ethnography, Ethnology and the Ethnography of Ethnologies. Sites: A Journal of Social Anthropology and Cultural Studies, 3(2), 116–136. doi:10.11157/sites-vol3iss2id19 Mansell, R. (2013) Introduction: imagining the internet: open, closed or in between. In: Perini, Fernando and Girard, Bruce, (eds.) Enabling Openness (pp. 9-20). Ottawa IDRC, Fundación Comunica, Ottawa, Canada,. Mansell, R. (2014). The governance of communication networks: reconsidering the research agenda. International Journal of Media and Cultural Politics, 10(2), 145–153. doi:10.1386/macp.10.2.145_1 McCarthy, D. R. (2011). Open Networks and the Open Door: American Foreign Policy and the Narration of the Internet1. Foreign Policy Analysis, 7(1), 89–111. doi:10.1111/j.1743-8594.2010.00124.x Menchen-Trevino, E. (2013). Collecting Vertical Trace Data: Big Possibilities and Big Challenges for Multi-Method Research. Policy & Internet, 5(3): 328-339. doi:10.1002/1944-2866.POI336 User-Centric Ethnological Mapping of the WWW 26 Munck, V. de, & Korotayev, A. (2000). Cultural Units in Cross-Cultural Research. Ethnology, 39(4), 335–348. doi:10.2307/3774050 Murdock, G. P. (1950). Family Stability in Non-European Cultures. The ANNALS of the American Academy of Political and Social Science, 272(1), 195–201. doi:10.1177/000271625027200125 Napoli, P. M., & Karppinen, K. (2013). Translating diversity to Internet governance. First Monday, 18(12). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/4307/3799 Nordenstreng, K. (2011). Free flow doctrine in global media policy. In R. Mansell & M. Raboy (Eds.), The handbook of global media and communication policy (pp. 79–94). Malden, MA: Blackwell. doi:10.1002/9781444395433.ch5 Park, H. A. N. W. O. O., Barnett, G. A., & Chung, C. J. O. O. (2011). Structural changes in the 2003 – 2009 global hyperlink network. Global Networks, 11(4), 522–542. Prior, M. (2007). Post-broadcast democracy: How media choice increases inequality in political involvement and polarizes elections. New York: Cambridge University Press. doi:10.1017/CBO9781139878425 Reporters without Borders (2007). “List of the 13 Internet enemies.” Retrieved from http://en.rsf.org/list-of-the-13-internet-enemies-07-11-2006,19603 Ruiz, J. B., & Barnett, G. a. (2015). Who owns the international Internet networks? The Journal of International Communication, 21(1), 38–57. doi:10.1080/13216597.2014.976583 Schiller, D., & Sandvig, C. (2011, March 4). Free flow of information and profit? Huffington Post. Retrieved from http://www.huffingtonpost.com/dan-schiller/free-flow-of- information-_b_831419.html Shenkar, O. (2001). Cultural Distance Revisited: Towards a More Rigorous User-Centric Ethnological Mapping of the WWW 27 Conceptualization and Measurement of Cultural Differences. Journal of International Business Studies, 32(3), 519–535. doi:10.1057/palgrave.jibs.8490982 Shumate, M., & Dewitt, L. (2008). The north/south divide in NGO hyperlink networks. Journal of Computer Mediated Communication, 13(2), 405-428. doi: 10.1111/j.1083- 6101.2008.00402.x Straubhaar, J. (2007). World television: from global to local. Los Angeles: Sage. Takhteyev, Y., Gruzd, A., & Wellman, B. (2012). Geography of Twitter networks. Social Networks, 34(1), 73–81. doi: 10.1016/j.socnet.2011.05.006 Taneja. H & Wu, A.X. (2014). Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain web user behavior. The Information Society, 30(5), 297-309. doi:10.1080/01972243.2014.944728 The Economist Explains (2014, February 10) Why South Korea is really an internet dinosaur. Economist.com. Retrieved from http://www.economist.com/blogs/economist- explains/2014/02/economist-explains-3 Thomas, N. (1989). The Force of Ethnology: Origins and Significance of the Melanesia/Polynesia Division. Current Anthropology, 30(1), 27. doi:10.1086/203707 Warf, B. (2015). The Hermit Kingdom in cyberspace: unveiling the North Korean internet. Information, Communication & Society, 18(1), 109–120. doi:10.1080/1369118X.2014.940363 Weber, M. S., & Monge, P. (2011). The Flow of Digital News in a Network of Sources, Authorities, and Hubs. Journal of Communication, 61(6), 1062–1081. doi: org/10.1111/j.1460-2466.2011.01596.x Webster, J. G., & Ksiazek, T. B. (2012). The Dynamics of Audience Fragmentation: Public Attention in an Age of Digital Media. Journal of Communication, 62(1), 39–56. doi:10.1111/j.1460-2466.2011.01616.x User-Centric Ethnological Mapping of the WWW 28 Wu, L., & Ackland, R. (2014). How Web 1.0 fails: the mismatch between hyperlinks and clickstreams. Social Network Analysis and Mining, 4(1), 1-7. 1 We use "infrastructure" to refer to a range of levers of Internet architecture such as ISPs, routers, protocols, under-sea cables, hyperlinks etc, that enable or constrain usage. This is consistent with the use of the term in the literature (e.g., DeNardis, 2012; Dodge, 2008) 2 Another type of popular WWW imageries is based on the coverage of usually US-based IT giants such as Facebook and Twitter, which veils the political and economic specificities of the particular online applications (see Menchen-Trevino, 2013). 3 Additionally, hyperlinks may contain erroneous links, irrelevant information and inconsequential relationships (Weber & Monge, 2011) 4 Taneja and Wu (2014) direct scholarly and public attention from its conventional focus on China’s governmental filtering mechanism to the web usage under its local influences. This study suggests no clear role of access blockage in explaining the extent of isolation of Chinese web browsing behavior. 5 To be clear, we do believe that the fast inclusion of users from and of websites focusing on formerly underrepresented regions online may cause changes that conflate with the effects of governmental blockage 6 It is hard to tell from our data whether the Chinese cluster has users only from mainland China or from HK and Taiwan as well. However, we see a separate cluster of Taiwanese sites including the Chinese Wikipedia in 2013. 7 All Internet penetration figures are from World Development Indicators from World Bank, made available by Google Public Data Explorer. Figure 3 Thickening of Online Regional Cultures over Time Figure 1: Ethnological Mapping of Global Web Use 29 30 Figure 2 Evolution of the WWW (Distance and Thickening) About the Authors 31 Angela Xiao Wu (PhD, Northwestern University) is an Assistant Professor in the School of Journalism & Communication at the Chinese University of Hong Kong. She explores the connection between emergent technologies and cultural changes using mixed methodologies. Address: Room 206-7, Humanities Building, Chinese University of Hong Kong, Shatin, N. T., Hong Kong. Email: [email protected] Harsh Taneja (PhD, Northwestern University) is an Assistant Professor in the School of Journalism at University of Missouri. His research focuses on media use, specifically how contextual and individual factors shape patterns of audience formation. Address: 181-C Gannett Hall, Missouri School of Journalism, Columbia, MO, USA -65211-1200. Email: [email protected]
1611.06961
1
1611
2016-11-21T19:20:32
Rising Novelties on Evolving Networks: Recent Behavior Dominant and Non-Dominant Model
[ "cs.SI", "cs.IR", "physics.soc-ph" ]
Novelty attracts attention like popularity. Hence predicting novelty is as important as popularity. Novelty is the side effect of competition and aging in evolving systems. Recent behavior or recent link gain in networks plays an important role in emergence or trend. We exploited this wisdom and came up with two models considering different scenarios and systems. Where recent behavior dominates over total behavior (total link gain) in the first one, and recent behavior is as important as total behavior for future link gain in second one. It suppose that random walker walks on a network and can jump to any node, the probablity of jumping or making connection to other node is based on which node is recently more active or receiving more links. In our assumption random walker can also jump to node which is already popular but recently not popular. We are able to predict rising novelties or popular nodes which is generally suppressed under preferential attachment effect. To show performance of our model we have conducted experiments on four real data sets namely, MovieLens, Netflix, Facebook and Arxiv High Energy Physics paper citation. For testing our model we used four information retrieval indices namely Precision, Novelty, Area Under Receiving Operating Characteristic(AUC) and Kendal's rank correlation coefficient. We have used four benchmark models for validating our proposed models. Although our model doesn't perform better in all the cases but, it has theoretical significance in working better for recent behavior dominant systems.
cs.SI
cs
Rising Novelties on Evolving Networks: Recent Behavior Dominant and Non-Dominant Model Khushnood Abbasa,b,∗ aBig Data Research Center, University of Electronic Science and Technology of China, Chengdu 611731, PR China bBig Data mining and application center, Chongqing Institute of green and Intelligent Technology of China, Chinese Academy of Sciences, Chongqing, 401120, P.R. China. Abstract Novelty attracts attention like popularity. Hence predicting novelty is as important as popularity. Novelty is the side effect of competition and aging in evolving systems. Recent behavior or recent link gain in networks plays an important role in emergence or trend. We exploited this wisdom and came up with two models considering different scenarios and systems. Where recent behavior dominates over total behavior (total link gain) in the first one, and recent behavior is as important as total behavior for future link gain in second one. It suppose that random walker walks on a network and can jump to any node, the probablity of jumping or making connection to other node is based on which node is recently more active or receiving more links. In our assumption random walker can also jump to node which is already popular but recently not popular. We are able to predict rising novelties or popular nodes which is generally suppressed under preferential attachment effect. To show performance of our model we have conducted experiments on four real data sets namely, MovieLens, Netflix, Facebook and Arxiv High Energy Physics paper citation. For testing our model we used four information retrieval indices namely Precision, Novelty, Area Under Receiving Operating Characteristic(AUC) and Kendal's rank correlation coefficient. We have used four benchmark models for validating our proposed models. Although our model doesn't perform better in all the cases but, it has theoretical significance in working better for recent behavior dominant systems. Introduction Every time we use the Internet (particularly social media platforms, search engines, email servers) we leave our traces behind which generates a huge volume of data (Hommes 2002), (Bouchaud, Matacz, and Potters 2001), (Haldane and May 2011). This huge data carrying a lot of opportunity for understanding the individual as well as collective behaviours. Collective behaviours are more important in many domain such as finance, ∗Corresponding Author Email address: [email protected] (Khushnood Abbas) Preprint submitted to Elsevier June 14, 2021 viral marketing, epidemic disease prevention and so on, by targeting or controlling individuals or communities when predicting their behaviour and / or events and trends in societies. For example from Google trend some researchers infer the real world phenomena such as geographical location of disease spread (Ginsberg et al. 2008), stock market prediction (Preis, Moat, and Stanley 2013), which product will be in demand or who is going to win this election.Likewise, social media platforms such as Twitter has been used to track human mobility, improve the response to disasters, etc. Therefore we can say this big data is carrying ample amount of opportunities for scientists and researchers from all disciplines to solve this complex world problem (Axtell 2001), (King 2011), (Vespignani 2009), (Perc 2012). Most of the big data of the interactions of people in the Internet can be modeled The following two main different types of networks can be shaped from such data: a) monopartite, in which the nodes have similar types (i.e., only people or items) and links reflect a relationship among them; and b) bipartite, in which the nodes can be from different types (i.e., people and items) and links show a relationship between different types of nodes. By generally simply the latter type can be transformed to two different monopartite networks. Nevertheless, one of the main attributes in such network is the link formation among the nodes over time which can help to manage the dynamics of the network and make appropriate decision (Abbasi 2016). Although the quality item or fit node always show some common characteristics i.e they compete to get attention. It may be possible in presence of popular nodes its strength forgotten. Researchers have also found that in network such as paper citation it may not get attention for long time (Ke et al. 2015), some gain popularity many times (Cheng et al. 2016). In all the cases we think as also been proven that recent activity of the node is one of the important feature of node for future activity (Gleeson et al. 2014), (ZENG et al. 2013). Popularity or future link gain prediction is a complex task depending on different factors like quality or nodes fitness and so on. Content popularity may fluctuate with time (Eisler, Bartos, and Kertész 2008), increase over time or be limited within communities. Most recently researchers have found that the popularity of online contents like news, blog posts, videos, mobile app download (Gleeson et al. 2014) in online discussion forums and product reviews exhibits temporal dynamics. Emergence or first time occurence is novelty for those who didn't face it before, which can be innovation also. Innovation is special case of novelty in a sense it is entertained by collective attention, while novelty may not. The emergence, novelty , trend or future occurrence prediction models can be found since quite long time ago such as (Zanette and Montemurro 2005), (Hoppe 1984), (Simon 1955), (Tria et al. 2014). Emergence prediction theory applies in many areas of life such as economics (Simon 1955), biology (E. and Yule 1925), physics (Redner 1998) etc. (Simon 1955) has given stochastic model which fits to skewed or power law distribution or fit to rich-gets-richer phenomenon. It is obvious that popularity of any item on social media doesn't last forever. In addition decay rate may vary from item to item. Every type of node have its own decay rate like (Parolo et al. 2 2015) have found research article citation rate decays after some time. Cumulative advantage is a well known phenomenon seen almost in every evolving networks, which states that popularity increases cumulatively; the rate of new link (Either item receives rating in case of Movielens, or a friend like or comments in case of Facebook wall post activity) formation for any node is proportional to the observed number of links which node has received in past. Authors in (D. Wang, Song, and Barabasi 2013) for quantifying long term prediction considered fitness of paper for future citation gain of the paper. The nature of paper citation distribution is also found fat tailed or skewed which tells only few papers carrying most of the citation while most of the papers no citation or very very low (Redner 1998). We have solved the novelty problem using networks because of its wide application (Garlaschelli, Caldarelli, and Pietronero 2003), (Buldyrev et al. 2010). Almost everything shows aging effect, from biological organism to inanimate twitter "meme". Trend is side effect of aging; some perform better and loose influence within few hours and some perform for years. Therefore aging is one of the important factor that we should taken into consideration while solving emergence phenomena. Novelty is in one sense unexpected event or occurrence in future temporal domain, therefore recent behavior is an important feature for predicting rising novelties on evolving networks. Emergence can also be considered as after product of competition and aging. Ranking index on the basis of action of interest is one of the best way to understand emergence and competition such as in our case action of interest is in link formation of the node. Therefore considering all above facts we have solved the problem of emergence or rising novelty considering; aging and recent behavior (recent link gain) as well as total behavior (total link gain), and tested performance of our model on ranking index based metrics. The rest of the paper is organized as follows. In Section 2 we have introduced the benchmark models and also proposed our model. In section 3 we have given details about data sets and indexes that we have used for testing our model. In section 4 we have given the results. In Section 5 we have concluded the paper. Materials and Methods Before introducing our two proposed models for link prediction . first we briefly describe four existing prediction models (i.e., Node In-degree; PageRank(PR); Popularity Based Predictor(PBP); and Temporal Based Predic- tor(TBP)) which will be used to benchmark the models and compare their performance using the evaluation metrics which will be discussed in the last part of this Section. PageRank PageRank given by (Brin and Page 1998) was developed to rank webpages on internet for Google search engine optimization purpose. It can be applied in other networked architecture also where structural property of the node 3 plays an important role such as information diffusion, scientific paper/author ranking etc. PageRank algorithm can be given as follows:- If node ni have link to node nj there will be a directed link between them (ni− > nj). If node (i.e webpage) nj has Si set of link to other nodes then page will distribute its importance in lj(the number of nodes in set Si). Generally, the transition matrix of the network or graph A can be given as follows-  1/lj if nj ∈ si 0 Otherwise Aij =  Since there can be nodes that do not have link to other nodes although they are being pointed by other nodes, also known as dangling nodes , so new transformed matrix (S) can be given as- S = A + Ncd Where Ncd matrix have all the elements zero except for dangling nodes' column which are 1/N where N is the number of rows or nodes in the matrix. Easy to find that those columns are normalized that sums to one for making column stochastic matrix. Now the PageRank of dangling nodes will not be zero. Since random surfer will follow the link from one page to another, suppose that random surfer follows the PageRank (follows S) with probability (α) then there is (1 − α) probability that he will choose a random page. So now PageRank matrix also known as Google matrix M can be given as- M = αS + (1 − α) n In Where In is matrix of size n ∗ n, it's every element as one . PageRank vector P R can be calculated using power method as P Rk = M.P R (k−1) it will definitely converge to a static vector which is PageRank. Popularity-based predictor(PBP) (ZENG et al. 2013) came up with Popularity Based Predictor(PBP). It exploits the preferential attachment phenomenon, which states that popularity increases cumulatively; the rate of new link (either item receives rating in case of Movielens, or a friend like or comments in case of Facebook wall post activity) formation for any node is proportional to the observed number of links which node has received in past. If an item is popular at time t, then it will probably be popular due to the condition that current degree of an item ko(t) is a good predictor of its future popularity. (ZENG et al. 2013) proposes to calculate the prediction score of an item at time t can be given as follows- 4 so(t, Tp) = k o (t) − λko(t−TP) (1) Where ko(t) is the rating/links received up to time t. λ ∈ [0, 1] , note that λ = 0 gives the total popularity and for λ = 1 it gives recent popularity. Through out the manuscript by popularity we mean number of ratings or links received by item or node. Temporal Base Predictor (TBP) This model (Zhou, Zeng, and Wang 2015) considers decay effect only while collecting score of node for future probability of getting links. so(t) =X u Auo(t) exp(d(Tuo − t)) (2) where so(t) is prediction score for node o at time t, Auo(t) is the user object adjacency matrix, and Tuo is the time when object or node received link and d is the decay rate. Proposed model 1: Recent Behaviour Dominant Model(RBDM) In many systems such as human, herding or recent behavior followers are very common. Although it is well known that people go for popular items or follow rich-gets-richer behavior, but to understand emergence, recent behavior is one of the important factor. People follow the strength of the node also, with recent behaviours. We also know "congestion feeds itself" phenomena, meaning having more recent attractions(e.g recent new links) may lead to gaining more recent attractions. To quantify all these phenomena we came up with a model that gives weight to recency of link formation. If there are few attentions to node (e.g links) then will give weight to total popularity gain. Since we are modeling a system in which humans are core of its action for making link either user item bipartite network, Facebook friend ship network or paper citation network. And if people follow recent behavior in making links then recent degree gain must be a good predictor for future degree gain. In the same way if they follow total degree or popularity of the node then total degree would be a good predictor. But in reality people follow both therefore, we supppose people follow recent behavior with probability α, and with 1 − α they follow total degree or popularity of the items. Po(t, TP ) = (αo P ∆ko(t, TP ) ∆ko(t, TP ) + (1 − αo) ko(t)P ko(t)) u u 5 (3) Where ∆ko(t, TP ) = ko(t) − ko(t − Tp),ko(t) reflect the link gain upto time t. αo is dominance factor. It depends on system to system ho much recent behavior dominated system is, weak or strong. Such as for "bursty" behavior strong dominance should work. In our case αo is from Cumulative Distribution of ∆ko(t,TP ) . It means αo is ∆ko(t,TP ) biased towards recent behaviours, the more recent behaviour, the higher αo will be. IF the recent behaviour probability ( ∆ko(t,TP ) ), is low then the model score will depends on total link gain. Which is why we call this ∆ko(t,TP ) P P u model "Recent Behavior Dominant Model(RBDM)". u Proposed model 2: Recent Behaviour Non-Dominant Model(RBNDM) for Emergence In this model we think recent behavior is effect of long term past behavior. If a node is getting more link recently it is because it has already gained link in past. In other words people follow recent behaviours but also at the same time they concern about past links. In that system we need to give weightage to both behaviours. So to model this we think if a node is active in recent time and also it was popular then its probability of gaining link in future is high. Po(t, TP ) = ((1 − αo) ∆ko(t, TP ) ∆ko(t, TP ) + αo P u ko(t)P ko(t)) u (4) Since we are considering evolving systems, we should consider the time as an important factor. Therefore to calculate total score of node, i.e ko(t) , we used aging effect similar to TBP model described above. αo is from cumulative distribution of ∆ko(t,TP ) ∆ko(t,TP ) P . u Data and Metrics To test the performance and robustness of our model we have considered different data sets and evaluation metrics. Evalutation metrics including preci- Four evaluation metrics are adopted to measure the accuracy of the proposed model sion(Pn),novelty(Qn) and Area Under Recieving Operating Characteristic(AU C) and rank correlation Kendall's Tau(τ). 6 • Precision is defined as the fraction of objects that are predicted also lie in the top N object of true ranking (Herlocker et al. 2004). pn = Dn n Where Dn is the number of common objects between predicted and real ranking. n is the size of list to be ranked. its value ranges in [0,1], higher value of (Pn) is better. • Novelty(Qn) is a metric to measure the ability of a predictor to rank the items in top n position that was not in top n position in past (ZENG et al. 2013). These are the rising novelties in the system. If we denote the predicted object as (Ppo) and potential true object as Pro, then the novelty is given by- Qn = Ppo/Pro • AUC measures the relative position of the predicted item and true ranked items. Suppose predicted item list is (Lpn) and real item list is (Lrn). if sop ∈ Lpn and srp ∈ Lrn is score of object in predicted then AUC is given by- where, P op∈Lpn AU C =  I(spn, srn) = P I(spn, srn) rp∈Lrn LpnLrn 0 ⇐ spn < srn 0.5 ⇐ spn = srn 1 ⇐ spn > srn • Kendal's Tau(τ) measures the correlation between predicted and actual ratings. It varies between −1 and +1. τ = 1 when predicted and actual are identical,τ = 0 when both ranking is independent and τ = −1 shows they perfectly disagree. It can be given as- where C is the number of concordant pairs and D is the number of discordant pairs. τ = C − D C + D 7 Data To test the predictors accuracy we have used different data sets including MovieLens, Netflix, Facebook wall post and Arxiv paper citation. MovieLens and Netflix data sets contains movie ratings, Facebook data set contains users' wall post relationships and arxiv citation data set contains paper citation information from arxiv database of High Energy Physics field (Gehrke, Ginsparg, and Kleinberg 2003). Movielens, Netflix and Facebook data is same as reported in paper (Zhou, Zeng, and Wang 2015). For Arxiv high energy physics citation data contains papers that were uploaded by scientists. It contains 34, 546 papers from January 1993 to April 2003. There is an edge if paper i has cited paper j. We have converted the time into number of months. We have considered the paper j has received link from paper i at the time paper i was submitted to arxiv server. For the three data sets Facebook, Movielens and Netflix the time is considered in days while for arxiv citation data set the time is in months since citation process is slower than the rest of the cases. The data description are as follows- • Netflix data contains 4960 users,16599 movies and 1249058 links, data was collected during(1st Jan 2000 -- 31st Dec 2005). • MovieLens data set contains 7533 movies, 864581 links and 5000 users and data was collected during(1st Jan 2002 -- 1st Jan 2005). • Facebook data contains 40981 set of users and their 38143 wall post activity and 855542 links, during period of (14 Sep 2004 -- 22nd Jan 2009). If user has posted on a wall there will be a link between the user and the wall, self influenced is removed by removing the link between user and its own wall post. • Arxiv-HePh data set contains 30500 number of papers and 347185 edges from January 1993 to April 2003. 8 Figure 1: The above figure shows temporal occurrence of event or link formation per unit of time, i.e for Movielens, Netflix, Facebook it is in days and for Citation dataset it is in Months. 9 MovieLensTimeNo of Edges020040060080010000200004000060000NetflixTimeNo of Edges0500100015002000050000150000FacebookTimeNo of Edges050010001500050000100000150000CitationTimeNo of Edges0204060801001200100003000050000 Analysis and Results The link prediction models often require to consider the creation (and decay) of the links in a network over time. In other words, observing the link formation behaviour during a given time (e.g., up to the models will predict (and rank) nodes' link gain during a period of time window in future (>t). In order to compare different prediction models, first we have calculated the values for the evaluation metrics (Pn, Qn, AUC, tua), as shown in Figure 3, considering top 50, 100 and 200 items for all the four datasets. Results on synthetic data To prove our models' theoratical relevance in [Figure 2] we have created data for recent degree gain and total degree gain. To achieve this we have sampled data from population of size n*n, where n is total system size. We have randomly sampled with replacement, recent degree gain and total degree gain from population of 1000000. In first column we have plotted the distribution of recent degree gain and in second column, distribution of α in our model. In third column we have plotted the correlation rank τ with recent degree gain and total degree gain and with our models. It can be seen the rank correlation for recent degree gain and Recent Behaviour Dominant Model(Recent:RBDM) is 1. It proves our hypothesis "Recent Behaviour Dominance" effect. In the same way we have plotted the rank correlation with recent degree gain and RBNDM. We have repated the procedure with total degree gain also. Figure 2: We have created random data for recent degree gain and total degree gain and then calculated our models correlation for varying system size. We have tested upto 1000 size. First figure from left is probablity distribution of recent degreegain, the middle figure is distribution of α in our model and the right most is rank correlation τ. The x axis is the size of the system. Y-axis is the correlation value which can be between -1 to 1. Recent:RBDM means correlation between recent 10 00.00020.00040.00060.00080.0010.00120.00140.00160.00180.002173145217289361433505577649721793865937RecentDegreeGain00.10.20.30.40.50.60.70.80.91168135202269336403470537604671738805872939α -1.5-1-0.500.511.5160119178237296355414473532591650709768827886945Rank Correlation tau Recent:RBDMRecent:RBNDMTotal:RBDMTotal:RBNDM degree gain and our probposed model RBDM. In same order Total:RBNDM is the rank correlation between our proposed model RBNDM and total degree gain, and so on. Results on Real Data To evaluate the performance of our models we have selected 10 random t for each data sets. Selection of t is considered in such a way that predictor have enough history information so we left one-third of the data from start and one-third from last. From middle one-third part we have randomly selected time and then calculated score. Since predictors are based on nodes' history, we have selected only those node that have received at least one link before time t. Therefore the new nodes after randomely selected time t will be discarded in our analysis. Accuracy comparison For comparing our proposed predictors with benchmark predictors we have considered past time window (TP ) and future time window (TF ) as 30 days and for arxiv citation data set the time is 40 months for past and future time window both. For comparison we have selected the top n ranked items from predicted list and compare them against the real items for both the predictors. For pageRank teleportation parameter we have considered 0.90. While comparing our predictor we have considered the past and future time windows as 30 days in case of Movielense, Netflix and Facebook respectively. Paper citation case is different, its evolution takes time so instead of day we have considered no of months. Thus in this case past and future time windows are 40 months. We did this to make sure we have enough random months so that we can take average of 10 without any bias. Because after cleaning the data all we have 121 months start from 0 month. 40 months is very short period for paper citation, generally decay effect cant be seen in this short period of time. 11 12 AUC50AUC100AUC200Pn50Pn100Pn200Qn50Qn100Qn200tauRBDM0.9890.9880.9850.5520.6290.7010.4520.4430.480.564RBNDM0.9880.9890.9860.520.6550.7080.4220.460.4870.553PageRank0.9570.9620.9580.4740.5890.6490.1430.1780.1920.56PBP0.990.9910.9890.5820.6810.7260.3540.3720.4190.57In-degree0.9370.9480.9560.4460.5770.6480000.574TBP0.9910.9910.9870.5660.6640.7090.4350.4480.4650.57600.10.20.30.40.50.60.70.80.91Movielens AUC50AUC100AUC200Pn50Pn100Pn200Qn50Qn100Qn200tauRBDM0.9730.9680.9570.5380.5840.6350.5080.5170.5320.316RBNDM0.9610.960.9470.5220.5630.6270.4540.4810.4940.324PageRank0.9430.9450.9370.3220.4650.5460.1350.2150.2530.316PBP0.9890.9890.9880.5320.570.6220.4350.4560.4490.214In-degree0.9630.9690.9720.2180.3370.4840000.234TBP0.9680.9630.9510.560.5880.6360.4670.5120.520.33200.10.20.30.40.50.60.70.80.91Netflix AUC50AUC100AUC200Pn50Pn100Pn200Qn50Qn100Qn200tauRBDM0.920.8960.8680.3060.3570.3840.2530.2730.2560.304RBNDM0.940.930.9170.2980.350.4070.240.2790.280.359PageRank0.770.7640.7620.0980.1360.2070.0580.0880.1170.197PBP0.9910.9890.9870.3740.4060.4270.260.2610.2340.137In-degree0.9860.9840.9810.2220.2670.3270000.108TBP0.8870.8640.840.320.3340.3690.2770.2490.2690.27600.10.20.30.40.50.60.70.80.91Facebook AUC50AUC100AUC200Pn50Pn100Pn200Qn50Qn100Qn200tauRBDM0.8990.8850.8630.2860.3520.3960.2050.2010.2240.306RBNDM0.9980.9970.9930.630.6530.6620.1540.0890.0640.473PageRank0.9940.9890.9780.4620.4680.4940.2160.180.2190.384PBP0.9990.9980.9960.620.6570.6690.0630.0460.0420.602In-degree0.9990.9980.9960.610.6670.680000.619TBP0.9980.9960.9920.6280.6580.660.1590.0860.0580.47800.10.20.30.40.50.60.70.80.91Citation Figure 3: The performance comparison between proposed methods and benchmark methods for MovieLens, Netflix, Facebook and citation data set for top 50,100 and 200 items. The metrics used are; AUC, Pn , Qn and tau, higher the better all the four metrics gives result between 0 and 1 except tau which gives between -1 to 1. We have compared our results with the benchmark methods considering top 50,100 and 200 items in list. For comparing we have considered past item window (TP ) as 30 days and we have tested the predictor for the same future time length TF = 30 days. For arxiv citation network we have considered TP , TF = 40 months. [Figure 3] shows the comparative performance of proposed method over benchmark method. This result is the best value achieved by predictors when TF and TP are same as 30 days. In case of citation data set the TF and TP are 40 months. The parameter value in case of TBP and in our case is as follows: Movielens,Netflix and γ = 0.06 for Facebook and Citation it is 0.03. In case of PBP λ = 0.98. The pageRank parameter is 0.9 for all the datasets except Facebook in this case 0.6 gives good precision. From the [Figure 3] have better performance with benchmark models. Our proposed model not outperforms in all the cases but there atleast one case in which it always out performs with respect to benchmark models. Perfomance for fixed past (TP ) and varying future (T_F) time lenght In the next phase of our analysis, for further comparison of the performance of different predicting models, we also investigate the effects of the length of past and future time windows, on the performance of models measured through Pn, Qn, AUC, and tau. . 13 0.90.910.920.930.940.950.960.970.980.9911112131415161718191101111121131141151161171181191RBDMRBNMDIndegree0.30.350.40.450.50.550.60.650.70.751112131415161718191101111121131141151161171181191(PN) RBDMRBNMDIndegreePBPTBPPR0.010.110.210.310.410.511112131415161718191101111121131141151161171181191RBMDRBNMDIndegreePBPTBPPR0.30.350.40.450.50.550.60.650.70.751112131415161718191101111121131141151161171181191RBDMRBDNMIndegreePBPTBPPR0.80.820.840.860.880.90.920.940.960.9811112131415161718191101111121131141151161171181191RBDMRBNMDIn-degreePBPTBPPR00.10.20.30.40.50.60.711223344556677889100111122133144155166177188199RBDMRBNMDIn-degreePBPTBPPR00.10.20.30.40.50.61112131415161718191101111121131141151161171181191RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.250.30.350.40.450.51112131415161718191101111121131141151161171181191RBDMRBNDMIndegree Figure 4: Performance of the predictor for diferent values on future time window TF . The varticle columns are from right to left for AUC, Pn , novelty (Qn) and rank correlation (tau). This result is for top 100 items perfromance except rank correlation tau which works on the whole data. Y-axis is for metrics, AUC, Pn , Qn and tau results, higher the better. In [Figure 4] we have shown the performance of our predictor against the benchmark predictors for different values of future time window.For TBP and PBP the parameter values are same as the TBP author has reported in their paper. Here we have considered past time window as fixed. We have calculated accuracy on the basis of varying future time window. In case of Movielens long term precision prediction is not good while Qn prediction is good. We can find our proposed model's performance is good. From precision analysis we can find our proposed models performance doesn't get affected by future time window TF for all the datasets. Rank correlation τ also gets better as future time window increases for all the data sets. Novelty Qn affected by future time window only in case of Facebook. Our proposed model may not out perform all the predictors in all the situation but it has theoretical significance. The effects of Tp and Tf on the proposed models (RBDM and RBNDM) performance In the [Figure 5] we have shown the effect of recent behavior dominance and recent behavior non dominance in making prediction. To see the performance we have selected top 100 items. ML-DOM implies, result for top 100 items considering AUC index for Movielense (ML) Data set and considering RBDM (DM-Dominant Model) and so on. 14 0.70.750.80.850.90.9511112131415161718191101111121131141151161171181191RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.250.30.350.40.450.51112131415161718191101111121131141151161171181191Facebook RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.250.30.351112131415161718191101111121131141151161171181191RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.250.30.350.40.450.51112131415161718191101111121131141151161171181191RBDMRBNDMIndegreePBPTBPPR0.740.790.840.890.940.9913579111315171921232527293133353739RBDMRBNMDIn-degreePBPTBPPR00.10.20.30.40.50.60.70.813579111315171921232527293133353739RBDMRBNMDIn-degreePBPTBPPR00.050.10.150.20.2513579111315171921232527293133353739RBDMRBNMDIn-degreePBPTBPPR00.10.20.30.40.50.60.70.813579111315171921232527293133353739RBDMRBNDMIndegreePBPTBPPR Figure 5: Performance of RBDM Vs RBNDM, considering past time window (TP ) and future time window (TF ) same upto 200 days. In case of Citation the number time is upto 40 months. Abbreviations: ML- Movielens, NF-Netflix, FB-Facebook and CIT- Citation dataset, DOM is for RBDM model and NON-DOM is for RBNDM. The y-axis shows the metrics value, higher the better all the three metrics; Precision (Pn), Novelty(Qn) and AUC gives result between 0 and 1, rank correlation tau (τ) can give values between -1 to 1. The x-axis shows the time duration for past and future time window. In AU C analysis we have found that in case of Movielens short term and long term prediction has no effect. Its performance doesn't get affected by shorter and longer time window much. Specially in case of Movielens. In case of Netflix both the predictors has almost similar performance but after 100 days a slight deterioration in performance found. Similar effect have found for Facebook also. In case of Citation data set the time window is in terms of months, so up to 40 months its performance increases. In case of Movielens precision (Pn) analysis the predictor have similar performance and its accuracy are also not getting affected. Past and future time window have negligible effect. In Qn or novelty prediction analysis we have found that Netflix data has better performance over others, while both the predictor has similar performance. The novelty prediction much affected by past and future time window as compare to AUC and Precision. Only for predicting citation data the both predictors performance varies much in which predictor RBDM has better performance. In case of rank correlation both predictor have similar performance, only in case of citation RBNDM performs better. 15 0.60.650.70.750.80.850.90.95117131925313743495561677379859197103109115121127133139145151157163169175181187193199 ML_DOM NF_DOM FB_DOM CIT_DOM ML_NON_DOM NF_NON_DOM FB_NON_DOM CIT_NON_DOM00.10.20.30.40.50.60.70.817131925313743495561677379859197103109115121127133139145151157163169175181187193199 ML_DOM NF_DOM FB_DOM CIT_DOM ML_NON_DOM NF_NON_DOM FB_NON_DOM CIT_NON_DOM00.10.20.30.40.50.617131925313743495561677379859197103109115121127133139145151157163169175181187193199 ML_DOM NF_DOM FB_DOM CIT_DOM ML_NON_DOM NF_NON_DOM FB_NON_DOM CIT_NON_DOM-0.050.050.150.250.350.450.550.650.7517131925313743495561677379859197103109115121127133139145151157163169175181187193199Tau-RBDM Vs RBNDM ML_DOMNF_DOMFB_DOMCIT_DOMML_NON_DOMNF_NON_DOMFB_NON_DOMCIT_NON_DOM Conclusions In this manuscript we came up with two models to make prediction of node on online social media or evolving networks specially considering its temporal behavior. The first model (Recent Behavior Dominant Model(RBDM)) we have considered that people go for popular as well as follow recent behaviours but recent behavior dominates especially in case when node has recieved more links in recent past. It suppose that random walker walks on a network and can jump to any node, the probablity of jumping to other nodes is based on which node is recently more active or receiving more link. The more recently node has received link the more it will dominate over total degree for future link gain. The second model (Recent Behavior Non-Dominant Model(RBNDM)) in which we think the node will gain more links if it is recently active and also have gained link in past. We have compared our results with state of the art models i.e popularity based predictor, pageRank , In-degree and TBP. To test the robustness of our model we have tested our models on different data sets which has different temporal distribution. we have found our proposed model performs better. Our models not always out performs the benchmarks models but in different cases on different data sets such as RBNDM doesn't perform better than RBDM in other case but in case of citation data set it performs better in precision, novelty and rank correlation. Although with TBP some times it lacks. The merits of our model is it helps identifying novel entries without any significant cost of predicting already popular items. In this paper we have considered the recent behavior as the basis of identifying rising novelties with other combinations such as aging, dominant recent behavior as well as non dominant recent behavior. In all of these with respect to our data sets prediction accuracy is good. We have considered only temporal effects of the node's attracting new link. We have found it one of the important feature for making prediction and considering other complex feature might increase accuracy but it increases computational complexity. So we can say our model computational resource efficient also. In our current work we have not considered any threshold when recent behavior will start dominating over total behavior in future work one can consider the threshold. Acknowledgement This work was supported by the National Natural Science Foundation of China (Grant Nos. 61370150 and 61433014). References Abbasi, Alireza. 2016. "A Longitudinal Analysis of Link Formation on Collaboration Networks." Journal of Informetrics. http://www.sciencedirect.com/science/article/pii/S1751157716300815. http://dx.doi.org/10.1016/j. 16 joi.2016.05.001. Axtell, R. L. 2001. "Zipf Distribution of U.S. Firm Sizes." Science 293 (5536). American Association for the Advancement of Science (AAAS): 1818 -- 20. doi:10.1126/science.1062081. Bouchaud, Jean-Philippe, Andrew Matacz, and Marc Potters. 2001. "Leverage Effect in Financial Mar- kets: The Retarded Volatility Model." Phys. Rev. Lett. 87 (22). American Physical Society (APS). doi:10.1103/physrevlett.87.228701. Brin, Sergey, and Lawrence Page. 1998. "The Anatomy of a Large-Scale Hypertextual Web Search Engine." Computer Networks and ISDN Systems 30 (1-7). Elsevier BV: 107 -- 17. doi:10.1016/s0169-7552(98)00110-x. Buldyrev, Sergey V., Roni Parshani, Gerald Paul, H. Eugene Stanley, and Shlomo Havlin. 2010. "Catas- trophic Cascade of Failures in Interdependent Networks." Nature 464 (7291). Springer Nature: 1025 -- 28. doi:10.1038/nature08932. Cheng, Justin, Lada A. Adamic, Jon M. Kleinberg, and Jure Leskovec. 2016. "Do Cascades Recur?" In Proceedings of the 25th International Conference on World Wide Web, WWW 2016, Montreal, Canada, April 11 - 15, 2016, edited by Jacqueline Bourdeau, Jim Hendler, Roger Nkambou, Ian Horrocks, and Ben Y. Zhao, 671 -- 81. ACM. doi:10.1145/2872427.2882993. E., F. Y., and G. Udny Yule. 1925. "A Mathematical Theory of Evolution Based on the Conclusions of Dr. J. c. Willis, F.R.S." Journal of the Royal Statistical Society 88 (3). JSTOR: 433. doi:10.2307/2341419. Eisler, Zoltán, Imre Bartos, and János Kertész. 2008. "Fluctuation Scaling in Complex Systems: Taylors Law and Beyond1." Advances in Physics 57 (1). Informa UK Limited: 89 -- 142. doi:10.1080/00018730801893043. Garlaschelli, Diego, Guido Caldarelli, and Luciano Pietronero. 2003. "Universal Scaling Relations in Food Webs." Nature 423 (6936). Springer Nature: 165 -- 68. doi:10.1038/nature01604. Gehrke, Johannes, Paul Ginsparg, and Jon Kleinberg. 2003. "Overview of the 2003 KDD Cup." SIGKDD Explor. Newsl. 5 (2). Association for Computing Machinery (ACM): 149. doi:10.1145/980972.980992. Ginsberg, Jeremy, Matthew H. Mohebbi, Rajan S. Patel, Lynnette Brammer, Mark S. Smolinski, and Larry Brilliant. 2008. "Detecting Influenza Epidemics Using Search Engine Query Data." Nature 457 (7232). Springer Nature: 1012 -- 14. doi:10.1038/nature07634. Gleeson, James P, Davide Cellai, Jukka-Pekka Onnela, Mason A Porter, and Felix Reed-Tsochas. 2014. "A Simple Generative Model of Collective Online Behavior." Proceedings of the National Academy of Sciences 111 (29). National Acad Sciences: 10411 -- 15. doi:10.1073/pnas.1313895111. 17 Haldane, Andrew G., and Robert M. May. 2011. "Systemic Risk in Banking Ecosystems." Nature 469 (7330). Springer Nature: 351 -- 55. doi:10.1038/nature09659. Herlocker, Jonathan L., Joseph A. Konstan, Loren G. Terveen, and John T. Riedl. 2004. "Evaluating Collaborative Filtering Recommender Systems." ACM Transactions on Information Systems 22 (1). Association for Computing Machinery (ACM): 5 -- 53. doi:10.1145/963770.963772. Hommes, C. H. 2002. "Modeling the Stylized Facts in Finance Through Simple Nonlinear Adaptive Systems." Proceedings of the National Academy of Sciences 99 (Supplement 3). Proceedings of the National Academy of Sciences: 7221 -- 28. doi:10.1073/pnas.082080399. Hoppe, Fred M. 1984. "Polya-Like Urns and the Ewens Sampling Formula." Journal of Mathematical Biology 20 (1). Springer Nature: 91 -- 94. doi:10.1007/bf00275863. Ke, Qing, Emilio Ferrara, Filippo Radicchi, and Alessandro Flammini. 2015. "Defining and Identifying Sleeping Beauties in Science." Proceedings of the National Academy of Sciences 112 (24). Proceedings of the National Academy of Sciences: 7426 -- 31. doi:10.1073/pnas.1424329112. King, G. 2011. "Ensuring the Data-Rich Future of the Social Sciences." Science 331 (6018). American Association for the Advancement of Science (AAAS): 719 -- 21. doi:10.1126/science.1197872. Parolo, Pietro Della Briotta, Raj Kumar Pan, Rumi Ghosh, Bernardo A. Huberman, Kimmo Kaski, and Santo Fortunato. 2015. "Attention Decay in Science." Journal of Informetrics 9 (4). Elsevier BV: 734 -- 45. doi:10.1016/j.joi.2015.07.006. Perc, M. 2012. "Evolution of the Most Common English Words and Phrases over the Centuries." Journal of The Royal Society Interface 9 (77). The Royal Society: 3323 -- 28. doi:10.1098/rsif.2012.0491. Preis, Tobias, Helen Susannah Moat, and H. Eugene Stanley. 2013. "Quantifying Trading Behavior in Financial Markets Using Google Trends." Sci. Rep. 3 (April). Nature Publishing Group. doi:10.1038/srep01684. Redner, S. 1998. "How Popular Is Your Paper? An Empirical Study of the Citation Distribution." The European Physical Journal B 4 (2). Springer Nature: 131 -- 34. doi:10.1007/s100510050359. Simon, Herbert A. 1955. "On a Class of Skew Distribution Functions." Biometrika 42 (3/4). JSTOR: 425. doi:10.2307/2333389. Tria, F., V. Loreto, V. D. P. Servedio, and S. H. Strogatz. 2014. "The Dynamics of Correlated Novelties." Sci. Rep. 4 (July). Nature Publishing Group. doi:10.1038/srep05890. Vespignani, A. 2009. "Predicting the Behavior of Techno-Social Systems." Science 325 (5939). American Association for the Advancement of Science (AAAS): 425 -- 28. doi:10.1126/science.1171990. 18 Wang, D., C. Song, and A.-L. Barabasi. 2013. "Quantifying Long-Term Scientific Impact." Science 342 (6154). American Association for the Advancement of Science (AAAS): 127 -- 32. doi:10.1126/science.1237825. Zanette, Damián, and Marcelo Montemurro. 2005. "Dynamics of Text Generation with Realistic Zipfs Distribution." Journal of Quantitative Linguistics 12 (1). Informa UK Limited: 29 -- 40. doi:10.1080/09296170500055293. ZENG, AN, STANISLAO GUALDI, MATÚŠ MEDO, and YI-CHENG ZHANG. 2013. "Trend Prediction in Temporal Bipartite Networks: The Case of Movielens, Netflix, and Digg." Advances in Complex Systems 16 (04n05). World Scientific Pub Co Pte Lt: 1350024. doi:10.1142/s0219525913500240. Zhou, Yanbo, An Zeng, and Wei-Hong Wang. 2015. "Temporal Effects in Trend Prediction: Identifying the Most Popular Nodes in the Future." Edited by Xia Li. PLOS ONE 10 (3). Public Library of Science (PLoS): e0120735. doi:10.1371/journal.pone.0120735. 19
1909.05838
1
1909
2019-09-12T17:44:15
Multilingual Multimodal Digital Deception Detection and Disinformation Spread across Social Platforms
[ "cs.SI" ]
Our main contribution in this work is novel results of multilingual models that go beyond typical applications of rumor or misinformation detection in English social news content to identify fine-grained classes of digital deception across multiple languages (e.g. Russian, Spanish, etc.). In addition, we present models for multimodal deception detection from images and text and discuss the limitations of image only and text only models. Finally, we elaborate on the ongoing work on measuring deceptive content (in particular disinformation) spread across social platforms.
cs.SI
cs
Multilingual Multimodal Digital Deception Detection and Spread across Social Platforms Maria Glenski, Ellyn Ayton, Josh Mendoza, and Svitlana Volkova Data Sciences and Analytics Group Pacific Northwest National Laboratory {maria.glenski, ellyn.ayton, joshua.mendoza, svitlana.volkova}@pnnl.gov Richland, Washington 99352 9 1 0 2 p e S 2 1 ] I S . s c [ 1 v 8 3 8 5 0 . 9 0 9 1 : v i X r a Motivation There is a deluge of information flooding feeds, timelines, and forums online but even in the wake of this, users are in- creasingly relying on these platforms for news and informa- tion to base not only their opinions but actions. An August 2018 survey from the Pew Research Center found that 68% of Americans report that they get at least some of their news from social media (Matsa and Shearer 2018) while another found that the rate of Americans who often get their news online in some way increased from 38% in 2016 to 43% in 2017 (Bialik and Matsa 2017). Alongside the increased access to information and on-demand news about local and global events alike, there has been a deluge of misleading or deceptive misinformation. The spread of this "digital disin- formation" within and across networks is of great concern. The impact of digital disinformation has been seen in sev- eral areas from natural disasters and other crisis events (Star- bird et al. 2014; Starbird 2017; Takahashi, Tandoc, and Carmichael 2015) to politics (Hadgu, Garimella, and We- ber 2013), health-related conspiracies (Seymour et al. 2015; Jolley and Douglas 2014), and more. At the level of individ- ual experiences, recent Pew Research Center studies have found that the average user is highly concerned about mis- information in their general use: 31% see inaccuracy as the top concern when consuming news from social media, 64% of adults believe fake news stories caused a great deal of confusion (Mitchell, Holcomb, and Barthel 2016), and 57% of social media users who consume news from one or more of those platforms expect the news they see to be "largely inaccurate" (Matsa and Shearer 2018). Recent Work Many studies focused on digital deception, in particular de- ception in open-source data including social media, have fo- cused on rumor and misinformation detection with a pri- mary focus on the network's role in information diffu- sion models (Qazvinian et al. 2011; Kwon et al. 2013; Wu, Yang, and Zhu 2015; Kwon, Cha, and Jung 2017). Other studies compare and contrast the behavior of tradi- tional and alternative media (Starbird 2017), classify media Copyright c(cid:13) 2019, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. sources into sub-categories of misinformation (Wang 2017; P´erez-Rosas and Mihalcea 2015; Volkova et al. 2017; Baly et al. 2018), or attempt to detect rumor-spreading users (Rath et al. 2017). Our main contribution in this work is novel results of multilingual models that go beyond typical applications of rumor or misinformation detection in English social news content to identify fine-grained classes of digital deception across multiple languages (e.g., Russian, Spanish, etc.). In addition, we present models for multimodal deception de- tection from images and text and discuss the limitations of image only and text only models. Finally, we elaborate on the ongoing work on measuring deceptive content (in partic- ular disinformation) spread across social platforms. Identifying linguistic markers of digital deception and their contribution to detection models in English First, we examined linguistic cues of digital deception across a spectrum (disinformation, propaganda, conspiracy, hoaxes, and satire) to develop predictive models with which we clas- sified 130 thousand news posts on Twitter as suspicious or verified, and predicted four sub-classes of suspicious news satire, hoaxes, clickbait and propaganda (Volkova et al. 2017). Similar to Vosoughi, Roy, and Aral 2018 and Grin- berg et al. 2019, we relied on source-based annotations rather than content-level annotations to capture the intent be- hind spreading deceptive content. Through this study, we identified several key differences between news tweets of different sub-classes when spread online. For example, we saw that credible news tweets (i.e., those that did not spread digital deception) contain sig- nificantly less bias markers, hedges and subjective terms and less harm/care, loyalty/betrayal and authority moral cues compared to news tweets spreading varied types of digital deception. The best performing models built to detect these fine- grained classes achieved accuracy of 0.95 on the binary pre- dictive task and F1 of 0.91 on the multi-class. This work was built upon in a subsequent studies (Rashkin et al. 2017; Volkova and Jang 2018) that examined linguistic and lexi- cal features of various types of deceptive news articles and disinformation statements to show that these features con- Figure 1: Key findings from the analysis of multimodal deception detection model behavior from (Volkova et al. 2019). tribute to the understanding of the differences between re- liable news sources and those that spread disinformation which can also be leveraged for effective detection models. Understanding patterns of engagement and information spread from deceptive news sources In a large-scale study of news in social media, we analyzed 11 million posts and investigated the propagation behavior of users that directly interact with news accounts identified as spread- ing credible information versus digital deception (Glenski, Weninger, and Volkova 2018c). Unlike previous work which primarily looks at specific rumors or events, we focused on news sources in an effort to bridge the gap in the understand- ing of how users react to news sources of varying credibil- ity and how their various initial responses contribute the the spread of digital deception. Our analysis identified several key differences in prop- agation behavior from credible versus suspicious news sources such as high inequity in the diffusion rate based on the source of deception, with a small group of highly active users responsible for the majority of disinforma- tion spread overall and within various demographics. Our demographics-based analysis found that users with lower annual income and education share more from disinforma- tion sources compared to their counterparts. In a subsequent study, we further identified significant differences in the pat- terns of engagements from automated "bot" accounts ver- sus humans (Glenski, Weninger, and Volkova 2018a) and how user-reactions to deceptive and credible news sources remain consistent as well as differ across multiple plat- forms (Glenski, Weninger, and Volkova 2018b). Explaining multimodal digital deception detection An- other recent area of interest has been the incorporation of image-based features to more accurately identify multi- modal digital deception. In this recent study (Volkova et al. 2019), we presented multi-modal deceptive news classification models and an in- depth quantitative and qualitative analysis of their behavior when classifying various classes of digital deception that in- corporates imagery alongside text. Key findings of the anal- ysis of model behavior are highlighted in Figure 1. When we compared the performance of models that rely on text or image features alone along with models trained on text and images jointly, we found that the latter models outper- form the individually trained model with F1 scores as high as 0.74 for binary classification of deceptive (propaganda or disinformation) versus credible. Our quantitative analysis reveals that when considering only one aspect of the content, the text only models outperform those that just leverage im- age features (by 3-13% absolute in F-measures). Finally, we also presented a novel interactive tool ErrFILTER1 that al- lows users to explain model prediction by characterizing text and image traits of suspicious news content and analyzing patterns of errors made by the various models, which can in turn be used to inform the design of future digital deception detection models. Multilingual Deception Detection The main contribution of this extended abstract focuses on the results of our predictive models that identify fine-grained classifications of digital deception and related deceptive content from multilingual social media postings. Similarly to the recent work described above that focused on multi- platform and multi-modal deception detection, we focus on multi-dimensional computational approaches to identifying multilingual digital disinformation and misinformation be- ing spread in social media. 1ErrFilter is available at https://github.com/pnnl/errfilter Figure 2: Distribution of languages represented in the large multilingual dataset of 7M Twitter posts from 2016. Detection Task In this work, we concentrate on deception detection in multilingual social media postings structured as two multi-class classification tasks : 1. 4-way Classification Given a social media posting, classify the text as Propa- ganda, Conspiracy, Hoax, or Clickbait. 2. 5-way Classification Given a social media posting, classify the text as Disin- formation, Propaganda, Conspiracy, Hoax, or Clickbait. Multilingual Twitter Data The dataset used in this work comprises 7M posts in a variety of languages from English to Russian, German, and Spanish. We present the distribu- tion of languages represented in this dataset in Figure 2. Here, we see that the majority (47%) of the data collected has text written in Russian, followed by English posts (36%) with the remainder composed of Spanish, German, French, Arabic, Ukranian, Portugeese, Italian, and other languages. Multilingual Deception Detection Building off of previ- ous, related tasks (Volkova et al. 2017), we use a similar neu- ral architecture for this task. This architecture, composed of a network and/or linguistic cues sub-network (left) and a text representation (as word or characters) sub-network (right). As typical with other multi-classification tasks, we re- port the macro F1 scores for each of our models on the 4-way and 5-way classification tasks. We highlight one of our key findings in Figure 3 which illustrates the model per- formance in terms of macro F1 scores on the multilingual dataset. Unlike for English (explored in (Volkova et al. 2017; Rashkin et al. 2017)), text representations in characters in combination with DeepWalk representation network fea- tures achieve the best performance of 0.76 for both the 4- way and 5-way classification tasks. Ongoing Work: Measuring Cross-Platform Spread of Disinformation Intuitively, the next steps need to focus on measuring cross- platform spread of disinformation. Social media platforms on which digital disinformation is released and promoted do not exist in a vacuum, and, thus, the connections between Figure 3: Macro F1 scores for 4-way and 5-way classifica- tion tasks in a multilingual setting. platforms and communities have a potentially significant im- pact on the spread and virality of digital disinformation. Al- though we have previously examined the concurrent spread of information from news sources on multiple platforms, our continued efforts in this area focus on incorporating the cross-platform links between users who actively spread or engage with disinformation and the cross-platform URLs as- sociated with disinformation narratives. Under DARPA SocialSim program2, we developed a uni- fied framework for measuring information spread and evolu- tion within and across social platforms, that was presented at the ICWSM 2019 tutorial3.Our framework will allow us to measure disinformation spread within and across social plat- forms e.g., Twitter, Youtube and Telegram focusing on spe- cific social phenomena -- information cascades, recurrence, persistent groups and coordinated effort. More specifically, we will focus on several user cases of known disinforma- 2https://www.darpa.mil/program/computational-simulation-of- online-social-behavior 3https://sites.google.com/alumni.nd.edu/icwsm19t3/ tion: the White Helmets4, Syrian airstrikes5 and NATO ex- ercises6. Additionally, we will be measuring disinformation spread and the effect of censorship during internet outages during crisis events in Venezuela7 and Sri Lanka8. Biographical Notes Maria Glenski received the Ph.D. degree from the Univer- sity of Notre Dame, Notre Dame, IN, USA, in 2019. She is currently a Data Scientist in the Data Sciences and An- alytics group, National Security Directorate, Pacific North- west National Laboratory. Her research in social media anal- ysis, rating systems, and social news consumption has been published in the ACM Conference on Hypertext and Social Media, ACM Transactions on Intelligent Systems and Tech- nology, and the ACM Conference on Computer-Supported Cooperative Work and Social Computing. Ellyn Ayton Ellyn Ayton is a Data Scientist at Pacific North- west National Lab. Her work focuses on machine learning and natural language processing, with applications to de- ceptive news detection and social media analytics. Ellyn re- ceived her MS in Computer Science from Western Washing- ton University in 2018. Josh Mendoza Joshua Mendoza is currently a Data Scien- tist in the Data Sciences and Analytics group, National Secu- rity Directorate, Pacific Northwest National Laboratory. His work focuses on deep learning and engineering, with appli- cations in natural language processing and computer vision. Joshua received his bachelors degree with honors in 2015 from the University of Washington. Svitlana Volkova received the Ph.D. degree from Johns Hopkins University, Baltimore, MD, USA, in 2015. She is currently a senior scientist at the Data Sciences and Ana- lytics group, National Security Directorate, Pacific North- west National Laboratory. Her research focuses on advanc- ing machine learning, deep learning and natural language processing techniques to build novel predictive and forecast- ing social media analytics. Her models advance understand- ing, analysis, and effective reasoning about extreme volumes of dynamic, multilingual, and diverse real-world social me- dia data. She was awarded the Google Anita Borg Memorial Scholarship in 2010 and the Fulbright Scholarship in 2008. Dr. Volkova is a Vice Chair of the ACM Future of Comput- ing Academy. References Baly, R.; Karadzhov, G.; Alexandrov, D.; Glass, J.; and Nakov, P. 2018. Predicting factuality of reporting and bias of news media sources. In Proceedings of EMNLP, 3528 -- 3539. Bialik, K., and Matsa, K. E. 2017. Key trends in social and digital news media. Pew Research Center. Glenski, M.; Weninger, T.; and Volkova, S. 2018a. How humans versus bots react to deceptive and trusted news sources: A case study of active users. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 654 -- 661. IEEE. Glenski, M.; Weninger, T.; and Volkova, S. 2018b. Iden- tifying and understanding user reactions to deceptive and trusted social news sources. In Proceedings of the 56th An- nual Meeting of the Association for Computational Linguis- tics (Volume 2: Short Papers), 176 -- 181. Glenski, M.; Weninger, T.; and Volkova, S. 2018c. Propa- gation from deceptive news sources who shares, how much, how evenly, and how quickly? IEEE Transactions on Com- putational Social Systems 5(4):1071 -- 1082. Grinberg, N.; Joseph, K.; Friedland, L.; Swire-Thompson, B.; and Lazer, D. 2019. Fake news on twitter during the 2016 us presidential election. Science 363(6425):374 -- 378. Hadgu, A. T.; Garimella, K.; and Weber, I. 2013. Politi- cal hashtag hijacking in the us. In Proceedings of the 22nd International Conference on World Wide Web, 55 -- 56. ACM. Jolley, D., and Douglas, K. M. 2014. The effects of anti- vaccine conspiracy theories on vaccination intentions. PloS one 9(2):e89177. Kwon, S.; Cha, M.; Jung, K.; Chen, W.; and Wang, Y. 2013. Prominent features of rumor propagation in online social media. In Proceedings of the 13th International Conference on Data Mining (ICDM), 1103 -- 1108. IEEE. Kwon, S.; Cha, M.; and Jung, K. 2017. Rumor detection over varying time windows. PloS One 12(1):e0168344. Matsa, K. E., and Shearer, E. 2018. News use across social media platforms 2018. Pew Research Center. Mitchell, A.; Holcomb, J.; and Barthel, M. 2016. Many americans believe fake news is sowing confusion. Pew Re- search Center. P´erez-Rosas, V., and Mihalcea, R. in open domain deception detection. EMNLP, 1120 -- 1125. Qazvinian, V.; Rosengren, E.; Radev, D. R.; and Mei, Q. 2011. Rumor has it: Identifying misinformation in mi- In Proceedings of the Conference on Empirical croblogs. Methods in Natural Language Processing (EMNLP), 1589 -- 1599. Association for Computational Linguistics. Rashkin, H.; Choi, E.; Jang, J. Y.; Volkova, S.; and Choi, Y. 2017. Truth of varying shades: Analyzing language in In Proceedings of fake news and political fact-checking. the 2017 Conference on Empirical Methods in Natural Lan- guage Processing, 2921 -- 2927. 2015. Experiments In Proceedings of 4https://www.washingtonpost.com/world/ russian-disinformation-campaign-targets-syrias-beleaguered-rescue-workers/ 2018/12/18/113b03c4-02a9-11e9-8186-4ec26a485713 story.html 5https://www.foxnews.com/world/ russian-trolls-ramp-up-disinformation-campaign-after-syria-airstrikes-pentagon 6https://dod.defense.gov/News/Article/Article/1649146/ nato-moves-to-combat-russian-hybrid-warfare/ 7https://www.npr.org/2019/01/26/688868687/ amid-chaos-venezuelans-struggle-to-find-the-truth-online 8https://www.washingtonpost.com/technology/2019/04/22/ sri-lankas-social-media-shutdown-illustrates-global-discontent-with-silicon-valley/ ?utm term=.6166a484a0c7 Rath, B.; Gao, W.; Ma, J.; and Srivastava, J. 2017. From retweet to believability: Utilizing trust to identify rumor spreaders on twitter. Proceedings of the IEEE/ACM Interna- tional Conference on Advances in Social Networks Analysis and Mining (ASONAM). Seymour, B.; Getman, R.; Saraf, A.; Zhang, L. H.; and Kalenderian, E. 2015. When advocacy obscures accuracy online: digital pandemics of public health misinformation through an antifluoride case study. American journal of pub- lic health 105(3):517 -- 523. Starbird, K.; Maddock, J.; Orand, M.; Achterman, P.; and Mason, R. M. 2014. Rumors, false flags, and digital vig- ilantes: Misinformation on twitter after the 2013 boston marathon bombing. iConference 2014 Proceedings. Starbird, K. 2017. Examining the alternative media ecosys- tem through the production of alternative narratives of mass In Proceedings of the 11th shooting events on twitter. International AAAI Conference on Web and Social Media (ICWSM). AAAI. Takahashi, B.; Tandoc, E. C.; and Carmichael, C. 2015. Communicating on twitter during a disaster: An analysis of tweets during typhoon haiyan in the philippines. Computers in Human Behavior 50:392 -- 398. Volkova, S., and Jang, J. Y. 2018. Misleading or falsifica- tion: Inferring deceptive strategies and types in online news and social media. In Proceddings of the Web, 575 -- 583. Volkova, S.; Shaffer, K.; Jang, J. Y.; and Hodas, N. 2017. Separating facts from fiction: Linguistic models to classify In Proceed- suspicious and trusted news posts on twitter. ings of the 55th Annual Meeting of the Association for Com- putational Linguistics (Volume 2: Short Papers), volume 2, 647 -- 653. Volkova, S.; Ayton, E.; Arendt, D.; Huang, Z.; and Hutchin- son, B. 2019. Explaining multimodal deceptive news pre- In Proceedings of the 2019 International diction models. Conference on Web and Social Media. Vosoughi, S.; Roy, D.; and Aral, S. 2018. The spread of true and false news online. Science 359(6380):1146 -- 1151. Wang, W. Y. 2017. "Liar, liar pants on fire": A new bench- In Proceedings of mark dataset for fake news detection. ACL, 422 -- 426. Wu, K.; Yang, S.; and Zhu, K. Q. 2015. False rumors detec- tion on sina weibo by propagation structures. In Proceedings of the 31st International Conference on Data Engineering (ICDE), 651 -- 662. IEEE.
1811.05015
1
1811
2018-11-12T21:56:07
A Team-Formation Algorithm for Faultline Minimization
[ "cs.SI" ]
In recent years, the proliferation of online resumes and the need to evaluate large populations of candidates for on-site and virtual teams have led to a growing interest in automated team-formation. Given a large pool of candidates, the general problem requires the selection of a team of experts to complete a given task. Surprisingly, while ongoing research has studied numerous variations with different constraints, it has overlooked a factor with a well-documented impact on team cohesion and performance: team faultlines. Addressing this gap is challenging, as the available measures for faultlines in existing teams cannot be efficiently applied to faultline optimization. In this work, we meet this challenge with a new measure that can be efficiently used for both faultline measurement and minimization. We then use the measure to solve the problem of automatically partitioning a large population into low-faultline teams. By introducing faultlines to the team-formation literature, our work creates exciting opportunities for algorithmic work on faultline optimization, as well as on work that combines and studies the connection of faultlines with other influential team characteristics.
cs.SI
cs
A Team-Formation Algorithm for Faultline Minimization Sanaz Bahargama, Behzad Golshana, Theodoros Lappasb, Evimaria Terzia aBoston University bStevens Institute of Technology Abstract In recent years, the proliferation of online resumes and the need to evaluate large populations of candidates for on-site and virtual teams have led to a growing interest in automated team-formation. Given a large pool of candidates, the general problem requires the selection of a team of experts to complete a given task. Surprisingly, while ongoing research has studied numerous variations with different constraints, it has overlooked a factor with a well-documented impact on team cohesion and performance: team faultlines. Addressing this gap is challenging, as the available measures for faultlines in existing teams cannot be efficiently applied to faultline optimization. In this work, we meet this challenge with a new measure that can be efficiently used for both faultline measurement and minimization. We then use the measure to solve the problem of automat- ically partitioning a large population into low-faultline teams. By introducing faultlines to the team-formation literature, our work creates exciting opportu- nities for algorithmic work on faultline optimization, as well as on work that combines and studies the connection of faultlines with other influential team characteristics. Keywords: Teams, Team Faultlines, Team Formation Email addresses: [email protected] (Sanaz Bahargam), [email protected] (Behzad Golshan), [email protected] (Theodoros Lappas), [email protected] (Evimaria Terzi) Preprint submitted to Expert Systems With Applications November 14, 2018 1. Introduction The problem of organizing the individuals in a given population into teams emerges in multiple domains. In a business setting, the workforce of a firm is organized in groups, with each group dedicated to a different project (Mohrman et al., 1995). In an educational context, it is common for the instructor to parti- tion the students in her class into small teams, with team members collaborating to complete different types of assignments (Agrawal et al., 2014a, Webb, 1982, Bahargam et al., 2017, Agrawal et al., 2014b). In a government setting, elected officials are organized in committees that design and implement policies for a wide spectrum of critical issues (Fenno, 1973). In recent years, the proliferation of online resumes and the need to evaluate large populations of candidates for on-site and virtual teams have led to a grow- ing interest in automated team-formation (Lappas et al., 2009, Anagnostopoulos et al., 2012a, Golshan et al., 2014, Anagnostopoulos et al., 2012b, Kargar and An, 2011, An et al., 2013, Dorn and Dustdar, 2010, Gajewar and Sarma, 2012, Li and Shan, 2010, Sozio and Gionis, 2010, Agrawal et al., 2014a, Bahargam et al., 2015). Given a large pool of candidates, the general problem requires the selec- tion of a team of experts to complete a given task. The ongoing literature has studied numerous problem variations with different constraints and optimiza- tion criteria. Examples include the coverage of all the skills required to achieve a set of goals (Lappas et al., 2009, Li and Shan, 2010, Gajewar and Sarma, 2012), smooth communication among the members of the team (Rangapuram et al., 2013, Anagnostopoulos et al., 2012a, Lappas et al., 2009, Kargar et al., 2012), the minimization of the cost of recruiting promising candidates (Golshan et al., 2014, Kargar et al., 2012), scheduling constraints (Durfee et al., 2014), the balancing of the workload assigned to each member (Anagnostopoulos et al., 2012b), and the need for effective leadership (Kargar and An, 2011). Surprisingly, while ongoing research on team formation has studied nu- merous variations with different constraints, it has overlooked a factor with a well-documented impact on a team cohesion and performance: team fault- 2 lines. The faultline concept was introduced in the seminal work by Lau and Murnighan (Lau and Murnighan, 1998). Faultlines manifest as hypothetical di- viding lines that split a group into relatively homogeneous subgroups based on multiple attributes (Lau and Murnighan, 1998, Meyer and Glenz, 2013). The consideration of multiple attributes is critical, as it distinguishes relevant work from the study on single-attribute faultlines, referred to as a "separation" (Har- rison and Klein, 2007). The team-formation framework that we describe in this work focused on the general multi-attribute paradigm. Faultline-caused sub- groups are in risk of colliding, leading to costly conflicts, poor communication, and disintegration (Bezrukova et al., 2009, Choi and Sy, 2010, Gratton et al., 2011, Jehn and Bezrukova, 2010, Li and Hambrick, 2005, Molleman, 2005, Polzer et al., 2006, Shaw, 2004, Thatcher et al., 2003). Bridging the faultline literature with automated team-formation is challeng- ing, as the available measures for faultlines in existing teams cannot be efficiently used for faultline optimization. For instance, many faultline measures utilize clustering algorithms to identify the large homogenous groups that create fault- lines within a team (Meyer et al., 2014, Jehn and Bezrukova, 2010, Meyer and Glenz, 2013, Barkema and Shvyrkov, 2007, Lawrence and Zyphur, 2011). While such measures have emerged as the state-of-the-art, their clustering step requires a pre-existing team. Therefore, in a team-formation setting, a clustering-based measure would need to naively consider all (or an exponential number) of pos- sible teams in order to find a faultline-minimizing solution. This brute-force approach is not applicable to even moderately-sized populations. Similarly, we cannot use any of the existing measures based on expensive (and often expo- nential) computations to identify the subgroups within a team (Thatcher et al., 2003, Zanutto et al., 2011, Bezrukova et al., 2009, Trezzini, 2008, Shaw, 2004, Van Knippenberg et al., 2011). In this work, we describe the fundamental efficiency principles that a faultline measure needs to follow in order to be applicable to the automated formation of faultline-minimizing teams. We then introduce Conflict Triangles (CT): a new measure that follows these principles. The CT measure is consistent with the 3 principles of faultline theory (Lau and Murnighan, 1998) and is founded on the extensive work on the balance of social structures (Cartwright and Harary, 1956, Easley and Kleinberg, 2010, Heider, 1958, Morrissette and Jahnke, 1967). We then use this measure as the objective function for the problem of partitioning a given population into teams, such that the average faultline score per team is minimized. We refer to this as the Faultline-Partitioning problem and formally define it in Section 4. Our work thus makes the following contributions: 1. We initiate research on the unexplored overlap between the decades of work on team faultlines and the rapidly emerging field of automated team formation. 2. We describe the fundamental efficiency principles that a faultline measure has to satisfy to be applicable to faultline-aware team-formation. 3. We present a new measure that follows these principles can thus be used for both faultline measurement and minimization. Our evaluation demon- strates the measure's effectiveness in both tasks. 4. We formally define the Faultline-Partitioning problem, analyze its complexity, and present an efficient algorithmic framework for its solution. By introducing faultlines to automated team-formation, our work creates exciting opportunities for algorithmic work on faultline optimization, as well as on work that combines and studies the connection of faultlines with other influential team characteristics. In Section 8, we discuss the implications of our work for practitioners in both organizational and educational settings and discuss potential directions for future work. 2. Background and Motivation To the best of our knowledge, our work is the first to incorporate faultlines in an algorithmic framework for automated team-formation. However, our work is related to three types of research: (i) algorithmic frameworks for optimizing various factors that affect the performance of a team. (ii) management, psy- chology and sociology studies on faultlines and their effects on team outcomes, 4 and (iii) efforts measure faultlines in existing teams. Next, we discuss each of these categories in more detail. 2.1. Algorithmic work on team formation Our previous work (Lappas et al., 2009) studied the problem of automated team-formation in the context of social networks. Given a pool of experts and a set of skills that needed to be covered, the goal there is to select a team of experts that can collectively cover all the required skills, while ensuring efficient intra-team communication. Over the last years, this work has been extended to identify a single team or a collection of teams that optimize different fac- tors that influence a team's performance. For example, a significant body of work has focused on incorporating different definitions of the communication cost among experts (Anagnostopoulos et al., 2012a, An et al., 2013, Dorn and Dustdar, 2010, Gajewar and Sarma, 2012, Kargar and An, 2011, Li and Shan, 2010, Sozio and Gionis, 2010, Galbrun et al., 2017). Other work has also fo- cused on optimizing the cost of recruiting promising candidates (Golshan et al., 2014, An et al., 2013), minimizing the workload assigned to each individual team member (Anagnostopoulos et al., 2012b, 2010), satisfying scheduling con- straints (Durfee et al., 2014), identifying effective leaders (Kargar and An, 2011), and optimizing the individual's benefit from team participation (Agrawal et al., 2014a, Bahargam et al., 2015). Although all these efforts focus on optimizing various teams aspects, the work that we describe in this paper is the first to address faultline optimization. As we describe in our work, minimizing faultline potential raises new algorithmic challenges that cannot be addressed by extant algorithmic solutions. 2.2. Studies on the effects of team faultlines For decades, researchers from various disciplines have studied the creation, operation, and performance of teams in different settings. Faultline theory was introduced by Lau and Murnighan (Lau and Murnighan, 1998). It has since 5 been the focus of numerous follow-up works. A number of papers have stud- ied how the existence of faultlines within a team can lead to conflict (Li and Hambrick, 2005, Choi and Sy, 2010, Thatcher et al., 2003) and affect function- ality (Molleman, 2005, Polzer et al., 2006) and performance (Bezrukova et al., 2009, Thatcher et al., 2003). Motivated by the observation that the existence of faultlines does not guarantee the formation of colliding subgroups, researchers have also studied the factors that can lead to faultline activation (Pearsall et al., 2008, Jehn and Bezrukova, 2010). Further, Gratton et al. (Gratton et al., 2011) explored strategies that a leader or manager can follow to effectively handle or avoid the emergence of faultlines within a team. 2.3. Operationalizing Faultline Strength Previous work has suggested various methods for evaluating faultlines in teams. Even though the original faultline paper by (Lau and Murnighan, 1998) serves as the foundation of the long line of relevant literature and introduces principles that we also adopt in our work, it does not define a faultline measure. Instead, the authors lay out fundamental principles that a measure needs to follow in order to accurately evaluate the faultline strength in a given team. While these principles are appropriate for faultline measurement, they are not sufficient to ensure that a qualifying measure will also have the computational efficiency required to serve as the objective function of a scalable algorithm that has to process large populations of candidates to create teams with minimal faultlines. Computational efficiency is critical in this setting, as each of the hundreds or thousands of individuals in the given population can be represented by a point in a multidimensional space of attributes (e.g. demographics, resume information). Any team-formation algorithm would then have to efficiently navigate this space and quickly evaluate the faultline strength of many different combinations in order to identify faultline-minimizing teams. Therefore, in order to be efficiently applicable to faultline minimization, a faultline measure should follow the following two efficiency principles: 6 • Linear Computation: The measure should be easy to compute for a given team in polynomial time. • Constant Updates: The measure should be easy to update in constant time if one person joins or leaves the team. In Section 3, we introduce Conflict Triangles (CT): a new measure that pro- vides these two characteristics. The CT measure is consistent with the principles of faultline theory (Lau and Murnighan, 1998) and is founded on the extensive work on the balance of social structures (Cartwright and Harary, 1956, Easley and Kleinberg, 2010, Heider, 1958, Morrissette and Jahnke, 1967). Next, we review the extensive literature on faultline measurement and discuss the short- comings of extant measures in the context of the two efficiency principles that are necessary for automated team-formation. 2.3.1. State of the Art in Faultline measurement A long line of literature has focused on identifying and measuring the strength of faultlines in existing teams. In recent years, clustering-based algorithms have emerged as the state of the art for this purpose (Meyer et al., 2014, Jehn and Bezrukova, 2010, Meyer and Glenz, 2013, Barkema and Shvyrkov, 2007, Lawrence and Zyphur, 2011). This line of work is exemplified by the 3-step Av- erage Silhouette Width (ASW) approach proposed by (Meyer and Glenz, 2013). Given a team of individuals, the first step includes applying an agglomerative- clustering algorithm for pre-clustering the team's members. Agglomerative clus- tering begins by assigning each member to its own cluster. The two most similar clusters are then iteratively joined until all points belong to the same cluster. The authors of the original paper experiment with the two most popular merg- ing criteria: Ward's algorithm and Average Linkage (AL). Thus, for a team with n members, the joint set of results from the two alternatives yields a total of 2 × n possible configurations (2 for each possible number of clusters). The second step focuses on computing the ASW of each possible configura- tion (Rousseeuw, 1987). The silhouette s(i) of an individual i quantifies how 7 well a team member i fits into its cluster in comparison to all other clusters and is formally defined as: s(i) = bi − αi max(αi, bi) , where ai is the average distance of i to all other point in its cluster and bi is the lowest average distance of i to all points in any other cluster of which i is not a member. The silhouette ranges from −1 to +1, where a high value indicates that the object is well matched to its own cluster and poorly matched to others. The ASW is the average silhouette of all the team's members. The third step employs a post-processing method to maximize the ASW of each configuration, by temporarily moving individuals across subgroups and recomputing the ASW after each move. The move that leads to the highest in- crease is made permanent. The process continues until no further improvement is possible. Finally, the maximum ASW score over all configurations is reported as the strength of the team's faultline structure. Using ASW in automated team-formation: Previous work has repeatedly verified the advantage of the ASW measure over alternative approaches (Meyer et al., 2014, Meyer and Glenz, 2013). However, the measure cannot be efficiently used as the objective function for team-formation algorithms, as it is designed to evaluate faultline strength in existing teams and assumes that the composition of a team is part of the input. As stated earlier in this section, an appropriate measure for faultline minimization should be easy to compute in linear time and easy to update in constant time. However, Given a team of n individuals, the complexity of the agglomerative-clustering step alone is O(n2logn) (Rokach and Maimon, 2005). There is then no guarantee on the number of reassignments that it will take for the ASW score to converge. In addition, the score cannot be updated in constant time. Instead, the deletion or addition of a member would require the new team to be re-evaluated from scratch, in order to compute the optimal ASW score. In theory, a practitioner could consider all possible teams, evaluate their re- spective faultline strengths, and choose the optimum. In practice, however, this 8 brute-force approach is not scalable and can only be applied to populations of trivial size. It can certainly not be applied to populations of hundreds or thou- sands of individuals, which are common in the team-formation literature (Lap- pas et al., 2009, Anagnostopoulos et al., 2012a, 2010). The team-partitioning task that we address in this work is considerably more computationally challeng- ing than single-team formation. In order to use the ASW measure for this task, a practitioner would have to consider all possible partitionings of a population into fixed-size, non-overlapping teams. This is a computationally intractable process that would have to consider O(N !) alternatives. Similar to the ASW measure, other clustering-based approaches are also excluded from automated team-formation due to computational efficiency (Barkema and Shvyrkov, 2007, Lawrence and Zyphur, 2011). 2.3.2. Other Faultline Measures Similar to clustering-based approaches, most existing faultline measures are not applicable to team-formation tasks due to computational efficiency. For instance, the cost to compute the Index of Polarized Multi-Dimensional Di- versity proposed by (Trezzini, 2008) grows exponentially with the number of attributes. The SGA measure by (Carton and Cummings, 2013) depends on the exhaustive evaluation of every possible partition of a given group with two or more subgroups. Similarly, the FLS measure by (Shaw, 2004) depends on the computation and averaging of all possible internal alignments and cross-product alignments of every feature with respect to the subgroups of every other fea- ture. Given that each of these constructs has to be updated every time a person is added to or removed from a team, the FLS formula cannot be updated in constant time. The measure proposed by (Van Knippenberg et al., 2011) uses regression analysis to measure the variance of each attribute that is explained by all other attributes. Despite its advantages in a measurement setting, run- ning multiple regressions for every candidate team is not a realistic option in a team-formation setting. 9 (Thatcher et al., 2003) propose a formula for computing the portion of the total variance explained by a given segmentation of a team into subgroups. Their final faultline measure F aug is then defined as the score of the segmentation that maximizes the formula. However, the measure can only be applied for segmentations of two subgroups due to (i) the exhaustive nature of the search for the best split that makes the cost prohibitive in a team-formation setting, and (ii) the fact that, if we allow the number of subgroups to vary arbitrarily, the solution that maximizes the formula is to trivially assign each individual to its own subgroup. Hence, an algorithm that uses this measure to create low- faultline teams would never choose to create highly diverse teams, despite the fact that high diversity is associated with low faultlines (Lau and Murnighan, 1998). These limitations are inherited by follow up efforts that extend this measure (Zanutto et al., 2011, Bezrukova et al., 2009). The measure by (Li and Hambrick, 2005) assumes a specific attribute of interest and is not suitable for evaluating team faultlines across attributes. This is also the reason that the measure has been excluded by comparative studies of faultline measures (Meyer and Glenz, 2013). Another relevant construct is the Subgroup Strength measure proposed by (Gib- son and Vermeulen, 2003). While this measure is not designed for faultline measurement, it is relevant due to its focus on subgroups. Its creators posit that strong subgroups exist if there is high variability in the extent to which attributes overlap in the dyads within a team. Their measure is thus based on computing the pairwise similarities between the team's members across all attributes. The team's subgroup strength is then computed as the standard deviation over all possible member pairs. Even though this measure is not specifically designed for faultline measurement, it is easy to compute and to update, as required by the team-formation paradigm. Hence, we include this measure in our experimental evaluation in Section 5. 10 (a) (b) (c) Figure 1: Triangles associated with the country of origin, gender, and educational background. 3. Operationalizing a Team's Faultline Potential We consider a pool W of n individual workers. Each worker i ∈ W is associated with an m-dimensional feature vector wi, such that wi(f ) returns the value of feature f for worker i. For each feature f , we create a complete signed graph Gf that includes one node for each worker in W . The sign of the edge between two nodes (workers) (i, i(cid:48)) is positive if they have the same value for feature f (i.e. wi(f ) = wi(cid:48)(f ) ) and negative otherwise. Consider the following example: Example 1. We are given a pool of 3 workers, where each worker is described by 3 features: country of origin, gender, and undergraduate major. Our data thus consists of the following feature vectors: w1 = [India, Male, Computer Science] w2 = [India, Male, Business] w3 = [China, Male, Chemistry] Fig 1 shows the graphs for the three features. A long line of relevant literature has established the use of triangles to model social structures (Cartwright and Harary, 1956, Easley and Kleinberg, 2010, Heider, 1958, Morrissette and Jahnke, 1967). In our own setting, the triangle 11 represents the fundamental building block of our faultline measure, as any struc- ture that includes more members (e.g. a rectangle) can be trivially modeled via (or broken down to) triangles. The figure reveals the existence of 3 possible types of triangles among the members of the team, according to the signs on their edges: (+, +, +), (−,−,−), and (−,−, +). By definition, (+, +,−) trian- gles cannot exist as they would imply that 2 individuals have the same value as the third one but not the same as each other. We observe that faultlines can only appear in the presence of (+,−,−) triangles that consist of one positive and two negative edges, such as the one for the country of origin feature shown in Fig 1(a). Given that faultlines can only emerge in the presence of (+,−,−) triangles, we refer to these as Conflict Triangles. A conflict triangle captures the intuition that two people from the same country are more likely to interact with each other than to the third person, thus enabling the creation of a potential faultline. On the other hand, A faultline could never occur for the gender feature (Fig 1(b)), as all three authors have the same value (Male). Similarly, since all three authors have a different value for the undergraduate major feature (Fig 1(c)), there is no faultline potential. This is consistent with faultline theory, which states that faultlines cannot emerge in the presence of perfect homogeneity or perfect diversity (Lau and Murnighan, 1998, Gratton et al., 2011). (a) High faultline po- tential (b) No faultline poten- tial (c) No faultline poten- tial Figure 2: Examples of teams with high and low faultline potential. The ability of triadic relationships to capture the perfect homogeneity/diversity principles that are mandated by faultline theory maintaints its usefulenes in a 12 MMMMFFFF team-formation setting. Consider the example in Figure 2a. The team in the figure represents the worst-case scenario in terms of faultline potential for the gender feature: a 50-50 split between two large homogeneous groups of males (M) and females (F). Figure 2b shows an example of a team with no faultline potential for gender, as it consists exclusively of female members. Even though increased homogeneity is indeed one of the ways to reduce faultline potential, it is wrong to equate diversity with the emergence of faultlines. We demonstrate this in Figure 2c. All the members of the teams in this figure have different values with respect to the feature country of origin. We observe that, as in cases of perfect homogeneity, faultlines cannot exist in the presence of perfect diversity. This observation reveals that the task of measuring a team's faultlines goes beyond simply measuring its diversity with respect to different features. Similarly, a team formation algorithm has to carefully balance the two states of homogeneity and diversity within a team in order to achieve a low potential for faultlines. 3.1. Feature Alignment: The next essential step toward the design of a triangle-based faultline mea- sure is the consideration of the alignment of conflict triangles across multiple features (Meyer and Glenz, 2013). Consider three individuals (i, j, k) defined within a space of features FT . Given a feature f ∈ FT , let τ =< (i, j), k > be a conflict triangle such that wi(f ) = wj(f ) and wi(f ), wj(f ) (cid:54)= wk(f ). Let iscon(τ, f ) be a function that returns 1 if τ is a conflict triangle for f and 0 otherwise. If the same conflict triangle emerges for a second feature f(cid:48), we say that τ is aligned across the two features f and f(cid:48) (i.e. iscon(τ, f ) = iscon(τ, f(cid:48)) = 1). Let p(τ, T ) return the percentage of all available features of team T for which τ is aligned (i.e. for which τ appears as a conflict triangle). Formally: p(τ, T ) = {f ∈ FT : iscon(τ, f ) = 1} FT 13 We say that a triangle τ from team T is fully aligned if it is aligned across all team features (i.e. p(τ, T ) = 1). Then, we define the faultline potential of a given team T as follows: (cid:88) τ∈DT CT (T ) = p(τ, T ) (1) where DT is the set of all distinct conflict triangles < (i, j), k > that appear across any of the features in T . Our measure has a probabilistic interpretation, as it encodes the expected number of successes (conflict triangles) that we would get after DT Bernoulli trials, where each trial corresponds to a different τ ∈ DT and has a success probability equal to p(τ, T ). The trial for conflict triangle τ involves sampling )(uniformly at random) a feature f from FT and is successful if τ is a conflict triangle for f . Hence, a perfectly aligned triangle would succeed for any sampled feature and would increment the team's score by 1. Similarly, the trial for a triangle τ that is aligned over half of the team's features would have a 50% of success and would increment the team's score by 0.5. The penalty that Eq. (1) assigns to each conflict triangle in the team is directly proportional to the triangle's alignment across the team's features. Under this definition, the minimum faultline potential is assigned to per- fectly homogeneous or perfectly diverse teams, as they both include zero con- flict triangles. On the other hand, in accordance with faultline theory (Lau and Murnighan, 1998), the maximum faultline potential is assigned to teams that can be split into two perfectly homogeneous subgroups of equal size. Learning the appropriate penalization scheme from real data: The definition given in Equation 1 intuitively applies, for each conflict triangle, a penalty that is directly proportional to the triangle's alignment across the team's features. We thus expect it to be a reasonable modeling choice for many do- mains. However, in practice, this penalization scheme may not be appropriate for a specific domain or application. Therefore, we extend our framework via by describing a methodology that allows practitioners to learn the appropriate penalization on function for their domain, based on information from existing 14 teams in the same domain. We present the details of our technique for learning the penalization parameters in Section 6. 3.2. Efficiently computing a team's faultline potential The computation requires us to count the total number of conflict triangles across all features. Thus, for T ⊆ W , CT (T ) can be computed in polynomial time. For this, one has to consider all triangles appearing in the feature graphs and count how many of those are conflict triangles. The running time of the naive computation is O(mT3) where T is the size of the team and m is the number of features. Next, we present a method for significantly speeding up this computation. Given a set of workers T ⊆ W , and a feature f that takes values v1, . . . , vL, we summarize the values of f observed among the workers in T via the aggregate feature vector r(T, f ) such that r(T, f )[vj] gives the number of workers in T that have a value equal to vj. We observe that these aggregate vectors can be computed in O(mT) time by simply counting all feature values of all workers. Once the aggregate feature values have been computed, the faultline potential for each feature f that takes values v1, . . . , vL can be written as follows: (T − r(T, f )[vj]) (2) N(cid:88) (cid:18)r(T, f )[vj] (cid:19) CT (T, f ) = j=1 2 We observe that, for any feature f with L different possible values, the faultline potential with respect to f can be computed in O(L) time using the above equation. Thus, the overall faultline potential CT (T ) can be computed in O(mL). Given that both the number of features m and the number of possible values for each feature L are usually small constants, this computational cost is negligible compared to the time required to create the aggregate feature values. The use of the aggregate feature vectors also allows us to update the score in constant time, as required by the second efficiency principle of faultline-aware team-formation. Specifically, if an individual i joins or leaves the team, we only need to update (in O(m)) the number of conflict triangles that are due to the 15 aggregate counts that change due to the addition or removal of i. 4. The Faultline-Partitioning Problem In this section, we formally define the Faultline-Partitioning problem, i.e., the problem of partitioning a set of workers W into (cid:96) teams of equal size such that the total faultline potential score across teams is minimized. We show that this problem is not only NP-hard to solve, but also NP-hard to approximate within any bounded approximation factor, unless P = NP. Then, in Section 4.1, we present an efficient heuristic algorithm for its solution. First, we extend the notion of faultline potential to a collection of teams. For any partitioning T = {T1, T2,··· , T(cid:96)} of workers into (cid:96) teams, we use CT (T) to denote the total faultline potential of all teams in T. Formally: (cid:96)(cid:88) CT (T) = CT (Ti). (3) i=1 We can thus define the Faultline-Partitioning problem as follows: Problem 1 (Faultline-Partitioning). Given a pool of workers W (with W = (cid:96) × k), find a partitioning T = {T1, T2,··· , T(cid:96)} of the workers W into (cid:96) teams of size k such that CT (T) is minimized. Next, we proceed to analyze the hardness of the Faultline-Partitioning problem. Our results apply for the more general problem of partitioning a population into teams with specific but possibly different sizes. Theorem 1. The Faultline-Partitioning problem is NP-hard to solve. Theorem 1 implies that the Faultline-Partitioning problem cannot be optimally solved in polynomial time unless N P = P . Next, we provide a formal proof of this theorem. Proof. We present a polynomial-time reduction from the NP-Complete k-Clique Partitioning problem to our Faultline-Partitioning problem (Gary and 16 Johnson, 1979, Rosgen and Stewart, 2007). The k-Clique Partitioning is a decision problem which asks the following question: Given a graph H = (V, X), is it possible to partition the nodes of the graph into disjoint cliques of size k? Given a graph H = (V, X) (with V nodes and X edges), we first create the complement of H denoted by H(cid:48) = (V, X(cid:48)). Clearly, any clique of size k in the original graph H corresponds to a set of k nodes with no edges among them in H(cid:48). For our reduction, every node i ∈ V will correspond to a worker for our problem. Also, we will interpret each edge in H(cid:48) as an agreement ("+") and each missing edge as a disagreement ("-"). Then, for every edge (i, i(cid:48)) in H(cid:48), we create a feature f(i,i(cid:48)) and then construct the corresponding feature graph Gf(i,i(cid:48) ) that contains one positive edge connecting nodes i and i(cid:48), while all other edges, connecting all pairs of nodes, are negative. Fig 3 shows how an example graph H with three edges is transformed into three feature graphs. (cid:98)H (in gray) and its Figure 3: Faultline-Partitioning problem Graph feature graphs for the corresponding Now consider the optimal solution to this instance of the Faultline-Partitioning problem. Since the size of each team is fixed (k), it is easy to see that each edge of H(cid:48) that falls within one team creates (k − 2) conflict triangles. This implies that the optimal solution is the one that minimizes the total number of edges that fall within the partitions. More specifically, the optimal solution has a faultline potential equal to zero if and only if there exists a partitioning of the 17 21432143-----+2143-+----2143+----- nodes in H(cid:48) with no edge inside the partitions which further corresponds to a partitioning of the nodes in H into cliques. Corollary 1. The Faultline-Partitioning problem is NP-hard to approxi- mate within any factor. Proof. We will prove the hardness of approximation of Faultline-Partitioning by contradiction. Assume that there exists an α-approximation algorithm for (cid:96) } is the the Faultline-Partitioning problem. Then if T∗ = {T ∗ partitioning with lowest faultline potential and TA = {T A (cid:96) } is the solution output by this approximation algorithm, it will hold that CT (TA) ≤ αCT (T∗). If such an approximation algorithm exists, then this algorithm can be used to decide the instances of the k-Clique Partitioning problem, for 2 ,··· , T ∗ 2 ,··· , T A 1 , T ∗ 1 , T A which the optimal solution has a faultline potential equal to 0. However, this contradicts the proof of Theorem 1, which indicates that these problems are also NP-hard. Thus, such an approximation algorithm does not exist. 4.1. The FaultlineSplitter algorithm In this section, we present an algorithm for the Faultline-Partitioning problem. We refer to the algorithm as FaultlineSplitter and provide the pseudocode in Algorithm 1. The Python implementation of the algorithm is available online 1. The algorithm starts with a random partitioning of the input population into (cid:96) equal-size groups and then reassigns individuals to teams in an iterative fashion until the faultline potential of the obtained partitions does not improve across iterations. In each iteration, the algorithm starts with a partitioning of the set W into (cid:96) groups and forms a new assignment with (ideally) a lower faultline potential score. This is done by executing two functions: AssignCosts and ReassignTeams. The AssignCosts function returns a cost associated with the 1https://github.com/sanazb/Faultline 18 Algorithm 1 The FaultlineSplitter algorithm. Input: Set of workers W with m features and the number of desired parti- tions (cid:96). Output: Partitioning T = {T1, T2, . . . , T(cid:96)} 1: Randomly partition W into T = {T1, . . . , T(cid:96)} 2: while CT (T) has not converged do 3: 4: 5: return T c = AssignCosts (W, T) T = ReassignTeams(T, c) assignment of every individual to every team; i.e., c(i, Tj) is the cost of assigning individual i into team Tj. These costs are used by ReassignTeams to produce a new assignment of individuals to teams -- always guaranteeing that the teams are of equal size. Next, we describe the details of these the two main routines of FaultlineSplitter. The AssignCosts routine: This routine, assigns to every worker i and team Tj cost c(i, Tj), which is the cost of assigning worker i to team Tj. In order to compute these costs, AssignCosts considers the current teams in T as a baseline to evaluate if the assignment of worker i to team Tj can lead to fewer conflict triangles. Thus, an intuitive definition of cost is the number of conflict triangles that i incurs when he joins Tj. This is equal to CT (Tj ∪ {i}) if i (cid:54)∈ Tj and CT (Tj) if i ∈ Tj. We observe that, if worker i already belongs to team Tj, the reassignment is not going to change the size of the resulting team. However, if i (cid:54)∈ Tj the assigning i to Tj creates a team of size (k + 1). This is problematic, since the number of conflict triangles in teams of size k is not comparable to that in teams of size (k + 1). This can be resolved by introducing a normalization factor which measures the maximum possible number of conflict triangles in a team of a fixed size. Formally, for a team of size k, we use ∆k to denote the maximum possible number of conflict triangles that can emerge in the team across all features. 19 Now, we compute the cost function as follows: CT (Tj ∪ {i})/∆k CT (Tj)/∆k+1 c(i, Tj) = if i (cid:54)∈ Tj if i ∈ Tj (4) Running time: Note that computing all three cost functions can be done in O(mW) using the aggregate feature vectors as discussed in Section 3.2. The ReassignTeams routine: ReassignTeams takes as input a current a cost of assigning each one of the n individuals into each one of the (cid:96) teams and outputs a new partition of the individuals into (cid:96) equal-size groups. The algorithm, views this partitioning problem as a minimum weight b-matching problem (Burkard et al., 2012) in a bipartite graph, where the nodes on the one side correspond to n individuals and the nodes on the other side correspond to (cid:96) teams. In this graph, there is an edge between every individual i and team Tj. The weight/cost of this edge is, for example, c(i, Tj) -- computed as described above. Finding a good partition then translates into picking a subset of the edges of the bipartite graph, such that the selected edges have a minimum weight sum, every individual in the subgraph defined by the selected edges has degree 1, and each team has degree k. This would mean that every worker is assigned to exactly one cluster and every cluster has exactly k members. This is a classical b-matching problem that can be solved in polynomial time using the Hungarian algorithm (Burkard et al., 2012, Kuhn, 1955). Variable-size partitioning: It is important to point out that our algorithm can be easily modified to partition a population into teams of fixed but possibly different sizes. The ReassignTeams routine in our algorithm computes a new assignment of individuals to teams by solving a minimum weight b-matching problem in a bipartite graph where nodes on the right represent individuals and nodes on the left represent the available spots/positions in each team. This setup gives us the flexibility to choose the number of available spots in each team. In fact, this is how the algorithm enforces equal-size teams in our current implementation. 20 Computational speedups: Computing the new partition using the Hungar- ian algorithm, requires O(n3) time. This is a computationally expensive op- eration, especially since this step needs to be completed in each iteration of FaultlineSplitter. In order to avoid this computational cost, we solve the bipartite b-matching problem approximately using a greedy heuristic that works as follows: in each iteration the edge (i, Tj) with the lowest cost c(i, Tj) is se- lected, and worker i is assigned to the j-th team Tj; this assignment only takes place if: 1) worker i is not assigned to any team in an earlier iteration, and 2) the j-th team has less than k workers so far (i.e., if it has not reached the desired team size). This is repeated until all the workers are assigned to a team. To find the minimum cost edge in each iteration we need to sort all edges with respect to their costs and then traverse them in this order. Since there are O(n(cid:96)) edges, the running time of this greedy alternative is O(n(cid:96) log(n(cid:96))) per iteration. 5. Experiments In this section, we describe the experiments that we performed to evaluate our methodology. 5.1. Datasets Adult: The Adult dataset is a census dataset from UCI's machine learning reposi- tory. It contains information on 32, 561 individuals; the features in the data are age, work class, education, marital status, occupation, relationship, race, sex, capital-gain, capital-loss, hours-per-week, and native country 2. We convert non-categorical features to categorical features as follows: for age and hours- per-week we bin their values into buckets of size 10. Also, we convert both capital-gain and capital-loss into binary features depending whether their value is equal to zero or not. 2https://archive.ics.uci.edu/ml/datasets/Adult 21 Census: The Census dataset is extracted from the US government's "Current Population Survey" 3. We focused on the most recent collected data from the year 2014. Our dataset contains census information on 200, 469 individuals. The dataset includes the following features: marital status, gender, education, race, country, citizen, and army. DBLP: The DBLP dataset is created by using the latest snapshot of the DBLP website and filtering only authors that published papers on tier-1 and tier-2 computer science (NLP, IR, DM, DB, AI, Theory, Networks) conferences and journals 4. Although the only known attribute in the raw dataset is the country of origin, we extracted the following features for each of the 57, 972 authors, based on their publications: number of years active, primary area of focus (based on number of publications),average number of publications in ten years, and total number of publications. We also computed a quality feature for each author, by giving her 2 points for each paper published in a top-tier conference and 1 point for all other papers. We bin both the total number of publications and the average number of publications into buckets of size 10, and bin the quality score into buckets of size 5. BIA660: This dataset is collected from entry surveys taken by all students who take the Analytics course offered by one of the authors of this paper. The data was collected during 6 different semesters and includes data from 502 graduate students. It consists of 85 teams, with an average of 5.9 students per team. For each student, the dataset includes the major of the degree they were pursuing at the time of the data collection, the major of their bachelor's degree, gender, country, and a self-assessment of her level with respect to machine learning, analytics, programming, and experience with team projects. The assessments are given on a scale from 0 (no experience) to 3 (very experienced). For each team, we also have its performance (on a scale of 0 to 100) on a collaborative, 3http://thedataweb.rm.census.gov/ftp/cps_ftp.html 4http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html 22 semester-long project that accounts for 70% of the entire grade, as well as the average satisfaction level (on a scale of 0 to 7) of the team's members with the way the team operated. For each team we computed tension (bad triangles) for each team across all features. Synthetic-1: In order to control the number of conflict triangles in our data, we have developed a method to create synthetic datasets given a target percentage of conflict triangles. First, we assume that our pool of workers W is going to consist of a single feature which can only take 3 different values X, Y , and Z. Let's define x, y, z to be the number of data points with these values respectively. Now, it is clear that N (W ) = x × y × z. On the other hand, given that total number of workers is n we have x + y + z = n. Note that if the value of x is given, we can use these equations to compute the value of y and z as well. To create our datasets, we try different values of x and then we solve for variables y and z. Then, we randomly partition workers into three groups of size x, y, and z and assign the value X, Y , and Z to them respectively. Synthetic-2: In order to compare different faultline measures -- ASW, Subgroup Strength (SS), and our CT measure -- we generate a dataset as follows. We con- sider three features: Race (Asian, White, Black, Native American), Country (USA, China, England, France), and Education (High-school, Undergraduate, Graduate). Then, given a team size T S and a number of subgroups SN , we gen- erate 100 teams that include T S individuals divided into SN completely homo- geneous subgroups. Within each subgroup, all individuals have the same value for each feature F . This value V is selected with a probability that is inversely proportional to the number of subgroups in the team that has already been as- signed V for this feature. This process allows us to create perfectly homogenous groups that are highly dissimilar from each other. We repeat the process for T S ∈ {4, 8, 16, 32, 64}. Given a value for T S, we start with SN = 1 (a perfectly homogeneous team) and double the value until SN = T S (one individual per subgroup). For instance, for T S = 16, we consider SN ∈ {1, 2, 4, 8, 16}. This process generates a total of 3100 teams. Controlling the number of perfectly 23 Table 1: Statistics for the real datasets. Dataset Size Features % of conflict triangles DBLP Adult Census DBLP-Aug BIA660 Synthetic-1 57,972 32,561 200,469 155 502 400 6 12 7 9 8 8 35% 41% 44% 47% 62% 8% homogenous subgroups allows us to control diversity and simulate multiple sce- narios of conflict between different types of subgroups within the team. Discussion: Table 1 shows some basic statistics for our datasets. As mentioned earlier, the Synthetic-1 dataset allows us to tune the percentage of different types of triangles. The synthetic instance reported in Table 1 corresponds to a dataset of size 400 with 8 features where we set the percentage of negative and positive triangles to 8% and 25% respectively. Fig 4 illustrates the Cramer's V values for all pairs of features in all datasets. Cramer's V value is a standard measure the correlation between two categorical variables (Cram´er, 2016). It has a value of 1 when two variables are perfectly correlated and 0 if there is absolutely no correlation. The figure illustrates that Adult and Census are similar in terms of feature correlation. Specifically, we observe a small correlation for the majority of the features and only a couple of them with high correlations. On the other hand, DBLP exhibits significantly higher correlation patterns. 5.2. Evaluation on the Faultline-Partitioning problem In this section, we evaluate the performance of our algorithms for the Faultline-Partitioning problem. Baselines: We compare our FaultlineSplitter algorithm with two baselines: Greedy and Clustering. The Greedy algorithm takes an iterative approach that creates a single team in each iteration and thus it requires (cid:96) iterations to create all (cid:96) teams. Each team is constructed as follows. First, the algorithm selects two random workers. It then continues by greedily adding the worker that 24 (a) DBLP (b) Adult (c) Census (d) Synthetic-1 (e) BIA660 (f) DBLP-Aug Figure 4: The Cramer's V values for all pairs of features for all datasets. minimizes the faultline score of the team. Once the size of team reaches k, the algorithm removes the selected members from the pool of experts and moves on to build the next team. Finally, Clustering is a clustering algorithm that tries to create equal-size partitions such that the number of positive (negative) edges within the teams is maximized (minimized) (Malinen and Franti, 2014). Evaluation metric: for every algorithm, we measure its performance via the faultline potential of the set of teams that it creates, as per Equation 3. Be- cause some of our comparisons require plotting results obtained from datasets of different sizes in the same figure, we apply the following dataset-specific normal- ization. For a dataset of size n, we divide the faultline potential of a partitioning obtained for this dataset with the the total number of triangles that can be en- countered in datasets of this size, i.e., (cid:0)n (cid:1). Thus, the y-axis of all our plots is 3 in [0, 1]. 5.2.1. Varying the population size For each dataset, we randomly select, with replacement, 100 sets of n in- dividuals, for n ∈ {100, 200, 400, 800, 1600}. We then use the algorithms to 25 0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V0.000.250.500.751.00Cramer's V Figure 5: Faultline results for different population sizes (parameter n) partition each set into teams of size 5. For each algorithm, we report the aver- age faultline potential achieved over all sets for every value of n, along with the corresponding 90% confidence intervals. The results for all three datasets are shown in Figure 5. We also report the computational time (in seconds) of each algorithm for each value of n in Figure 6. The first observation is that all the algorithms perform better as the size of the population increases, with the achieved normalized faultline potential values ultimately converging to a low value around 0.1, for all datasets. An examination of the data reveals that we can confidently attribute this trend to the fact that increasing the size of the population leads to the introduction of identical or highly similar individuals (i.e. in terms of their feature values). This makes it easier to form low-faultline teams. This is not a surprising finding in real datasets, which tend to include large clusters of similar points, rather than points that are uniformly distributed within the multi-dimensional space defined by their features. We observe that The FaultlineSplitter algorithm consistently achieves the best results across datasets, while the the Greedy algorithm outperforms Clustering in two of the three datasets DBLP and Adult. This reveals a weak- ness of Clustering: its inability to consistently deliver low-faultline solutions as the population becomes larger. On the other hand, the FaultlineSplitter algorithm does not exhibit this weakness, emerging as both the most stable 26 adultcensusdblp0500100015000500100015000500100015000.20.30.050.100.150.200.250.200.240.280.32Population SizeNorm. Faultline PotentialAlgorithmGreedyFaultline−SplitterClustering Figure 6: Running times for different population sizes (parameter n) and effective approach. Finally, as in the previous experiment, the algorithms exhibit a negligible variation over the different samples that we considered for each value of the parameter. With respect to computational time, Figure 6 verifies that FaultlineSplitter can scale to large population sizes. Using the Census dataset, we observe that, even for the largest population of 1600 individuals, the algorithm computed the solution in less 2 minutes. In fact, its speed was nearly identical to that of the greedy heuristic. Finally, while the Clustering algorithm emerges as the fastest option, this comes at the cost of inferior solutions (i.e. teams with higher faultline potential), as we demonstrated in Figure 5. 5.2.2. Varying the team size For this experiment, we set the size of the population of individuals to W = 800. For each real dataset, we randomly select 100 populations, of 800 individuals each, with replacement. We then use the algorithms to parti- tion each population into teams of size k, for k ∈ {3, 4, 5,··· , 20}. For each algorithm, we report the average normalized faultline potential achieved over all population for every value of k, along with the corresponding 90% confidence intervals. The results for Adult, Census and DBLP datasets are shown in Fig 7. We observe that the FaultlineSplitter algorithm had the overall best per- formance across datasets. We observe that its advantage wanes as the value of k increases. This can be explained by the fact that asking for larger teams 27 050100150050010001500Population SizeTime (s)AlgorithmGreedyFaultline−SplitterClustering Figure 7: Faultline results for different team sizes (parameter k) makes the problem harder, as it requires the inclusion of additional individuals and thus makes it harder to avoid the introduction of conflict triangles into the team. This explanation is also consistent with the fact that the perfor- mance of the two algorithms tends to decrease as k becomes larger. A second observation is that the Greedy algorithm is consistently outperformed by both FaultlineSplitter and Clustering. This demonstrates the difficulty of the Faultline-Partitioning problem and the need for sophisticated partitioning algorithms that go beyond greedy heuristics. Finally, as shown in the figure, we observe that the standard deviations for all algorithms were consistently negligible, bolstering our confidence in the reported findings. 5.2.3. Varying the number of conflict triangles The purpose of this experiment is to evaluate the algorithm on populations with different potential for faultlines. While random samples obtained from our real-world datasets differ trivially in terms of the percentage of conflict trian- gles, we can engineer synthetic data to obtain datasets with different number of conflict triangles. To conduct this experiment, we use the Synthetic-1 dataset described in Section 5.1. We consider populations of 400 individuals and set the team size equal to 5. The results are shown in Fig 8. The plot verifies that finding low-faultline teams becomes harder as the population's inherent potential for such faultlines increases. However, the FaultlineSplitter algo- rithm consistently outperforms the other methods. In fact, the gap between the 28 adultcensusdblp4681012141618204681012141618204681012141618200.160.200.240.060.090.120.150.1500.1750.2000.2250.250Team SizeNorm. Faultline PotentialAlgorithmGreedyFaultline−SplitterClustering Figure 8: Performance of all algorithms for synthetic datasets with different number of bad triangles (400 workers, teams of size 5 and 10 features) two algorithms increases as the number of conflict triangles in the population increases. This demonstrates the superiority of the FaultlineSplitter algo- rithm over the other approaches in terms of searching the increasingly smaller space of low-faultline solutions. 5.3. Faultline Measurement in existing teams In this section, we compare three alternative options for faultline measure- ment in existing teams: the proposed CT measure, the ASW by (Meyer and Glenz, 2013), and the Subgroup Strength (SS) measure by (Gibson and Ver- meulen, 2003). We select the ASW due to its status as the state-of-the-art, even though, as we discussed in detail in Section 2, it is not appropriate for the Faultline-Partitioning problem that is the main focus of our work. We select the SS measure because it combines the simplicity and computational efficiency required for the Faultline-Partitioning problem with competitive results in previous benchmarks (Meyer and Glenz, 2013). 5.3.1. A Comparison on Synthetic Teams For this study, we use the Synthetic-2 dataset which, as we describe in Sec- tion 5.1, includes teams of various sizes and subgroup composition. First, we group the teams according to size. We then use each of the three faultline measure to evaluate the teams in each group. Finally, we compute the Pearson 29 0.250.300.350.4042004400460048005000520054005600Conflict TrianglesNorm. Faultline PotentialAlgorithmGreedyFaultline−SplitterClustering Correlation Coefficient (PCC) between every pair of measures. We present the results in Figure 9a. Then, in Figure 9b we report the average computational time needed to compute the score of each team for each of the three measures. (a) Pairwise Correlation of Faultline Mea- sures (b) Mean Computational Time Figure 9: A comparison of the ASW, Conflict Triangles (CT), and Subgroup Strength (SS) faultline measures on the Synthetic-2 dataset. The first observation from Figure 9a is that all three measures report sim- ilar scores across team sizes, with the pairwise PCC over 0.65. Hence, while the three measures follow different measurement paradigms, their results tend to be consistent. However, the bars also reveal that the correlation between SS and CT measures was the highest among all possible measure-pairs. In fact, the observed PCC value for this pair was consistently around 0.9, revealing near-perfect correlation. This is intuitive if we consider the nature of the two measures: the conflict triangles counted by the CT measure include, by defini- tion, a pair of team members that are also identified as "overlapping" by the SS measure. A key difference between the two measures is that CT does not consider all-positive triangles (i.e. a triplet of team members with the same value for a feature, see Fig. 1b), while SS would consider all 3 dyads in such a triangle as overlaps. However, the results reveal that this difference does not sig- nificantly differentiate the results of the two measures, possibly due to the fact that SS does not follow the CT's counting paradigm and, instead, aggregates overlap sums via the standard deviation. With respect to computational time, Figure 9b verifies the theoretical anal- 30 48163264Team Size0.00.20.40.60.81.0CorrelationCT Vs. ASWCT Vs. SSASW Vs. SS48163264Team Size105104103102101100101Time per Team in Seconds (log scale)CTSSASW ysis that we presented in Section 2. The y-axis represents the average time (in seconds) required to compute the score for a team, in log scale. As we discussed in detail in Section 4, any algorithm for the Faultline-Partitioning problem has to quickly consider a large number of candidate teams in order to efficiently locate (or approximate) the best possible partitioning. We observe that ASW is orders of magnitude slower than the other two measures, with the gap growing rapidly with the size of the teams. In addition, while the SS and CT measures can be easily updated in constant time as the algorithm makes small changes to the team's roster, this is not the case for ASW. In short, while ASW may indeed be a competitive option for faultline measurement, our analysis and experiments verify that it is not a good candidate for faultline-optimization problems, such as the one that we study in this work. Out of two fastest measures, CT displays a clear advantage over SS. We observe that it is several times faster and, as in the case of ASW, the gap grows rapidly with the size of the population. The results verify the effectiveness of our methodology for computing CT, which we discuss in detail in Section 3.2. They also demonstrate that, while two measures might satisfy the efficiency principles that are necessary for efficient faultline- minimization in teams, one of the two can still have a significant computational advantage that makes it more appropriate for large populations. 5.3.2. A Comparison on Real Teams For this study we use the BIA660 dataset, which includes two outcomes: (i) the team's performance (represented by its grade) and (ii) the average satis- faction of the team's members with their overall collaborative experience. In Figures 10a and 10b we visualize the performance of each team against its cor- responding CT, SS, and ASW scores. We observe that performance has a strong negative association with the CT and SS scores, as demonstrated by the slope of the line. In contrast, the corresponding line for the ASW measure is nearly parallel to the x-axis, suggesting a lack of correlation. This finding is verified by the Pearson Correlation Coefficient (PCC) values for the CT, SS, and ASW measures, which were −0.21, −0.23 and −0.04, respectively. Note that a nega- 31 tive correlation is intuitive, as it means that lower faultlines are associated with higher performance. In Figures 10c and 10d we visualize the satisfaction of each team against its corresponding CT, SS, and ASW scores. The results are consistent with the performance analysis: satisfaction exhibits a strong negative association the CT measure, while its association with ASW is very weak. In fact, the correlation of satisfaction with CT and SS appears to be even stronger than that of the team's performance. Again, these findings are verified by the PCC values for the CT, SS, and ASW measures, which were −0.26, −0.34 and 0.02, respectively. (a) Performance Vs CT (b) Performance Vs ASW (c) Performance Vs SS (d) Satisfaction Vs CT (e) Satisfaction Vs ASW (f) Satisfaction Vs SS Figure 10: The association of the CT, SS, and ASW measures with team performance and satisfaction. The results verify that the teams' overall faultline-strength, as measured by the CT measure, has a strong negative association with meaningful outcomes. Next, we demonstrate how a practitioner can examine feature-specific faultlines to identify specific features that are associated with each outcome. 32 6070809050100150Faultline ScoreGrade607080900.10.20.30.4ASW ScoreGrade607080900.40.81.21.6Subgroup StrengthGrade456750100150Faultline ScoreSatisfaction45670.10.20.30.4ASW ScoreSatisfaction45670.40.81.21.6Subgroup StrengthSatisfaction Each of the two outcomes (performance and satisfaction) serves as the de- pendent variable in a separate regression that also includes the team's faultline potential with respect to different features, according to the CT measure. We also consider multiple control variables that could account for part of the vari- ance in the dependent variable. We present the results of both regressions in Table 2. The table reveals strong negative correlations of the faultline scores for the features country, BS major, and current degree with performance. This implies that the existence of potentially conflicting groups in these features can be detri- mental to the team's grade. We observe similar trends for the country and cur- rent degree features in the context of team satisfaction. Such findings can inform the instructor about the existence of potentially problematic dimensions and guide his efforts to strategically design the teams. In practice, this type of re- gression can be used before solving an instance of the Faultline-Partitioning problem, in order to identify the dimensions that need to be considered during the optimization. This is a critical step, as trying to solve for all possible di- mensions is likely to limit the solution space and eliminate high-quality teams due to the existence of faultlines in trivial (non-influential) dimensions. 6. Generalizing the penalization scheme of aligned conflict triangles As mentioned earlier our definition of faultline potential (summarized in Equation 1) applies, for each conflict triangle, a penalty that is directly propor- tional to the triangle's alignment across the features. Our experimental results presented in Section 5.3.2 demonstrate that this penalization scheme yields a metric that is a strong predictor of a team's success. However, one might argue that in a specific domain or application, different degrees of alignment should be penalized using a different scheme. In this section, we extend our frame- work by (1) demonstrating how different penalization scheme of aligned con- flict triangles can be implemented, (2) describing a methodology that allows practitioners to learn the appropriate penalization scheme for their domain 33 Table 2: Regression Results Dependent variable: Grade (1) −10.887∗∗∗ (−3.793) −12.821∗∗ (−2.580) Satisf action (2) −1.195∗∗∗ (−4.937) −0.676 (−1.612) Degree BS Major Gender Country ML Exp Analytics Exp Programming Exp Team Exp Average ML Exp Average Analytics Exp Average Prog Exp Average Team Exp Constant 0.106 (0.028) −8.010∗∗∗ (−3.001) −5.428 (−0.841) 5.233 (1.082) −4.464 (−0.926) 1.344 (0.323) 0.219 (0.185) −0.241 (−0.205) −1.820∗ (−1.758) 0.898 (0.772) 97.821 (10.586) 86 0.313 0.200 8.126 2.766∗∗∗ 0.147 (0.457) −1.121∗∗∗ (−4.977) −1.029∗ (−1.889) −0.063 (−0.155) 0.336 (0.827) −0.188 (−0.535) −0.105 (−1.052) −0.143 (−1.438) 0.014 (0.155) 0.040 (0.405) 7.308∗∗∗ (9.374) 86 0.467 0.379 0.686 5.327∗∗∗ 34 Observations R2 Adjusted R2 Residual Std. Error (df = 73) F Statistic (df = 12; 73) Note: Significance levels: The dependent variable are grade and satisfaction. t-statistics are shown in parentheses. ∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01 based on information from existing teams in the same domain, (3) studying the Faultline-Partitioning problem under a given penalization scheme. 6.1. Faultine potential with a generalized penalization scheme Given a team T with a set of features FT , we define the faultline potential of a team given a penalization scheme g(.) as: FT (cid:88) P CT (T, g) = g(x) × aligned(x, T ), (5) x=1 where aligned(i, T ) returns the number of conflict triangles that are aligned across exactly x features in FT . The above formulation allows us to flexibly penalize the existence of aligned conflict triangles by selecting the appropriate g(x) penalty for each value of x. Naturally, it makes sense to define g(x) as an ascending function to reflect the fact that higher alignment should translate to a higher faultline potential. Note that if define g(x) = x, then the obtained faultine potential is equivalent to our original definition of CT (t) presented in Equation 1 (module some constant). 6.2. Learning the penalization scheme The task of learning the appropriate penalty parameters can be modeled as a supervised learning task. Each team serves as a data point in the training set. More specifically, the predictive variables are the aligned(x, T ) values for in- creasing values of x. The dependent variable should reflect the degree to which a team's performance is influenced by faultlines. We compute the dependent variables using the following technique. Given a set of teams along with any success metric that encodes their outcome in a particular domain (e.g. perfor- mance, satisfaction, cohesion), we obtain the dependent variables by negating the success scores and normalizing them to have a mean equal to 0 and a stan- dard deviation equal to 1. The goal is then to learn the penalty-parameters g(x) that best fit the data. To achieve this, we train a linear regression to obtain the best g(x) values. It is important to mention that fitting the linear regres- sion may lead to negative g(x) values. This does not create any issues, but if 35 practitioners desire to obtain faultline potential values that are always positive, they can simply add a constant to all g(x) values. This is a safe operation as it simply adds a constant value to all fautline potential values and does not affect the difference between teams' faultline potentials. In fact, in our experiments we always add a constant value to all g(x) parameters to ensure that g(0) is equal to 0. This makes the penalization scheme more interpretable as we expect the penalty of conflict-free triangles to be 0. If the practitioner has no access to numeric outcomes variables, we can still learn g(x) as follows. The learning task can be modeled as a classification task with a binary variable that is equal 1 for all actual teams in the data. The training data is then complemented by randomly-populated "noise" groups that do not represent actual teams. The binary dependent variable for these fake teams is 0. In this case, the goal is to find the penalty-parameters that best differentiate between actual and noise teams. This technique builds upon the fact that in most cases, individuals (and managers) tend to form teams that have a lot degree of conflict and faultline potential. To demonstrate the effectiveness of our proposed learning procedure, we use the BIA660 dataset as it consists of a set of teams along with two outcome scores, namely "grade" and "satisfaction". Table 3 summarizes the g(x) values we obtained using the techniques described above. The first two rows correspond to the g(x) values obtained from the grade and satisfaction metrics. The third row corresponds to g(x) values calculated from our binary classification task (without using any outcome scores). The fourth rows corresponds to g(x) values obtained on a version of BIA660 dataset in which outcome score of each team is randomly sampled from the set {0, 1}. This row helps verify that the results of the other rows is significant and not due to chance. Note that the first three rows in Table 3 share a similar trend (and for the most part) the numbers are ascending representing that the higher degrees of alignment should be penalized more. On the other hand, we can see that the values in the last row are significantly different and do not exhibit any meaningful pattern. We can observe that the g(x) values reported in the first 3 36 Table 3: Obtained penalization schemes using the BIA660 dataset g(1) g(2) g(3) g(4) g(5) g(6) g(7) g(8) Grade 0.091 Satisfaction 0.088 Real Vs. Fake 0.068 Random -0.063 0.064 0.07 0.099 0.021 0.053 0.028 0.079 0.428 0.112 0.141 0.061 -0.041 0.165 0.079 0.115 -0.153 0.233 0.253 0.184 0.053 0.171 0.208 0.223 0.142 0.111 0.133 0.171 0.098 Frequencies 0.2% 1.5% 6.8% 12.9% 17.0% 11.6% 4.5% 0.7% rows, while following the expected trend, sometimes fluctuate. For example, the values of g(8) are smaller than g(7). This can be explained using the last row of the table which summarizes the frequencies of each degree of the alignment in the entire dataset. For instance, we can see that in the entire dataset, there are only 0.7% of triangles that can form 8 aligned conflicts. This means, that in our learning task this value is in almost all cases set to 0 for both successful and unsuccessful teams. Thus, the parameters learned using the linear regression are more subject to noise. In fact, if we focus only on degrees of alignments that have at least 5% presence in the data, we can see that the g(x) values are more robust and conform to our expected behaviour. 6.3. Team-formation under the generalized penalization scheme As we discussed in Section 2.3, solving the Faultline-Partitioning prob- lem for a large group of individuals requires an operationalized notion of faultline that can be (1) computed in linear time and (2) updated in constant time when a member joins or leaves the team. Unfortunately, these two criteria may not hold for a given penalization scheme. In fact given a team T , computing the P CT (T, g) requires a running time of O(mT3). This is because our speed-up technique described in Section 3.2 can not be applied to any penalization scheme. This makes the Faultline-Partitioning problem even more challenging to solve as it becomes computationally expensive. The FaultlineSplitter algo- rithm can still be used to solve the Faultline-Partitioning problem given any penalization scheme, but the solution does not scale up to large popula- tion of individuals. Given that, we present some theoretical and experimental 37 evidence to demonstrate that solving the Faultline-Partitioning problem with our original penalization scheme produces teams that are of high-quality under different penalization schemes as well. Of course, directly solving the Faultline-Partitioning problem with a given penalization scheme can pro- duce better results, but in most cases the slight improvement can not justify the huge required computational cost. Let us use CT (T ) and P CT (T, g) to refer to the definition of faultline poten- tial (according to Equation 1) and the faultline potential given a penalization scheme (according to Equation 5) respectively. Now, it is easy to show that CT (T ) ∗ max(g(x)) ∗ m ≥ P CT (T, g). The above equation simply states that in the worst-case scenario all m features of conflicting individuals form a conflicting triangle. This is an strict upper bound for P CT (T, g). Although this may not be a tight bound, it suggest that optimizing CT (T ) directly might be an efficient strategy for solving the Faultline-Partitioning problem under any penalization scheme. The following experiment further demonstrates that optimizing the original faultline potential (presented in Equation 1 is quite aligned with optimizing faultline potential under a given penalization scheme. In this experiment, we have solved the Faultline-Partitioning problem on the BIA660 dataset us- ing the penalization scheme from the first row of Table 3. More precisely, we ran the FaultlineSplitter algorithm to create 50 teams of equal size. In each iteration of the algorithm, we recorded the faultline potential according to Equation 1. Figure 11 illustrates how the value of CT (T ) and P CT (T, g) compare as the optimization proceeds. We can see that the P CT (T, g) has an almost linear relationship with our original definition of faultline potential. This implies that by solving the Faultline-Partitioning problem using our original penalization scheme, we can benefit from the speed-up techniques we introduced in Section 3.2 without sacrificing the quality of the obtained teams even if a different penalization scheme is desired. 38 Figure 11: Comparing the faultline potential using different penalization schemes 7. Handling numeric attributes One of the limitations of CT is that it is primarily designed for nominal attributes. Thus, numerical attributes need to be discretized into bins prior to computing the faultline score. The ability to handle multimodal data is a well-known challenge in faultline measurement. For instance, the popular ASW approach has to pre-process the data by using dummy variables to encode categorical variables as numeric. Next, we present two techniques to extend our basic CT model to deal with numerical attributes. The first technique is based on binning, but aims to creates bins of variable length that can accurately capture the distribution of the underlying data. More precisely, a pre-processing module based on Kernel Density Estimation (KDE) could automate the discretization process and deliver dynamic segmentations that accurately capture the distribution of numeric variables (Rudemo, 1982). The resulting bins would then represent the natural groups of numeric values that are present in the given dataset. An alternative technique that departs from the standard binning paradigm would be to use a threshold γ to define agreement and disagreement between team members. Specifically, given a numeric feature f , we say two individuals i and i(cid:48) are in agreement iff wi(f )− wi(cid:48)(f ) ≤ γ. Otherwise, the two individuals are considered to be in a disagreement. As before, a triangle is identified as a conflict triangle with respect to feature f if two of each members agree on 39 406080100506070mean(CT(T))mean(PCT(T,g)) feature f and disagree with the third individual in the triangle. The problem then translates into the task of selecting an appropriate value for γ. Domain knowledge is a key factor in this effort, as each feature is likely to have its own threshold. For instance, while a difference of 2 years for the age feature is generally considered small, a difference of 2 stars in the context of the popular 5- star rating scale is far more significant. An intuitive way to set feature-specific thresholds would be to assume that two members agree on feature f if the difference of their corresponding values is within 1 standard deviation of the same feature (as computed across the entire population that we want to partition into teams). A second way to tune the feature-specific thresholds is to use a validation set that includes the scores of teams for meaningful team outcomes, such as performance or satisfaction. We used such a dataset in Section 5.3.2. We can then choose the threshold values that maximize the correlation between the resulting faultline and outcomes scores. While the above methods allow us to flexibly model (dis)agreements and address numeric attributes during the computation of conflict triangles, they do not directly model the degree of disagreement between two team members in the context of a numeric feature. For instance, a conflict triangle with two members in their 20s and one in their 30s tends to be less problematic than a triangle with two member in their 20s and one in their 60s. To address this issue, we can weigh (the disagreement in) a conflict triangle by directly using the numeric values of its members. In practice, the weight of a conflict triangle with respect to feature f would then be equal to the the average absolute difference between the values of feature f for the two individuals in disagreement. The CT measure would then be expressed as a weighted sum, rather than the pure number of conflict triangles in the given team. Combining this method with the two techniques that we discussed above (or with any techniques based on binning or definitions of disagreement) enables us to comprehensively extend our approach to handle numeric attributes. 40 8. Discussion Our work focuses on the previously unexplored overlap between the decades of work on team faultlines and the rapidly growing literature on automated team-formation. We formally define the Faultline-Partitioning problem, which is the first problem definition that asks for the formation of teams with minimized faultlines from a large population of candidates. We present a de- tailed complexity analysis and introduce a new faultline-minimization algorithm (FaultlineSplitter) that outperforms competitive baselines in an experimen- tal evaluation on both real and synthetic data. One of the major challenges that we address in this work is finding a faultline measure that can be efficiently applied to faultline optimization. As we highlight in this paper, computational efficiency (in a practical team-formation setting) translates into two requirements that an appropriate measure should satisfy: (i) the ability to compute the faultline score of a team in linear time, and (ii) the ability to update a team's score in constant time after small changes to the team (e.g. the removal or addition of a member). The relevant literature has described multiple operationalizations of the faultline concept. However, as we discuss in detail in Section 2, these operationalizations do not satisfy these requirements and are only appropriate for measuring faultline strength in existing teams. As such, they are not scalable enough to serve as the objective function of a combinatorial algorithm that has to process a large population and evaluate very large numbers of candidate-teams in order to find a faultline- minimizing solution. Therefore, we introduce a new measure that we refer to as Conflict Triangles (CT). The CT measure is based on the extensive literature on modeling social structures and is consistent with the fundamental principles of faultline theory by (Lau and Murnighan, 1998). In addition, CT satisfies the two efficiency requirements and is appropriate for faultline-optimization algorithms. 8.1. Implications Our work is the first to incorporate the faultline concept into an algorith- mic framework for automated team-formation. From a team-builder's perspec- 41 tive, the ability to control the faultlines of teams that are automatically sam- pled from a large population of candidates has multiple uses. First, it allows the team builder to proactively reduce the risk of undesirable outcomes that have been consistently linked with faultlines, such as conflicts, polarization, and disintegration. Second, it provides an effective way to manage the diversity within a team. A trivial way to eliminate faultlines is to create highly ho- mogeneous teams. However, this approach would also lead to teams that are unable to benefit from the well-documented benefits of diversity, such as inno- vation and increased performance (Kearney et al., 2009, Roberge and Van Dick, 2010, Van der Vegt and Janssen, 2003). In order to avoid such shortcomings, a team-builder can utilize our algorithmic framework to strategically engineer low-faultline teams without over-penalizing diversity. A characteristic exam- ple is a team that is maximally diverse; a team in which no two individuals share a common attribute. Consistent with the faultline theory by (Lau and Murnighan, 1998), our framework would recognize this as a team with the same faultline potential as a perfectly homogeneous team. We demonstrate this via examples in Figures 1 and 2. Our team-partitioning paradigm has applications in both an organizational and educational setting. In a firm setting, the task of partitioning a workforce into teams is common. By using the proposed FaultlineSplitter algorithm, a manager can identify faultline-minimizing partitionings within the multidimen- sional space defined by various employee features. A regression analysis, such as the one we described in Section 5.3.2, can guide the manager's team-building efforts by selecting specific features with potentially problematic faultlines. In a classroom setting, instructors often face the task of partitioning their students into teams for assignments and projects. As we demonstrated in our experi- ments, faultlines in student teams can have a strong association with meaning- ful outcomes, such as performance and member satisfaction. By releasing our team-partitioning software, we hope that we can automate this team-formation task and benefit both students and instructors. 42 8.2. Directions for Future Work Future work could focus on algorithms that combine faultlines minimization (either as an objective function or via constraints) with other factors, such as intra-team communication, skill coverage, and recruitment cost. Such work would add to the rapidly growing literature on automated team formation, which we review in Section 2.1. We expect this to be a challenging task from an optimization perspective, as additional constraints can be hard to satisfy while trying to avoid the creation of faultlines. For instance, if the distribution of skills is strongly correlated with the population's demographics, a homogenous team is unlikely to exhibit a diverse skillset. Hence, the ability to leverage both homogeneity and diversity will be an asset for such efforts. The proposed FaultlineSplitter algorithm can be combined with any faultline measure that follows the efficiency principles that we describe in this work (i.e. linear computation and constant updates). Future work on such mea- sures is essential, as existing measures are not scalable enough for optimization purposes. We make our own contribution in this direction via The CT measure that we propose in this work. In conclusion, we hope that future efforts will be able to build on our work to address challenging problems that combine efficient algorithmic constructs for automated team-formation with the rich findings on the causes and effects of teams faultlines. Acknowledgement This research was supported in part by NSF grants IIS-1813406 and CAREER- 1253393. References R. Agrawal, B. Golshan, and E. Terzi. Grouping students in educational settings. In Proceedings of the 20th ACM SIGKDD International Confer- ence on Knowledge Discovery and Data Mining, KDD '14, pages 1017 -- 1026. 43 ACM, 2014a. ISBN 978-1-4503-2956-9. doi: 10.1145/2623330.2623748. URL http://doi.acm.org/10.1145/2623330.2623748. R. Agrawal, B. Golshan, and E. Terzi. Forming beneficial teams of students in massive online classes. In Proceedings of the First ACM Conference on Learning @ Scale Conference, L@S '14, pages 155 -- 156, 2014b. ISBN 978-1- 4503-2669-8. doi: 10.1145/2556325.2567856. URL http://doi.acm.org/10. 1145/2556325.2567856. A. An, M. Kargar, and M. ZiHayat. Finding affordable and collaborative teams from a network of experts. In Proceedings of the 2013 SIAM International Conference on Data Mining, pages 587 -- 595, 2013. A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. Power in unity: Forming teams in large-scale community systems. In Pro- ceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM '10, pages 599 -- 608, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0099-5. doi: 10.1145/1871437.1871515. URL http://doi.acm.org/10.1145/1871437.1871515. A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. On- line team formation in social networks. In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages 839 -- 848, New York, NY, USA, 2012a. ACM. ISBN 978-1-4503-1229-5. doi: 10.1145/2187836.2187950. URL http://doi.acm.org/10.1145/2187836.2187950. A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. On- line team formation in social networks. In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages 839 -- 848, New York, NY, USA, 2012b. ACM. ISBN 978-1-4503-1229-5. doi: 10.1145/2187836.2187950. URL http://doi.acm.org/10.1145/2187836.2187950. S. Bahargam, D. Erdos, A. Bestavros, and E. Terzi. Personalized education; solving a group formation and scheduling problem for educational content. In International Educational Data Mining Society. ERIC, 2015. 44 S. Bahargam, D. Erdos, A. Bestavros, and E. Terzi. Team formation for scheduling educational material in massive online classes. arXiv preprint arXiv:1703.08762, 2017. H. G. Barkema and O. Shvyrkov. Does top management team diversity promote or hamper foreign expansion? Strategic Management Journal, 28(7):663 -- 680, 2007. doi: 10.1002/smj.604. URL https://onlinelibrary.wiley.com/doi/ abs/10.1002/smj.604. K. Bezrukova, K. A. Jehn, E. L. Zanutto, and S. M. Thatcher. Do workgroup faultlines help or hurt? a moderated model of faultlines, team identifica- tion, and group performance. Organization Science, 20(1):35 -- 50, 2009. doi: 10.1287/orsc.1080.0379. URL https://pubsonline.informs.org/doi/abs/ 10.1287/orsc.1080.0379. R. Burkard, M. Dell'Amico, and S. Martello. Assignment Problems. Society for Industrial and Applied Mathematics, 2012. A. M. Carton and J. N. Cummings. The impact of subgroup type and subgroup configurational properties on work team performance. Journal of Applied Psychology, 98(5):732, 2013. doi: 10.1037/a0033593. URL https://doi. org/10.1037/a0033593. D. Cartwright and F. Harary. Structural balance: a generalization of heider's theory. Psychological review, 63(5):277, 1956. doi: 10.1037/h0046049. URL https://doi.org/0.1037/h0046049. J. N. Choi and T. Sy. Group-level organizational citizenship behavior: Effects of demographic faultlines and conflict in small work groups. Journal of Or- ganizational behavior, 31(7):1032 -- 1054, 2010. doi: 10.1002/job.661. URL https://onlinelibrary.wiley.com/doi/abs/10.1002/job.661. H. Cram´er. Mathematical Methods of Statistics (PMS-9), volume 9. Princeton university press, 2016. 45 C. Dorn and S. Dustdar. Composing near-optimal expert teams: A trade- off between skills and connectivity. In Proceedings of the 2010 Interna- tional Conference on On the Move to Meaningful Internet Systems - Volume Part I, OTM'10, pages 472 -- 489. Springer-Verlag, 2010. ISBN 3-642-16933-3, 978-3-642-16933-5. URL http://dl.acm.org/citation.cfm?id=1947725. 1947768. E. H. Durfee, J. C. Boerkoel, Jr., and J. Sleight. Using hybrid scheduling for the semi-autonomous formation of expert teams. Future Generation Computer Systems, 31:200 -- 212, Feb. 2014. ISSN 0167-739X. doi: 10.1016/j.future.2013. 04.008. URL http://dx.doi.org/10.1016/j.future.2013.04.008. D. Easley and J. Kleinberg. Networks, Crowds, and Markets Reasoning About a Highly Connected World, volume 1. Cambridge University Press, 2010. R. F. Fenno. Congressmen in committees. Little, Brown, 1973. A. Gajewar and A. D. Sarma. Multi-skill collaborative teams based on densest subgraphs. In Proceedings of the 2012 SIAM International Conference on Data Mining, pages 165 -- 176, 2012. E. Galbrun, B. Golshan, A. Gionis, and E. Terzi. Finding low-tension commu- nities. In Proceedings of the 2017 SIAM International Conference on Data Mining, pages 336 -- 344. SIAM, 2017. doi: 10.1137/1.9781611974973.38. URL https://epubs.siam.org/doi/abs/10.1137/1.9781611974973.38. M. R. Gary and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-completeness. WH Freeman and Company, New York, 1979. C. Gibson and F. Vermeulen. A healthy divide: Subgroups as a stimulus for team learning behavior. Administrative Science Quarterly, 48(2):202 -- 239, 2003. doi: 10.2307/3556657. URL http://www.jstor.org/stable/3556657. B. Golshan, T. Lappas, and E. Terzi. Profit-maximizing cluster hires. In Pro- ceedings of the 20th ACM SIGKDD International Conference on Knowledge 46 Discovery and Data Mining, KDD '14, pages 1196 -- 1205, New York, NY, USA, 2014. ACM. ISBN 978-1-4503-2956-9. doi: 10.1145/2623330.2623690. URL http://doi.acm.org/10.1145/2623330.2623690. L. Gratton, A. Voigt, and T. Erickson. Bridging faultlines in diverse teams. IEEE Engineering Management Review, 39(1):80 -- 90, 2011. ISSN 0360-8581. doi: 10.1109/EMR.2011.5729976. D. A. Harrison and K. J. Klein. What's the difference? diversity constructs as separation, variety, or disparity in organizations. Academy of management review, 32(4):1199 -- 1228, 2007. doi: 10.5465/amr.2007.26586096. URL https: //doi.org/10.5465/amr.2007.26586096. F. Heider. The Psychology of Interpersonal Relations. John Wiley & Sons, 1958. ISBN 9780898592825. URL https://books.google.com/books?id= Zh6TDmayL0AC. K. A. Jehn and K. Bezrukova. The faultline activation process and the ef- fects of activated faultlines on coalition formation, conflict, and group out- comes. Organizational Behavior and Human Decision Processes, 112(1): 24 -- 42, 2010. ISSN 0749-5978. doi: https://doi.org/10.1016/j.obhdp. 2009.11.008. URL http://www.sciencedirect.com/science/article/ pii/S0749597809001095. M. Kargar and A. An. Discovering top-k teams of experts with/without a leader in social networks. In Proceedings of the 20th ACM International Confer- ence on Information and Knowledge Management, CIKM '11, pages 985 -- 994. ACM, 2011. ISBN 978-1-4503-0717-8. doi: 10.1145/2063576.2063718. URL http://doi.acm.org/10.1145/2063576.2063718. M. Kargar, A. An, and M. Zihayat. Efficient bi-objective team formation in social networks. Machine Learning and Knowledge Discovery in Databases, pages 483 -- 498, 2012. doi: 10.1007/978-3-642-33486-3 31. URL http://dx. doi.org/10.1007/978-3-642-33486-3_31. 47 E. Kearney, D. Gebert, and S. C. Voelpel. When and how diversity benefits teams: The importance of team members' need for cognition. Academy of Management Journal, 52(3):581 -- 598, 2009. doi: 10.5465/amj.2009.41331431. URL https://doi.org/10.5465/amj.2009.41331431. H. W. Kuhn. The hungarian method for the assignment problem. Naval Re- search Logistics Quarterly, 2:83 -- 97, 1955. doi: 10.1002/nav.3800020109. URL https://doi.org/10.1002/nav.3800020109. T. Lappas, K. Liu, and E. Terzi. Finding a team of experts in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowl- edge Discovery and Data Mining, KDD '09, pages 467 -- 476, New York, NY, USA, 2009. ACM. ISBN 978-1-60558-495-9. doi: 10.1145/1557019.1557074. URL http://doi.acm.org/10.1145/1557019.1557074. D. C. Lau and J. K. Murnighan. Demographic diversity and faultlines: The compositional dynamics of organizational groups. Academy of Management Review, 23(2):325 -- 340, 1998. doi: 10.5465/amr.1998.533229. URL https: //doi.org/10.5465/amr.1998.533229. B. S. Lawrence and M. J. Zyphur. Identifying organizational faultlines with latent class cluster analysis. Organizational Research Methods, 14(1):32 -- 57, 2011. doi: 10.1177/1094428110376838. URL https://doi.org/10.1177/ 1094428110376838. C. Li and M. Shan. Team formation for generalized tasks in expertise social net- works. In 2010 IEEE Second International Conference on Social Computing, pages 9 -- 16, 2010. doi: 10.1109/SocialCom.2010.12. J. Li and D. C. Hambrick. Factional groups: A new vantage on demographic faultlines, conflict, and disintegration in work teams. Academy of Manage- ment Journal, 48(5):794 -- 813, 2005. doi: 10.5465/amj.2005.18803923. URL https://doi.org/10.5465/amj.2005.18803923. 48 M. I. Malinen and P. Franti. Balanced k-means for clustering. In Structural, Syn- tactic, and Statistical Pattern Recognition - Joint IAPR International Work- shop, S+SSPR, pages 32 -- 41. Springer Berlin Heidelberg, 2014. B. Meyer and A. Glenz. Team faultline measures: A computational comparison and a new approach to multiple subgroups. Organizational Research Methods, 16(3):393 -- 424, 2013. doi: 10.1177/1094428113484970. URL https://doi. org/10.1177/1094428113484970. B. Meyer, A. Glenz, M. Antino, R. Rico, and V. Gonz´alez-Rom´a. Faultlines and subgroups: A meta-review and measurement guide. Small Group Research, 45(6):633 -- 670, 2014. doi: 10.1177/1046496414552195. URL https://doi. org/10.1177/1046496414552195. S. A. Mohrman, S. G. Cohen, and A. M. Morhman Jr. Designing team-based organizations: New forms for knowledge work. Jossey Bass Business and Management Series. Jossey-Bass, 1995. ISBN 9780787900809. URL https: //books.google.com/books?id=pEe5AAAAIAAJ. E. Molleman. Diversity in demographic characteristics, abilities and personality traits: Do faultlines affect team functioning? Group decision and Negotiation, 14(3):173 -- 193, 2005. doi: 10.1007/s10726-005-6490-7. URL https://doi. org/10.1007/s10726-005-6490-7. J. O. Morrissette and J. C. Jahnke. No relations and relations of strength zero in the theory of structural balance. Human Relations, 20(2):189 -- 195, 1967. doi: 10.1177/001872676702000207. URL https://doi.org/10.1177/ 001872676702000207. M. J. Pearsall, A. P. Ellis, and J. M. Evans. Unlocking the effects of gender faultlines on team creativity: Is activation the key? Journal of Applied Psychology, 93(1):225, 2008. doi: 10.1037/0021-9010.93.1.225. URL https: //doi.org/10.1037/0021-9010.93.1.225. 49 J. T. Polzer, C. B. Crisp, S. L. Jarvenpaa, and J. W. Kim. Extending the faultline model to geographically dispersed teams: How colocated subgroups can impair group functioning. Academy of Management Journal, 49(4):679 -- 692, 2006. doi: 10.2307/20159792. URL https://www.jstor.org/stable/ 20159792. S. S. Rangapuram, T. Buhler, and M. Hein. Towards realistic team formation in social networks based on densest subgraphs. In Proceedings of the 22Nd International Conference on World Wide Web, WWW '13, pages 1077 -- 1088, New York, NY, USA, 2013. ACM. ISBN 978-1-4503-2035-1. doi: 10.1145/ 2488388.2488482. URL http://doi.acm.org/10.1145/2488388.2488482. M.-´E. Roberge and R. Van Dick. Recognizing the benefits of diversity: When and how does diversity increase group performance? Human Resource Management Review, 20(4):295 -- 308, 2010. ISSN 1053-4822. doi: https: //doi.org/10.1016/j.hrmr.2009.09.002. URL http://www.sciencedirect. com/science/article/pii/S1053482209000795. L. Rokach and O. Maimon. Clustering methods. In Data mining and knowledge discovery handbook, pages 321 -- 352. Springer, 2005. B. Rosgen and L. Stewart. Complexity results on graphs with few cliques. Discrete Mathematics and Theoretical Computer Science, 9(1):127 -- 135, 2007. URL http://www.dmtcs.org/volumes/abstracts/dm090108.abs.html. P. J. Rousseeuw. Silhouettes: A graphical aid to the interpretation and val- idation of cluster analysis. Journal of Computational and Applied Mathe- matics, 20:53 -- 65, 1987. ISSN 0377-0427. doi: https://doi.org/10.1016/ 0377-0427(87)90125-7. URL http://www.sciencedirect.com/science/ article/pii/0377042787901257. M. Rudemo. Empirical choice of histograms and kernel density estimators. Scan- dinavian Journal of Statistics, 9(2):65 -- 78, 1982. URL http://www.jstor. org/stable/4615859. 50 J. B. Shaw. The development and analysis of a measure of group fault- lines. Organizational Research Methods, 7(1):66 -- 100, 2004. doi: 10.1177/ 1094428103259562. URL https://doi.org/10.1177/1094428103259562. M. Sozio and A. Gionis. The community-search problem and how to plan a suc- cessful cocktail party. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '10, pages 939 -- 948, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0055-1. doi: 10.1145/ 1835804.1835923. URL http://doi.acm.org/10.1145/1835804.1835923. S. M. Thatcher, K. A. Jehn, and E. Zanutto. Cracks in diversity research: The effects of diversity faultlines on conflict and performance. Group Decision and Negotiation, 12(3):217 -- 241, 2003. doi: 10.1023/A:1023325406946. URL https://doi.org/10.1023/A:1023325406946. B. Trezzini. Probing the group faultline concept: An evaluation of measures of patterned multi-dimensional group diversity. Quality & Quantity, 42(3): 339 -- 368, 2008. doi: 10.1007/s11135-006-9049-z. URL https://doi.org/10. 1007/s11135-006-9049-z. G. S. Van der Vegt and O. Janssen. Joint impact of interdependence and group diversity on innovation. Journal of management, 29(5):729 -- 751, 2003. doi: 10.1016/S0149-2063\ 03\ 00033-3. URL https://doi.org/10.1016/ S0149-2063_03_00033-3. D. Van Knippenberg, J. F. Dawson, M. A. West, and A. C. Homan. Diversity faultlines, shared objectives, and top management team performance. human relations, 64(3):307 -- 336, 2011. doi: 10.1177/0018726710378384. URL https: //doi.org/10.1177/0018726710378384. N. M. Webb. Student interaction and learning in small groups. Review of Educational Research, 52(3):421 -- 445, 1982. doi: 10.2307/1170424. URL https://www.jstor.org/stable/1170424. 51 E. L. Zanutto, K. Bezrukova, and K. A. Jehn. Revisiting faultline concep- tualization: Measuring faultline strength and distance. Quality & Quan- tity, 45(3):701 -- 714, 2011. doi: 10.1007/s11135-009-9299-7. URL https: //doi.org/10.1007/s11135-009-9299-7. 52
1304.4324
1
1304
2013-04-16T03:47:29
Popularity Prediction in Microblogging Network: A Case Study on Sina Weibo
[ "cs.SI", "physics.soc-ph" ]
Predicting the popularity of content is important for both the host and users of social media sites. The challenge of this problem comes from the inequality of the popularity of con- tent. Existing methods for popularity prediction are mainly based on the quality of content, the interface of social media site to highlight contents, and the collective behavior of user- s. However, little attention is paid to the structural charac- teristics of the networks spanned by early adopters, i.e., the users who view or forward the content in the early stage of content dissemination. In this paper, taking the Sina Weibo as a case, we empirically study whether structural character- istics can provide clues for the popularity of short messages. We find that the popularity of content is well reflected by the structural diversity of the early adopters. Experimental results demonstrate that the prediction accuracy is signif- icantly improved by incorporating the factor of structural diversity into existing methods.
cs.SI
cs
Popularity Prediction in Microblogging Network: A Case Study on Sina Weibo Peng Bao, Hua-Wei Shen, Junming Huang, Xue-Qi Cheng Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China [email protected], [email protected], [email protected], [email protected] 3 1 0 2 r p A 6 1 ] I S . s c [ 1 v 4 2 3 4 . 4 0 3 1 : v i X r a ABSTRACT Predicting the popularity of content is important for both the host and users of social media sites. The challenge of this problem comes from the inequality of the popular- ity of content. Existing methods for popularity prediction are mainly based on the quality of content, the interface of social media site to highlight contents, and the collective behavior of users. However, little attention is paid to the structural characteristics of the networks spanned by early adopters, i.e., the users who view or forward the content in the early stage of content dissemination. In this paper, tak- ing the Sina Weibo as a case, we empirically study whether structural characteristics can provide clues for the popular- ity of short messages. We find that the popularity of con- tent is well reflected by the structural diversity of the early adopters. Experimental results demonstrate that the pre- diction accuracy is significantly improved by incorporating the factor of structural diversity into existing methods. Categories and Subject Descriptors J.4 [SOCIAL AND BEHAVIORAL SCIENCES]: So- ciology; H.4 [INFORMATION SYSTEMS APPLICA- TIONS]: Miscellaneous General Terms Measurement, Experimentation Keywords popularity prediction; information diffusion; structural di- versity; microblogging; social network 1. INTRODUCTION Popularity prediction on social networks can help users sift through the vast stream of online contents and enable advertisers to maximize revenue through differential pricing for access to content or advertisement placement. Popular- ity prediction is challenging since numerous factors can af- fect the popularity of online content. Moreover, popularity is very asymmetric and broadly-distributed. Several pio- neering work devoted to the characteristics and mechanisms of information diffusion [1, 2, 3]. Several efforts have been made to study the popularity prediction on social networks. Copyright is held by the author/owner(s). WWW 2013 Companion, May 13–17, 2013, Rio de Janeiro, Brazil. ACM 978-1-4503-2038-2/13/05. Szabo et al. [4] found that the final popularity is reflected by the popularity in early period by investigating Digg and Youtube. A direct extrapolation method is then employed to predict the long-term popularity. Lerman et al. [5] mod- eled users’ vote process on Digg by considering both the interestingness and the visibility of online content. Hong et al.[6] formulated the popularity prediction as a classification problem. However, existing methods pay little attention to the struc- tural characteristic of the propagation path of online con- tent. In this paper, we consider the popularity prediction problem by studying the relationship between the popular- ity of online content and the structural characteristics of the underlying propagation network. The study is conducted on the Sina Weibo, the biggest microblogging network in China. Experimental results demonstrate that our method signifi- cantly outperforms the state-of-the-art method which ne- glects the structural characteristics of social networks. This indicates that the structural diversity would give us some in- sights to understand the mechanism of information diffusion and to predict the long-term popularity of a tweet. 2. PROBLEM STATEMENT In this paper, the popularity prediction aims to predict the popularity p(tr ) of a tweet at a reference time tr , given the forward information of this tweet before an indicating time ti . The indicating time ti is the time at which we observe the information of a tweet and the reference time tr is the time at which we predict the popularity of the tweet. The popularity p(t) is measured by the number of times that a tweet is re-tweeted at time t. 3. FINDINGS AND METHODS We first study the structural characteristics of the forward path of tweets. Encouraged by the work in [7], we investigate whether the final popularity of a tweet is well indicated by the structural characteristics of the network consisting of users that re-tweet the tweet at an earlier time. Specifically, we analyze the structural characteristics of a tweet with the following two measurements on its re-tweet path at 1 hour after it is posted. The first measurement is link density. Among all users that have forwarded the tweet k at time ti , link density is the ratio of the number of followship links to the number of all possible links. The other measurement is the diffusion depth, which is the longest length of the path from the submitter to any user that has retweeted the tweet k at time ti . s r u o h 8 4 r e t f a y t i r a l u p o p g o L 3 10 2 10 1 10 −4 10 −2 10 Log link density after 1 hour 0 10 s r u o h 8 4 r e t f a y t i r a l u p o p g o l e g a r e v A 3 10 2 10 1 10 2 4 8 6 Diffusion depth after 1 hour 10 Figure 1: Structural characteristics We report the final popularity of a tweet with respect to the link density and the diffusion depth. As shown in Figure 1, there exists a strong negative linear correlation between the final popularity and the link density, and there exists a strong positive near-linear correlation between the final popularity and the diffusion depth. This finding tells us that a diverse group of earlier users, reflected with low link density and large diffusion depth, leads to a wide spreading of a tweet. Therefore, the structural characteristics of diffu- sion paths of a tweet at an earlier time can help predict its final popularity. Based on the above findings, we propose two improved approaches to predict the final popularity using earlier pop- ularity and structural characteristics. We estimate the loga- rithmic final popularity with a combination of the logarith- mic early popularity and the logarithmic link density, ln pk (tr ) = α1 ln pk (ti ) + α2 ln ρk (ti ) + α3 , (1) where ρk (ti ) is the link density at or before time ti , and α1 , α2 and α3 are global coefficients that will be learned from the data. Similarly, we define a diffusion depth version to estimate the logarithmic final popularity of a tweet as ln pk (tr ) = β1 ln pk (ti ) + β2dk (ti ) + β3 , (2) where dk (ti ) is the diffusion depth of the tweet k at or before time ti , and β1 , β2 and β3 are also global coefficients. To demonstrate the effectiveness of our proposed approaches, we compare them with a baseline approach which estimates the final popularity with the early popularity alone [4]. The baseline predicts the final popularity using ln pk (tr ) = γ1 ln pk (ti ) + γ2 , (3) where γ1 and γ2 are also global coefficients that will be learned from the data. 4. EXPERIMENTS We use Sina Weibo dataset published by WISE 2012 Chal- lenge1 . We select the tweets posted during July 1-31, 2011 and all the re-tweet paths occurred during July 1-August 31, 2011. The data set consists of 16.6 million tweets. This data set also contains a snapshot of the social network of Sina Weibo. The social network contains 58.6 millions of registered users and 265.5 millions of following relations. We take 75% of all the tweets in the dataset as the training set and the rest 25% as the testing set. The predictions are evaluated with RMSE (root mean squared error) and MAE (mean absolute error). As reported in Table 1, the approach incorporating the link density significantly reduces the prediction error compared with the baseline, and the approach incorporating the diffusion depth performs even 1 http://www.wise2012.cs.ucy.ac.cy/challenge.html Table 1: Prediction error of three approaches. Primitive type RMSE MAE 0.57 0.77 Baseline 0.45 0.63 with link density with diffusion depth 0.61 0.43 better. Here, the values of α2 and β2 in previous formulas that we learned from the data is 0.04 and 0.07 separately. The results empirically demonstrate that early structural characteristics affect the final popularity. Low link density and long diffusion path implies that a tweet is more probably spread to different parts of the network, which helps the tweet become known by a greater population. 5. CONCLUSIONS In this paper, we have studied how to predict the popular- ity of short message in Sina Weibo. We find that structural characteristics provide strong evidence for the final popular- ity. A low link density and a deep diffusion usually lead to wide spreading, capturing the intuition that a diverse group of individuals spread a message to wider audience than a dense group. Based on such a finding, we propose two ap- proaches by incorporating the early popularity with the link density and the diffusion depth of early adopters. Exper- iments demonstrate that the proposed approaches signifi- cantly reduce the error of popularity prediction. Our find- ing provides a new perspective to understand the popularity prediction problem and is helpful to build accurate predic- tion models in the future. 6. ACKNOWLEDGEMENTS This work is funded by the National Natural Scientific Foundation of China under grant Nos. 61232010, 61202215 and National Basic Research Program of China (the 973 program) under grant No. 2013CB329602. This work is partly funded by the Beijing Natural Scientific Foundation of China under grant No. 4122077. This work is also supported by Key Lab of Information Network Security, Ministry of Public Security. 7. REFERENCES [1] A.-L. Barab´asi. The origin of bursts and heavy tails in human dynamics. Nature, 435(7039):207–211, 2005. [2] F. Wu, B. Huberman. Novelty and collective attention. Proc. Natl. Acad. Sci., 104(45):17599-17601, 2007. [3] J. Yang, J. Leskovec. Patterns of temporal variation in online media. In Proc. of WSDM’11, pages 177–186, Feb. 2011, Hong Kong. [4] G. Szabo, B. A. Huberman. Predicting the popularity of online content. Commun. ACM, 53(8):80–88, 2010. [5] K. Lerman, T. Hogg. Using a model of social dynamics to predict popularity of news. In Proc. of WWW ’10, pages 621–630, Apr. 2010, Raleigh, USA. [6] L. Hong, O. Dan, B. D. Davison. Predicting popular messages in twitter. In Proc. of WWW’11, pages 57–58, Mar. 2011, Byderabad, India. [7] J. Ugander, L. Backstrom, C. Marlow, J. Kleinberg. Structural diversity in social contagion. Proc. Natl Acad. Sci., 109(14):5962–5966, 2012.
1505.06791
1
1505
2015-05-26T02:18:07
Tracking Employment Shocks Using Mobile Phone Data
[ "cs.SI", "physics.soc-ph" ]
Can data from mobile phones be used to observe economic shocks and their consequences at multiple scales? Here we present novel methods to detect mass layoffs, identify individuals affected by them, and predict changes in aggregate unemployment rates using call detail records (CDRs) from mobile phones. Using the closure of a large manufacturing plant as a case study, we first describe a structural break model to correctly detect the date of a mass layoff and estimate its size. We then use a Bayesian classification model to identify affected individuals by observing changes in calling behavior following the plant's closure. For these affected individuals, we observe significant declines in social behavior and mobility following job loss. Using the features identified at the micro level, we show that the same changes in these calling behaviors, aggregated at the regional level, can improve forecasts of macro unemployment rates. These methods and results highlight promise of new data resources to measure micro economic behavior and improve estimates of critical economic indicators.
cs.SI
cs
Tracking Employment Shocks Using Mobile Phone Data Jameson L. Toole∗ Engineering Systems Division, MIT, Cambridge, MA, 02144 School of Information Science, University of Pittsburgh, Pittsburgh, PA 15260 Yu-Ru Lin Erich Muehlegger Department of Economics, UC Davis, Davis, CA 95616 Harvard Kennedy School, Harvard University, Cambridge, MA, 02144 Daniel Shoag Department of Civil and Environmental Engineering, MIT, Cambridge, MA, 02144 Marta C. Gonz´alez David Lazer Lazer Laboratory, Department of Political Science and College of Computer and Information Science, Northeastern University, Boston, MA 02115, USA and Harvard Kennedy School, Harvard University, Cambridge, MA, 02144 5 1 0 2 y a M 6 2 ] I S . s c [ 1 v 1 9 7 6 0 . 5 0 5 1 : v i X r a 1 Abstract Can data from mobile phones be used to observe economic shocks and their consequences at multiple scales? Here we present novel methods to detect mass layoffs, identify individuals affected by them, and predict changes in aggregate unemployment rates using call detail records (CDRs) from mobile phones. Using the closure of a large manufacturing plant as a case study, we first describe a structural break model to correctly detect the date of a mass layoff and estimate its size. We then use a Bayesian classification model to identify affected individuals by observing changes in calling behavior following the plant’s closure. For these affected individuals, we observe significant declines in social behavior and mobility following job loss. Using the features identified at the micro level, we show that the same changes in these calling behaviors, aggregated at the regional level, can improve forecasts of macro unemployment rates. These methods and results highlight promise of new data resources to measure micro economic behavior and improve estimates of critical economic indicators. Keywords: unemployment — computational social science — social networks — mobility — complex systems 2 Economic statistics are critical for decision-making by both government and private in- stitutions. Despite their great importance, current measurements draw on limited sources of information, losing precision with potentially dire consequences. The beginning of the Great Recession offers a powerful case study: the initial BEA estimate of the contraction of GDP in the fourth quarter of 2008 was an annual rate 3.8%. The American Recov- ery and Reinvestment Act (stimulus) was passed based on this understanding in February 2009. Less than two weeks after the plan was passed, that 3.8% figure was revised to 6.2%, and subsequent revisions peg the number at a jaw dropping 8.9% – more severe than the worst quarter during the Great Depression. The government statistics were wrong and may have hampered an effective intervention. As participation rates in unemployment surveys drop, serious questions have been raised as to the declining accuracy and increased bias in unemployment numbers [1]. In this paper we offer a methodology to infer changes in the macro economy in near real time, at arbitrarily fine spatial granularity, using data already passively collected from mobile phones. We demonstrate the reliability of these techniques by studying data from two European countries. In the first, we show it is possible to observe mass layoffs and identify the users affected by them in mobile phone records. We then track the mobility and social interactions of these affected workers and observe that job loss has a systematic dampening effect on their social and mobility behavior. Having observed an effect in the micro data, we apply our findings to the macro scale by creating corresponding features to predict unemployment rates at the province scale. In the second country, where the macro-level data is available, we show that changes in mobility and social behavior predict unemployment rates ahead of official reports and more accurately than traditional forecasts. These results demonstrate the promise of using new data to bridge the gap between micro and macro economic behaviors and track important economic indicators. Figure 1 shows a schematic of our methodology. 3 FIG. 1. A schematic view of the relationship between job loss and call dynamics. We use the calling behavior of individuals to infer job loss and measure its effects. We then measure these variables and include them in predictions of unemployment at the macro scale, significantly improving forecasts. MEASURING THE ECONOMY Contemporary macroeconomic statistics are based on a paradigm of data collection and analysis begun in the 1930s [2, 3]. Most economic statistics are constructed from either survey data or administrative records. For example, the US unemployment rate is calculated based on the monthly Current Population Survey of roughly 60,000 households, and the Bureau of Labor Statistics manually collects 80,000 prices a month to calculate inflation. Both administrative databases and surveys can be slow to collect, costly to administer, and fail to capture significant segments of the economy. These surveys can quickly face sample size limitations at fine geographies and require strong assumptions about the consistency of responses over time. Statistics inferred from survey methods have considerable uncertainty and are routinely revised in months following their release as other data is slowly collected [1, 4–6]. Moreover, changes in survey methodology can result in adjustments of reported rates of up to 1-2 percentage points [7]. The current survey-based paradigm also makes it challenging to study the effect of eco- nomic shocks on networks or behavior without reliable self-reports. This has hampered 4 Detect Call SignalsInfer Job LossMacroMicroPredict Unemployment scientific research. For example, many studies have documented the severe negative con- sequences of job loss in the form of difficulties in retirement [8], persistently lower wages following re-employment including even negative effects on children’s outcomes [9, 10], in- creased risk of death and illness [11, 12], higher likelihood of divorce [13], and, unsurprisingly, negative impacts and on happiness and emotional well-being [14]. Due to the cost of ob- taining the necessary data, however, social scientists have been unable to directly observe the large negative impact of a layoff on the frequency and stability of an individual’s social interactions or mobility. PREDICTING THE PRESENT These shortcomings raise the question as to whether existing methods could be supple- mented by large-scale behavioral trace data. There have been substantial efforts to discern important population events from such data, captured by the pithy phrase of, “predict- ing the present” [15–18]. Prior work has linked news stories with stock prices [19–21] and used web search or social media data to forecast labor markets [22–26], consumer behav- ior [27, 28], automobile demand, vacation destinations [15, 29]. Research on social media, search, and surfing behavior have been shown to signal emerging public health problems [30–37]; although for a cautionary tale see [38]. And recent efforts have even been made to- wards leveraging Twitter to detect and track earthquakes in real-time detection faster than seismographic sensors [39–41]. While there are nuances to the analytic approaches taken, the dominant approach has been to extract features from some large scale observational data and to evaluate the predictive (correlation) value of those features with some set of measured aggregate outcomes (such as disease prevalence). Here we offer a twist on this methodology through identification of features from observational data and to cross validate across individual and aggregate levels. All of the applications of predicting the future are predicated in part on the presence of distinct signatures associated with the systemic event under examination. The key analytic challenge is to identify signals that (1) are observable or distinctive enough to rise above the background din, (2) are unique or generate few false positives, (3) contain information beyond well-understood patterns such as calendar-based fluctuations, and (4) are robust to manipulation. Mobile phone data, our focus here, are particularly promising for early detec- 5 tion of systemic events as they combine spatial and temporal comprehensiveness, naturally incorporate mobility and social network information, and are too costly to intentionally manipulate. Data from mobile phones has already proven extremely beneficial to understanding the everyday dynamics of social networks [42–48] and mobility patterns of millions [49–56]. With a fundamental understanding of regular behavior, it becomes possible to explore deviations caused by collective events such as emergencies [57], natural disasters [58, 59], and cultural occasions [60, 61]. Less has been done to link these data to economic behavior. In this paper we offer a methodology to robustly infer changes to measure employment shocks at extremely high spatial and temporal resolutions and improve critical economic indicators. DATA We focus our analysis at three levels: the individual, the community, and the provincial levels. We begin with unemployment at the community (town) level, where we examine the behavioral traces of a large-scale layoff event. At the community and individual levels, we analyze call record data from a service provider with an approximately 15% market share in an undisclosed European country. The community-level data set spans a 15 month period between 2006 and 2007, with the exception of a 6 week gap due to data extraction failures. At the province level, we examine call detail records from a service provider from another European country, with an approximately 20% market share and data running for 36 months from 2006 to 2009. Records in each data set include an anonymous id for caller and callee, the location of the tower through which the call was made, and the time the call occurred. In both cases we examine the universe of call records made over the provider’s network (see SI for more details). OBSERVING UNEMPLOYMENT AT THE COMMUNITY LEVEL We study the closure of an auto-parts manufacturing plant (the plant) that occurred in December, 2006. As a result of the plant closure, roughly 1,100 workers lost their jobs in a small community (the town) of 15,000. Our approach builds on recent papers [52–54, 57] that use call record data to measure social and mobility patterns. 6 There are three mobile phone towers within close proximity of the town and the plant. The first is directly within the town, the second is roughly 3km from the first and is geo- graphically closest to the manufacturing plant, while the third is roughly 6.5km from the first two on a nearby hilltop. In total, these three towers serve an area of roughly 220km2 of which only 6km2 is densely populated. There are no other towns in the region covered by these towers. Because the exact tower through which a call is routed may depend on factors beyond simple geographic proximity (e.g. obstructions due to buildings), we consider any call made from these three towers as having originated from the town or plant. We model the pre-closure daily population of the town as made up of a fraction of individuals γ who will no longer make calls near the plant following its closure and the complimentary set of individuals who will remain (1− γ). As a result of the layoff, the total number of calls made near the plant will drop by an amount corresponding to the daily calls of workers who are now absent. This amounts to a structural break model that we can use to estimate the prior probability that a user observed near the plant was laid off, the expected drop in calls that would identify them as an affected worker, and the time of the closure (see SI for full description of this model). We suspect that some workers laid off from the plant are residents of the town and thus they will still appear to make regular phone calls from the three towers and will not be counted as affected. Even with this limitation, we find a large change in behavior. To verify the date of the plant closing, we sum the number of daily calls from 1955 regular users (i.e. those who make at least one call from the town each month prior to the layoff) connecting through towers geographically proximate to the affected plant. The estimator selects a break date, tlayof f , and pre- and post- break daily volume predictions to minimize the squared deviation of the model from the data. The estimated values are overlaid on daily call volume and the actual closure date in the Figure 2A. As is evident in the figure, the timing of the plant closure (as reported in newspapers and court filings) can be recovered statistically using this procedure - the optimized predictions display a sharp and significant reduction at this date. As a separate check to ensure this method is correctly identifying the break date, we estimate the same model for calls from each individual user i and find a distribution of these dates ti layof f is peaked around the actual layoff date (see Figure 1 in SI). 7 FIG. 2. Identifying the layoff date. A) Total aggregate call volume (black line) from users who make regular calls from towers near the plant is plotted against our model (blue). The model predicts a sudden drop in aggregate call volume and correctly identifies the date of the plant closure as the one reported in newspapers and court records. B) Each of the top 300 users likely to have been laid off is represented by a row where we fill in a day as colored if a call was made near the plant on that day. White space marks the absence of calls. Rows are sorted by the assigned probability of that user being laid off according to our Bayesian model. Users with high probabilities cease making calls near the plant directly following the layoff. C) We see a sharp, sustained drop in the fraction of calls made near the plant by users assigned to the top decile in probability of being unemployed (red) while no affect is seen for the control group users believed to be unaffected (blue). Moreover, we see that laid off individuals have an additional drop off for a two week period roughly 125 days prior the plant closure. This time period was confirmed to be a coordinated vacation for workers providing further evidence we are correctly identifying laid off workers. OBSERVING UNEMPLOYMENT AT THE INDIVIDUAL LEVEL To identify users directly affected by the layoff, we calculate Bayesian probability weights based on changes in mobile phone activity. For each user, we calculate the conditional probability that a user is a non-resident worker laid off as part of the plant closure based on their observed pattern of calls. To do this, we compute the difference in the fraction of days on which a user made a call near the plant in 50 days prior to the week of the layoff. We denote this difference as ∆q = qpre − qpost. We consider each user’s observed difference a single realization of a random variable, ∆q. Under the hypothesis that there is no change in (cid:113) qpre(1−qpre) 50 + qpost(1−qpost) 50 ). Under the behavior, the random variable ∆q is distributed N (0, (cid:113) qpre(1−qpre) 50 alternative hypothesis the individual’s behavior changes pre- and post-layoff, the random variable ∆q is distributed N (d, + qpost(1−qpost) 50 ), where d is the mean reduction in calls from the plant for non-resident plant workers laid off when the plant was closed. We assign user i the following probability of having been laid off given his or her calling pattern: 8 -60-40-200204060Day750800850900950Callsdatamodel-200-1000100200Day0.00.10.20.30.40.50.6Fraction of Calls Near PlantClosing DateVacationControlUnemployed-60-40-200204060Day750800850900950Callsdatamodel-200-1000100200Day0.00.10.20.30.40.50.6Fraction of Calls Near PlantClosing DateVacationControlUnemployedAweekendsClosing DateBCCall nearplantNo Call Users ranked by P(laidoff) P (laidof f )i = γP (∆q∆q = d) γP (∆q∆q = d) + (1 − γ)P (∆q∆q = 0) (1) Calculating the probabilities requires two parameters, γ, our prior that an individual is a non-resident worker at the affected plant and d, the threshold we use for the alternative hypothesis. The values of γ = 5.8% and d = 0.29 are determined based on values fit from the model in the previous section. Validating the Layoff On an individual level, Figure 2B shows days on which each user makes a call near the plant ranked from highest to lowest probability weight (only the top 300 users are shown, see Figure 2 in SI for more users). Users highly suspected of being laid off demonstrate a sharp decline in the number of days they make calls near the plant following the reported closure date. While we do not have ground-truth evidence that any of these mobile phone users was laid off, we find more support for our hypothesis by examining a two week period roughly 125 days prior to the plant closure. Figure 2C shows a sharp drop in the fraction of calls coming from this plant for users identified as laid off post closure. This period corresponds to a confirmed coordinated holiday for plant workers and statistical analysis confirms a highly significant break for individuals classified as plant workers in the layoff for this period. Given that we did not use call data from this period in our estimation of the Bayesian model, this provides strong evidence that we are correctly identifying the portion of users who were laid off by this closure. In aggregate, we assign 143 users probability weights between 50% and 100%. This represents 13% of the pre-closure plant workforce and compares closely with the roughly 15% national market share of the service provider. ASSESSING THE EFFECT OF UNEMPLOYMENT AT THE INDIVIDUAL LEVEL We now turn to analyzing behavioral changes associated with job loss at the individual level. We first consider six quantities related to the monthly social behavior: A) total calls, B) number of incoming calls, C) number of outgoing calls, D) calls made to individuals physically located in the town of the plant (as a proxy for contacts made at work), E) number of unique contacts, and F) the fraction of contacts called in the previous month 9 FIG. 3. Changes in social networks and mobility following layoffs. We quantify the effect of mass layoffs relative to two control groups: users making regular calls from the town who were not identified as laid off and a random sample of users from the rest of the country. We report monthly point estimates for six social and three mobility behaviors: A) Total calls, B) number of incoming calls, C) number of outgoing calls, D) Fraction of calls to individuals in the town at the time of the call, E) number of unique contacts, and the fraction of individuals called in the previous month who were not called in the current month (churn), G) Number of unique towers visited, H) radius of gyration, I) average distance from most visited tower. Pooling months pre- and post-layoff yield statistically significant changes in monthly social network and mobility metrics following a mass layoff. J) Reports regression coefficient for each of our 9 dependent variables along with the 66% and 95% confidence intervals. that were not called in the current month, referred to as churn. In addition to measuring social behavior, we also quantify changes in three metrics related to mobility: G) number of unique locations visited, H) radius of gyration, and I) average distance from most visited tower (see SI for detailed definitions of these variables). To guard against outliers such as long trips for vacation or difficulty identifying important locations due to noise, we only consider months for users where more than 5 calls were made and locations where a user recorded more than three calls. We measure changes in these quantities using all calls made by each user (not just those near the plant) relative to months prior to the plant closure, weighting measurements by 10 -0.3-0.2-0.10.00.10.2CallsIncomingOutgoing-0.3-0.2-0.10.00.10.2To TownContactsChurn-50050100150200Day-0.3-0.2-0.10.00.10.2Towers-50050100150200Day-50050100150200DayRandomTownClosing DateClosing DateClosing DateMonthly changes in behavior following a mass layoffAGFEDCBIH-0.8-0.6-0.4-0.20.00.2Percent ChangeLog(Inc)Log(Out)Log(Calls)Log(Towers)-0.10-0.050.000.050.10Percentage PointsTo TownChurn-3.0-2.5-2.0-1.5-1.0-0.50.0Number of ContactsContactsSummary: Effects of mass layoffs on social behavior and mobilityMobilitySocialRandomTownDependent variableJ the probability an individual is laid off and relative to two reference groups: individuals who make regular calls from the town but were not believed to be laid off (mathematically we weight this group using the inverse weights from our bayesian classifier) and a random sample of 10,000 mobile phone users throughout the country (all users in this sample are weighted equally). Figure 3A-I shows monthly point estimates of the average difference between relevant characteristics of users believed to be laid off compared to control groups. This figure shows an abrupt change in variables in the month directly following the plant closure. Despite this abrupt change, data at the individual level are sufficiently noisy that the monthly point estimates are not significantly different from 0 in every month. However, when data from months pre- and post-layoff are pooled, these differences are robust and statistically significant. The right panel of Figure 3 and Table I in the SI show the results of OLS regressions comparing the pre-closure and post-closure periods for laid-off users relative to the two reference groups (see SI for detailed model specification as well as confidence intervals for percent changes pre- and post-layoff for each variable). The abrupt and sustained change in monthly behavior of individuals with a high probability of being laid off is compelling evidence in support of using mobile phones to detect mass layoffs with mobile phones. We find that the total number of calls made by laid off individuals drops 51% and 41% following the layoff when compared to non-laid off residents and random users, respectively. Moreover, this drop is asymmetric. The number of outgoing calls decreases by 54% percent compared to a 41% drop in incoming calls (using non-laid off residents as a baseline). Sim- ilarly, the number of unique contacts called in months following the closure is significantly lower for users likely to have been laid off. The fraction of calls made by a user to some- one physically located in the town drops 4.7 percentage points for laid off users compared to residents of the town who were not laid off. Finally, we find that the month-to-month churn of a laid off person’s social network increases roughly 3.6 percentage points relative to control groups. These results suggest that a user’s social interactions see significant decline and that their networks become less stable following job loss. This loss of social connections may amplify the negative consequences associated with job loss observed in other studies. For our mobility metrics, find that the number of unique towers visited by laid-off individ- uals decreases 17% and 20% relative to the random sample and town sample, respectively. Radius of gyration falls by 20% and 22% while the average distance a user is found from 11 the most visited tower also decrease decreases by 26% relative to reference groups. These changes reflect a general decline in the mobility of individuals following job loss, another potential factor in long term consequences. OBSERVING UNEMPLOYMENT AT THE PROVINCE LEVEL The relationship between mass layoff events and these features of CDRs suggests a poten- tial for predicting important, large-scale unemployment trends based on the population’s call information. Provided the effects of general layoffs and unemployment are similar enough to those due to mass layoffs, it may be possible to use observed behavioral changes as additional predictors of general levels of unemployment. To perform this analysis, we use another CDR data set covering approximately 10 million subscribers in a different European country, which has been studied in prior work [44, 45, 52–54, 57]. This country experienced enormous macroeconomic disruptions, the magnitude of which varied regionally during the period in which the data are available. We supplement the CDR data set with quarterly, province-level unemployment rates from the EU Labor Force Survey, a large sample survey providing data on regional economic conditions within the EU (see SI for additional details). We compute seven aggregated measures identified in the previous section: call volume, incoming calls, outgoing calls, number of contacts, churn, number of towers, and radius of gyration. Distance from home was omitted due to strong correlation with radius of gyration while calls to the town was omitted because it is not applicable in a different country. For reasons of computational cost, we first take a random sample of 3000 mobile phone users for each province. The sample size was determined to ensure the estimation feature values are stable (see SI Figure 6 for details). We then compute the seven features aggregated per month for each individual user. The k-th feature value of user i at month t is denoted as yi,t,k and we compute month over month changes in this quantity as y(cid:48) normalized feature value for a province s, is computed by averaging all users in selected i,t,k = yi,t,k yi,t−1,k . A province ¯ys,t,k =(cid:80) i∈s y(cid:48) i,t,k. In addition, we use percentiles of the bootstrap distribution to compute the 95% confidence interval for the estimated feature value. After aggregating these metrics to the province level, we assess their power to improve predictions of unemployment rates. Note that we do not attempt to identify mass layoffs in this country. Instead, we look for behavioral changes that may have been caused by 12 layoffs and see if these changes are predictive of general unemployment statistics. First, we correlate each aggregate measure with regional unemployment separately, finding significant correlations in the same direction as was found for individuals (see Table II in the SI). We also find the strong correlations between calling behavior variables, suggesting that principal component analysis (PCA) can reasonably be used to construct independent variables that capture changes in calling behavior while guarding against co-linearity. The first principal component, with an eigenvalue of 4.10, captures 59% of the variance in our data and is the only eigenvalue that satisfies the Kaiser criterion. The loadings in this component are strongest for social variables. Additional details on the results of PCA can be found in the SI Tables III and IV. Finally, we compute the scores for the first component for each observation and build a series of models that predict quarterly unemployment rates in provinces with and without the inclusion of this representative mobile phone variable. First, we predict the present by estimating a regression of a given quarter’s unemployment on calling behavior in that quarter (e.g. using phone data from Q1 to predict unemployment in Q1). As phone data is available the day a quarter ends, this method can produce predic- tions weeks before survey results are tabulate and released. Next, we predict the future in a more traditional sense by estimating a regression on a quarter’s surveyed unemployment rate using mobile phone data from last quarter as a leading indicator (e.g. phone metrics from Q1 to predict unemployment rates in Q2). This method can produce more predictions months before surveys are even conducted. See Figure 3 in the SI for a detailed timeline of data collection, release, and prediction periods. We have eight quarters of unemploy- ment data for 52 provinces. We make and test our predictions by training our models on half of the provinces and cross-validate by testing on the other half. The groups are then switched to generate out of sample predictions for all provinces. Prediction results for an AR1 model that includes a CDR variable are plotted against actual unemployment rates in Figure 4. We find strong correlation coefficients between predictions of predictions of present unemployment rates (ρ = 0.95) as well as unemployment rates one quarter in the future (ρ = 0.85). As advocated in [38] it is important to benchmark these type of prediction algorithms against standard forecasts that use existing data. Previous work has shown that the perfor- mance of most unemployment forecasts is poor and that simple linear models routinely out- perform complicated non-linear approaches [62–65] and the dynamic stochastic general equi- 13 librium (DSGE) models aimed at simulating complex macro economic interactions [66, 67]. With this in mind, we compare predictions made with and without mobile phone covariates using three different model specifications: AR1, AR1 with a quadratic term (AR1 Quad), AR1 with a lagged national GDP covariate (AR1 GDP). In each of these model specifica- tions, the coefficient related to the principal component CDR score is highly significant and negative as expected given that the loadings weigh heavily on social variables that declined after a mass layoff (see tables V and VI in the SI regression results). Moreover, adding metrics derived from mobile phone data significantly improves forecast accuracy for each model and reduces the root mean squared error of unemployment rate predictions by be- tween 5% and 20% (see inserts in Figure 4). As additional checks that we are capturing true improvements, we use mobile phone data from only the first half of each quarter (before surveys are even conducted) and still achieve a 3%-10% improvement in forecasts. These results hold even when variants are run to include quarterly and province level fixed effects (see tables VII and VIII in the SI). In summary, we have shown that features associated with job loss at the individual level are similarly correlated with province level changes in unemployment rates in a separate country. Moreover, we have demonstrated the ability of massive, passively collected data to identify salient features of economic shocks that can be scaled up to measure macro economic changes. These methods allow us to predict “present” unemployment rates two to eight weeks prior to the release of traditional estimates and predict “future” rates up to four months ahead of official reports more accurately than using historical data alone. DISCUSSION We have presented algorithms capable of identifying employment shocks at the individual, community, and societal scales from mobile phone data. These findings have great practi- cal importance, potentially facilitating the identification of macro-economic statistics with much finer spatial granularity and faster than traditional methods of tracking the economy. We can not only improve estimates of the current state of the economy and provide predic- tions faster than traditional methods, but also predict future states and correct for current uncertainties. Moreover, with the quantity and richness of these data increasing daily, these results represent conservative estimates of its potential for predicting economic indicators. 14 FIG. 4. Predicting unemployment rates using mobile phone data. We demonstrate that aggregating measurements of mobile phone behaviors associated with unemployment at the individual level also predicts unemployment rates at the province level. To make our forecasts, we train various models on data from half of the provinces and use these coefficients to predict the other half. Panel A compares predictions of present unemployment rates to observed rates and Panel B shows predictions of unemployment one quarter ahead using an AR1 model that includes co-variates of behaviors measured using mobile phones. Both predictions correlate strongly with actual values while changes in rates are more difficult to predict. The insets show the percent improvement to the RMSE of predictions when mobile phone co-variates are added to various baseline model specifications. In general, the inclusion of mobile phone data reduces forecast errors by 5% to 20%. The ability to get this information weeks to months faster than traditional methods is ex- tremely valuable to policy and decision makers in public and private institutions. Further, it is likely that CDR data are more robust to external manipulation and less subject to service 15 AB provider algorithmic changes than most social media [38]. But, just as important, the micro nature of these data allow for the development of new empirical approaches to study the effect of economic shocks on interrelated individuals. While this study highlights the potential of new data sources to improve forecasts of critical economic indicators, we do not view these methods as a substitute for survey based approaches. Though data quantity is increased by orders of magnitude with the collection of passively generated data from digital devices, the price of this scale is control. The researcher no longer has the ability to precisely define which variables are collected, how they are defined, when data collection occurs making it much harder to insure data quality and integrity. In many cases, data is not collected by the researcher at all and is instead first pre-processed by the collector, introducing additional uncertainties and opportunities for contamination. Moreover, data collection itself is now conditioned on who has specific devices and services, introducing potential biases due to economic access or sorting. If policy decisions are based solely on data derived from smartphones, the segment of the population that cannot afford these devices may be underserved. Surveys, on the other hand, provide the researcher far more control to target specific groups, ask precise questions, and collect rich covariates. Though the expense of creating, administering, and participating in surveys makes it difficult to collect data of the size and frequency of newer data sources, they can provide far more context about participants. This work demonstrates the benefits of both data gathering methods and shows that hybrid models offer a way to leverage the advantages of each. Traditional survey based forecasts are improved here, not replaced, by mobile phone data. Moving forward we hope to see more such hybrid approaches. Projects such as the Future Mobility Survey[68] and the MIT Reality Mining project [24] bridge this gap by administering surveys via mobile devices, allowing for the collection of process generated data as well as survey based data. These projects open the possibility to directly measure the correlation between data gathered by each approach. The macro-economy is the complex concatenation of interdependent decisions of millions of individuals [69]. To have a measure of the activity of almost every individual in the economy, of their movements and their connections should transform our understanding of the modern economy. Moreover, the ubiquity of such data allows us to test our theories at scales large and small and all over the world with little added cost. We also note poten- 16 tial privacy and ethical issues regarding the inference of employment/unemployment at the individual level, with potentially dire consequences for individuals’ access, for example, to financial markets. With the behavior of billions being volunteered, captured, and stored at increasingly high resolutions, these data present an opportunity to shed light on some of the biggest problems facing researchers and policy makers alike, but also represent an ethical conundrum typical of the “big data” age. ACKNOWLEDGMENTS Jameson L. Toole received funding from the National Science Foundation Graduate Re- search Fellowship Program (NSF GRFP). AUTHOR CONTRIBUTIONS Jameson L. Toole designed and performed data analysis and wrote the paper. Yu-Ru Lin designed and performed data analysis and wrote the paper. Daniel Shoag designed and performed data analysis and wrote the paper. Erich Muehlegger designed and performed data analysis and wrote the paper. Marta C. Gonzalez provided data and edited the paper. David Lazer designed analysis, provided data, and wrote the paper. ∗ [email protected] [1] Krueger, A., Mas, A. & Niu, X. The evolution of rotation group bias: Will the real unem- ployment rate please stand up? Tech. Rep., National Bureau of Economic Research (2014). [2] Marcuss, D. & Kane, R. E. Us national income and product statistics born of the great depression and world war ii. Tech. Rep., Bureau of Economic Analysis (2007). [3] Card, D. Origins of the Unemployment Rate: The Lasting Legacy of Measurement without Theory. American Economic Review 101, 552–557 (2011). [4] Hausman, J. & Leibtag, E. CPI Bias from Supercenters: Does the BLS Know that Wal-Mart Exists? Tech. Rep., National Bureau of Economic Research (2004). [5] Jones, S. R. G. & Riddell, W. C. The Measurement of Unemployment: An Empirical Ap- proach. Econometrica 67, 147–162 (1999). 17 [6] Burda, M. C., Hamermesh, D. S. & Stewart, J. Cyclical Variation in Labor Hours and Productivity Using the ATUS. Tech. Rep., National Bureau of Economic Research (2012). [7] Tiller, R. & Welch, M. Predicting the National unemployment rate that the ”old” CPS would have produced. In Proceedings of the Section on Survey Research Methods, American Statistical Association (1994). [8] Chan, S. & Stevens, A. H. Employment and retirement following a late-career job loss. American Economic Review 211–216 (1999). [9] Ruhm, C. J. Are workers permanently scarred by job displacements? The American Economic Review 319–324 (1991). [10] Oreopoulos, P., Page, M. & Stevens, A. H. The intergenerational effects of worker displace- ment. Journal of Labor Economics 26, 0–455 (2008). [11] Sullivan, D. & Von Wachter, T. Job displacement and mortality: An analysis using adminis- trative data. The Quarterly Journal of Economics 124, 1265–1306 (2009). [12] Classen, T. J. & Dunn, R. A. The effect of job loss and unemployment duration on suicide risk in the United States: a new look using mass-layoffs and unemployment duration. Health economics 21, 338–350 (2012). [13] Charles, K. K. & Stephens Jr, M. Job displacement, disability, and divorce. Tech. Rep., National bureau of economic research (2001). [14] Krueger, A. B., Mueller, A., Davis, S. J. & Sahin, A. Job search, emotional well-being, and job finding in a period of mass unemployment: Evidence from high frequency longitudinal data [with comments and discussion]. Brookings Papers on Economic Activity pp. 1–81 (2011). [15] Choi, H. & Varian, H. Predicting initial claims for unemployment benefits. Google Inc (2009). [16] Vespignani, A. Predicting the behavior of techno-social systems. Science 325, 425–8 (2009). [17] Lazer, D. et al. Computational Social Science. Science 323, 721–723 (2009). [18] Henderson, J. V., Storeygard, A. & Weil, D. N. Measuring Economic Growth from Outerspace. The American Economic Review 102, 994–1028 (2012). [19] Hayo, B. & Kutan, A. M. The impact of news, oil prices, and global market developments on Russian financial markets1. Economics of Transition 13, 373–393 (2005). [20] Lavrenko, V. et al. Mining of concurrent text and time series. In KDD-2000 Workshop on Text Mining, 37–44 (Citeseer, 2000). 18 [21] Schumaker, R. P. & Chen, H. Textual analysis of stock market prediction using breaking financial news: The AZFin text system. ACM Transactions on Information Systems (TOIS) 27, 12 (2009). [22] Ettredge, M., Gerdes, J. & Karuga, G. Using web-based search data to predict macroeconomic statistics. Communications of the ACM 48, 87–92 (2005). [23] Askitas, N. & Zimmermann, K. F. Google econometrics and unemployment forecasting (2009). [24] Eagle, N. & Pentland, A. Reality mining: Sensing complex social systems. Personal and Ubiquitous Computing 10, 255–268 (2006). [25] Suhoy, T. Query indices and a 2008 downturn: Israeli data (Research Department, Bank of Israel, 2009). [26] Antenucci, D., Cafarella, M., Levenstein, M., R´e, C. & Shapiro, M. D. Using Social Media to Measure Labor Market Flows. Tech. Rep., National Bureau of Economic Research (2014). [27] Goel, S., Hofman, J. M., Lahaie, S., Pennock, D. M. & Watts, D. J. Predicting consumer behavior with Web search. Proceedings of the National Academy of Sciences 107, 17486–17490 (2010). [28] Gelman, M., Kariv, S., Shapiro, M. D., Silverman, D. & Tadelis, S. Harnessing naturally occurring data to measure the response of spending to income. Science 345, 212–215 (2014). [29] Choi, H. & Varian, H. Predicting the Present with Google Trends. Economic Record 88, 2–9 (2012). [30] Ginsberg, J. et al. Detecting influenza epidemics using search engine query data. Nature 457, 1012–1014 (2008). [31] Aramaki, E., Maskawa, S. & Morita, M. Twitter catches the flu: detecting influenza epidemics using Twitter. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, 1568–1576 (Association for Computational Linguistics, 2011). [32] Chew, C. & Eysenbach, G. Pandemics in the age of Twitter: content analysis of Tweets during the 2009 H1N1 outbreak. PloS one 5, e14118 (2010). [33] Culotta, A. Towards detecting influenza epidemics by analyzing Twitter messages. In Pro- ceedings of the first workshop on social media analytics, 115–122 (ACM, 2010). [34] Gomide, J. et al. Dengue surveillance based on a computational model of spatio-temporal locality of Twitter. In Proceedings of the 3rd International Web Science Conference, 3 (ACM, 2011). 19 [35] de Quincey, E. & Kostkova, P. Early warning and outbreak detection using social networking websites: The potential of twitter. In Electronic healthcare, 21–24 (Springer, 2010). [36] Zamite, J. a., Silva, F. A. B., Couto, F. & Silva, M. J. MEDCollector: Multisource epidemic data collector. In Transactions on large-scale data-and knowledge-centered systems IV, 40–72 (Springer, 2011). [37] Signorini, A., Segre, A. M. & Polgreen, P. M. The use of Twitter to track levels of disease activity and public concern in the US during the influenza A H1N1 pandemic. PloS one 6, e19467 (2011). [38] Lazer, D., Kennedy, R., King, G. & Vespignani, A. Big data. The parable of Google Flu: traps in big data analysis. Science (New York, N.Y.) 343, 1203–5 (2014). [39] Sakaki, T., Okazaki, M. & Matsuo, Y. Earthquake shakes twitter users: real-time event detection by social sensors. In Proceedings of the 19th international conference on World wide web, 851–860 (ACM, 2010). [40] Guy, M., Earle, P., Ostrum, C., Gruchalla, K. & Horvath, S. Integration and dissemina- tion of citizen reported and seismically derived earthquake information via social network technologies. In Advances in intelligent data analysis IX, 42–53 (Springer, 2010). [41] Earle, P., Bowden, D. & Guy, M. Twitter earthquake detection: earthquake monitoring in a social world. Annals of Geophysics 54, 708–715 (2012). [42] Barab´asi, A.-L. The origin of bursts and heavy tails in human dynamics. Nature 435, 207–211 (2005). [43] Rybski, D., Buldyrev, S. V., Havlin, S., Liljeros, F. & Makse, H. A. Scaling laws of hu- man interaction activity. Proceedings of the National Academy of Sciences 106, 12640–12645 (2009). [44] Onnela, J.-P., Arbesman, S., Gonz´alez, M. C., Barab´asi, A.-L. & Christakis, N. A. Geographic Constraints on Social Network Groups. PLoS ONE 6, 7 (2011). [45] Onnela, J.-P. et al. Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences of the United States of America 104, 7332–7336 (2007). [46] Cho, E., Myers, S. A. & Leskovec, J. Friendship and mobility. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining KDD 11, KDD ’11, 1082 (ACM Press, 2011). 20 [47] Goncalves, B. & Ramasco, J. J. Human dynamics revealed through Web analytics. Physical Review E 78, 7 (2008). [48] Bond, R. M. et al. A 61-million-person experiment in social influence and political mobiliza- tion. Nature 489, 295–298 (2012). [49] Balcan, D. et al. Multiscale mobility networks and the spatial spreading of infectious diseases. Proceedings of the National Academy of Sciences of the United States of America 106, 21484–9 (2009). [50] Han, X.-P., Hao, Q., Wang, B.-H. & Zhou, T. Origin of the scaling law in human mobility: Hierarchy of traffic systems. Physical Review E 83, 2–6 (2011). [51] Brockmann, D., Hufnagel, L. & Geisel, T. The scaling laws of human travel. Nature 439, 462–5 (2006). [52] Gonz´alez, M. C., Hidalgo, C. A. & Barab´asi, A.-L. Understanding individual human mobility patterns. Nature 453, 779–782 (2008). [53] Song, C., Qu, Z., Blumm, N. & Barab´asi, A.-L. Limits of predictability in human mobility. Science 327, 1018–1021 (2010). [54] Song, C., Koren, T., Wang, P. & Barab´asi, A.-L. Modelling the scaling properties of human mobility. Nature Physics 6, 818–823 (2010). [55] Deville, P. et al. Dynamic population mapping using mobile phone data. Proceedings of the National Academy of Sciences 1408439111– (2014). [56] Yan, Xiao-Yong, Zhao, Chen, Fan, Ying, Di, Zengru, & Wang, Wen-Xu Universal predictabil- ity of mobility patterns in cities Journal of the Royal Society Interface 11, (2014). [57] Bagrow, J. P., Wang, D. & Barab´asi, A.-L. Collective Response of Human Populations to Large-Scale Emergencies. PLoS ONE 6, 8 (2011). [58] Blumenstock, J. E., Fafchamps, M. & Eagle, N. Risk and Reciprocity Over the Mobile Phone Network: Evidence from Rwanda. SSRN Electronic Journal (2011). [59] Lu, X., Bengtsson, L. & Holme, P. Predictability of population displacement after the 2010 Haiti earthquake. Proceedings of the National Academy of Sciences of the United States of America 109, 11576–81 (2012). [60] Calabrese, F., Colonna, M., Lovisolo, P., Parata, D. & Ratti, C. Real-Time Urban Monitoring Using Cell Phones: A Case Study in Rome 12, 141–151 (2011). [61] Calabrese, F. & Ratti, C. Real Time Rome. NETCOM 20, 247–258 (2006). 21 [62] Montgomery, A. L., Zarnowitz, V., Tsay, R. S. & Tiao, G. C. Forecasting the us unemployment rate. Journal of the American Statistical Association 93, 478–493 (1998). [63] Milas, C. & Rothman, P. Out-of-sample forecasting of unemployment rates with pooled STVECM forecasts. International Journal of Forecasting 24, 101–121 (2008). [64] Schuh, S. An evaluation of recent macroeconomic forecast errors. New England Economic Review 35–56 (2001). [65] Stock, J. H. & Watson, M. W. A Comparison of Linear and Nonlinear Univariate Models for Forecasting Macroeconomic Time Series. Tech. Rep., National Bureau of Economic Research (1998). [66] Rossi, B. Do DSGE Models Forecast More Accurately Out-of-Sample than VAR Models? Advances in Econometrics 32, 27–79 (2013). [67] Edge, R. M., Gurkaynak, R. S., REIS, R. & SIMS, C. A. How useful are estimated dsge model forecasts for central bankers?[with comments and discussion]. Brookings Papers on Economic Activity 209–259 (2010). [68] Cottrill, C. D., Pereira, F. C., Zhao, F., Dias, I. F., Lim, H. B., Ben-Akiva, M. E., & Zegras, P. C. Future mobility survey. Transportation Research Record: Journal of the Transportation Research Board 2354, 59-67 (2013). [69] Krugman, P. R. The Self Organizing Economy (Blackwell Publishers, 1996). SUPPLEMENTARY INFORMATION Materials and Methods CDR Data set 1 (D1): We analyze call detail records (CDRs) from two industrialized European countries. In the first country, we obtain data on 1.95 million users from a service provider with roughly 15% market share. The data run for 15 months across the years 2006 and 2007, with the exception of a gap between August and September 2006. Each call record includes a de-identified caller and recipient IDs, the locations of the caller’s and recipient’s cell towers and the length of the call. Caller or recipients on other network carriers are assigned random IDs. There are approximately 1.95 million individuals identified in the data, 453 million calls, and 16 million hours of call time. The median user makes or receives 90 calls per months. 22 CDR Data set 2 (D2): The second data set contains 10 million users (roughly 20% mar- ket share) within a single country over three years of activity. Like D1, each billing record for voice and text services, contains the unique identifiers of the caller placing the call and the callee receiving the call, an identifier for the cellular antenna (tower) that handled the call, and the date and time when the call was placed. Coupled with a data set describing the locations (latitude and longitude) of cellular towers, we have the approximate location of the caller when placing the call. For this work we do not distinguish between voice calls and text messages, and refer to either communication type as a “call.” However, we also possess identification numbers for phones that are outside the service provider but that make or receive calls to users within the company. While we do not possess any other information about these lines, nor anything about their users or calls that are made to other numbers outside the service provider, we do have records pertaining to all calls placed to or from those ID numbers involving sub- scribers covered by our data set. Thus egocentric networks between users within the company and their immediate neighbors only are complete. This information was used to generate egocentric communication networks and to compute the features described in the main text. From this data set, we generate a random sample population of k users for each of the provinces, and track each user’s call history during our 27-month tracking period (from December 2006 to March 2009). We discuss how the sample size is chosen in a following subsection. Finally, we note that due to an error in data extraction from the provider, we are missing data for Q4 in 2007. The use of CDR data to study mobility and social behaviors on a massive scale is becoming increasingly common. In addition to its large scale, its format is generally consistent between countries and mobile operators. In the context of this study, each mobile phone data set contains five columns: 1) an anonymized, unique identifier for the caller, 2) the ID of the tower through which the caller;s call was routed, 3) an anonymized, unique identifier of the receiver of the call, 4) the ID of the tower through which the receiver’s call was routed, and 5) the timestamp down to the second which the call was initiated. In order to obtain the location of both caller and receiver, data is restricted to only calls between members of the same mobile operator. The tower IDs reflect the tower used upon starting the call and we have no information on changes in location that may be made during the call. We also 23 obtain a list of latitudes and longitudes marking the coordinates of each tower. Although calls are generally believed to be routed through the tower that is geographically closest to the phone, this may not be the case if the signal is obscured by buildings or topology. For this reason, we consider a cluster of towers near the geographic area in question instead of a single tower. To ensure privacy of mobile phone subscribers, all identifiers were anonymized before we received the data and no billing or demographic information was provided on individuals or in aggregate. Filtering CDR Data We limit our sample to mobile phone users who either make or receive at least ten calls connecting through one of the three cell towers closest to the manufacturing plant of interest. In addition, we require that users make at least one call in each month spanned by a given data set to ensure users are still active. Manufacturing plant closure We gather information on a large manufacturing plant closing that affected a small com- munity within the service provider’s territory from news articles and administrative sources collected by the country’s labor statistics bureau. The plant closure occurred in Decem- ber 2006 and involved 1,100 employees at an auto-parts manufacturing plant in a town of roughly 15,000 people. Town Level Structural Break Model We model the pre-closure daily population of the town as consisting of three segments: a fraction of non-resident plant workers γ, a fraction of resident workers µ, and a fraction of non-workers normalized to (1 − γ − µ). We postulate that each individual i has a flow probability of making or receiving a call at every moment pi. Workers spend a fraction ψ of their day at their jobs and thus make, in expectation, piψ call on a given day during work hours. When losing their job in the town, both resident and non-resident workers are 24 re-matched in national, not local, labor market. Given this model, the expected daily number of cell phone subscribers making or receiving calls from the three towers serving the plant and town: γψ ¯p + (1 − γ)¯p for t < tlayof f µ(1 − ψ)¯p + (1 − γ − µ)¯p for t ≥ tlayof f vol = This model predicts a discrete break in daily volume from the towers proximate to the plant of (γ + µ)ψ ¯p at the date tlayof f . For workers, the predicted percentage change in call volume from these towers is (γ+µ)ψ ¯p (µ¯p+γψ ¯p. Non-workers experience no change. 25 Individual Structural Break Model We fit a model similar to the community structural break model to data for each individual user, i, based on the probability they made a call from the town on each day. For each individual, we use the non-linear estimator to select a break date ti and post- break daily probabilities pi,t<ti layof f and pi,t>ti layof f layof f , and constant pre- to minimize the squared deviation from each individuals’ data. Figure 5 plots the distribution of break-dates for individuals. As expected, there is a statistically significant spike in the number of individuals experiencing a break in the probability of making a call from the town at the time of the closure and significantly fewer breaks on other, placebo dates. These two methods provide independent, yet complementary ways of detecting mass layoffs in mobile phone data. FIG. 5. We plot the distribution of break dates for the structural break model estimated for individuals. We find a strong, statistically significant peak centered on the reported closure date (red) with far fewer breaks on other, placebo dates. This is consistent with both our community wide model as well as the Bayesian model presented above. 26 -60-40-200204060Day0.000.010.020.030.040.050.060.07Density of UsersClosing DateEstimated Individual Layoff Dates Bayesian Estimation On an individual level, Figure 6A shows days on which each user makes a call near the plant ranked from highest to lowest probability weight. Figure 6B provides greater detail for users probability weights between 50% and 100%. Users highly suspected of being laid off demonstrate a sharp decline in the number of days they make calls near the plant following the reported closure date. Figure 6C graphs the inverse cumulative distribution of probability weights. While we do not have ground-truth evidence that any of these mobile phone users was laid off, we find more support for our hypothesis by examining a two week period roughly 125 days prior to the plant closure. Figures 6A and 6B illustrate that the call patterns of users assigned the highest probabil- ities change significantly after the plant closure. These users make calls from the town on a consistent basis before the layoff, but make significantly fewer calls from the town afterwards. In contrast, the call patterns of users assigned the lowest weights do not change following the plant closure. In aggregate, we assign 143 users probability weights between 50% and 100%. This represents 13% of the pre-closure plant workforce this fraction compares closely with the roughly 15% national market share of the service provider. The European Labor Force Survey Each quarter, many European countries are required to conduct labor force surveys to measure important economic indicators like the unemployment rates studied here. In person or telephone interviews concerning employment status are conducted on a sample size of less than 0.5% of the population. Moreover, participants are only asked to provide responses about their employment status during a 1 week period in the quarter. These “microdata” surveys are then aggregated at the province and national levels. Con- firmed labor force reports and statistics for a particular quarter are released roughly 14 weeks after the quarter has ended. For example, Q1 of 2012 begins January 1st, 2012 and ends March 31st, 2012. The survey data is analyzed and unemployment numbers are released between two and three weeks following the end of the quarter. These numbers, however, are unconfirmed and subject to revisions which can occur at any time in the following quarters. 27 FIG. 6. Identifying affected individuals. A) Each user is represented by a row where we fill in a day as colored if a call was made near the plant on that day. White space marks the absence of calls. Rows are sorted by the assigned probability of that user being laid off. B) A closer view of the users identified as mostly to have been laid off reveals a sharp cut off in days on which calls were made from the plant. C) An inverse cumulative distribution of assigned probability weights. The insert shows an enlarged view at the probability distribution for the 150 individuals deemed most likely to have been laid off. The Effect of Job Loss on Call Volumes We measure the effect of job loss on six properties of an individual’s social behavior and three mobility metrics. CDR Metrics Calls:: The total number of calls made and received by a user in a given month. 28 FIG. 7. A timeline showing the various data collection and reporting periods. Traditional survey method perform surveys over the course of a single week per quarter, asking participants about their employment status during a single reference week. Unofficial survey results, subject to revision are then released a few weeks following the end of the quarter. Mobile phone data, however, is continually collected throughout the quarter and is available for analysis at any time during the period. Analysis of a given quarter can be performed and made available immediately following the end of the month. Incoming:: The number of calls received by a user in a given month. Outgoing:: The number of calls made by a user in a given month Contacts:: The number of unique individuals contacted by a user each month. Includes calls made and received. To Town:: The fraction of a user’s calls made each month to another user who is physically located in the town of the plant closure at the time the call was made. Churn:: The fraction of a user’s contacts called in the previous month that was not called in the current month. Let Ct be the set of users called in month t. Churn is then calculated as: churnt = 1 − Ct−1−Ct Ct−1 . Towers:: The number of unique towers visited by a user each month. (cid:80)n Radius of Gyration, Rg:: The average displacement of a user from his or her center of j=1 (cid:126)rj − (cid:126)rcm2, where n is the number of calls made by a user in the month and rcm is the center of mass calculated by averaging the positions of all mass: Rg = (cid:113) 1 n a users calls that month. To guard against outliers such as long trips for vacation or difficulty identifying important locations due to noise, we only consider months for 29 users where more than 5 calls were made and locations that where a user recorded more than three calls. (cid:80)n Average Distance from Top Tower, R1:: The average displacement of a user from their j=1 (cid:126)rj − (cid:126)r12, where n is the number of calls made by a user in the month and r1 is the coordinates of the location most visited by the most called location: R1 = (cid:113) 1 n user. To guard against outliers such as long trips for vacation or difficulty identifying important locations due to noise, we only consider months for users where more than 5 calls were made and locations that where a user recorded more than three calls. Measuring Changes For each user i, we compute these metrics monthly. Because individuals may have differ- ent baseline behaviors, we normalize a user’s time series to the month immediately before the layoff denoted t∗. To assess differences in behavior as a result of the mass layoff, we construct three groups: (1) A group of laid off users from the town where the probability of being laid off is that calculated in the previous section, (2) a town control group consisting of the same users as group 1, but with inverse weights, and (3) a group of users selected at random from the country population. Each user in the final group is weighted equally. For each month, we compute the weighted average of all metrics then plot the difference between the laid off group and both control groups in Figure 3 in the main text. (cid:88) yt = i wi yi,t yi,t∗ ∆yt = ¯yt − ¯yt,control (2) (3) We estimate changes in monthly behavior using OLS regressions. We specify two models that provide similar results. For a metric : yi = αi + β1Ai + β2Ui + β3AiUi (4) where Ai is a dummy variable indicating if the observation was made in a month before or after the plant closure and Ui is a dummy variable that is 1 if the user was assigned a 30 greater than 50% probability of having been laid off and 0 otherwise. An alternate model substitutes the probability of layoff itself, for the unemployed dummy: yi = αi + β1Ai + β2wi + β3Aiwi (5) In many cases, we are more interested in relative changes in behavior rather than absolute levels. For this, we specify a log-level model of the form: log(yi) = αi + φ1Ai + φ2wi + φ3Aiwi (6) Now the coefficient φ3 can be interpreted as the percentage change in feature yi,n experienced by a laid off individual in months following the plant closure. Changes to mobility metrics as well as changes to total, incoming, and outgoing calls were estimated using the log-level model. Churn and To Town metrics are percentages already and are thus estimated using a level-level model. The changes in the number of contacts each also estimated using a level-level model. Models are estimated using data from users believed to be unemployed and data from the two control groups. Results are shown in Table ??. Comparisons to each group produce consistent results. In addition relative changes, we also measure percent changes in each variable pre- and post-layoff. Figure 8 shows the percent change in each variable for an average month before and after the plant closing. We report changes for three groups, those we believe were unaffected by the layoff, but live in the tower, those we believe are unaffected, but live elsewhere in the country, and those with a probability p > 0.5 of being laid off. The laid off group shows significant changes in all metrics, while the town and country control groups show few. Predicting Province Level Unemployment To evaluate the predictive power of micro-level behavioral changes, we use data from a different undisclosed industrialized European country. As discussed in the main text, we use call detail records spanning nearly 3 years and the entire user base of a major mobile phone provider in the country. For each of the roughly 50 provinces within this country, 31 FIG. 8. For each sample of mobile phone users (those we believe to be unaffected by the layoff living in the town and the country as well as those with a probability p > 0.5 of being laid off), we plot the percent change in each variable before and after the layoff. we assemble quarterly unemployment rates during the period covered by the CDR data. At the national level, we collect a time series of GDP. We select a sample of users in each province and measure the average relative value of 7 of the variables identified to change following a layoff. To-town and distance from home variables are omitted as the former is only measured when we know the location of the layoff and the latter is strongly correlated with Rg. First, we correlate each aggregate calling variable with unemployment at the regional level. To control for differences in base levels of unemployment across the country, we first de- mean unemployment and each aggregate variable. Table ?? shows that each calling behavior is significantly correlated with unemployment and that these correlations are consistent with the directions found in the individual section of the paper. Moreover, we discover strong correlation between each of the calling behavior variables, suggesting that principal component analysis is appropriate. 32 CallsIncomingOutgoingTo TownContactsChurnTowersRgR10.30.20.10.00.1Percent Change After Closureunaffected-townunaffected-countrylaid-off Principal Component analysis As shown in the individual section of the paper, changes in these variables following a mass layoff are correlated. This correlation is seen in province level changes as well (Table ??). Given this correlation, we use principal component analysis (PCA) extract an independent mobile phone variable and guard against co-linearity when including all phone variables as regressors. The results from PCA and the loadings in each component can be found in Table ?? and Table ??, respectively. We find only the first principal component passes the Kaiser test with an eigenvalue significantly greater than 1, but that this component captures 59% of the variance in the calling data. The loadings in this component fall strongly on the social variables behavior. We then compute the scores for this component for each observation in the data and use these scores as regressors. The prominent elements of the first principal component are primarily related to the social behavior of callers. Model Specification We make predictions of present and future unemployment rates using three different models specifications of unemployment where each specification is run in two variants, one with the principal component score as an additional independent variable denoted as CDRt and the other without. The twelve models are described as follows: 1. AR(1) Ut = α1Ut−1 Ut = β1Ut−1 + γCDRt Ut+1 = α1Ut−1 Ut+1 = β1Ut−1 + γCDRt 33 (7) (8) (9) (10) 2. AR(1) + Quad 3. AR(1) + GDP Ut = α1Ut−1 + α2U 2 t−1 Ut = β1Ut−1 + β2U 2 t−1 + γCDRt Ut+1 = α1Ut−1 + α2U 2 t−1 Ut+1 = β1Ut−1 + β2U 2 t−1 + γCDRt Ut = α1Ut−1 + α2gdpt−1 Ut = β1Ut−1 + β2gdpt−1 + γCDRt Ut+1 = α1Ut−1 + α2gdpt−1 Ut+1 = β1Ut−1 + β2gdpt−1 + γCDRt (11) (12) (13) (14) (15) (16) (17) (18) To evaluate the ability of these models to predict unemployment, we use a cross-validation framework. Data from half of the provinces are used to train the model and these coefficients are used to predict unemployment rates given data for the other half of the provinces. We perform the same procedure switching the training and testing set and combine the out of sample predictions for each case. We evaluate the overall utility of these models by plotting predictions versus observations, finding strong correlation (see the main text). To evaluate the additional benefit gained from the inclusion of phone data, we compute the percentage difference between the same model specification with and without the mobile phone data, ∆RM SE% = 1 − RM SEw/CDR/RM SEw/out .In each case, we find that the addition of mobile phone data reduces the RMSE by 5% to 20%. Predictions using weekly CDR Data Until now, we have used data from the entire quarter to predict the results from the unemployment survey conducted in the same quarter. While these predictions would be available at the very end of the quarter, weeks before the survey data is released, we also make predictions using CDR data from half of each quarter to provide an additional 1.5 34 months lead time that may increase the utility of these predictions. We estimate the same models as described in the previous section and find similar results. Even without full access to a quarter’s CDR data, we can improve predictions of that quarter’s unemployment survey before the quarter is over by 3%-6%. The Effect of Sample Size on Feature Estimation It is important to consider the extent to which the sampling size is sufficient and does not affect much the feature estimation. We study the reliability of sample size (k) in terms of relative standard deviation (RSD). For each given sample size k, we sample T times (without replacement) from the population. The RSD with respect to sample size k for a particular feature, is given by RSD(k) = sk fk where sk is the standard deviation of the feature estimates from the T samples, and fk is the mean of the feature estimates from the T samples. We use T = 10 to study the feature reliability. In Figure ??, we plot the different features’ %RSD by averaging the RSD values of all provinces. The plots show that the values of %RSD over sample size k = 100, 200, ..., 2000 decrease rapidly. When sample size k = 2000, the %RSD for all features, except for radius of gyration (Rg), is lower than 1%. The estimates of Rg exhibit the highest variation; however, we can still obtain reliable estimates with thousands of sampled individuals (RSD(k) = 0.026 for Rg, with k = 2000). For the results in the manuscript, a value of k=3000 was chosen with the confidence that sample size effects are small. Mass Layoffs and General Unemployment While mass layoffs provide a convenient and interesting natural experiment to deploy our methods, they are only one of many employment shocks that economy absorbs each month. We have measured changes in call behaviors due to mass layoffs, but these changes may be unhelpful if they do not result from other forms of unemployment like isolated layoffs of individual works. Though it is beyond the scope of this work to directly determine if individuals affected by mass layoffs experience the same behavioral changes as those experi- encing unemployment due to other reasons, strong correlations have been observed between the number of mass layoffs observed in a given time period and general unemployment rates 35 - http://www.bls.gov/news.release/pdf/mmls.pdf. 36
1706.09494
2
1706
2017-07-08T13:28:55
Misinformation spreading on Facebook
[ "cs.SI" ]
Social media are pervaded by unsubstantiated or untruthful rumors, that contribute to the alarming phenomenon of misinformation. The widespread presence of a heterogeneous mass of information sources may affect the mechanisms behind the formation of public opinion. Such a scenario is a florid environment for digital wildfires when combined with functional illiteracy, information overload, and confirmation bias. In this essay, we focus on a collection of works aiming at providing quantitative evidence about the cognitive determinants behind misinformation and rumor spreading. We account for users' behavior with respect to two distinct narratives: a) conspiracy and b) scientific information sources. In particular, we analyze Facebook data on a time span of five years in both the Italian and the US context, and measure users' response to i) information consistent with one's narrative, ii) troll contents, and iii) dissenting information e.g., debunking attempts. Our findings suggest that users tend to a) join polarized communities sharing a common narrative (echo chambers), b) acquire information confirming their beliefs (confirmation bias) even if containing false claims, and c) ignore dissenting information.
cs.SI
cs
Misinformation spreading on Facebook Fabiana Zollo and Walter Quattrociocchi Abstract Social media are pervaded by unsubstantiated or untruthful rumors, that contribute to the alarming phenomenon of misinformation. The widespread pres- ence of a heterogeneous mass of information sources may affect the mechanisms behind the formation of public opinion. Such a scenario is a florid environment for digital wildfires when combined with functional illiteracy, information overload, and confirmation bias. In this essay, we focus on a collection of works aiming at providing quantitative evidence about the cognitive determinants behind misinfor- mation and rumor spreading. We account for users' behavior with respect to two distinct narratives: a) conspiracy and b) scientific information sources. In particular, we analyze Facebook data on a time span of five years in both the Italian and the US context, and measure users' response to i) information consistent with one's narra- tive, ii) troll contents, and iii) dissenting information e.g., debunking attempts. Our findings suggest that users tend to a) join polarized communities sharing a common narrative (echo chambers), b) acquire information confirming their beliefs (confir- mation bias) even if containing false claims, and c) ignore dissenting information. 1 Introduction The rapid advance of the Internet and web technologies facilitated global commu- nications all over the world, allowing news and information to spread rapidly and intensively. These changes led up to the formation of a new scenario, where people actively participate in both contents' production and diffusion, without the medi- Fabiana Zollo Ca' Foscari University of Venice, Via Torino, 155 - 30172, Venice, Italy e-mail: [email protected] Walter Quattrociocchi IMT School for Advanced Studies, Piazza San Francesco, 19 - 55100 Lucca, Italy e-mail: [email protected] 1 2 Fabiana Zollo and Walter Quattrociocchi ation of journalists or experts in the field. The emergence of such a wide, hetero- geneous (and disintermediated) mass of information sources may affect contents' quality and the mechanisms behind the formation of public opinion [32, 29, 49]. In- deed, despite the enthusiastic rhetoric about collective intelligence [35], unsubstan- tiated or untruthful rumors reverberate on social media, contributing to the alarming phenomenon of misinformation. Since 2013, the World Economic Forum (WEF) has been placing the global danger of massive digital misinformation at the core of other technological and geopolitical risks, ranging from terrorism, to cyber attacks, up to the failure of global governance [26]. People are misinformed when they hold beliefs neglecting factual evidence, and misinformation may influence public opin- ion negatively. Empirical investigations have showed that, in general, people tend to resist facts, holding inaccurate factual beliefs confidently [31]. Moreover, correc- tions frequently fail to reduce misperceptions [39] and often act as a backfire effect. Thus, beyond its undoubted benefits, a hyperconnected world may allow the viral spread of misleading information, which may have serious real-word consequences. In that direction, examples are numerous. Inadequate health policies in South Africa led to more than 300,000 unnecessary AIDS deaths [37], however the events were exacerbated by AIDS denialists, who state that HIV is inoffensive and that antiretro- viral drugs cause, rather than treat, AIDS. Similar considerations may be extended to the Ebola outbreak in west Africa: after the death of two people having drunk salt water, the World Health Organisation (WHO) had to restate that all rumours about hypothetical cures or practices were false and that their use could be danger- ous [14]. Or again, the American case of Jade Helm 15, a military training exercise which took place in multiple US states, but turned out to be perceived as a conspir- acy plot aiming at imposing martial law, to the extent that Texas Gov. Greg Abbott ordered the State Guard to monitor the operations. Certainly, such a scenario represents a florid environment for digital wildfires, es- pecially when combined with functional illiteracy, information overload, and confir- mation bias – i.e., the tendency to seek, select, and interpret information coherently with one's system of beliefs [38]. On the Internet people can access always more extreme versions of their own opinions. In this way, the benefits coming from the exposure to different points of views can be dramatically reduced [34]. Individuals, and the groups that they form, may move to a more extreme point in the same di- rection indicated by their own preexisting beliefs; indeed, when people discuss with many like-minded others, their views become more extreme [46]. First evidences of social contagion and misperception induced by social groups emerged in the famous experiment conducted by Solomon Asch in 1955 [7]. The task of the participants was very simple: they had to match a certain line placed on a white card with the corresponding one (i.e., having the same length) among three other lines placed on another white card. The subject was one of the eight people taking part to the test, but was unaware that the others were there as part of the research. The experiment consisted of three different rounds. In the first two rounds everyone provided the right (and quite obvious) answer. In the third round some group members matched the reference line to the shorter or longer one on the second card, introducing the so-called unexpected disturbance [28]. Normally subjects erred less than 1% of the Misinformation spreading on Facebook 3 time; but in the third case they erred 36.8% of the time [4]. Another relevant study was conducted by James Stoner, who identified the so-called risky shift [45]. In the experiment people were first asked to study twelve different problems and provide their solution; after that, they had to take a final decision together, as a group. Out of thirteen groups, twelve repeatedly showed a pattern towards greater risk-taking. Misinformation, as well of rumor spreading, deals with these and several other aspects of social dynamics. However, adoption and contagion are often illustrated under the oversimplified metaphor of the virus: ideas spread by "contact" and peo- ple "infected" become active spreaders in the contagion process. We believe that such a metaphor is misleading, unless we consider that the receptor of such a virus is complex and articulated. Indeed, the adoption of ideas and behaviors deals with a multitude of cognitive dimensions, such as intentionality, trust, social norms, and confirmation bias. Hence, simplistic models adapted from mathematical epidemi- ology are not enough to understand social contagion. It is crucial to focus on such relevant research questions by using methods and applying tools that go beyond the pure, descriptive statistics of big data. In our view, such a challenge can be ad- dressed by implementing a cross-methodological, interdisciplinary approach which takes advantage of both the question-framing capabilities of social sciences and the experimental and quantitative tools of hard sciences. 2 Outline The chapter is structured as follows. In section 3 we provide the background of our research work, as well as tools and methodology adopted; in section 4 we describe the datasets; in section 5 we discuss the dynamics behind information consumption and the existence of echo chambers on both the Italian and the US Facebook; in sec- tion 6 we show how confirmation bias dominates information spreading; in section 7 we focus on users' interaction with paradoxical and satyrical information (trolls), while in section 8 we analyze users' response to debunking attempts. In section 9 we target the emotional dynamics inside and across echo chambers. Finally, we draw our conclusions in section 10. 3 Background and Research Methodology In 2009 a paper on Science [33] proclaims the birth of the Computational Social Science (CSS), an emerging research field aiming at studying massive social phe- nomena quantitatively, by means of a multidisciplinary approach based on Com- puter Science, Statistics, and Social Sciences. Since CSS benefits from the large availability of data from online social networks, it is attracting researchers in ever- increasing numbers as it allows for the study of mass social dynamics at an un- precedented level of resolution. Recent studies have pointed out several important 4 Fabiana Zollo and Walter Quattrociocchi results ranging from social contagion [48, 36, 6] up to information diffusion [2, 8], passing through the virality of false claims [15, 21]. A wide literature branch is also devoted to understanding the spread of rumors and behaviors by focusing on struc- tural properties of social networks to determine the way in which news spread in social networks, what makes messages go viral, and what are the characteristics of users who help spread such information [15, 21, 13, 48]. Several works investigated how social media can shape and influence the public sphere [1, 9, 17, 18], and ef- forts to contrast misinformation spreading range from algorithmic-based solutions up to tailored communication strategies [5, 16, 25, 42, 43, 44]. Along this path, important issues have been raised around the emergence of the echo chambers, enclosed systems where users are exposed only to information co- herent with their own system of beliefs [47]. Many argue that such a phenomenon is directly related to the algorithms used to rank contents [40]. Speaking of this, Face- book research scientists quantified exactly how much individuals can be exposed to ideologically diverse news and information on social media [9], finding that individ- ual's choice about contents has an effect stronger than that of Facebook's News Feed algorithm in limiting the exposure to cross-cutting content. Undoubtedly, selective exposure to specific contents facilitates the aggregation of users in echo chambers, wherein external and contradicting versions are ignored [30]. Moreover, the lack of experts mediating the production and diffusion of content may encourage specula- tions, rumors, and mistrust, especially on complex issues. Pages about conspiracy theories, chem-trails, reptilians, or the link between vaccines and autism, proliferate on social networks, promoting alternative narratives often in contrast to mainstream content. Thus, misinformation online is pervasive and difficult to correct. To face the issue, several algorithmic-driven solutions have been proposed both by Google and Facebook [20, 23], that joined other major corporations to provide solutions to the problem and try to guide users through the digital information ecosystem [27]. Si- multaneously, it has also been observed the rapid spread of blogs and pages devoted to debunk false claims, namely debunkers. Moreover, the diffusion of unreliable content may lead to confuse unverified sto- ries with their satirical counterparts. Indeed, it has been noticed the proliferation of satirical, wacky imitations of conspiracy theses. In this regard, there is a large com- munity of people, known as trolls, behind the creation of Facebook pages aimed at diffusing caricatural and paradoxical contents mimicking conspiracy news. Their activities range from controversial comments and satirical posts, to the fabrication of purely fictitious statements, heavily unrealistic and sarcastic. According to Poe's law [3], without a blatant display of humor, it is impossible to create a parody of ex- tremism or fundamentalism that someone won't mistake for the real thing. Hence, trolls are often accepted as realistic sources of information and, sometimes, their memes become viral and are used as evidence in online debates from real political activists. As an example, we report one of the most popular memes in Italy: Italian Senate voted and accepted (257 in favor, 165 abstained) a law proposed by Senator Cirenga aimed at providing politicians with a 134 Billion fund to help them find a job in case of defeat in the next political competition. Misinformation spreading on Facebook 5 It would be easy to verify that the text contains at least three false statements: i) Senator Cirenga does not exist and has never been elected in the Italian Parliament, ii) the total number of votes is higher than the maximum possible number of voters, and iii) the amount of the fund corresponds to more than 10% of Italian GDP. Indeed, the bill is false and such a meme was created by a troll page. Nonetheless, on the wave of public discontent against Italian policy-makers, it quickly became viral, obtaining about 35K shares in less than one month. Nowadays, it is still one of the most popular arguments used by protesters manifesting all over Italian cities. Such a scenario makes crucial the quantitative understanding of the social deter- minants related to content selection, news consumption, and beliefs formation and revision. In this essay, we focus on a collection of works [10, 11, 12, 19, 50, 51] aim- ing at characterizing the role of confirmation bias in viral processes online. We want to investigate the cognitive determinants behind misinformation and rumor spread- ing by accounting for users' behavior on different and specific narratives. In particu- lar, we define the domain of our analysis by identifying two well-distinct narratives: a)conspiracy and b) scientific information sources. Notice that we do not focus on the quality or the truth value of information, but rather on its verifiability. While pro- ducers of scientific information as well as data, methods, and outcomes are readily identifiable and available, the origins of conspiracy theories are often unknown and their content is strongly disengaged from mainstream society and sharply divergent from recommended practices. Thus, we first analyze users' interaction with Facebook pages belonging to such distinct narratives on a time span of five years (2010-2014), in both the Italian and the US context. Then, we measure users' response to i) information consistent with one's narrative, ii) troll contents, and iii) dissenting information e.g., debunking attempts. 4 Datasets We identify two main categories of pages: conspiracy news – i.e. pages promot- ing contents neglected by mainstream media – and science news. The first category includes all pages diffusing conspiracy information (i.e., pages that disseminate con- troversial information, most often lacking supporting evidence and sometimes con- tradictory of the official news). Pages like I don't trust the government, Awakening America, or Awakened Citizen promote heterogeneous contents ranging from aliens, chem-trails, geocentrism, up to the causal relation between vaccinations and homo- sexuality. The second category is that of scientific dissemination and includes insti- tutions, organizations, scientific press having the main mission to diffuse scientific knowledge. For example, pages like Science, Science Daily, and Nature are active in diffusing posts about the most recent scientific advances. Finally, we identify two additional categories of pages: 1. Troll: sarcastic, paradoxical messages mocking conspiracy thinking (for the Italian dataset); 6 Fabiana Zollo and Walter Quattrociocchi 2. Debunking: information aiming at correcting false conspiracy theories and un- truthful rumors circulating online (for the US dataset). To produce our datasets, we built a large atlas of Facebook public pages with the assistance of several groups (Skepti Forum, Skeptical spectacles, Butac, Protesi di Complotto), which helped in labelling and sorting both conspiracy and scientific sources. To validate the list, all pages have then been manually checked by looking at their self-description and the type of promoted content. The exact breakdowns of the Italian and US Facebook datasets are reported in Table 1 and Table 2, respec- tively. The entire data collection process is performed exclusively by means of the Facebook Graph API [24], which is publicly available and can be used through one's personal Facebook user account. We used only public available data (users with pri- vacy restrictions are not included in our dataset). Data was downloaded from public Facebook pages that are public entities. Users' content contributing to such entities is also public unless users' privacy settings specify otherwise and in that case it is not available to us. When allowed by users' privacy specifications, we accessed public personal information. However, in our study we used fully anonymized and aggregated data. We abided by the terms, conditions, and privacy policies of Face- book. Table 1 Breakdown of the Italian Facebook dataset. Pages Posts Likes Comments Likers Commenters Science 34 62,705 2,505,399 180,918 332,357 53,438 Conspiracy 39 208,591 6,659,382 836,591 864,047 226,534 Troll 2 4,709 40,341 58,686 15,209 43,102 Table 2 Breakdown of the US Facebook dataset. Pages Posts Likes Comments Likers Commenters Science 83 262,815 453,966,494 22,093,692 39,854,663 7,223,473 Conspiracy 330 369,420 145,388,117 8,304,644 19,386,131 3,166,726 Debunking 66 47,780 3,986,922 429,204 702,122 118,996 Misinformation spreading on Facebook 5 Echo Chambers 5.1 Attention Patterns 7 We start our discussion by analyzing how information gets consumed by users in both the Italian [10, 11, 12] and the US Facebook [50]. As a first step, we focus on users' actions allowed by Facebook's interaction paradigm i.e., likes, comments, and shares. Each action has a particular meaning [22]: while a like represents a positive feedback to the post, a share expresses the desire to increase the visibility of a given information; finally, a comment is the way in which the debate takes form around the topic of the post. Also, we consider the lifetime of a post (respectively, a user) i.e., the temporal distance between the first and last comment to the post (respectively, of the user). We also define the persistence of a post (respectively, a user) as the Kaplan-Meier estimates of survival functions by accounting for the lifetime of the post (respectively, the user). Fig. 1 shows the empirical Complementary Cumulative Distribution Functions (CCDFs) of users' activity on posts grouped by category on the Italian Facebook. We may notice that distributions of likes, comments, and shares are all heavy-tailed. To further investigate users' consumption patterns, in Fig. 2 we also plot the CCDF of the posts' lifetime, observing that distinct kinds of contents show a comparable lifetime. Fig. 1 ITALIAN FACEBOOK. Empirical complementary cumulative distribution functions (CCDFs) of users' activity (likes, comments and shares) on posts grouped by category. Distri- butions denote heavy-tailed consumption patterns. 8 Fabiana Zollo and Walter Quattrociocchi Fig. 2 ITALIAN FACEBOOK. Empirical CCDF, grouped by category, of the posts' lifetime i.e., the temporal distance (in hours) between the first and last comment. Lifetime is similar for both categories. As for the US Facebook, the distribution of the number of likes, comments, and shares on posts belonging to both scientific and conspiracy news is shown in the left panel of Fig. 3. As seen from the plots, all distributions are heavy-tailed – i.e, they are best fitted by power laws and possess similar scaling parameters. In the right panel of Fig. 3, we plot the Kaplan-Meier estimates of survival functions of posts grouped by category. To further characterize differences between the survival functions, we perform the Peto & Peto [41] test to detect whether there is a statis- tically significant difference between the two survival functions. Since we obtain a p-value of 0.944, we can state that there are not significant statistical differences be- tween posts' survival functions on both science and conspiracy news. Thus, posts' persistence in the two categories is similar also in the US case. Summarizing, our findings show that distinct kinds of information (science, con- spiracy) are consumed in a comparable way. However, when considering the corre- lation between couples of actions, we find that users of conspiracy pages are more prone to both share and like a post, denoting a higher level of commitment [10]. Conspiracy users are more willing to contribute to a wide diffusion of their topics of interest, according to their belief that such information is intentionally neglected by mainstream media. 5.2 Polarization We now want to understand if users' engagement with a specific kind of content can become a good proxy to detect groups of users sharing the same system of beliefs i.e., echo chambers. Assume that a user u has performed x and y likes (comments) on scientific and conspiracy posts, respectively, and let ρ(u) = (y−x)/(y+x). Thus, Misinformation spreading on Facebook 9 Fig. 3 US FACEBOOK Left: Complementary cumulative distribution functions (CCDFs) of the number of likes, comments, and shares received by posts belonging to conspiracy (top) and sci- entific (bottom) news. Right: Kaplan-Meier estimates of survival functions of posts belonging to conspiracy and scientific news. Error bars are on the order of the size of the symbols. we say that user u is polarized towards science if ρ(u) ≤ −0.95, while she is towards conspiracy if ρ(u) ≥ 0.95 user u is polarized towards conspiracy. In Fig. 4 we show the Probability Density Function (PDF) of users' polarization on the Italian Facebook. We observe a sharply peaked bimodal distribution where the vast majority of users is polarized either towards science (ρ(u) ∼ 1) or conspir- acy (ρ(u) ∼ −1). Hence, most of likers can be divided into two groups of users, those polarized towards science and those polarized towards conspiracy news. Let us consider now the fraction of friends y of a user u sharing the same po- larization of u. We define the engagement θ (u) of a user u as her liking activity normalized with respect to the total number of likes in our dataset. We find that the more a user is active on her narrative, the more she is surrounded by friends sharing the same attitude. Such a pattern is shown in the right panels of Fig.4. Hence, so- cial interactions of Facebook users are driven by homophily: users not only tend to be very polarized, but they also tend to be linked to users with similar preferences. Indeed, in both right panels of Figure 4 we can observe that for polarized users the fraction of friends with the same polarization is very high ((cid:38) 0.75) and grows with the engagement. Similar patterns can be observed on the US Facebook. In Fig 5 we show that the PDF for the polarization of all users is sharply bimodal here as well, with most having (ρ(u) ∼ −1) or (ρ(u) ∼ 1). Thus, most users may be divided into two main groups, those polarized towards science and those polarized towards conspiracy. The same pattern holds if we look at polarization based on comments rather than on likes. In summary, our results confirm the existence of echo chambers on both the Ital- ian and the US Facebook. Indeed, contents related to distinct narratives aggregate 10 Fabiana Zollo and Walter Quattrociocchi Fig. 4 ITALIAN FACEBOOK Left: Probability density function (PDF) of users' polarization. Notice the strong bimodality of the distribution, with two sharp peaks localized at −1 (cid:46) ρ(u) (cid:46) −0.95 (conspiracy users) and at 0.95 (cid:46) ρ(u) (cid:46) 1 (science users). Right: Fraction of polarized neighbors as a function of the engagement θ for both science (left) and conspiracy (right) users. Fig. 5 US FACEBOOK Probability Density Functions (PDFs) of the polarization of all users com- puted both on likes (left) and comments (right). users into distinct, polarized communities, where users interact with like-minded people sharing their own system of beliefs. 6 Information Spreading and Cascades In this section we show how confirmation bias dominates viral processes of infor- mation diffusion and that the size of the (mis)information cascades may be approxi- mated by the size of the echo chamber [19]. We begin our analysis by characterizing Misinformation spreading on Facebook 11 the statistical signature of cascades according to the narrative (science or conspir- acy). Fig. 6 shows the PDF of the cascade lifetime for both science and conspiracy. We compute the lifetime as the time (in hours) elapsed between the first and the last share of the post. In both categories we find a first peak at approximately 1– 2 hours and a second peak at approximately 20 hours, denoting that the temporal sharing patterns are similar, independently of the narrative. We also find that a sig- nificant percentage of the information spreads rapidly (24.42% of the science news and 20.76% of the conspiracy rumors diffuse in less than two hours, and 39.45% of science news and 40.78% of conspiracy theories in less than five hours). Only 26.82% of the diffusion of science news and 17.79% of conspiracy lasts more than one day. Fig. 6 ITALIAN FACEBOOK Probability Density Function (PDF) of lifetime computed on science news and con- spiracy theories, where the lifetime is here computed as the temporal distance (in hours) between the first and last share of a post. Both categories show a similar be- havior, with a peak in the first two hours and another around 20 hours. In Fig. 7 we show the lifetime as a function of the cascade's size, i.e. the num- ber of users sharing the post. For science news we observe a peak in the lifetime corresponding to a cascade's size value of ≈ 200; moreover, the variability of the lifetime grows with the cascades' sizes, and higher cascade's size values correspond to high lifetime variability. For conspiracy-related contents, lifetime variability in- creases with cascade's size, and for highest values we observe a variability of the lifetime 50% around the average values. Such results suggest that news assimilation differs according to the categories. Science information is usually assimilated (i.e., it reaches a higher level of diffusion) quickly. A longer lifetime does not necessar- ily correspond to a higher level of interest, but possibly to a prolonged discussion within a specialised group of experts. Conversely, conspiracy rumors are assimilated more slowly and show a positive relation between lifetime and size; long-lived posts tend to be discussed by larger communities. 0.0000.0250.0500.07501020304050Lifetime(hours)PDFScienceConspiracy 12 Fabiana Zollo and Walter Quattrociocchi Fig. 7 ITALIAN FACEBOOK Lifetime as a function of the cascade's size for conspiracy news (left) and science news (right). We observe a contents-driven differentiation in the sharing patterns. For conspiracy the lifetime grows with the size, while for science news there is a peak in the lifetime around a value of the size equal to 200, and a higher variability in the lifetime for larger cascades. Finally, Fig. 8 shows that the majority of links between consecutively sharing users is homogeneous, i.e. both users share the same polarization and, hence, belong to the same echo chamber. In particular, the average edge homogeneity value of all the observed sharing cascades is always greater than or equal to zero, suggesting that information spreading occurs mainly inside homogeneous clusters in which all users share the same polarization. Thus, contents tend to circulate only inside the echo chambers. Summarizing, we found that cascades' dynamics differ, although consumption patterns on science and conspiracy pages are similar. Indeed, selective exposure is the primary driver of contents' diffusion and generates the formation of echo chambers, each with its own cascades' dynamics. 7 Response to Paradoxical Information We have showed that users tend to aggregate around preferred contents shaping well-separated and polarized communities. Our hypothesis is that users' exposure to unsubstantiated claims may affect their selection criteria and increase their atti- tude to interact with false information. Thus, in this section we want to test how polarized users interact with information that is deliberately false i.e., troll posts, which are paradoxical imitations of conspiracy contents [10]. Such posts diffuse clearly dubious claims, such as the undisclosed news that infinite energy has been 020040060005001000150020002500Conspiracy Cascade SizeLifetime (hours)02004000250500750Science Cascade SizeLifetime (hours) Misinformation spreading on Facebook 13 Fig. 8 ITALIAN FACEBOOK Mean edge homogeneity for science (solid orange) and conspiracy (dashed blue) news. The mean value of edge homogeneity on the whole sharing cascades is always greater or equal to zero. finally discovered, or that a new lamp made of actinides (e.g. plutonium and ura- nium) will finally solve the lack of energy with less impact on the environment, or that chemical analysis reveal that chem-trails contain sildenafil citratum (sold as the brand name Viagra). Fig. 9 shows how polarized users of both categories interact with troll posts in terms of comments and likes on the Italian Facebook. Our findings show that users usually exposed to conspiracy claims are more likely to jump the credulity barrier: indeed, conspiracy users are more active in both liking and commenting troll posts. Thus, even when information is deliberately false and framed with a satirical pur- pose, its conformity with the conspiracy narrative transforms it into credible content for members of the conspiracy echo chamber. Evidently, confirmation bias plays a crucial role in content selection. Fig. 9 ITALIAN FACEBOOK Percentage of comments and likes on troll posts from users polarized towards science (light blue) and conspiracy (orange). 012340.11.0Mean Edge HomogeneityPDFScienceConspiracy 14 8 Response to Dissenting Information Fabiana Zollo and Walter Quattrociocchi Debunking pages on Facebook strive to contrast misinformation spreading by pro- viding fact-checked information to specific topics. However, if confirmation bias plays a pivotal role in selection criteria, then debunking is likely to sound to con- spiracy users such as information dissenting from their preferred narrative. In this section, our aim is to study and analyze users' behavior w.r.t. debunking contents on the US Facebook [50]. As a first step, we show how debunking posts get liked and commented according to users' polarization. Fig. 10 shows how users' activity is distributed on debunking posts: left (respectively, right) panel shows the proportions of likes (respectively, comments) left by users polarized towards science, users polarized towards conspir- acy, and not polarized users. We notice that the majority of both likes and comments is left by users polarized towards science (respectively, 66,95% and 52,12%), while only a small minority is made by users polarized towards conspiracy (respectively, 6,54% and 3,88%). Indeed, the first interesting result is that the biggest consumer of debunking information is the scientific echo chamber. Out of 9,790,906 polarized conspiracy users, just 117,736 interacted with debunking posts – i.e., commented a debunking post at least once. Fig. 10 US FACEBOOK Pro- portions of likes (left) and comments (right) left by users polarized towards science, users polarized towards con- spiracy, and not polarized users. Hence, debunking posts remain mainly confined within the scientific echo cham- ber and only few users usually exposed to unsubstantiated claims actively interact with the corrections. Dissenting information is mainly ignored. However, in our sce- nario few users belonging to the conspiracy echo chamber do interact with debunk- ing information. We now wonder about the effect of such an interaction. Therefore, we perform a comparative analysis between users' behavior before and after they first comment on a debunking post. Fig. 11 shows the liking and commenting rates – i.e, the average number of likes (or comments) on conspiracy posts per day – be- fore and after the first interaction with debunking. We can observe that users' liking and commenting rates increase after the interaction, Thus, their activity in the con- spiracy echo chamber is reinforced. In practice, debunking attempts are acting as a backfire effect. Misinformation spreading on Facebook 15 Fig. 11 US FACEBOOK Rate – i.e., average number, over time, of likes (left) and com- ments (right)) on conspiracy posts of users who interacted with debunking posts. 9 Emotional Dynamics In this section, we aim at analyzing the emotional dynamics inside and across echo chambers. In particular, we apply sentiment analysis techniques to the comments of our Facebook Italian dataset, and study the aggregated sentiment with respect to scientific and conspiracy-like information [51]. The sentiment analysis is based on a supervised machine learning approach, where we first annotate a substantial sample of comments, and then build a Support Vector Machine (SVM) classification model. The model is then applied to associate each comment with one sentiment value: negative, neutral, or positive. The sentiment is intended to express the emotional attitude of Facebook users when posting comments. To further investigate the dynamics behind users' polarization, we now study how the sentiment changes w.r.t. users' engagement in their own echo chamber. In the left panel of Fig. 12, we show the PDF of the mean sentiment of polarized users with at least two comments. We may observe an overall negativity, more evident on the conspiracy side. When looking at the sentiment as a function of the number of comments of the user, we find that the more active a polarized user is, the more she tends towards negative values, both on science and conspiracy posts. Such results are shown in the right panel of Fig. 12, where the sentiment has been regressed w.r.t. the logarithm of the number of comments. Interestingly, the sentiment of science users decreases faster than that of conspiracy users. We now want to investigate the emotional dynamics when such polarized (and negative-minded) users meet together. To this aim, we pick all the posts represent- ing the arena where the debate between science and conspiracy users takes place. In particular, we select all the posts commented at least once by both a user polarized on science and a user polarized on conspiracy. We find 7,751 such posts (out of 315,567), reinforcing the fact that the two communities are strictly separated and do not often interact with one another. Then, we analyze how the sentiment changes when the number of comments of the post increases i.e., when the discussion be- 16 Fabiana Zollo and Walter Quattrociocchi Fig. 12 ITALIAN FACEBOOK Left: Probability Density Function (PDF) of the mean sentiment of polarized users having commented at least twice, where −1 corresponds to negative sentiment, 0 to neutral and 1 to positive. Right:Average sentiment of polarized users as a function of their number of comments. Negative (respectively, neutral, positive) sentiment is denoted by red (re- spectively, yellow, blue) color. The sentiment has been regressed w.r.t. the logarithm of the number of comments. comes longer. Fig. 13 shows the aggregated sentiment of such posts as a function of their number of comments. Clearly, as the number of comments increases – i.e., the discussion becomes longer – the sentiment is always more negative. Therefore, we may conclude that the length of the discussion does affect the negativity of the sentiment. Fig. 13 US FACEBOOK Ag- gregated sentiment of posts as a function of their number of comments. Negative (re- spectively, neutral, positive) sentiment is denoted by red (respectively, yellow, blue) color. Misinformation spreading on Facebook 10 Conclusions 17 We investigated how information related to two very distinct narratives – i.e., scien- tific and conspiracy news – gets consumed and shapes communities on Facebook. For both the Italian and the US scenario, we showed the emergence of two well- separated and polarized groups – i.e., echo chambers – where users interact with like-minded people sharing the same system of beliefs. We found that users are ex- tremely focused and self-contained on their specific narrative. Such a highly polar- ized structure facilitates the reinforcement and contents' selection by confirmation bias. Moreover, we observed that social interactions of Facebook users are driven by homophily: users not only tend to be very polarized, but they also tend to be linked to users with similar preferences. According to our results, confirmation bias dominates viral processes of information diffusion. Also, we found that the size of misinformation cascades may be approximated by the same size of the echo cham- ber. Furthermore, by measuring the response to the injection of false information (parodistic imitations of alternative stories), we observed that users prominently interacting with alternative information sources – i.e. more exposed to unsubstan- tiated claims – are more prone to interact with intentional and parodistic false claims. Thus, our findings suggest that conspiracy users are more likely to jump the credulity barrier: even when information is deliberately false and framed with a satirical purpose, its conformity with the conspiracy narrative transforms it into credible content for members of the conspiracy echo chamber. Then, we investigated users' response to dissenting information. By analyzing the effectiveness of debunking on conspiracy users on the US Facebook, we found that scientific echo chamber is the biggest consumer of debunking posts. Indeed, only few users usually active in the conspiracy echo chamber interact with debunk- ing information and, in the latter case, their activity in the conspiracy echo chamber increases after the interaction, rather than decreasing. Thus, debunking attempts are acting as a backfire effect. Finally, we focused on the emotional dynamics inside and between the two echo chambers, finding that the sentiment of users on science and conspiracy pages tends to be negative, and is more and more negative when the discussion becomes longer or users' activity on the social network increase. In particular, the discussion degen- erates when the two polarized communities interact with one another. Our findings provide insights about the determinants of polarization and the evo- lution of core narratives on online debating, suggesting that fact-checking is not working as expected. As long as there are no immediate solutions to functional illiteracy, information overload and confirmation bias will continue dominating so- cial dynamics online. In such a context, misinformation risk and its consequences will remain significant. To contrast misinformation spreading, we need to smooth polarization. To this aim, understanding how core narratives behind different echo chambers evolve is crucial and could allow to design more efficient communica- tion strategies that account for users' cognitive determinants behind these kind of mechanisms. 18 References Fabiana Zollo and Walter Quattrociocchi 1. Adamic, L.A., Glance, N.: The political blogosphere and the 2004 us election: divided they blog. In: Proceedings of the 3rd international workshop on Link discovery, pp. 36–43. ACM (2005) 2. Adar, E., Zhang, L., Adamic, L.A., Lukose, R.M.: Implicit structure and the dynamics of blogspace. In: Workshop on the weblogging ecosystem, vol. 13, pp. 16,989–16,995 (2004) 3. Aikin, S.F.: Poe's law, group polarization, and argumentative failure in religious and political discourse. Social Semiotics 23(3), 301–317 (2013) 4. Akerlof, G.A., Yellen, J.L., Katz, M.L.: An analysis of out-of-wedlock childbearing in the united states. The Quarterly Journal of Economics pp. 277–317 (1996) 5. AlMansour, A.A., Brankovic, L., Iliopoulos, C.S.: A model for recalibrating credibility in dif- ferent contexts and languages-a twitter case study. International Journal of Digital Information and Wireless Communications (IJDIWC) 4(1), 53–62 (2014) 6. Aral, S., Muchnik, L., Sundararajan, A.: Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences 106(51), 21,544–21,549 (2009) 7. Asch, S.E.: Opinions and social pressure. Readings about the social animal 193, 17–26 (1955) 8. Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone's an influencer: quantifying In: Proceedings of the fourth ACM international conference on Web influence on Twitter. search and data mining, pp. 65–74. ACM (2011) 9. Bakshy, E., Messing, S., Adamic, L.A.: Exposure to ideologically diverse news and opinion on facebook. Science 348(6239), 1130–1132 (2015) 10. Bessi, A., Coletto, M., Davidescu, G.A., Scala, A., Caldarelli, G., Quattrociocchi, W.: Science vs conspiracy: Collective narratives in the age of misinformation. PloS one 10(2), e0118,093 (2015) 11. Bessi, A., Petroni, F., Del Vicario, M., Zollo, F., Anagnostopoulos, A., Scala, A., Caldarelli, G., Quattrociocchi, W.: Viral misinformation: The role of homophily and polarization. In: Proceedings of the 24th International Conference on World Wide Web, pp. 355–356. ACM (2015) 12. Bessi, A., Petroni, F., Del Vicario, M., Zollo, F., Anagnostopoulos, A., Scala, A., Caldarelli, G., Quattrociocchi, W.: Homophily and polarization in the age of misinformation. The Euro- pean Physical Journal Special Topics 225(10), 2047–2059 (2016) 13. Centola, D.: The spread of behavior in an online social network experiment. Science 329(5996), 1194–1197 (2010) 14. Centre, W.H.O.M.: Ebola: Experimental Situation Assessment (2014). URL http://www.who.int/mediacentre/news/ebola/ 15-august-2014/en/ therapies and rumoured remedies. 15. Cheng, J., Adamic, L., Dow, P.A., Kleinberg, J.M., Leskovec, J.: Can cascades be predicted? In: Proceedings of the 23rd international conference on World Wide Web, pp. 925–936. Inter- national World Wide Web Conferences Steering Committee (2014) 16. Ciampaglia, G.L., Shiralkar, P., Rocha, L.M., Bollen, J., Menczer, F., Flammini, A.: Compu- tational fact checking from knowledge networks. PloS one 10(6) (2015) 17. Conover, M., Ratkiewicz, J., Francisco, M.R., Gonc¸alves, B., Menczer, F., Flammini, A.: Po- litical polarization on twitter. ICWSM 133, 89–96 (2011) 18. Conover, M.D., Goncalves, B., Ratkiewicz, J., Flammini, A., Menczer, F.: Predicting the po- litical alignment of twitter users. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp. 192–199 (2011). DOI 10.1109/PASSAT/SocialCom.2011.34 19. Del Vicario, M., Bessi, A., Zollo, F., Petroni, F., Scala, A., Caldarelli, G., Stanley, H.E., Quat- trociocchi, W.: The spreading of misinformation online. Proceedings of the National Academy of Sciences 113(3), 554–559 (2016) 20. Dong, X.L., Gabrilovich, E., Murphy, K., Dang, V., Horn, W., Lugaresi, C., Sun, S., Zhang, W.: Knowledge-based trust: Estimating the trustworthiness of web sources. Proceedings of the VLDB Endowment 8(9), 938–949 (2015) 27. Jenni Sargent, M.d.: First draft coalition. Website (2017). URL https:// 28. Kahan, D.M.: Social influence, social meaning, and deterrence. Virginia Law Review pp. World Economic Forum (2013) firstdraftnews.com 349–395 (1997) Misinformation spreading on Facebook 19 21. Dow, P.A., Adamic, L.A., Friggeri, A.: The anatomy of large Facebook cascades. In: ICWSM (2013) 22. Ellison, N.B., Steinfield, C., Lampe, C.: The benefits of facebook friends: social capital and college students' use of online social network sites. Journal of Computer-Mediated Commu- nication 12(4), 1143–1168 (2007) O., 23. Erich, (2015). news-feed-fyi-showing-fewer-hoaxes/ Udi, W.: News URL feed hoaxes http://newsroom.fb.com/news/2015/01/ Showing fewer fyi: 24. Facebook: Using the graph api. Website (2017). URL https://developers. facebook.com/docs/graph-api/using-graph-api/. Last checked: 24.02.2017 25. Gupta, A., Kumaraguru, P., Castillo, C., Meier, P.: Tweetcred: Real-time credibility assessment of content on twitter. In: Social Informatics, pp. 228–243. Springer (2014) 26. Howell, W.L.: Digital wildfires in a hyperconnected world. Tech. Rep. Global Risks 2013, 29. Katz, E., Lazarsfeld, P.F.: Personal Influence, The part played by people in the flow of mass communications. Transaction Publishers (1970) 30. Knobloch-Westerwick, S.: Selective exposure and reinforcement of attitudes and partisanship before a presidential election. Journal of Communication 62(4), 628–642 (2012) 31. Kuklinski, J.H., Quirk, P.J., Jerit, J., Schwieder, D., Rich, R.F.: Misinformation and the cur- rency of democratic citizenship. Journal of Politics 62(3), 790–816 (2000) 32. Lazarsfeld, P.F., Berelson, B., Gaudet, H.: The peoples choice: how the voter makes up his mind in a presidential campaign. New York Columbia University Press (1968) 33. Lazer, D., Pentland, A.S., Adamic, L., Aral, S., Barabasi, A.L., Brewer, D., Christakis, N., Contractor, N., Fowler, J., Gutmann, M., et al.: Life in the network: the coming age of com- putational social science. Science (New York, NY) 323(5915), 721 (2009) 34. Lessig, L.: Code: And other laws of cyberspace. ReadHowYouWant. com (2009) 35. Levy, P.: Collective Intelligence: Mankind's Emerging World in Cyberspace. Perseus Publish- ing (1999) 36. McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: Homophily in social net- works. Annual review of sociology pp. 415–444 (2001) 37. Moore, J.P.: The dangers of denying HIV. Nature 459(7244), 168–168 (2009) 38. Nickerson, R.S.: Confirmation bias: A ubiquitous phenomenon in many guises. Review of 39. Nyhan, B., Reifler, J.: When corrections fail: The persistence of political misperceptions. Po- general psychology 2(2), 175 (1998) litical Behavior 32(2), 303–330 (2010) 40. Pariser, E.: The filter bubble: What the Internet is hiding from you. Penguin UK (2011) 41. Peto, R., Peto, J.: Asymptotically efficient rank invariant test procedures. J. Royal Statistical Society Ser. A 135, 185–207 (1972) 42. Qazvinian, V., Rosengren, E., Radev, D.R., Mei, Q.: Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 1589–1599. Association for Computational Linguistics (2011) 43. Ratkiewicz, J., Conover, M., Meiss, M., Gonc¸alves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: ICWSM (2011) 44. Resnick, P., Carton, S., Park, S., Shen, Y., Zeffer, N.: Rumorlens: A system for analyzing In: Proc. Computational Journalism the impact of rumors and corrections in social media. Conference (2014) 45. Stoner, J.A.: Risky and cautious shifts in group decisions: The influence of widely held values. Journal of Experimental Social Psychology 4(4), 442–459 (1968) 46. Sunstein, C.R.: The law of group polarization. Journal of political philosophy 10(2), 175–195 (2002) 20 Fabiana Zollo and Walter Quattrociocchi 47. Sunstein, C.R.: Republic. com 2.0. Princeton University Press (2009) 48. Ugander, J., Backstrom, L., Marlow, C., Kleinberg, J.: Structural diversity in social contagion. Proceedings of the National Academy of Sciences 109(16), 5962–5966 (2012) 49. Watts, D.J., Dodds, P.S.: Influentials, networks, and public opinion formation. Journal of consumer research 34(4), 441–458 (2007) 50. Zollo, F., Bessi, A., Del Vicario, M., Scala, A., Caldarelli, G., Shekhtman, L., Havlin, S., Quattrociocchi, W.: Debunking in a world of tribes. arXiv preprint arXiv:1510.04267 (2015) 51. Zollo, F., Novak, P.K., Del Vicario, M., Bessi, A., Mozetic, I., Scala, A., Caldarelli, G., Quat- trociocchi, W.: Emotional dynamics in the age of misinformation. PloS one 10(9), e0138,740 (2015) Acknowledgements This work is based on co-authored material. We thank Aris Anagnostopou- los, Alessandro Bessi, Guido Caldarelli, Michela Del Vicario, Shlomo Havlin, Igor Mozetic, Petra Kralj Novak, Fabio Petroni, Antonio Scala, Louis Shekhtman, H. Eugene Stanley, and Brian Uzzi.
1302.6256
2
1302
2013-12-26T02:00:15
Parallel Maximum Clique Algorithms with Applications to Network Analysis and Storage
[ "cs.SI", "cs.DC", "cs.DM", "cs.DS", "physics.soc-ph" ]
We propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks ranging from 1000 to 100 million nodes. In a test on a social network with 1.8 billion edges, the algorithm finds the largest clique in about 20 minutes. Our method employs a branch and bound strategy with novel and aggressive pruning techniques. For instance, we use the core number of a vertex in combination with a good heuristic clique finder to efficiently remove the vast majority of the search space. In addition, we parallelize the exploration of the search tree. During the search, processes immediately communicate changes to upper and lower bounds on the size of maximum clique, which occasionally results in a super-linear speedup because vertices with large search spaces can be pruned by other processes. We apply the algorithm to two problems: to compute temporal strong components and to compress graphs.
cs.SI
cs
Parallel Maximum Clique Algorithms with Applications to Network Analysis and Storage Ryan A. Rossi, David F. Gleich, Assefaw H. Gebremedhin Purdue University Computer Science {rrossi,dgleich,agebreme}@purdue.edu Md. Mostofa Ali Patwary Northwestern University Electrical Engineering and Computer Science [email protected] 3 1 0 2 c e D 6 2 ] I S . s c [ 2 v 6 5 2 6 . 2 0 3 1 : v i X r a ABSTRACT We propose a fast, parallel maximum clique algorithm for large sparse graphs that is designed to exploit characteristics of social and information networks. The method exhibits a roughly linear runtime scaling over real-world networks rang- ing from 1000 to 100 million nodes. In a test on a social net- work with 1.8 billion edges, the algorithm finds the largest clique in about 20 minutes. Our method employs a branch and bound strategy with novel and aggressive pruning tech- niques. For instance, we use the core number of a vertex in combination with a good heuristic clique finder to efficiently remove the vast majority of the search space. In addition, we parallelize the exploration of the search tree. During the search, processes immediately communicate changes to up- per and lower bounds on the size of maximum clique, which occasionally results in a super-linear speedup because ver- tices with large search spaces can be pruned by other pro- cesses. We apply the algorithm to two problems: to compute temporal strong components and to compress graphs. Categories and Subject Descriptors G.2.2 [Graph theory]: Graph algorithms; H.2.8 [Database Applications]: Data Mining General Terms Algorithms, Experimentation Keywords parallel maximum clique algorithms, network analysis, tem- poral strong components, graph compression 1. INTRODUCTION The maximum clique problem seeks to find a clique (com- plete subgraph) of the largest possible size in a given graph. The problem is NP-hard, even to solve in an approximate sense [28]. As a result one is inclined to believe that ex- act algorithms for finding maximum cliques will be too slow to be practical for large network analysis applications. Yet, many real-world problems have features that do not elicit worst-case behaviors from well-designed algorithms. In this manuscript, we propose a fast, state-of-the-art par- allel exact maximum clique finder. And enabled by its effi- ciency, we use the clique finder (i) to investigate cliques in large social and information networks, (ii) to study largest temporal strong components in dynamic networks, and (iii) to compress graphs. We demonstrate that finding the largest clique in big so- cial and information networks is fast (Table 1). By way of example, we can find the maximum clique in social networks with nearly two billion edges in about 20 minutes with a 16- processor shared memory system. Empirically, our method is observed to have a roughly linear runtime (Figure 1) for these networks, which is remarkable in light of the fact that the problem is NP-hard. As a point of comparison, our new solver significantly outperforms a recent fast maximum clique finder we developed [39] as well as an off-the-shelf clique enumerator (Section 5). Consequently, we expect our new algorithm to be useful for tasks such as analyzing large networks, evaluation of graph generators, community detec- tion, and anomaly detection, where maximum cliques are needed. In its basic form, our algorithm is a branch and bound method with novel and aggressive pruning strategies. Sev- eral key components stand out as features contributing to its efficiency and distinguishing it from existing algorithms. First, the algorithm begins by finding a large clique us- ing a near linear-time heuristic; the obtained solution is checked for optimality before the algorithm proceeds any further, and the algorithm is terminated if the solution is found to be optimal. Second, we use this heuristic clique, in combination with (tight) upper bounds on the largest clique, to aggressively prune the graph. The upper bounds are computed at the level of the input graph or individual neighborhoods. Third, we use implicit graph edits and peri- odic full graph updates in order to keep our implementation efficient. Fourth, we parallelize the search procedure. The parallel search is designed such that processes (workers) im- mediately communicate changes to upper and lower bounds on the size of maximum clique. As a result, vertices with especially large search spaces can be pruned by other pro- cesses, which occasionally results in a super-linear speedup. Finally, our framework is tunable in the sense that the graph representation, data structures, and the implementations of the algorithm can be adapted based on the properties of the input graph. The algorithm is discussed in detail in Section 4, its performance is evaluated in Section 5, and the bounds it makes use of in its pruning strategies are reviewed in Section 3. One motivation for this work came from a connection be- tween the largest temporal strong component of a dynamic network and maximum cliques in an associated graph. In a network when each edge represents a contact – a phone 1 call, an email, or physical proximity – between two entities at a specific point in time, one gets an evolving network structure [22] where a temporal path represents a sequence of contacts that obeys time. A temporal strong component is a set of vertices where all pairwise temporal paths exist, just like a strong component is a set of vertices where all pairwise paths exist. Surprisingly, checking if an evolving network has a tem- poral strong component of size k is NP-complete [34, 3]. For some intuition, consider the following “wrong” reduc- tion from the perspective of establishing NP-hardness. A temporal strong component of size k corresponds to a clique of size k in a temporal reachability graph where each edge represents a temporal path between vertices. Finding the maximum clique, then, reveals the largest temporal strong component. At a first glance, this is no help as even approx- imating the largest clique in a graph is hard [28]. With a fast, well-designed algorithm, however, the connection can be exploited. We apply our maximum clique finder for this analysis and discuss properties of temporal components we find in Twitter and phone call networks in Section 6.1. Cliques are the most dense local structure possible in a network. Previous studies found cliques useful to compress a networks [10]. We tackle an easier problem and use cliques to compute a compression friendly ordering that makes many edges in the graph local. We find in Section 6.2 that this ordering generates results that are nearly as good as existing heuristics designed specifically for that problem. We make all our implementations and further experiments available in an online appendix: http://www.ryanrossi.com/pmc 2. CLIQUES IN SOCIAL AND INFORMA- TION NETWORKS We proceed by first demonstrating how fast the algorithm finds cliques on various social and information networks and discussing observations we make about the cliques obtained. We experiment with 32 networks categorized in 8 broad classes. In the online appendix – see the link above – we present a more extensive collection of around 74 social and information networks, 16 temporal reachability networks, and 63 dense graphs from DIMACS challenge. Table 1 de- scribes the properties of the 32 networks considered here. It also shows the size of the largest clique in each network and states the time taken to find each clique. We plot the runtime pictorially in Figure 1, which demonstrates linear scaling between 1000 vertices and 100M vertices. We now briefly explain the data and what each clique signifies. For all of the following networks, we discard edge weights, self-loops, and only consider the largest strongly connected component. In contrast to the temporal components we de- scribe later, in this section we mean the standard strong com- ponents. If the graph is directed, we remove non-reciprocated edges. This strategy will identify fully-directed cliques. 1. Biological networks. We study a network where the nodes are proteins and the edges represent protein-protein interactions (dmela [44]) and another where nodes are sub- strates and edges are metabolic reactions (celegans). Cliques in these networks signify biologically relevant modules. 2. Collaboration networks. These are networks in which nodes represent individuals and edges represent scien- tific collaborations or movie production collaborations (math- Table 1: For each of the social and information net- works studied we find the largest clique in less than 21 minutes. The column K + 1 is a core number based upper-bound, ω denotes the size of the clique obtained by the initial heuristic step, and ω denotes the actual maximum clique. graph V E K+1 ω 1. 2. 3. 4. 5. 6. 7. 8. celegans dmela 453 7.4k 2.0k 26k 11 12 mathsciet dblp hollywood 333k 317k 1.1M 56M 2209 821k 1.0M 114 25 wiki-talk 92k 361k 59 retweet 1.1M 2.3M 19 whois rl-caida as-skitter arabic-2005 wikipedia2 it-2004 uk-2005 7.5k 191k 1.7M 11M 112 57k 608k 89 33 1.7M 102 164k 1.9M 4.5M 67 509k 130k 7.2M 432 12M 500 cmu mit stanford berkeley uillinois penn texas fb-a fb-b uci-uni 70 250k 6.6k 73 251k 6.4k 92 568k 12k 852k 65 23k 1.3M 86 31k 1.4M 63 42k 36k 1.6M 82 3.1M 24M 75 2.9M 21M 64 59M 92M 17 slashdot gowalla youtube flickr livejournal orkut twitter friendster 359k 950k 54 70k 197k 52 1.1M 3.0M 52 514k 3.2M 310 4.0M 28M 214 3.0M 106M 231 21M 265M 1696 66M 1.8B 304 9 7 25 114 2209 14 13 55 17 66 102 31 432 500 45 32 51 42 56 43 49 23 23 6 25 29 16 45 214 44 174 129 ω 9 7 25 114 2209 15 13 58 17 67 102 31 432 500 45 33 51 42 57 44 51 25 24 6 26 29 17 58 214 47 323 129 Time (s.) <.01 0.06 0.08 0.05 1.69 0.09 0.58 0.09 0.13 1.2 0.03 1.16 0.12 0.06 0.09 0.1 0.09 0.16 0.18 0.24 0.33 6.3 5.52 33.86 0.06 0.2 0.84 5.2 2.98 48.49 598 1205 scinet, dblp, hollywood [4]). Large cliques in these networks are expected because they are formed when collaborations involve many participants. 3. Interaction networks. Here, nodes represent individ- uals and edges represent interaction in the form of message posts (wiki-talk [31]). 4. Retweet networks. Here, nodes are Twitter users and two users are connected by an edge if they have retweeted each other. We collected this network ourselves. Cliques are groups of users that have all mutually retweeted each other and may represent an interest cartel or anomaly. 5. Technological networks. The nodes in these net- works are routers (as-skitter, rl-caida, whois), and edges are observed communications between the entities. 6. Web link networks. Here, nodes are web-pages and edges are hyperlinks between pages (wikipedia, arabic- 2005, it-2004, uk-2005 [4]). The largest clique represents the largest set of pages where full pairwise navigation is possible. 7. Facebook networks. The nodes are people and edges represent “Facebook friendships” (CMU, MIT, Stanford, Berke- ley, UIllinois, Penn, Texas [48], fb-a, fb-b [50], uci-uni [23]). 8. Social networks. Nodes are again people and edges represent social relationships in terms of friendship or fol- lower (orkut, LiveJournal, flickr [24], gowalla, slashdot, youtube[32], twitter [30], friendster [Internet Archive]). 2 e e m m i i t t n n u u R R g g o o l l 2 2 1 1 0 0 −1 −1 −2 −2 −3 −3 3 3 4 4 5 5 6 6 7 7 log V + E log V + E 8 8 9 9 Figure 1: The empirical runtime of our clique finder in social and information networks scales almost lin- early with the network dimension. We summarize below our findings about cliques in these networks and the performance of our algorithm: • We observe that the initial heuristic step of the algorithm finds the largest clique in most cases: 17 of the 32 in- stances considered here, and 52 of the 74 networks consid- ered in the online appendix; see Figure 2 for a summary. This property helps our exact maximum clique algorithm terminate quickly. • We studied the relationship between the largest k-core (a notion discussed in Section 3) and the largest clique. Fig- ure 2 shows a summary of the results we obtained on all 74 networks. In the collaboration and most web-link net- works, we find that the largest k-core is a maximum clique for every graph. The social networks, in comparison, have a much larger difference between the two, which suggests a fundamental difference in the types of networks formed via collaboration relationships versus social relationships. • We observe that technological networks have surprisingly large cliques. Given that a clique represents an overly re- dundant set of edges, this would suggest that these max- imum cliques represent over-built technology, or critical groups of nodes. • We observe that for the twitter network, the nodes in the largest clique are a strange set of spam accounts and legitimate accounts with thousands of followers and fol- lowing thousands. We believe that most members of this clique likely reciprocate all follower relationships. 3. BOUNDS ON MAXIMUM CLIQUE SIZE As a prelude to our algorithm, we review a few easy to derive upper bounds on the size of the largest clique ω(G) in a graph G. These bounds will allow us to terminate our algorithm once we have found something that hits the upper- bound or stop a local search early because there is no larger clique present. A simple upper bound on the size of the largest clique is the maximum degree ∆(G) in the graph. Usually this is too simple to be useful. A stronger bound can be obtained using k-cores. A k-core in a graph G is a vertex induced subgraph where all vertices have degree at least k [43]. The core number of a vertex v is the largest k such that v is in a k-core. We denote it by K(v). Suppose that G contains a clique of size k, then each vertex in the clique has degree k−1 3 1 0.8 0.6 0.4 0.2 0 1 0.8 0.6 0.4 0.2 0 ω / ω ) 1 + K ( / ω 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1. bio 2. collab 3. inter 4. retweet 5. tech 6. web 7. facebook 8. social 1. bio 2. collab 3. inter 4. retweet 5. tech 6. web 7. facebook 8. social Figure 2: These two figures summarize the results on all 74 networks studied in the online appendix. The top figure shows that our heuristic (ω) finds the largest clique (ω) in biological, collaboration, and web networks in all but one case. The bottom figure identifies networks where the largest core number (K) tightly bounds the largest clique (ω). and the entire graph must have a k − 1-core. Consequently, if K(G) is the largest core number of any vertex in G, then K(G) + 1 is an upper bound on the clique size. In contrast to cliques, the core numbers of all vertices in a graph can be computed with a linear time algorithm [2]. The value K(G) is also known as the degeneracy of the graph. The quantity K(G) + 1 is an upper-bound on the number of colors used by a greedy coloring algorithm that processes vertices in order of decreasing core numbers – also known as degeneracy order [21]. Note that the number of colors used by any greedy coloring of G is also an upper- bound on the size of the largest clique because a clique of size k requires k colors. Let L(G) be the number of colors used by a greedy coloring algorithm that uses the degener- acy order. Then L(G) ≤ K(G) + 1 and we get a potentially tighter bound on the size of the largest clique. The bound L(G) can be computed in linear time with some care on the implementation of the greedy coloring scheme. We summa- rize the bounds we have at this point: Fact 3.1. ω(G) ≤ L(G) ≤ K(G) + 1 ≤ ∆(G) + 1. We can further improve the bounds in Fact 3.1 by using one additional fact about a maximum clique in a graph. Any neighborhood graph of a vertex within the largest clique has a clique of the same size within the neighborhood graph as well. The way our algorithm proceeds is by iteratively re- moving vertices from the graph that cannot be in the largest clique. Let NR(v), the reduced neighborhood graph of v, be the vertex-induced subgraph of G corresponding to v and all neighbors of v that have not been removed from the graph yet. All the bounds in Fact 3.1 apply to finding the largest clique in each of these neighborhood subgraphs. We can therefore state: Fact 3.2. ω(G) ≤ max v L(NR(v)) ≤ max v ≤ max v K(NR(v)) + 1 ∆(NR(v)) + 1. (1) (2) (3) Computing the tighter bounds in Fact 3.2 requires slightly more than linear work. For each vertex, we must form the neighborhood graph. If we look at the union of all of these neighborhood graphs, there is a vertex in some neighbor- hood graph for each edge in G. Thus, there are a total of O(E) vertices in all neighborhoods. By the same argument, there are O(E + T ) edges where T is the total number of triangles in the graph. Consequently, we can make the following statement. Fact 3.3. The total work involved in computing the bounds in Fact 3.2 is bounded by O(E + T ). 4. MAXIMUM CLIQUE ALGORITHMS Given an undirected graph G = (V, E), let Cv denote a clique of the largest size containing the vertex v. A maxi- mum clique in G can be found by computing Cv for every vertex v in V and then picking the largest among these. This clearly is wasteful. Most branch and bound type algorithms for maximum clique speed up the process by keeping around the size of the largest clique computed at any point in the course of the algorithm (maxSoFar) and avoiding computa- tion of every Cu, u ∈ V , that would eventually be smaller than maxSoFar, a process generically referred to as prun- ing [38, 36, 46, 39, 51]. They differ chiefly in the way the pruning is done. The algorithm we developed in a recent work [39] uses a hierarchical pruning strategy that relies pri- marily on comparisons of degrees of vertices in the original input graph with maxSoFar, effectively using the weakest bound in Fact 3.2. In comparison, our new method uses the tightest bound in Fact 3.2. Furthermore, it is parallelized, and it contains a variety of new algorithmic and performance optimization ingredients that result in significantly superior performance. For reference throughout the discussion in this section, we outline our algorithm in the psuedocodes in Algorithm 1 and Algorithm 2 and provide an illustrative example in Figure 3. In the overall procedure, we identify the following steps as the most important: – finding a good initial clique via our heuristic, – using the smallest to largest ordering in the main loop; this helps ensure that neighborhoods of high degree vertices are as small as possible, – using efficient data structures for all the operations and graph updates, and – aggressively using k-core bounds and coloring bounds to remove vertices early. 4.1 Our fast heuristic clique finder Our exact maximum clique finder begins by calling a fast heuristic clique finder (see the main procedure MaxClique in Algorithm 2). The goal of this initial heuristic step is to find a large clique in the graph quickly. The heuristic is similar to the maximum-degree based heuristic described 4 Algorithm 1 Our greedy heuristic to find a large clique. This is used as the first step in the exact algorithm, outlined in Algorithm 2. The input array K holds core numbers of vertices. Set H = {}, Set max = 0 for each v ∈ V in decreasing core number order do if v’s core number is ≥ max then Let S be the neighs. of v with core numbers ≥ max Set C = {} for each vertex u ∈ S by decreasing core num. do 1 procedure HeuristicClique(G = (V, E) , K) 2 3 4 5 6 7 8 9 10 11 Add u to C if C > max then if C ∪ {u} is a clique then Set H = C, Set max = H 12 return H, a large clique in G in [39], which, in exploring for a maximum clique in which a vertex v participates, simply picks a vertex of the highest degree in the neighborhood of v. Our heuristic search differs as we use the core numbers of each vertex to guide the search instead. The inspiration for this change is the relationship between core numbers, the degeneracy order, and a simple 2-approximation algorithm for the densest subgraph. The heuristic, outlined in Algorithm 1, builds a clique by searching around each vertex in the graph and greedily adding vertices from the neighborhood as long as they form a clique. The order of vertices is the degeneracy order (the input parameter K contains the needed core numbers of the vertices). Because the core numbers are also a lower-bound on the size of the largest clique a vertex participates in, we can efficiently prune the greedy exploration. As mentioned in the previous section, this heuristic step in itself finds the largest clique in the graph in over half of the social networks we consider. It can therefore be used as a stand-alone procedure. All steps in Algorithm 1, except for the statements in Lines 7–9, can be performed using work proportional to the degree of a vertex. Those statements in turn require work proportional to the size of the subgraph in- duced by the neighborhood of a vertex. The overall runtime is therefore O(E · ∆(G)). 4.2 Initial pruning After our exact algorithm finds a heuristic clique H in the input graph G using the core numbers of the vertices, it puts those numbers to another strategic use. Suppose we find a clique in G of size ω = H. Then we can eliminate all ver- tices with core numbers strictly less than ω from our search (Line 4 in MaxClique). This pruning operation works be- cause a clique of size ω + 1 or larger must have vertices with core numbers at least ω. In a few cases, we observed this step suffices to certify that H is the maximum clique as we remove all of the graph. This happens, for instance, with the LiveJournal network. Moreover, this pruning pro- cedure reduces memory requirements significantly for most networks. In our implementation, for this initial pruning, vertices are explicitly removed from the graph. However, vertices re- moved in future pruning steps are simply marked as deleted in an index array. Future graph operations, such as neigh- borhood queries, check this array before returning their con- tents. This helps us achieve efficient implementation. 4.3 Searching Algorithm 2 Our exact maximum clique algorithm. See Sec- tion 4.5 for details about how to parallelize it. 1 procedure MaxClique(G = (V, E)) 2 Set K = CoreNumbers(G) array ⊲ K is a vertex-indexed 3 4 5 6 7 8 9 10 Set H = HeuristicClique(G, K) Remove (explicitly) vertices with K(v) < H while G > 0 do Let u be the vertex with smallest reduced degree InitialBranch(u) Remove u from G Periodically, explicitly remove vertices from G ⊲ the routine grows H Return H, the largest clique in G 1 2 3 4 11 procedure InitialBranch(u) 12 13 14 15 16 17 18 Set P = NR(u) if P ≤ H then return Set KN = CoreNumbers(P) Set K(P ) = maxv∈P KN (v) if K(P ) + 1 < H then return Remove any vertex with KN (v) < H from P Set L = Color(P , KN ) in degen. order colors 19 20 if L ≤ H then return Branch({}, P ) 10 11 16 17 18 9 15 19 23 20 12 13 14 21 22 5 6 7 8 24 25 26 ⊲ L is nr of Figure 3: An example that illustrates the workings of Algorithm 2. See discussion at the end of Sec- tion 4.3. while P > 0 and P + C > H do Select a vertex u from P and remove u from P Set C ′ = C ∪ {u} Set P ′ = P ∩ {NR(u)} if P ′ > 0 then Set L = Color(P ′) in natural (any) order if 21 procedure Branch(C, P ) 22 23 24 25 26 27 28 29 30 31 32 C ′ + L > H then Branch(C ′, P ′) else if C ′ > H then ⊲ C ′ is maximal ⊲ new max clique Set H = C ′ Remove any v with K(v) < H from G ⊲ implicitly After we reduce the size of the graph via the initial prun- ing, we then run a search strategy over all the remaining vertex neighborhoods in the graph (the while-loop in Max- Clique). The algorithm we run is similar to a standard branch and bound scheme for maximal clique enumeration [9]. However, we unroll the first two levels of branching and ap- ply our clique bounds in order to find only the largest clique. At this point, we wish to introduce a bit of terminology. Recall (from Section 3) that NR(v) is the reduced neighbor- hood graph of v and let dR(v) denote the reduced degree of v. These sets do not contain any vertices that have been removed from the graph due to changes in the lower-bound on the clique size due to k-cores and any vertices whose local searches have terminated. At the risk of being overly formal, let ω be the current best lower-bound on the clique size, and let X be a set of vertices removed via searching. Then: NR(v) = G({v} ∪ {u : (u, v) ∈ E, K(u) ≥ ω, u 6∈ X}). We explore the remaining vertices in order of the small- est to largest reduced degree. For each vertex, we explore its neighborhood using the function InitialBranch. When InitialBranch returns, we have found the largest clique in- volving that vertex, and so we can remove it from the graph. 5 Again, this is done by marking it as removed in an array. We did, however, find it advantageous to periodically recre- ate the graph data structure in light of all the edits and recompute k-cores. This reduces the cost of the intersection operations. In addition, we believe that this step aggregates memory access to a more compact region thereby improving caching on the processor. We do this every four seconds of wall clock time. The first step of InitialBranch is a set of tests to check if any of the bounds from Lemma 3.2 rule out finding a bigger clique in the neighborhood of u. The first test (Line 13) essentially corresponds to the weakest bound, Equation (3), in Lemma 3.2. To check against the bound given by Equation (2), we compute the core numbers for each vertex in the neighborhood subgraph. If the largest core number in the neighborhood graph is no better than the current lower bound, we immediately return and add the vertex to the list of searched vertices. If it isn’t, then we compute a greedy coloring of the subgraph using the degeneracy order. Using the coloring bound from Lemma 3.2 (Equation (1)), we can immediately return if there is no large clique present. If none of these checks pass, then we enter into a recursive search procedure that examines all subsets of the neighborhood in a search for cliques via the Branch function. The Branch function maintains a subgraph P and a clique C. The invariant shared by these sets is that we can add any vertex from P to C and get a clique one vertex larger. We pick a vertex and do this. To be precise, we pick the vertex with the largest color (note that colors are positive integer numbers). We then check if the clique C ′ is maximal by testing if there is any set P ′ that exists that satisfies the invariant. If it is a maximal clique, then we check against our current best clique H, and update it if we found a larger If it is not, then we test if it is possible that C ′ clique. and P ′ have a big clique. The biggest clique possible is C ′+ω(P ′) ≤ C ′+L(P ′), and so using the function Color, we compute a new greedy coloring to get the upper bound L(P ′). Unlike the greedy coloring in InitialBranch, here we do not use the degeneracy ordering as it was not worth the extra work in our investigations. If C ′ and P ′ pass these tests, we recurse on C ′ and P ′. The example in Figure 3 illustrates several of the points we have been discussing thus far. The core number of this graph is 4, which yields the upper bound of 5 on the maximum clique size. The clique detected by our heuristic is {1, 8, 23}; the graph has two maximum cliques: {19, 20, 21, 22} and {23, 24, 25, 26}. Our algorithm removes vertices 10, 11, 12, 13 and 16, 17, 18 in the initial pruning. Subsequently, our method will explore vertex 9 and remove it based on the maximum neighborhood core of 3. It explores vertex 15 next and re- moves it due to the neighborhood core bound. It then re- moves vertex 14 due to an insufficient degree. Subsequently, it finds the clique around vertex 19, then prunes all vertices except 1 through 8 due to core number bounds. Finally, it eliminates vertex 1 due to the neighborhood core bound; all other vertices are then iteratively removed via degree bounds. 4.4 Performance Optimization In the interest of space and to keep the presentation sim- ple, we have left out several details on performance enhance- ment that we have in our implementation. (We make the code available online for interested readers). To give a small example, we use an adjacency matrix structure for small graphs in order to facilitate O(1) edge checks. We use a fast O(d) neighborhood set intersection procedure, and have many other optimizations throughout the code. 4.5 Parallelization We have parallelized the search procedure. Our own im- plementation uses shared memory, but we describe the par- allelization such that it could be used with a distributed memory architecture as well. The parallel constructs we use are a worker task-queue and a global broadcast channel. In fact, the basic algorithm remains the same. We compute the majority of the prepro- cessing work in serial with the exception of a parallel search for the clique in the initial heuristic step. Here, we assume that each worker has a copy of the graph and distribute ver- tices to workers to find the largest heuristic clique in the neighborhood. In serial, we reduce the graph in light of the soc−orkut (290) soc−flickr (22) socfb−Texas (2.3) 8 8 7 7 6 6 5 5 4 4 3 3 2 2 1 1 p p u u d d e e e e p p S S 0 0 0 1 0 1 4 4 8 8 Processors Processors 12 12 16 16 Figure 4: Speedup of our parallel maximum clique algorithm on social and information networks. Sin- gle processor runtimes in seconds are shown in parentheses. 6 brock400−4 (331) san200−0−9−2 (1) san400−0−7−1 (0.2) brock800−4 (3604) brock400−3 (619) p−hat1500−1 (4) san1000 (1) 20 20 15 15 10 10 5 5 p p u u d d e e e e p p S S 0 0 0 1 0 1 4 4 8 8 Processors Processors 12 12 16 16 Figure 5: Speedup of our parallel maximum clique algorithm on DIMACS graphs. Single processor run- times in seconds are shown in parentheses. bounds, and then re-distribute a copy of the graph to all workers. At this point, we view the main while loop as a task generator and farm the current vertex out to a worker to find the largest clique in that neighborhood. Workers co- operate by communicating improved bounds between each other whenever they find a clique and whenever they remove a vertex from the graph using the shared broadcast channel. When a worker receives an updated bound, we have found that it is often possible for that worker to terminate its own search at once. Unlike previous algorithms, the speedup from our parallel maximum clique algorithms can be super linear since we are less dependent on the precise order of vertices explored. In our own shared memory implementa- tion, we avoid some of the communications by using global arrays and locked updates. 5. PERFORMANCE RESULTS As we illustrated in Table 1 and Figure 1, the runtime of our clique finder on social and information networks is fast, and it exhibits roughly linear scaling as we increase the problem size. We used a two processor, Intel E5-2760 system with 16 cores and 256 GB of memory for those tests and the remaining tests. None of the experiments came close to using all the memory. In this section we will be concerned with three questions: a) How scalable is our parallel algorithm? b) How does our method compare to other clique finders on social and information networks? c) Is the tighter upper bound that results from using neigh- borhood cores worth the additional expense? In what follows, we will refer to our own algorithm outlined in Algorithm 1 and 2 as “pmc” (for parallel maximum clique). For performance analysis purposes we will consider several versions of pmc. For the results reported in this section, we will use prob- lems from the 20 year old DIMACS clique challenge [49] to study the performance of our clique finder on an established benchmark of difficult problems. Even the best state of the art algorithms cannot solve all of these problems. In the interest of space, we do not present individual data on them. These graphs are all small: 45—1500 vertices. However, they contain an enormous number of edges and triangles compared with social networks. The number of triangles ) ) τ τ ≤ ≤ r r ( ( P P 1 1 0.8 0.8 0.6 0.6 0.4 0.4 0.2 0.2 0 0 0 0 pmc pmc (no neigh cores) pmc (native ordering) FMC MaxCliqueDyn BK 10 10 15 15 5 5 τ τ Figure 6: Comparison of a serial version of pmc and its variants against three existing maximum clique algorithms on 30 difficult social and information net- works. ranges between 34,000 and 520 million. Of the 57 graphs our method was able to solve, we divide them into an easy set of 26 graphs, where our algorithm terminates in less than a second and a hard set of 32 graphs which take between one second and an hour. Parallel Speedup. In Figure 4 we show the speedup obtained as we add processes to our pmc method for three social networks. In Figure 5 we show speedup results of pmc for seven of the DIMACS graphs. The runtime for both includes all the serialized preprocessing work, such as computing the core numbers initially. The figures illus- trate two different behaviors. For social networks, we only get mild speedups on 16-cores for the largest problem (soc- orkut). For the DIMACS graphs, we observe roughly linear and, sometimes, super-linear performance as we increase the number of processes. The superlinear performance is due to quicker returns from unfruitful branches as a result of the parallel exploration. These results indicate that our paral- lelization scales well and helps reduce the runtime for diffi- cult problems. Performance Profile Plots. To address the two remain- ing questions b) and c), we use performance profile plots to compare algorithms [15]. Performance profile plots compare the performance of multiple algorithms on a range of prob- lems. They are similar to ROC curves in that the best results are curves that lie towards the upper left. Suppose we have N problems in total and that an algorithm solves M of them within 4 times the speed of the best solver for each problem. Then we would have a point (τ, p) = (log2 4, M/N ). Note that the horizontal axes reflects a speed difference factor of 2τ . The fraction of problems that an algorithm cannot solve is given by the right-most point on the curve. In Figure 6, for instance, the method labeled BK only solves around 80% of the problems in the test set. Figure 6, social and information networks. We con- sider several variants of pmc in order to understand the effects of the various components on the method’s perfor- mance. The variants considered are: a serial version with neighborhood cores exploited (pmc), the same version but without exploiting neighborhood cores (pmc no neigh cores), 1 1 0.8 0.8 0.6 0.6 0.4 0.4 0.2 0.2 ) ) τ τ ≤ ≤ r r ( ( P P 0 0 0 0 1 1 pmc pmc (no neigh cores) 2 2 τ τ 3 3 4 4 (a) DIMACS-Hard (Serial) 1 1 0.8 0.8 0.6 0.6 0.4 0.4 0.2 0.2 ) ) τ τ ≤ ≤ r r ( ( P P 0 0 0 0 0.5 0.5 1 1 pmc pmc (no neigh cores) 1.5 1.5 τ τ 2 2 2.5 2.5 (b) DIMACS-Hard (16 Threads) Figure 7: Performance profiles comparing the per- formance of two versions of pmc (with and without neighborhood cores) on DIMACS graphs. The top figure shows comparison of serial versions of the two variants, the bottom figure shows similar compari- son of the parallel versions. and a version that uses only the k-core pruning steps and searches vertices in their native order, the order in which they were read from disk, rather than degeneracy order (pmc-native). We compare these three variants of pmc with three state of the art maximum clique finders. These include the re- cent method FMC (for fast maximum clique) from [39], the method MaxCliqueDyn [29] which dynamically adapts a greedy color sort, and a recent implementation of the Bron-Kerbosch (BK) algorithm in the igraph package [14]. From the performance profile plots, for these types of net- works, we find little difference between using the neighbor- hood cores and not using them, and somewhat more pro- nounced difference between using degeneracy ordering ver- sus native ordering. Further, we find a big difference be- tween our most optimized method (pmc) and the alterna- tive algorithms. Compared to the BK algorithm, we are over 1000 times faster for some problems, and we solve all of the instances. Compared to the FMC algorithm, we are about 50 times faster. This illustrates that our algorithm uses properties of the social and information networks to hone in on the largest clique quickly. Figures 7(a) and 7(b), DIMACS networks. These plots show results on the 32 hard instances of DIMACS prob- lems in the serial case (a) and in the parallel case (b). It can be seen that, in the serial case, the neighborhood cores greatly help reduce the work in the majority of cases. In a few cases, they resulted in a large increase in work (the 7 Table 2: For each temporal network, we list the num- ber of temporal edges, the number of vertices and edges in the reachability graph, the size ω of the temporal strong component and the runtime of our algorithm. graph ET VR ER ω Time (s.) infect-dublin infect-hyper 415k 20k fb-messages reality retweet twitter-cop 61k 52k 61k 45k 11k 113 1.9k 6.8k 18k 8.6k 176k 6.2k 84 106 532k 4.7M 1236 707 66k 474k 166 581 <.01 <.01 0.05 0.19 0.02 0.22 point furthest to the right in the serial figure). All of the work involved in computing these cores is parallelized, and we observe that, in parallel, using them is never any worse than about 20.5 ≈ 144% the speed of the fastest method. In summary, we observe that a) our parallelization strat- egy is effective, b) our algorithm outperforms existing algo- rithms dramatically, and c) neighborhood core bounds help with challenging problems. We recommend using neighbor- hood cores as they help the algorithm terminate faster with challenging problems and almost never take more than twice the time. 6. MAXIMUM CLIQUE APPLICATIONS Although finding the maximum clique is generally NP- hard, our procedure is effective on many real-world networks and produces nearly linear runtimes. In this section, we con- sider how well our method works as a subroutine for two applied problem: finding the largest temporal strong com- ponent and finding a compress-friendly order of a network. 6.1 Temporal strong components Temporal strong components were recently proposed by Bhadra et al. and Nicosia et al. to extend the idea of a strong component in a network to a temporal graph [3, 34]. Let V be a set of vertices, and ET ⊆ V × V × R+ be the set of tem- poral edges between vertices in V . Each edge (u, v, t) has a unique time t ∈ R+. For such a temporal network, a path represents a sequence of edges that must be traversed in in- creasing order of edge times. That is, if each edge represents a contact between two entities, then a path is a feasible route for information. Temporal paths are inherently asymmetric because of the directionality of time. Two vertices (u, w) are strongly connected if there exists a temporal path P from u to w and from w to u. A temporal strongly connected component (tSCC) is defined as a maximal set of vertices C ⊆ V such that any pair of vertices in C are strongly con- nected. Note that this is exactly the same definition as a strong component where we replaced the notion of a path with a temporal path. As previously mentioned, checking if a graph has a k-node temporal SCC is NP-complete [3, 34]. Nonetheless, we can compute the largest such strong component using a maxi- mum clique algorithm. Let us briefly explain how. The first step is to transform the temporal graph into what is called a strong-reachability graph. For each pair of vertices in V , we place an edge in the strong reachability graph if there is a temporal path between them. This is easy to do by using (a) Reachability (retweet) (b) Temporal SCC (retweet) Figure 8: In order to compute the largest tempo- ral strong component, we first compute the strong reachability network (a). These networks are rather dense and often reveal clear community structure. Here we see clear communities for the political left and right. We find that the largest temporal strong component in the retweet network (b) consists of 166 twitter users classified as politically “right” accord- ing to the original data with only a single exception. a method by [37]. With this reachability graph, the second step of the computation is to remove any non-reciprocated edges and then find a maximum clique. That maximum clique is the largest set of nodes where all pairwise tempo- ral paths exist, and hence, is the largest temporal strong component [34]. Data. We study three types of temporal networks. In each, the nodes represent people. Contact networks: The edges are face-to-face contacts (infect-dublin, infect-hyper[25]). See ref. [45] for more details about these data. Interaction networks: In fb-messages, the edges represent private mes- sages [35] and in the reality network, the edges represent calls [18]. We also investigate a cellular telephone call net- work where the edges are calls (reality [18]). Retweet net- works: Here, the edges are retweets. We analyzed a net- work of political retweets centered around the November 2010 election in the US (retweet [13]). A similar dataset is a retweet and mentions network from the UN conference held in Copenhagen. The data was collected over a two week period (twitter-copen [1]). Results and analysis. Figure 8 shows the reachability and largest temporal strong component from a retweet net- work about politics. It took the maximum clique finder less than a second to identify this clique. We summarize the re- maining experiments on the temporal strong components in Table 2. For all of these networks, we were able to identify the largest temporal strong component in less than a second after we computed the reachability network. There are two reasons for this performance. First, in all of the networks ex- cept for the interaction networks, the largest clique is the set of vertices with highest core numbers. Second, our heuristic computes the largest clique in all of these networks, and we are quickly able to reduce the remaining search space when it isn’t the largest k-core as well. We observe several interesting properties in these tempo- ral strong components. In the two contact networks (infect- hyper and infect-dublin), both of the largest strong compo- nents had about 100 vertices, despite the drastically different 8 sizes of the initial dataset. We suspect this is a consequence of the data collection methodology since the infect-dublin data were collected over months whereas the infect-hyper data were collected over days. In the interaction networks, the components contain a significant fraction of the total vertices, roughly 20-30%. In the retweet networks, the com- ponents are a much smaller fraction of the vertices. Given the strong communication pattern between the groups, the components are good candidates for centers communities in the networks. Together, these results show that temporal strong compo- nents are a strict requirement on a group of nodes in a net- work. For instance, there is a considerable difference in the size of temporal strong components between networks with asymmetry in the relations (retweets) compared with net- works with symmetric relationships (fb-forum, fb-messages, and reality). This finding may be important for those inter- ested in designing seeded viral campaigns on these networks. 6.2 Ordering for network compression In this application, we consider using the maximum cliques of a network to produce an ordering of the vertices that should be useful for reducing the storage space of the net- work structure. Compression has two important benefits, first, it reduces the amount of IO traffic involved in using the graph; second, good compression schemes may reduce the amount of work involved in running an algorithm on the graph [27, 26]. State-of-the-art network compression tech- niques heavily exploit locality of links within the adjacency list representation of a graph to reduce the number of bits required to store each edge [6, 7, 5]. Cliques are the densest local feature of a graph and in this application, we order the vertices of a network such that every vertex is in a large clique. This ensures that there are many local edges within the graph. We then evaluate how well the bvgraph [6, 7] compression method reduces the graph size using this order- ing. The specific ordering we use is the result of the follow- ing process. Given a graph G, we find a maximum clique C in G, remove C from G, and repeat the process until all vertices are removed. To improve the runtime, we ran our heuristic method to find large cliques. We then order the vertices according to the cliques, C1, C2, . . ., CK, where K denotes the number of iterations needed. Internally within each Ci we order the vertices by their degrees. We then permute the graph to use this ordering and use the bvgraph compression scheme with all default settings to compress the networks. Table 3 shows the results we get on two Face- book networks. We compare the compression obtained by reporting the size of each graph in bytes after compressing. We evaluate three orderings of the vertices: the native or- der, the Layered Label Propagation (LLP) order proposed to help improve compression with the bvgraph algorithm [5], and our clique-based order computed using PMC. We find that our ordering results in better compression than using the native ordering of the data and it is comparable to the LLP order although slightly worse. Previous research found that identifying and compressing large bicliques with a lin- ear number of edges helped to improve upon methods that use the adjacency list [10]. Given the success of this sim- ple ordering, we plan to evaluate these more complicated schemes next. Table 3: Size in bytes required to store two Face- book graphs using the bvgraph compression scheme in three different orders. Graph Vertices Edges Native LLP PMC fb-Penn fb-Texas 42k 36k 1.4M 1.6M 4237507 4605427 2740801 3232909 3104286 3508224 7. RELATED WORK A related problem to maximum clique finding is maximal clique enumeration: identifying all the maximal cliques in G. This problem tends to get more attention in data mining literature [52, 12]. For instance maximal cliques in social net- works are distributed according to a power-law [16]. There is a considerable body of recent work on this problem [47, 20, 19, 42, 11]. In particular, Du et al. [17] take advantage of the properties of social and information networks in order to enumerate all maximal cliques faster. In comparison, we wish to highlight how fast we can solve the maximum clique problem for these networks and temporal strong components by appropriately applying pruning steps and bounds. Pardalos and Xue [38] provide a good review of exact algo- rithms for maximum clique that existed prior to 1994. No- table methods proposed later include: among others, the works of Bomze et al. [8], Ostergard [36], Tomita et al. [46], and San Segundo et al. [41]. In a very recent work, Prosser [40] provides a computational study comparing various exact al- gorithms for maximum clique. The vast majority of existing work focuses on sequential maximum clique finders. Recent parallel algorithms include a multithreaded algorithm [33], albeit without using core numbers to accelerate pruning, and a MapReduce-based method [51]. 8. CONCLUSIONS We propose a new fast algorithm that finds the maximum clique on billion-edge social networks in minutes. It exhibits linear runtime scaling over graphs from 1000 vertices to 100 million vertices and has good parallelization potential. We applied the algorithm to compute the largest temporal strong components of a dynamic network, which involves finding the largest clique in a static reachability graph, and to obtain an ordering friendly for graph compression. Our hope is that maximum clique will now become a standard network analysis measure. Towards that end, we make our software package available for others to use: http://www.ryanrossi.com/pmc 9. REFERENCES [1] N. Ahmed, F. Berchmans, J. Neville, and R. Kompella. Time-based sampling of social network activity graphs. In SIGKDD MLG, pages 1–9, 2010. [2] V. Batagelj and M. Zaversnik. An o (m) algorithm for cores decomposition of networks. arXiv preprint cs/0310049, 2003. [3] S. Bhadra and A. Ferreira. Complexity of connected components in evolving graphs and the computation of multicast trees in dynamic networks. ADHOC-NOW, pages 259–270, 2003. [4] P. Boldi, B. Codenotti, M. Santini, and S. Vigna. UbiCrawler: A scalable fully distributed web crawler. Software: Practice & Experience, 34(8):711–726, 2004. 9 [5] P. Boldi, M. Rosa, M. Santini, and S. Vigna. Layered and mining. In ICDM, pages 300–309. IEEE, 2011. label propagation: A multiresolution coordinate-free ordering for compressing social networks. In WWW, pages 587–596. ACM, 2011. [6] P. Boldi and S. Vigna. The Webgraph Framework I: Compression techniques. In Proceedings of the 13th international conference on the World Wide Web, pages 595–602, New York, NY, USA, 2004. ACM Press. [7] P. Boldi and S. Vigna. Codes for the world wide web. Internet Mathematics, 2(4):407–429, 2005. [8] I. Bomze, M. Budinich, P. Pardalos, M. Pelillo, et al. The maximum clique problem. Handbook of combinatorial optimization, 4(1):1–74, 1999. [9] C. Bron and J. Kerbosch. Algorithm 457: finding all cliques of an undirected graph. Comm. ACM, 16(9):575–577, 1973. [10] G. Buehrer and K. Chellapilla. A scalable pattern mining approach to web graph compression with communities. In Proceedings of the international conference on Web search and web data mining (WSDM2008), pages 95–106, New York, NY, USA, 2008. ACM. [11] J. Cheng, Y. Ke, A. W.-C. Fu, J. X. Yu, and L. Zhu. Finding maximal cliques in massive networks. ACM Transactions on Database Systems, 36(4), 2011. [12] J. Cheng, L. Zhu, Y. Ke, and S. Chu. Fast algorithms for maximal clique enumeration with limited memory. In SIGKDD, pages 1240–1248, 2012. [13] M. Conover, J. Ratkiewicz, M. Francisco, B. Gon¸calves, A. Flammini, and F. Menczer. Political polarization on twitter. In ICWSM, 2011. [14] G. Csardi and T. Nepusz. The igraph software package for complex network research. InterJournal, Complex Systems:1695, 2006. [15] E. D. Dolan and J. J. Mor´e. Benchmarking optimization software with performance profiles. Mathematical Programming, 91(2):201–213, 2002. [16] N. Du, C. Faloutsos, B. Wang, and L. Akoglu. Large human communication networks: patterns and a utility-driven generator. In SIGKDD, pages 269–278, 2009. [17] N. Du, B. Wu, L. Xu, B. Wang, and P. Xin. Parallel algorithm for enumerating maximal cliques in complex network. In Mining Complex Data, volume 165, pages 207–221. Springer, 2009. [18] N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, 10(4):255–268, 2006. [19] D. Eppstein, M. Loffler, and D. Strash. Listing all maximal cliques in sparse graphs in near-optimal time. Algorithms and Computation, pages 403–414, 2010. [20] D. Eppstein and D. Strash. Listing all maximal cliques in large sparse real-world graphs. Experimental Algorithms, pages 364–375, 2011. [21] P. Erdos and A. Hajnal. On chromatic number of graphs and set-systems. Acta Mathematica Academiae Scientiarum Hungarica, 17:61–99, 1966. [22] A. Ferreira. On models and algorithms for dynamic communication networks: The case for evolving graphs. In ALGOTEL, 2002. [23] M. Gjoka, M. Kurant, C. Butts, and A. Markopoulou. Walking in facebook: A case study of unbiased sampling of osns. In INFOCOM, pages 1 –9, 2010. [24] D. F. Gleich. Graph of flickr photo-sharing social network. In DOI: 10.4231/ D39P2W550, 2012. [25] L. Isella, J. Stehl´e, A. Barrat, C. Cattuto, J. Pinton, and W. Van den Broeck. What’s in a crowd? analysis of face-to-face behavioral networks. Journal of theoretical biology, 271(1):166–180, 2011. [26] U. Kang and C. Faloutsos. Beyond’caveman communities’: Hubs and spokes for graph compression [27] C. Karande, K. Chellapilla, and R. Andersen. Speeding up algorithms on compressed web graphs. In WSDM ’09: Proceedings of the Second ACM International Conference on Web Search and Data Mining, pages 272–281, New York, NY, USA, 2009. ACM. [28] S. Khot. Improved inapproximability results for maxclique, chromatic number and approximate graph coloring. In FOCS, pages 600–, 2001. [29] J. Konc and D. Janezic. An improved branch and bound algorithm for the maximum clique problem. proteins, 4:5, 2007. [30] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? In WWW, pages 591–600, 2010. [31] J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. In WWW, pages 641–650, 2010. [32] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics, 6(1):29–123, 2009. [33] C. McCreesh and P. Prosser. Multi-threading a state-of-the-art maximum clique algorithm. Algorithms, 6(4):618–635, 2013. [34] V. Nicosia, J. Tang, M. Musolesi, G. Russo, C. Mascolo, and V. Latora. Components in time-varying graphs. Chaos, 22(2):023101, 2012. [35] T. Opsahl and P. Panzarasa. Clustering in weighted networks. Social networks, 31(2):155–163, 2009. [36] P. R. J. Ostergard. A fast algorithm for the maximum clique problem. Disc. Appl. Math., 120:197–207, 2002. [37] R. K. Pan and J. Saramaki. Path lengths, correlations, and centrality in temporal networks. arXiv, page 1101.5913v2, 2011. [38] P. M. Pardalos and J. Xue. The maximum clique problem. J. of Global Opt., 4(3):301–328, 1994. [39] B. Pattabiraman, M. M. A. Patwary, A. H. Gebremedhin, W. keng Liao, and A. Choudhary. Fast algorithms for the maximum clique problem on massive sparse graphs. In WAW13: 10th Workshop on Algorithms and Models for the Web Graph, 2013. [40] P. Prosser. Exact algorithms for maximum clique: A computational study. arXiv:1207.4616v1, 2012. [41] P. San Segundo, D. Rodr´ıguez-Losada, and A. Jim´enez. An exact bit-parallel algorithm for the maximum clique problem. Comput. Oper. Res., 38:571–581, 2011. [42] M. Schmidt, N. Samatova, K. Thomas, and B. Park. A scalable, parallel algorithm for maximal clique enumeration. Journal of Parallel and Distributed Computing, 69(4):417–428, 2009. [43] S. Seidman. Network structure and minimum degree. Social networks, 5(3):269–287, 1983. [44] R. Singh, J. Xu, and B. Berger. Global alignment of multiple protein interaction networks with application to functional orthology detection. PNAS, 105(35):12763–12768, 2008. [45] SocioPatterns. Infectious contact networks. http://www.sociopatterns.org/datasets/. Accessed 09/12/12. [46] E. Tomita and T. Kameda. An efficient branch-and-bound algorithm for finding a maximum clique with computational experiments. J. of Global Optimization, 37(1):95–111, 2007. [47] E. Tomita, A. Tanaka, and H. Takahashi. The worst-case time complexity for generating all maximal cliques and computational experiments. Theoretical Computer Science, 363(1):28–42, 2006. [48] A. Traud, P. Mucha, and M. Porter. Social structure of facebook networks. Physica A: Statistical Mechanics and its Applications, 2011. 10 [49] M. A. Trick and D. S. Johnson, editors. Cliques, Coloring, and Satisfiability: Second DIMACS Implementation Challenge. AMS, 1996. [50] C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In EuroSys, pages 205–218, 2009. [51] J. Xiang, C. Guo, and A. Aboulnaga. Scalable maximum clique computation using mapreduce. In Conference on Data Engineering (ICDE), pages 74–85. IEEE, 2013. [52] Y. Xie and P. S. Yu. Max-clique: A top-down graph-based approach to frequent pattern mining. In ICDM, pages 1139–1144, 2010. 11
1808.09600
1
1808
2018-08-29T01:33:21
The Remarkable Benefit of User-Level Aggregation for Lexical-based Population-Level Predictions
[ "cs.SI", "cs.CY" ]
Nowcasting based on social media text promises to provide unobtrusive and near real-time predictions of community-level outcomes. These outcomes are typically regarding people, but the data is often aggregated without regard to users in the Twitter populations of each community. This paper describes a simple yet effective method for building community-level models using Twitter language aggregated by user. Results on four different U.S. county-level tasks, spanning demographic, health, and psychological outcomes show large and consistent improvements in prediction accuracies (e.g. from Pearson r=.73 to .82 for median income prediction or r=.37 to .47 for life satisfaction prediction) over the standard approach of aggregating all tweets. We make our aggregated and anonymized community-level data, derived from 37 billion tweets -- over 1 billion of which were mapped to counties, available for research.
cs.SI
cs
The Remarkable Benefit of User-Level Aggregation for Lexical-based Population-Level Predictions Salvatore Giorgi1 Daniel Preot¸iuc-Pietro2 Anneke Buffone1 Daniel Rieman1 Lyle H. Ungar2 and H. Andrew Schwartz3 1Department of Psychology, University of Pennsylvania 2Computer and Information Science, University of Pennsylvania 3Computer Science, Stony Brook University [email protected] Abstract Nowcasting based on social media text promises to provide unobtrusive and near real-time predictions of community-level out- comes. These outcomes are typically re- garding people, but the data is often aggre- gated without regard to users in the Twitter populations of each community. This paper describes a simple yet effective method for building community-level models using Twit- ter language aggregated by user. Results on four different U.S. county-level tasks, span- ning demographic, health, and psychological outcomes show large and consistent improve- ments in prediction accuracies (e.g. from Pear- son r = .73 to .82 for median income pre- diction or r = .37 to .47 for life satisfac- tion prediction) over the standard approach of aggregating all tweets. We make our aggre- gated and anonymized community-level data, derived from 37 billion tweets -- over 1 billion of which were mapped to counties, available for research. 1 Introduction health Social media is an increasingly popular resource for large-scale population assessment which promises a cheap and non-intrusive complement to standard surveys with finer spatio-temporal scales (Coppersmith et al., 2015; Mowery et al., 2016; Wang et al., 2017). Twitter has been things -- to measure used -- among other 2011; community Mowery et al., 2016; Eichstaedt et al., 2015), well-being (Schwartz et al., 2013), and public (O'Connor et al., 2010; opinion on politics Miranda Filho et al., 2015). By having access to measurements from multiple locations or communities, models trained on text data from social media can be used both to predict future measurements and to provide community esti- mates where these are lacking or are not robust. (Paul and Dredze, Such research is made possible by the massive amount of easily accessible user-generated data from public social media. However, there has been little research on the way in which such data should be aggregated in order to compute community-level lexical fea- ture estimates. Typically, data are aggregated in a "bag of words" style, disregarding tweets and authors (Culotta, 2014a; Schwartz et al., 2013; Eichstaedt et al., 2015; Curtis et al., 2018). We find, however, that giving equal weight to each user, rather than to each word or tweet, yields much more accurate community-level predictions. In this paper, we conduct a series of experi- ments testing various simple yet intuitive aggre- gation methods. We show that choice of aggrega- tion methods can result in substantial (one might even say "remarkable") boosts in accuracy when predicting U.S. county level outcomes (e.g. user- to-county aggregation yields a 7% to 27% increase in Pearson correlation). Contributions include (a) validation of aggregation approaches across four outcomes related to health, psychology, and demo- graphics, (b) validation that aggregation has some effect on smaller sample of Twitter data, (c) show the effect of power tweeters (or "super users") and (d) release of resource-intensive community ag- gregated lexical data. Related work. This is the first work we know of to explore simple aggregation techniques for population-level prediction tasks from language. Previous work has explored more sophisticated adjustments, such as addressing demographic-self selection bias in Twitter community predictions by re-weighting messages, finding small improve- ments (a 4.5% reduction in symmetric mean ab- solute percentage error) (Culotta, 2014b). In a political voting intention prediction application, (Lampos et al., 2013) modeled users and words jointly by learning separate regression weights for the two dimensions based on the intuition that each user contributes differently towards the outcome. However, their model was specifi- cally adapted to problems that use time-series outcomes, rather than community-level aggrega- tion. Distributions of lexical features are con- sidered at multiple levels of analysis (message, user and community) in (Almodaresi et al., 2017) though each level considers one type of aggre- gation. Similar aggregation methods have been used in the context of topic modeling (Latent Dirichlet Allocation (Blei et al., 2003) and Au- thor Topic Model (Rosen-Zvi et al., 2004)) by considering user, hashtag and conversation level aggregations (Alvarez-Melis and Saveski, 2016; Hong and Davison, 2010) but, again, community level aggregation and prediction tasks were not considered. 2 Data Research was reviewed by an academic institu- tional review board and deemed exempt. 2.1 Twitter Data Collection Twitter Sample A random 10% sample of the entire Twitter stream ('GardenHose') was col- lected between July 2009 and April 2014, which was then supplemented with a random 1% sam- ple from May 2014 to February 2015. The total sample contains approximately 37.6 billion tweets (Preotiuc-Pietro et al., 2012). County Mapping In order to map each tweet to a location within a county in the United States, we use both self-reported location information in user profiles and latitude/longitude coordinates associ- ated with a tweet. If latitude/longitude coordinates are present then we trivially map the tweet to a county. The self-reported location information is a free text field and we use a cascading set of rules to map this field to a county. The rules are designed to avoid false positives (incorrect mappings) at the expense of fewer mappings. The full details of this process can be found in (Schwartz et al., 2013). Note that the latitude/longitude coordinates are a tweet attribute whereas the self-reported location is a user attribute yet both are used to map tweets to counties. Users are assigned a county by con- sidering their earliest county mapped tweet. In total, we are able to map 1.78 billion of the 37.6 billion tweets to a US county us- Full Sample 10% 37.6B 1% - Number of Tweets County Mapped 1.78B English∗ 1.64B 199M - Number User of Level∗∗ Users 1.53B 5.25M 131M 1.57M Table 1: Number of tweets in each section of the resource, including the total number of users. (*) The number of tweets used in the "all" experi- ments; (**) the number of tweets in the remaining experiments. ing the above-mentioned method. The county mapped data set was then filtered to contain only English tweets using the popular langid.py method (Lui and Baldwin, 2012), further reduc- ing our tweet set to 1.64 billion tweets. For ex- periments with user-level data aggregation, we re- moved users who made relatively few (less than 30) posts in our data set. Publicly Available Stream The standard pub- licly available Twitter stream outputs approxi- mately 1% of the public Tweet volume. Since a 10% sample is not available to most researchers, we replicated a 1% sample by taking a random 10% of our county mapped, English filtered 10% sample. The same process of county mapping, lan- guage filtering and user selection was applied to this data resulting in 131 million county mapped English tweets from 1.57 millions users. Table 1 presents the data set statistics. The County Tweet Lexical Bank The County Tweet Lexical Bank is a U.S. County level data set comprised of two feature sets1 : • an aggregated "bag-of-words" count vector across all the county's messages in order to pre- serve anonymity. The unigrams represent the most frequent words in the data set;2 ; • a "bag-of-topics" each county, with 2000 social media-derived topics described in (Schwartz et al., 2013). representation for Both feature sets will be releases across the 2009- 2015 time span as well as individual years. Yearly updates will be included as they become available. As we are only releasing aggregated word-level features, as opposed to raw Tweets, this data re- lease is within Twitter's Terms of Service. 1Available at https://github.com/wwbp 2While 25,000 features were used in the predictive tasks we removed some features (@-mentions, URLs, etc.) from the data release to preserve anonymity. Income Educat. Life Satis. Heart Dis. N 1750 1750 1952 2041 Mean 4.66 21.57 3.39 186.66 Std Dev Min 4.33 5.70 3.26 54.82 0.11 9.46 0.03 45.59 Max 5.07 70.30 3.51 412.32 Skew 0.47 1.20 0.02 0.66 Table 2: Descriptives of U.S. County data used in the four prediction tasks. 2.2 Outcomes The following U.S. county demographic, psycho- logical and health variables were used in our pre- diction tasks. Table 2 gives statistics for each county variable. census Income and Education The data for county median household income (log- transformed to reduce skewness; N =1,750) and percentage of people with a Bachelor's degree (N =1,750) were obtained from the 2010 U.S. Census Bureau's American Community Survey (ACS). Life Satisfaction To assess subjective well- being we used the average response to the ques- tion "In general, how satisfied are you with in your life?" (1 = very dissatisfied and 5 = very sat- isfied) (Lawless and Lucas, 2011). Estimates are averaged across 2009 and 2010 (N =1,952). Mortality Rates From the Centers of Dis- ease Control and Prevention (CDC) we collected age-adjusted mortality rates for heart disease (N =2,041). Rates are averaged across 2010-2015. 3 Methods 3.1 Aggregation Our aim is to use the user-level information based on the assumption that aggregating data first at the user-level would remove biases introduced by non-standard users of the platform. To this end, we explore three types of aggregation: (1) tweet to county, (2) county "bag of words" and (3) user to county. Tweet to County Here we compute feati,j = 1 Nj X k 1i(unigramk), (1) unigram was mentioned divided by Nj the total number of tweets from county j. County Next, we use a method which was generally used in past research, which aggre- gates all messages to a community disregard- ing any meta-data, including tweet or user in- formation. Previous state-of-the-art results us- ing this method include life satisfaction r = .31 (Schwartz et al., 2013), atheroclerotic heart dis- ease r = .42 (Eichstaedt et al., 2015) and education r = 0.15 (Culotta, 2014b). We therefore consider each county a "bag of words" using (1) with Nj equal to the number of unigrams from county j. User to County The third method treats the unit of analysis (U.S. county) as a community of users. Therefore, feature weights are extracted at the user level, normalized and then averaged to communi- ties: feati,j = 1 Nj X k∈Uj rk(unigrami), (2) where Uj is the set of users in county j, Nj is the total number of Twitter users in county j and rk(x) is the relative frequency of feature x for user k with i ∈ {all unigrams} and j ∈ {all counties}. Features We use as features a list of 2,000 social media- derived topics generated from Latent Dirichlet Allocation (Blei et al., 2003) using the complete MyPersonality Facebook data set consisting of approximately 15 million posts (Schwartz et al., 2013). The topic loadings are computed from the most frequent 25,000 unigrams in our data set. We also use a subset of these unigrams as additional features in our models (25,000 reduced to 10,000). Experimental setup For each of the four county level Census and health variables we built three models using 10- fold cross validation with the following features: (1) unigrams, (2) topics and (3) unigrams + top- ics. For consistency across tasks we only consid- ered counties with 100 or more 30+ tweet users (N =2,041). where 1i denotes the indicator function for unigrami. Here the ith feature for the jth unit of analysis (a U.S. county) is equal to the relative fre- quency of the unigram: the number of times each We used a feature selection pipeline which first removed all low variance features and then fea- tures that were not correlated with our census and health data. Principal component analysis was Income Educat. Life Satis. Heart Disease Tweet to County County User to County .68 .73 .82 .80 .80 .88 .26 .37 .47 .70 .70 .75 (a) Unigrams + Topics, Pearson r Income Educat. Life Satis. Heart Disease Tweet to County County User to County .67 .72 .79 .79 .78 .87 .22 .37 .44 .65 .64 .73 (b) Unigrams, Pearson r Income Educat. Life Satis. Heart Disease Tweet to County County User to County .65 .68 .81 .77 .80 .87 .31 .34 .47 .71 .71 .76 (c) Topics, Pearson r Table 3: Prediction results (Pearson r) for direct aggregation comparison on the 10% sample. then applied to the reduced feature set for fur- ther dimensionality reduction. This preprocess- ing was used to avoid overfitting, since our model included more independent variables (2000 topic frequencies and/or 10k unigrams) than observa- tions (at most 2,041 counties). For the prediction task we used linear regression with ℓ2 regulariza- tion (Ridge regression) (Eichstaedt et al., 2015). The regression regularization parameter α was set to 1000 using grid search. Because our initial dataset consisted of 37.6 billion tweets, using distributed IO was crucial for data aggregation and feature extraction. We used a Hadoop-style cluster consisting of 64 disks and 64 CPU cores across 8 physical machines. Over this cluster, we used Hadoop MapReduce for the county mapping step (taking approximately 1 week of wall clock runtime) and Spark for the fea- ture aggregations (taking approximately 1 day of wall clock runtime). The entire pipeline of county mapping, English language filtering, feature ex- traction and prediction used the DLATK Python package (Schwartz et al., 2017)3. Experiments Using the above setup we perform 3 experiments in order to explore the effects of data aggregation. We 1) directly compare aggregation methods us- 3Available at https://github.com/dlatk User to County Nuser−tweets Tweet to County (all) County (all) Nall−tweets Income Educat. .82 .88 Life Satis. .47 Heart Disease .75 1.350B 1.350B 1.356B 1.360B .72 .73 .81 .82 .36 .31 .71 .72 1.621B 1.621B 1.628B 1.634B Table 4: Prediction results (Pearson r, using uni- grams + topics) using full 10% data vs. users with 30+ tweets. The number of tweets used in each task is listed to highlight the fact that the "User to County" tasks use less tweets than the "all" tasks. ing our 10% data; 2) compare aggregation meth- ods using a 1% sample and, finally, 3) explore the effect of choosing an upper bound on the number of posts per Twitter users, looking at users with less than 50, 500, 1000 posts. This allows us to exclude frequent posters who are potentially orga- nizations or bots. 4 Results and Discussion Direct aggregation comparison. The results of our predictive experiments on the 10% data can be found in Table 3. Across all four tasks we see that the "User to County" approach outperforms the other aggregation methods, giving a higher Pearson r and obtaining state-of-the-art results for community-level predictions. We see the largest gains for the "User to County" aggregation for the income outcome, with a 13 point increase in Pearson r for topics alone and a 9 point increase for unigrams + topics. In Table 4 we remove the 30+ tweet requirement from the "Tweet to County" and "County" meth- ods and compare against the "User to County" method (with the 30+ tweet requirement). Again we see the "User to County" method outperforms all others in spite of the fact that the "User to County" approach uses less data than both "all" approaches, which contains 108 million more tweets. 1% data. In Table 5 we repeat the above ex- periment on a 1% Twitter sample. Here we see that the "User to County" method outperforms both the "Tweet to County" and "County" meth- ods (with all three tasks using the same number of tweets). When we compare the "User to County" and "County (all)" methods we see the "User to county" outperforming on two out of four tasks (Income and Life Satisfaction). Again, we note Income Educat. Life Satis. Heart Disease .71 .70 .76 .62 .60 .70 .77 .76 .79 .71 .67 .74 .35 .32 .39 .32 .28 .28 .64 .62 .66 .63 .62 .66 127M 130M 127M 130M 127M 130M 127M 131M .75 .67 .83 .77 .37 .34 .68 .66 191M 195M 191M 195M 191M 197M 191M 198M 2041∗ 949 1750∗ 1952∗ 960 949 1750∗ 954 Tweet to County County User to County Nuser−tweets County (all) Nall−tweets Ncounties Table 5: 1% sample prediction results (Pearson r) using topics + unigrams. ∗ same counties as the 10% prediction task. Max Tweets 50 500 1000 No Max 50 500 1000 No Max y t n u o C ) l l a ( o t r e s U y t n u o C Income Educat. Life Satis. Heart Disease .73 .81 .81 .73 .68 .80 .81 .81 .84 .87 .87 .82 .80 .87 .87 .87 .34 .44 .41 .31 .34 .47 .47 .48 .68 .75 .75 .72 .64 .76 .76 .76 Num. Users Removed 4,665,114 611,661 217,517 - 4,665,114 611,661 217,517 - beneficial if they are just treated such that they can't dominate a community. This highlights the benefit of our simple method: we do not need to consider optimizations which may not generalize across data, such as upper-bound thresholds on the number of tweets per user. Further, the user- to-county aggregation seems to provide at least a small benefit beyond removal of super users. Table 6: Prediction results (Pearson r) using topics + unigrams. Users with more than "Max Tweets" number of tweets are removed from the sample. 5 Conclusion that the "User to County" is using less data than the "County (all)". While, across the board, the performance increase is not as substantial as in the 10% results, we see comparable performance be- tween "User to County" and "County (all)" meth- ods despite the difference in the number of tweets. Super users. One theory why we see such large gains depending on aggregation technique is that aggregating through users negates the effects of super users -- those who post an extraordinary amount (such as organizations or bots). We im- plemented a maximum tweet requirement in or- der to remove these users and see if that accounts for the difference. Here we use both the "User to County" and "County (all)" samples and report re- sults in Table 6. These results demonstrate that by keeping only users with less than 500 tweets we get results close to our "User to County (No Max)" method using the user-naive "County (all)" scheme. This shows that relatively few users (in this case 611k) can significantly decrease perfor- mance, though still leaves a small gain from the user to county approach. As seen in the lower half of the table, this thresholding does not increase performance when using the "User to County" method, which suggests such users can still be This study explored the benefit of aggregation techniques for streaming user-generated data from individual messages to community level data, the typical setting for nowcasting. We showed that by simply aggregating to users first and then tak- ing the mean within a county, we can obtain large gains (remarkably, up to a 13 point increase in Pearson correlation) over typical aggregation methods common in past work. In order to foster nowcasting research utilizing this more ideal ag- gregation, we will release the County Tweet Lex- ical Bank -- a large aggregated and anonymized county-level data set, and computed on more than 1.6 billion tweets posted over 5 years. Future work in this area can look at adjust- ing models to account for other meta-data such as temporal variation and diversity and to ad- just for selection biases present in social me- dia, where the user base on social media is not representative of the population of the commu- nity (Greenwood et al., 2016). Acknowledgments This work was supported by a grant from the Tem- pleton Religion Trust (ID #TRT0048). The fun- ders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. References Fatemeh Almodaresi, Lyle H. Ungar, Vivek Kulkarni, Mohsen Zakeri, Salvatore Giorgi, and H. Andrew Schwartz. 2017. On the Distribution of Lexical Fea- tures in Social Media. In Annual Meeting of the As- sociation for Computational Linguistics, ACL. David Alvarez-Melis and Martin Saveski. 2016. Topic modeling in twitter: Aggregating tweets by conver- sations. ICWSM, 2016:519 -- 522. David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. Journal of ma- chine Learning research, 3(Jan):993 -- 1022. Glen Coppersmith, Mark Dredze, Craig Harman, and Kristy Hollingshead. 2015. From adhd to sad: An- alyzing the language of mental health on twitter through self-reported diagnoses. Aron Culotta. 2014a. Estimating county health statis- tics with twitter. In Proceedings of the 32nd an- nual ACM conference on Human factors in comput- ing systems, pages 1335 -- 1344. ACM. Aron Culotta. 2014b. Reducing Sampling Bias in So- In cial Media Data for County Health Inference. Joint Statistical Meetings Proceedings. Brenda Curtis, Salvatore Giorgi, Anneke E. K. Buf- fone, Lyle H. Ungar, Robert D. Ashford, Jessie Hemmons, Dan Summers, Casey Hamilton, and H. Andrew Schwartz. 2018. Can twitter be used to predict county excessive alcohol consumption rates? PLOS ONE, 13(4):1 -- 16. Johannes C Eichstaedt, H Andrew Schwartz, Mar- garet L Kern, Gregory Park, Darwin R Labarthe, Raina M Merchant, Sneha Jha, Megha Agrawal, Lukasz A Dziurzynski, Maarten Sap, Christopher Weeg, Emily E Larson, Lyle H Ungar, and Mar- tin EP Seligman. 2015. Psychological language on Twitter predicts county-level heart disease mortality. Psychological Science, 26:159 -- 169. Shannon Greenwood, Andrew Perrin, and Maeve Dug- gan. 2016. Social Media Update. Pew Research Center. Liangjie Hong and Brian D Davison. 2010. Empirical study of topic modeling in twitter. In Proceedings of the first workshop on social media analytics, pages 80 -- 88. ACM. Vasileios Lampos, Danie Preot¸iuc-Pietro, and Trevor Cohn. 2013. A User-Centric Model of Voting In- tention from Social Media. In Proceedings of the 51st Annual Meeting of the Association for Compu- tational Linguistics, ACL. Nicole M Lawless and Richard E Lucas. 2011. Predic- tors of regional well-being: A county level analysis. Social Indicators Research, 101(3):341 -- 357. Marco Lui and Timothy Baldwin. 2012. langid. py: An In Pro- off-the-shelf language identification tool. ceedings of the ACL 2012 system demonstrations, pages 25 -- 30. Association for Computational Lin- guistics. Renato Miranda Filho, Jussara M Almeida, and Gisele L Pappa. 2015. Twitter population sample bias and its impact on predictive outcomes: a case study on elections. In Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference on, pages 1254 -- 1261. IEEE. Danielle Mowery, Albert Park, Mike Conway, and Craig Bryan. 2016. Towards automatically classify- ing depressive symptoms from twitter data for pop- ulation health. Brendan O'Connor, Ramnath Balasubramanyan, Bryan R Routledge, and Noah A Smith. 2010. From tweets to polls: Linking text sentiment to public opinion time series. ICWSM, 11(122-129):1 -- 2. Michael J. Paul and Mark Dredze. 2011. You are what you tweet: Analyzing twitter for public health. In International Conference on Weblogs and Social Media (ICWSM), pages 265 -- 272. Daniel Preotiuc-Pietro, Sina Samangooei, Trevor Cohn, Nicholas Gibbins, and Mahesan Niranjan. 2012. Trendminer: An architecture for real time analysis of social media text. In In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media, Workshop on Real-Time Analysis and Mining of Social Streams, ICWSM. Michal Rosen-Zvi, Thomas Griffiths, Mark Steyvers, and Padhraic Smyth. 2004. The author-topic model for authors and documents. In Proceedings of the 20th conference on Uncertainty in artificial intelli- gence, pages 487 -- 494. AUAI Press. H Andrew Schwartz, Johannes C Eichstaedt, Mar- garet L Kern, Lukasz Dziurzynski, Richard E Lu- cas, Megha Agrawal, Gregory J Park, Shrinidhi K Lakshmikanth, Sneha Jha, Martin E P Seligman, and Lyle H Ungar. 2013. Characterizing geographic variation in well-being using tweets. In Proceed- ings of the 7th International AAAI Conference on Weblogs and Social Media, ICWSM. H Andrew Schwartz, Salvatore Giorgi, Maarten Sap, Patrick Crutchley, Lyle Ungar, and Johannes Eich- staedt. 2017. Dlatk: Differential language analysis toolkit. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Process- ing: System Demonstrations, pages 55 -- 60. Tao Wang, Markus Brede, Antonella Ianni, and Em- manouil Mentzakis. 2017. Detecting and character- izing eating-disorder communities on social media. In Proceedings of the Tenth ACM International Con- ference on Web Search and Data Mining, pages 91 -- 100. ACM.
1112.2460
1
1112
2011-12-12T07:22:48
Social Capital and Individual Performance: A Study of Academic Collaboration
[ "cs.SI", "cs.IR", "physics.soc-ph" ]
Studies on social networks highlight the importance of network structure or structural properties of a given network and its impact on performance outcome. One of the important properties of this network structure is referred as "social capital" which is the "network of contacts" and the associated values attached to these networks of contacts. In this study, our aim is to provide empirical evidence of the influence of social capital and performance within the context of academic collaboration. We suggest that the collaborative process involves social capital embedded within relationships and network structures among direct co-authors. Thus, we examine whether scholars' social capital is associated with their citation-based performance, using co-authorship and citation data. In order to test and validate our proposed hypotheses, we extract publication records from Scopus having "information science" in their title or keywords or abstracts during 2001 and 2010. To overcome the limitations of traditional social network metrics for measuring the influence of scholars' social capital within their co-authorship network, we extend the traditional social network metrics by proposing a new measure (Power-Diversity Index). We then use Spearman's correlation rank test to examine the association between scholars' social capital measures and their citation-based performance. Results suggest that research performance of authors is positively correlated with their social capital measures. This study highlights that the Power-diversity Index, which is introduced as a new hybrid centrality measure, serves as an indicator of power and influence of an individual's ability to control communication and information.
cs.SI
cs
(Submitted to JASIST) Social Capital and Individual Performance: A Study of Academic Collaboration Abstract Studies on social networks highlight the importance of network structure or structural properties of a given network and it s impact on performance outcome. The empirical validation of the association between network structures and performance has been well documented in a number of recent studies. One of the important properties of this network structure is referred as “social capital” which is the “network of contacts” and the associated values attached to these networks of contacts. There are very few systematic empirical studies suggesting a role of co-authors, as social capital in their scientific collaboration network and their effect on performance. In this study, our aim is to provide empirical evidence of the influence of social capital and performance within the context of academic collaboration. We suggest that the collaborative process involves social capital embedded within relationships and network structures among direct co-authors. Thus, we examine whether scholars’ social capital is associated with their citation-based performance, using co-authorship and citation data. In order to test and validate our proposed hypotheses, we extract publication records from Scopus having “information science” in their title or keywords or abstracts during 2001 and 2010. To overcome the limitations of traditional social network metrics for measuring the influence of scholars’ social capital within their co-authorship network, we extend the traditional social network metrics by proposing a new measure (Power-Diversity Index). We then use Spearman’s correlation rank test to examine the association between scholars’ social capital measures and their citation-based performance. Results suggest that research performance of authors is positively correlated with their social capital measures. This study highlights the importance of scholars’ social capital characteristics on their performance suggesting stronger links to more power ful contacts will lead to better performance and , therefore, their respective professional social network shows indicative outcomes to evaluate and predict the performance of scholars. It further highlights that the Power-diversity Index, which is introduced as a new hybrid centrality measure, serves as an indicator of power and influence of an individual’s ability to control communication and information. Keywords Social capital, social network analysis, co-authorship analysis, individual performance power-diversity. 1. Introduction Prominent sociologists such as Burt (1992), Coleman (1988) and Granovetter (1973) claim that personal attributes are not only the effective factor leading to the success of actors‟ performance, but the extent of social capital accumulated in their respective networks is more significant (Oh, Choi, & Kim, 2006). Social capital produces benefits or outcomes for individual and collective actors , which is generated through structural sources (Burt, 1992). The core idea of social capital is that a person‟s (or a group of people‟s) associates (e.g., family members, friends, colleagues) form an important asset that can be used to gain optimal performance (Woolcock & Narayan, 2000). The concept of social capital provides a useful and comprehensive conceptual perspective (Sawyer, Crowston, & Wigand, 1999; Tsai & Ghoshal, 1998) for understanding social capital and value creation 1 within a networking context. Accordingly, social capital means “the set of social resources embedded in relationships” (Tsai & Ghoshal, 1998, p. 464). Social capital has three components: structural, relational, and cognitive (Tsai & Ghoshal, 1998; Wellman, 1988). The structural dimension involves social interaction that the actor uses to gain access, information, or resources. The relational dimension encompasses aspects that arise from the interactions (including trust and loyalty). The cognitive dimension includes attributes such as shared norms, codes of action, and convergence of views. Our research suggests that conceptualizing social capital in terms of network structures, such as articulated by the strength of weak ties theory (Granovetter, 1973, 1983), provides valuable insight into scholars‟ co-authorship activities. In most large organizations, performance of individuals and teams are measured through a set of metrics that pertain to task and contextual performance. Similarly in academia, scholars and scientists are evaluated based on their academic performance (e.g., research productivity, teaching evaluations, governance capabilities, achieved grants). Such evaluation of scholars is not only needed for faculty recruitment and promotion schemes, but also for governmental funding allocation and for achieving a high reputation within the research community. The reputation of research organizations indirectly affects society‟s welfare, since high reputation attracts foreign purchases, foreign investments, and highly qualified students from around the world (Abbasi, Altmann, & Hwang, 2010). The implication of such evaluation and ranking provides the basis for governmental funding thus encouraging high research standards and goals. Therefore, on a global level, with respect to governmental funding (i.e., the allocation of funding for a specific project to a scientific research group) and university strategy, it is important to identify key scholars, collaboration areas and research strengths within universities with the aim of maximizing research output, cost optimization, and resource utilization. Since individuals have limited capacity to acquire and use knowledge, their interactions with others are necessary for knowledge creation (Demsetz, 1991), which usually appears in the form of publishing papers. Therefore, many scientific outputs are the result of collaborative work and most research projects are too large for an individual researcher to perform alone. This, in turn, leads to large scale scientific collaboration. However, having scholars with different skills, expertise and knowledge, as human capital, in group work is needed (McFadyen, Semadeni, & Cannella, 2009). Diversity of actors involved in group work facilitates the integration of expertise, contributes to successful projects‟ implementation and accelerates cycle time for new product development (Cummings, 2004; Eisenhardt & Tabrizi, 1995; Griffin & Hauser, 1992; Pinto, Pinto, & Prescott, 1993), but having a basic shared understanding of each other‟s knowledge and expertise is necessary to have a shared understanding about the whole project or research. The co-authorship network is a form of collaboration network among scholars that represents their scientific interactions and collective action to conduct research and produce the results as a form of a publication. Therefore, social norms and trust build among scholars, through their collaborations over time, are a form of social capital for academia. In other words, when researchers collaborate on projects, they do share substantial amounts of knowledge. This flow of knowledge, during research collaboration, 2 becomes a stock of knowledge, which mutually benefits the researchers not only in their respective future projects (Dierickx & Cool, 1989), but also in the current research by gaining new knowledge and reputation. Therefore, social capital resulting in collaboration networks can be used to explain the concept of knowledge capital (Oh et al., 2006). In order to quantify and highlight the importance of academic collaboration activities, studies exist that measure these not only using bibliometric indicators such as Rc-Index (Abbasi et al., 2010), but also social network measures (Abbasi & Altmann, 2011; Abbasi, Altmann, & Hossain, 2011; Takeda, Truex III, & Cuellar, 2010; Yan & Ding, 2009; Zhuge & Zhang, 2010). These studies have shown the applicability of social network measures (e.g., centrality measures) for co-authorship networks to indicate how centrality measures (as a proxy for scholars‟ collaboration activity) are useful to reflect scholars‟ performance based on their position and influence within their collaboration network. Here, also in another attempt to assert the importance of co-authors‟ role and position in their collaboration network, we evaluate a co-authorship network and propose measures for scholars‟ social capital. We highlight the proposed measure which better reflects scholars‟ social capital having higher correlation with their citation-based performance (i.e., citation count and h-index). The motivating questions for our study are: (i) How do we measure the concept of social capital of scholars? (ii) Do scholars‟ social capital metrics associate with their performance? For our analysis at an exploratory level, we use co-authorship and citation data obtained from the Scopus bibliometric database looking for publication records having “information science” in their title or keywords or abstracts during the time period of 2001 and 2010. This enables us to shape a co-authorship network of active scholars in the field of “information science”. In the following sections, we review the existing literature on social capital and network theories leading to measures proposed for social capital and co-authorship and performance. In Section 3, we explain our data collection method followed by our methodology and proposed measures to quantify scholars‟ social capital. Then, the result of testing associations between scholars‟ social capital measures and their performance is shown in the following section. We conclude the paper by discussing our findings and research limitations in Section 5. 2. Social Capital and Network Theories The concept of social capital has become increasingly popular in a wide range of social science disciplines (e.g., political science, economics, and organizational science). Social capital has been used as an important factor to explain actors‟ success in a number of areas (e.g., educational performance, career success, product innovation, inter-firm learning, and real-estate sales) by social scientists. Hanifan (1916) work on evaluating effect of community participation in enhancing school performance can be considered as the first study on social capital. But Bourdieu‟s (1986; 1992) and Coleman‟s (1987, 1988, 1990) works on education and Putnam‟s (1993, 1995, 2001) works on civic engagement and institutional performance are the main studies inspiring most of the current researches in social capital (Woolcock & Narayan, 2000). 3 Bourdieu (1986) identified several forms of capital: Economic capital; cultural capital: which could be embodied (in persons), objectified (e.g., in art), institutionalized (e.g., university degrees); Social capital: resources grounded in durable exchange-based networks of persons; Symbolic capital: manifestation of each of the other forms of capital when they are naturalized on their own terms. Bourdieu and Wacquant (1992) defined social capital in detail as “the sum of the resources, actual or virtual, that received by an individual (or a group) due to having a lasting network of more or less institutionalized relationships of mutual acquaintance and recognition” (p. 119). Coleman (1988), a sociologist interested in the role of social capital in human capital creation and educational outcome (Narayan & Cassidy, 2001), defines social capital as a function of social structure producing advantage: “It is not a single entity but a variety of different entities, with two elements in common: they all consist of some aspect of social structures, and they facilitate certain actions of actors- whether persons or corporate actors-within the structure.” (p. 598). Putnam (1993) also defined social capital as “those features of social organization, such as trust, norms and networks that can improve the efficiency of society by facilitating coordinated actions” (p. 167) or as “features of social life - networks, norms and trust - that enable participants to act together more effectively to pursue shared objectives” (Putnam, 1995) (pp. 664-665). Coleman‟s (1988) definition regards social capital as one of the potential resources, which an actor can use besides other resources such as human or cultural capital (their own skills and expertise), physical capital (tools) and economic capital (money) (Gauntlett, 2011). He also highlighted the importance of social capital effecting the creation of human capital. But social capital differs fundamentally from other types of capital as it resides not in the objects themselves (e.g., people) but in their relations with other objects. For instance, human capital represents individual attributes and characteristics (e.g., attractiveness, intelligence, and skills). These assets are possessed by individuals but social capital is embedded in the relationships among individuals (Shen, 2010). Emphasizing social capital‟s function in different contexts, Portes (1998) defines social capital as “the ability of actors to secure benefits by virtue of memberships in social networks or other social structures” (p. 3). Furthermore, Adler and Kwon (2002) defined social capital as “the resources available to actors as a function of their location in the structure of their social relations” (p. 18). They focus on social capital as a resource that exists essentially (permanently) in the social network binding a central actor to other actors. In another approach, Lin (1982) in the author‟s social resource theory claimed power, status and wealth as determinants of valued resources in most societies. Accessing and using social resources can lead to better socioeconomic status and are determined by structural positions and use of ties. In addition, some researchers defined social capital considering capital (attributes) individuals posses in a network. For instance, Boxman et al. (1991) defined social capital as “the number of people who can be expected to provide support and the resources those people have at their disposal” (p. 52) and Burt (1992) defined as this concept as “friends, colleagues, and more general contacts through whom you receive opportunities to use your financial and human capital” (p. 9) and also “the advantage created by a person‟s location in a structure of relationships” (Burt, 2005) (p. 5). Therefore, from this point of view, 4 social capital can be evaluated by the amount or variety of such characteristics of other actors to whom an actor has ties directly or indirectly (Lin, 1999). The core idea is that the actions of individuals (and groups) can be greatly facilitated by their direct and indirect links to other actors in their respective social networks (Adler & Kwon, 2002). In the above definitions, the focus is on the sources (e.g., networks, norms and trust) rather than the consequences of social capital. They considered different dimensions for social capital, namely bonding and bridging (Woolcock & Narayan, 2000) taking into account valued social resources. On the bonding views of social capital, the focus here is on collective actors‟ internal characteristics and ties structure (Adler & Kwon, 2002). Therefore, the bonding view of social capital undergirds reciprocity and solidarity, builds trust within the group and provides substantive and emotional support (Shen, 2010). Bonding social capital is viewed as a property of a network (group of individuals), which is not the focus of our study. 2.1. Individual’s Social Capital-Related Theories of Network 2.1.1. Tie Strength Theories Granovetter (1973)‟s theory of the „strength of weak ties‟ argues that an individual obtains new and novel information from weak ties rather than from strong ties within the individual‟s group structure. Examining people looking for a job, Granovetter (1973) illustrated that there were two kinds of social relationships: weak ties and strong ties. Contrary to popular belief, he found that the most successful job seekers were not those with the strongest ties. On the contrary, because weak ties with acquaintances provide a broader set of information and opportunities, they are more helpful during people‟s job search than strong ties with family and friends. The strength of a link between actors (interpersonal tie) in a network could be indicated and measured by the amount of time the link has been established, the degree of emotional intensity, the degree of intimacy, and reciprocal services (Granovetter, 1973). The interaction among the individual creates opportunity for knowledge sharing and information exchange and is considered crucial in the building trust among individuals. On the other hand, Krackhardt (1992) showed that strong ties are important in the generation of trust. He introduced the theory of „strength of strong ties‟ in contrast to Granovetter‟s (1973) theory. Levin and Cross (2004) found that strong ties, more so than weak ties, lead to the receipt of useful knowledge for improving performance in knowledge-intensive work areas. However, controlled for the dimension of trust, the structural benefit of weak ties emerged in their research model. It suggests that the weak ties provide access to non-redundant information. Weak ties facilitate faster project completion times, if the project is simple. It enables faster search for useful knowledge among other organizational subunits. Strong ties foster complex knowledge transfer, if knowledge is highly complex (Hansen, 1999; Reagans & Zuckerman, 2001). 5 2.1.2. Structural Hole Theory Burt (1992) argues that the structural configuration of an individual‟s social network, which provides optimized “bridging” or “brokerage” position is what dictates structural advantages such as information novelty and control. The basis for this argument leverages on the fact that maximizing the number of ties (ego-network size), regardless of being weak or strong, in an individual‟s network does not necessarily provide benefits. Furthermore, as an individual‟s personal network grows over time, the extent of information coming from closely knit clusters tends to become redundant. This is consistent with Freeman‟s (1979) approach to betweenness which is build around the concept of „local dependency‟. Therefore, it could be seen that Burt‟s (1992) notion of structural holes built further upon the assumption of betweenness centrality that advocated the idea of a brokerage position as providing information and control benefits. In fact, he shifted focus from the network structure to network position (Chung & Hossain, 2009). Burt (1992) claimed that increasing the number of direct contacts (ego-network size) without considering the diversity reached by the contacts makes the network inefficient in many ways. Therefore, the number of non-redundant contacts is important to the extent that redundant contacts would lead to the same people and, hence, provide the same information and control benefits. He defined ego-network effectiveness as the number of clusters which the ego is connected to and can obtain novel information and benefits (Burt, 1992). A structural hole (hole in the network structure) is defined as lack of tie between any pair of actors in the network. Network brokerage refers to the social structure where an actor builds connections across structural holes (Burt, 2005) linking otherwise disconnected actors. Brokerage brings novel information and opportunities, but the connections are too weak to provide emotional and substantive support. For instance, in economic networks, producers that broker more structural holes were found to make better profits from negotiating more favorable transactions with suppliers and customers (Burt, 1992). Within organizations, individuals‟ mobility is enhanced by having an informational network rich in structural holes (Podolny & Baron, 1997). Thus, Burt (1992) capitalizes on his theory of structural holes by focusing on the importance of structural position (e.g., brokerage) rather than structural properties (e.g., ego‟s network size). Therefore, on this view of social capital as bridging, social capital can help explain the differential success of actors (e.g., individuals and firms). Therefore, bridging social capital leads to a broad worldview, diversity in opinions and resources, and information diffusion (Shen, 2010). Bridging view of social capital focuses on a property of individuals (ego-network and not whole-network). These views highlight the social network engagement as a prerequisite for social capital. Walker et al. (1997) highlighted that “a social network structure is a vehicle for inducing cooperation through the development of social capital” (p. 110). Therefore, in brief, social capital could be regarded as the value of social networks, bonding similar people and bridging between diverse people, with norms of reciprocity (Uslaner, 2001). 6 2.2. Measuring Individuals’ Social Capital Measuring social capital is required in order to use it as a development tool. Although multi - dimensionality (i.e., different levels and units of study) and dynamicity of social capital over time (due to change of the social interaction over time) makes obtaining a single, true measure almost impossible (Woolcock & Narayan, 2000) but several researchers proposed different metrics to measure social capital. Bourdieu‟s (1986) tool to quantify social capital is network size: “The volume of the social capital possessed by a given agent thus depends on the size of the network of connections he/she can effectively mobilize and on the volume of the capital (economic, cultural or symbolic) possessed in his/her own right by each of those to whom he/she is connected” (p. 249). We should consider that while greater network size is good but the quality of the individuals is crucial for social capital. As explained earlier, it could infer that social capital is rooted in social networks and social relations and must be measured relative to them (Lin, 1999). Therefore, network science and social network analysis metrics could be used for measuring social capital. In this regard, several researchers asserted the location of actors in a network: ties strength (Granovetter, 1973; Portes, 1998), structural hole and constraints (Burt, 1992), as the key element of identifying social capital. As social network‟s engagement is the principal for social capital, we also use social network analysis metrics (that support the dimensions discussed in the literature) to measure social capital of scholars in their co-authorship network. We summarize the main indicators followed by their focus as discussed in the literature in Table 1. Table 1. Social Capital Dimensions and Relevant Proposed Metrics as Assets in Network Indicators Ego network size Focus Authors Diversity of contacts (Bourdieu, 1986) & (Boxman et al., 1991) Ego Average Ties Strength Ties Strength (Granovetter, 1973) & (Krackchardt, 1992) Ego Betweenness Centrality Structural Position Ego Effectiveness Brokerage & diversity (Burt, 1992) (Burt, 1992) Contact Status (Power) Embeddedness resources (Lin, 1982) & (Burt, 2005) To measure social capital, we use indicators covering the focus of related studies. Diversity of contacts (ego‟s network size) (Bourdieu, 1986), representing the available resources for an individual, has been considered in the literature as one of important factors on information diffusion and novelty. Another important factor emphasized in the literature is ties strength (Granovetter, 1973; Krackhardt, 1992). In addition, we use ego-betweenness centrality (Freeman, 1979) and effectiveness (Burt, 1992) in order to measure the structural position and brokerage characteristics of an individual in the network, respectively. In order to provide synthesis of two different approaches of social capital, diversity and power (as determinants of valued resources) (Lin, 1982), we define social capital as the frequency and diversity of 7 contacts (directly connected actors) to the powerful (high performance) contacts. Therefore, having the power (value) of actors in a social network, we measure social capital for an individual. We propose a new measure, Power-Diversity Index, to take into consideration the value of direct contacts in addition to their (quantity). Furthermore, proposing another measure, Power-Tie-Diversity Index, we added tie strength factor also to the previous measure (Power-Diversity Index). These measures are explained in detail in Section 3.2. These new proposed measures (i.e., Power-Diversity, Power-Tie-Diversity) reflect the thinking that connecting to more powerful individuals will give individuals more power. Accordingly then, this reflects individuals‟ power and influence on transmitting and controlling information as well as the popularity of an individual based on popularity of its direct contacts. 3. Data, Method and Measures 3.1. Data Scopus is one of the main sources presenting bibliometric data. To construct our database, we extract publications using the phrase “information science” in their titles or keywords or abstracts and restricting the search to publications in English published between 2001 and 2010. Indeed, the publications extracted cannot be considered as representing the world production in the “information science” field but it illustrates a good portion of publications in this field that do not have limitation to a specific sub- field, conference, journal, institutes and country. After extracting the publications‟ meta-data from Scopus and importing the information (i.e., title, publication date, author names, affiliations, publisher, number of citations, etc.), we used an application program, for extracting relationships (e.g., co-authorships) between and among researchers, and stored the data in tables in a local relational database. Four different types of information were extracted from each publication meta-data: Publications information (i.e., title, publication date, journal name, etc.); authors‟ names; affiliations of authors (including country, institute and department name, etc.); and keywords. Exploring our original extracted data we found affiliation information inconsistent, where there were several fields missing for some of publications and also different written names for the country of origin and institutions. So, in our second step we undertook manual checks (using Google) to fill the missing fields using other existing fields (e.g., we used institute names to find country). Also manually we merged the universities and departments which had different names (e.g., misspellings or using abbreviations) in our original extracted. Finally, after the cleansing of the publication data, the resulting database contained 4,579 publications published in 1,392 journals and conference proceedings (Indexed by Scopus) reflecting the contributions of 10,255 authors from 99 countries. 3.2. Methodology Social network analysis (SNA) is the mapping and measuring of relationships and flows between nodes of a social network. SNA provides both a visual and a mathematical analysis of human-influenced 8 relationships. The social environment can be expressed as patterns or regularities in relationships among interacting units (Wasserman & Faust, 1994). Each social network can be represented as a graph made of nodes (e.g., individuals, organizations, information) tied by one or more specific types of relations, such as financial exchange, friends, trade, and Web links. A link between any two nodes exists, if a relationship between those nodes exists. For instance, if the nodes represent people, a link means that those two people know each other in some way. Measures of SNA, such as centrality, have the potential to unfold existing informal network patterns and behavior that are not noticed before (Brandes & Fleischer, 2005). A method used to understand networks and their participants is to evaluate the location of actors in the network. Measuring the network location is about determining the centrality of an actor. These measures help determine the importance of a node in the network. To quantify the importance of an actor in a social network, various centrality measures have been proposed over the years (Scott, 1991; Wigand, 1988). Using each publication and its authors, we construct the co-authorship network of scholars. Nodes of the network represent scholars and a link between two nodes represents a publication co-authorship relationship between or among those scholars. We used UCINET (Borgatti et al. 2002), a social network analysis tool for visualizing the network and statistical functions, for calculating the measures descried below. 3.3. Measures 3.3.1. Measuring Scholars Performance To assess the performance of scholars, many studies suggest quantifying scholars‟ publication activities as a useful measure for the performance of scholars. But there are also many researchers pointing to the limits and bias of such quantification focusing on publication, mainly on the most visible articles from international databases. Further research shows the number of citations a publication receives qualifies the quantity of publications (Lehmann, Jackson, & Lautrup, 2006). Cronin (1996; 2002) also has been emphasized in the accumulation of citation counts, a form of symbolic capital, as an important aspect of academic life. Progressively, new citation-based metrics are being proposed, following Hirsch‟s (2005) h-index as the core metric for measuring the combination of quantity and quality of researchers and academic communities. Although there is considerable debate on the reliability of the h-index (e.g., Haque & Ginsparg, 2009), the h-index is still widely used world-wide among academicians. While the reliability of the measure is not the subject of this paper per se, it does provide at least an empirical and very widely used metric so as to gauge a researcher‟s prolificacy. Thus, we will consider the h-index as a citation-based surrogate measure and as a proxy for the performance of scholars. 3.3.2. Measuring Scholars’ Social Capital In Table 1 and the following paragraphs, we demonstrate the proper indicators recommended in the literature to measure social capital. We explain each indicator definition and their respective equations more precisely in this section. To answer precisely our first research question: “how do we measure the 9 social capital of scholars?” we propose following metrics to measure individuals‟ social capital. Although some of them have been used previously but we propose two new measures (Power-Diversity Index and Power-Tie-Diversity Index) which combines two and three different properties of individuals in their social network in order to quantify their social capital.  Individual Network Size (Degree Centrality) In order to measure diversity of contacts representing the available resources for an individual, as one of important factors of information diffusion and novelty, we will use individual degree centrality which is the number of direct contacts it has. In a co-authorship network, network size of an author is the number of her co-authors.  Individual Ties Strength (Average Tie Strength & Weighted Degree Centrality) To evaluate an individual‟s ties strength, we use the sum of ties strength and also average ties strength as proxy for social capital in order to represent the average strength of each tie of the actor. Sum of ties strength of an author is the total number of collaborations she has (including redundant collaborations with any co-author). Average ties strength is simply the average of the weights of her collaborations. That means dividing the sum of ties strength (i.e., the number of collaborations) by the network size of the author (i.e., the number of different co-authors).  Individual Effectiveness In order to optimize an individual‟s network by capitalizing on structural holes, Burt (1992) claims that increasing the number of direct contacts (network size) without considering the diversity reached by the contacts makes the network inefficient in many ways. Therefore, the number of non redundant contacts is important to the extent that redundant contacts would lead to the same people and hence provide the same information benefits. The term effectiveness is used to denote the average number of people reached per primary contact and to denote effectiveness in networks. Burt (1992) uses „effective size‟ as a term to denote the same. In conclusion, effectiveness of an individual is defined as the number of non-redundant (not connected) contacts. Precisely, this is the number of contacts that an individual has, minus the average number of ties that each contact has to other contacts of individuals. In a co-authorship network, effectiveness of an author is the number of her co-authors which are not co-author with each other.  Ego-Betweenness Centrality Considering bridging dimension, we use actors‟ ego-betweenness centrality to measure social capital. Betweenness centrality is an indicator of an individual‟s potential control of communication within the network and highlights bridging (brokerage) behavior of an actor (Freeman, 1979). Ego-betweenness centrality is defined as the sum of an individual‟s proportion of times this individual lies on the shortest 10 path between each part of alters (direct contacts to ego) (Hanneman & Riddle, 2005). For alters connected to each other, the contribution to the ego-betweenness of that pair is 0, and for contacts connected to each other only through ego (individual), the contribution is 1, for alters connected through ego and one or more other alters, the contribution is 1/k, where k is the number of nodes which connects that pair of alters.  Individual Power-Diversity Index In order to synthesize the two different approaches of social capital, diversity and power, we define the individual Power-Diversity Index to measure social capital based on both the frequency of connections and also considering the power of contacts (directly connected individuals). Having the power (value) of individuals in a social network, we could simply calculate an individual‟s sum or average of the power of direct contacts to synthesize quantity (frequency of contacts) and quality (their value) of embedded resources (contacts) of an individual as a proxy for his/her social capital. But in order to have a more advanced and accurate metric (rather than merely the sum or average), we will use the h-index (Hirsch, 2005) base formula to quantify the quality of contacts of an individual by counting top h powerful (valued) contacts whose power value is at least h. In a co-authorship network, we consider the h-index of authors as their power (value) indicator. Therefore, the Power-Diversity Index of an individual is the largest number such that her top h co- authors have each at least an h-index of h. For instance, looking at Table 2 the author has 7 co-authors who have h-indices of 6, 5, 5, 3, 3, 2 and 1, her Power-Diversity Index is 3 as three of her co-authors have an h-index of higher than 3 and one cannot find 4 co-authors who have an h-index of higher than 4.  Individual Power-Tie-Diversity Index In another effort, we take into consideration also individuals‟ tie strengths as another important property of individuals‟ social capital discussed in the literature. This measure can be applied in weighted networks. It is similar to individual Power-Diversity Index but taking the weight (strength) of ties into account. To define this new measure for an individual (in a weighted network), first we define co-authors‟ power-strength which is the h-index of each co-author multiplied by the strength of the tie between that co-author and the author. So, individual Power-Tie-Diversity Index is the largest number such that her top h co-authors have each at least the power-strength of h. Table 2. An Individual’s co-authors and their h-index and frequency of collaborations Co-authors h-index Freq. of Collaborations power-strength 1 2 3 4 5 CA1 CA2 CA3 CA4 CA5 6 5 5 3 3 4 3 2 3 1 24 15 10 9 3 11 6 7 CA6 CA7 1 1 2 2 2 2 In a co-authorship weighted network to calculate the individual Power-Tie-Diversity Index first we need to calculate the power-strength (co-ps) of each of her co-authors as her h-index times the number of collaborations (tie strength) they have had. Then, Power-Tie-Diversity of an individual is the largest number such that her top h co-authors have each at least co-ps of h. For instance, Table 2 shows the co- authors‟ power-strength of an author which are 24, 15, 10, 9, 3, 2, and 2 in descending order. Thus, the author‟s Power-Tie-Diversity Index is 4 as for 4 of her co-authors‟ power-strengths (co-ps) are higher than 4. 4. Analysis and Results 4.1. Dataset statistics Table 3 shows the top 20 active journals which have more publications in “information science” (having “information science” in the title or keywords or abstracts). Table 4 indicates the top 20 journals based on the citations count each journal receives. Table 3. Top 20 active journals in the field of “information science” Journal Name Pub. Cit. Journal Name Pub. Information Sciences 1 JASIST 2 Journal of Information Science 3 J. of Automation and IS 4 Journal of Documentation 5 J. of Chemical Info. and Modeling 6 Education for Information 7 Library and IS Research 8 9 International J. of Medical Info. 10 WSEAS Transactions on IS & App. 229 223 98 66 60 54 51 50 40 37 2818 3297 1195 8 387 627 125 289 248 22 11 Aslib Proceedings: New Info. Perspect. Physical Review A 12 13 Library Trends Bioinformatics 14 Information Research 15 16 Library Review 17 Journal of Theoretical Biology 18 New Library World International Info. and Library Review 19 20 Physical Review Letters 33 32 32 29 29 29 28 27 27 26 Cit. 43 638 64 1193 168 27 617 48 39 1595 Table 4. Top 20 cited journals in the field of “information science” Journal Name Cit. Pub. Journal Name Cit. Pub. Nature 1 JASIST 2 Information Sciences 3 Science 4 Physical Review Letters 5 Journal of Information Science 6 Bioinformatics 7 8 Information Systems Research 9 MIS Quarterly 3577 3297 2818 1934 1595 1195 1193 850 784 18 223 229 22 26 98 29 7 12 11 PNAS 12 Nucleic Acids Research Physical Review A 13 14 J. of Chemical Info. and Modeling 15 Journal of Theoretical Biology 16 Nature Biotechnology 17 Genome Research 18 SIGMOD Record 19 Nature Physics 734 661 638 627 617 538 527 476 441 24 17 32 54 28 4 2 12 13 12 10 Reviews of Modern Physics 749 2 20 JAMIA 393 22 4.2. Scholars Performance and Social Capital Measures Based on the available publication meta-data of scholars, we retrieve every pair of authors who are listed as authors of a publication. We merge redundant co-authorships by increasing more weight (tie strength) to their link (tie) for each relation. Therefore, we form the co-authorship network of scholars and a weighted network. This relational data (i.e., who is connected to whom with which frequency) is the basis for social network analysis. We imported these data to UCINET (Borgatti, Everett, & Freeman, 2002) to calculate the social network measures. In addition we calculated the citation-based performance measures (i.e., h-index) for all scholars. To illustrate, the results for the top 10 productive scholars are shown in Table 5. Table 5. Top 10 high performance scholars and their social capital measures Name h-index 1 Cit. Cnt. Network Size (Degree) Weighted Degree Effective- ness Avg. Ties Strength Ego- Betweeness Pow- Div Pow- Tie-Div 1 M. Thelwall 2 3 4 5 6 7 8 9 H.J. Kimble Y. Wang E.R. Dougherty B. Cronin C. Oppenheim L.I. Meho H.D. White J.C. Principe 10 Y.B. Jun 9 8 8 7 6 6 5 5 5 5 460 1125 328 606 164 153 282 169 120 89 17 28 30 16 4 20 6 2 13 6 26 40 35 21 6 26 8 2 14 6 16.45 23.68 19.56 13.88 4.33 19.19 5.67 1.00 10.79 5.33 1.53 1.43 1.17 1.31 1.50 1.30 1.33 1.00 1.08 1.00 245 557.3 376 186 12 352 24 0 114 26 4 4 3 4 2 4 1 1 1 1 2 3 2 2 1 2 1 1 1 1 To answer our second research question: “Do scholars‟ social capital metrics associate with their performance?” we calculated all measures shown in Table 5 for all scholars. Then, we applied the Spearman correlation rank test between the social capital measures and scholars‟ performance (i.e., citations count and h-index). As Table 6 shows the results of the correlation test, there are high significant correlation coefficients between social capital measures and scholar‟s citation-based performance. Results suggest that individuals‟ Power-Diversity Index has the highest coefficient with their performance either considering citation count or h-index. This highlights the importance of the power and role of co-authors to generate social capital for an author in her co-authorship network which may also lead to enhance her performance. Table 6. Spearman correlation rank test between scholars‟ centrality measures and their performance Scholars’ Social Capital Measures (N=10,254) Scholars’ Performance Measure 13 Individual Network Size (Degree Cent.) Weighted Degree Centrality (Sum of Ties Strength) Average Ties Strength Individual Effectiveness Ego Betweenness Centrality Individual Power-Diversity Index Individual Power-Tie-Diversity Index *. Correlation is significant at the .01 level (2-tailed). Citation Count h-index .219 * .226 * .135 * .192 * .172 * .656 * .103 * .159 * .177 * .268 * .292 * .309 * .853 * .206 * It is noteworthy to point out that the Power-Diversity Index coefficient value is three times higher than the second highest measure (i.e., ego-betweenness for the h-index and weighted degree centrality for citation count). Interestingly the coefficient for Power-Tie-Diversity Index is much lower than the Power-Diversity Index. This indicates that repeated collaborations with the same co-authors (even if they are prominent) does not create good social capital for them rather than having collaborations with more powerful (prominent) co-authors. The Ego-betweenness centrality coefficient is higher than ties strength and diversity measures. This shows bridging characteristics of scholars in their co-authorship network seems more important than the diversity of their co-authors and their ties‟ strength in regard to their performance. 5. Conclusion and Discussion In this study, we highlighted the importance of the co-authorship network as a tool for evaluating scholars‟ performance which is necessary in academia. We use social capital theory to explain how scholar‟s co-authorship network affects each individual scholar‟s performance. Although there are several definitions for social capital, most definitions‟ emphases are on the social relations that have productive benefits. Social capital is rooted in social networks and social relations and must be measured relative to them (Lin, 1999). Reviewing the literature we highlight scholars‟ structural position (e.g., network size, degree, betweenness) in their co-authorship network and also scholars‟ contacts characteristics (power and performance) as proper indicators of their respective social capital. Reviewing the literature on social scientists‟ and particularly network scientists‟ studies on social capital, we highlight different approaches and dimensions for social capital and focus on the approaches which evaluate individuals‟ property in the network. Although multi-dimensionality and dynamicity of social capital makes having a single, true measure almost impossible (Woolcock & Narayan, 2000) but as measuring social capital is required in order to use it as a development tool, several researchers proposed different metrics. Several measures (i.e., individual network size, ties strength, ego-betweenness centrality, Power- Diversity Index and Power-Tie-Diversity Index) using network analysis metrics. This assists us in quantifying the social capital resulting from the co-authorship through the social network, which is considered important for research management, academic institute as well as government policy makers 14 over recent years. While several measures have been used by other researchers earlier, the last two measures (i.e., Power-Diversity Index and Power-Tie-Diversity Index) are new which combine two and three properties of authors in their co-authorship network, respectively, to quantify the extent of social capital they gain. We test the correlation of the proposed measures of authors‟ with their research performance and all show a positive significant association. The results highlighted the importance of scholars‟ social capitals characteristics on their performance. Significant association between scholars‟ Power-Diversity Index and performance follows that connecting to more powerful contacts will lead to have better performance which is due to contacts‟ relative power and influence on transmitting and controlling information as well as the popularity of an individual based on popularity of its direct contacts . Power- Diversity Index indicates the individuals diversely connected to prominent contacts. These kinds of actors have special strategically positions that can control the flow of information in the network. Our research conceptualizes social capital in terms of network structures, such as articulated by the strength of weak ties theory (Granovetter, 1973, 1982) and provides valuable insight into co-authors‟ activities. The strength of weak ties theory suggests that the social network of any network member is the co-author‟s primary resource. Moreover, this network can be viewed as being comprised of participants who vary by the relative strength of their relationship with one another. Strongly tied- together members in a network tend to be more similar to each other than different, more likely to be available for each other, share more common interests, and interact more frequently. Conversely, weakly tied members in a social network tend to communicate less frequently, are more different than similar, and provide both newer information into the network and more access to other social networks (Sawyer, Crowston and Wigand, 1999). When applied to the co-author network, this suggests that co-authors with large social networks populated with more weak ties will have more social capital. The more resource- rich co-authors will get influential linkages and connections (via acquaintances) and be able to point to more influential co-authors who might be able to provide value-adding services. In brief, our findings show that Power-Diversity is a useful surrogate of the importance of a scholar in her co-authorship network by considering the diversity of contacts (number of co-authors) and also their value and power (performance). Power-Diversity, which can be considered as a new hybrid centrality measure, identifies individuals having direct connections to diverse powerful individuals. So, this measure is an indicator of the power and influence of an individual‟s ability to control communication and information. Using publication data and extracting co-authorship relations, we have presented an overview of collaboration efforts and collaborative networks in the “information science” research area. The collaboration networks of scientists in “information science” have been analyzed by using author affiliations from publications having „information science‟ in their „title‟ or ‟keywords‟ or „abstract‟ since 2001 to 2010 as extracted from Scopus. The publication dataset we have extracted does not support to represent the complete world production of research on “information science” (due to the possibility of significant biases: ignoring the relevant publications which are not using the exact phrase 15 „information science„; publications in other languages). Hence, the database does not pretend to represent the complete field. Applying this new measure for other social networks to test its association with individuals‟ performance could be a useful extension of standard centrality measures and a suitable proxy for the performance of the individuals in a network. In order to accomplish this, validation of this new measure is needed by testing it in other social networks. Footnotes: 1 The h-indices of scholars are not their full h-index. It is calculated based on their ten years of publications extracted from Scopus for our query between 2001 and 2010. This is the reason of difference with the h-indices of scholars reported in (Cronin & Meho, 2006). REFERENCES Abbasi, A., & Altmann, J. (2011). On the Correlation between Research Performance and Social Network Analysis Measures Applied to Research Collaboration Networks. Paper presented at the Hawaii International Conference on System Sciences, Proceedings of the 44th Annual., Waikoloa, HI. Abbasi, A., Altmann, J., & Hossain, L. (2011). Identifying the Effects of Co -Authorship Networks on the Performance of Scholars: A Correlation and Regression Analysis of Performance Measures and Social Network Analysis Measures. Journal of Informetrics, 5(4), 594-607. Abbasi, A., Altmann, J., & Hwang, J. (2010). Evaluating scholars based on their academic collaboration activities: two indices, the RC-Index and the CC-Index, for quantifying collaboration activities of researchers and scientific communities. Scientometrics, 83(1), 1-13. Adler, P. S., & Kwon, S. W. (2002). Social capital: Prospects for a new concept. Academy of Management Review, 27(1), 17- 40. Borgatti, S., Everett, M., & Freeman, L. (2002). Ucinet for windows: Software for social network analysis (version 6). Harvard, MA: Analytic Technologies. Bourdieu, P. (1986). The forms of capital. Readings in economic sociology, 280-291. Bourdieu, P., & Wacquant, L. J. D. (1992). An invitation to reflexive sociology: University of Chicago Press. Boxman, E. A. W., De Graaf, P. M., & Flap, H. D. (1991). The impact of social and human capital on the income attainment of Dutch managers. Social networks, 13(1), 51-73. Brandes, U., & Fleischer, D. (2005). Centrality measures based on current flow. Burt, R. S. (1992). Structural holes: The social structure of competition : Belknap Pr. Burt, R. S. (2005). Brokerage and closure: An introduction to social capital : Oxford University Press, USA. Chung, K. S. K., & Hossain, L. (2009). Measuring performance of knowledge -intensive workgroups through social networks. Project Management Journal, Jun2009, 40(2). Coleman, J. S. (1987). Norms as social capital. Economic imperialism, 133-155. Coleman, J. S. (1988). Social capital in the creation of human capital. American journal of sociology, 94(1), 95-120. Coleman, J. S. (1990). Foundations of social theory: Belknap Press. Cronin, B. (1996). Rates of return to citation. Journal of documentation, 52(2), 188-197. Cronin, B., & Meho, L. (2006). Using the h‐Index to rank influential information scientistss. Journal of the American Society for Information Science and Technology, 57(9), 1275-1278. Cronin, B., & Shaw, D. (2002). Banking (on) different forms of symbolic capital. Journal of the American Society for Information Science and Technology, 53(14), 1267-1270. Cummings, J. N. (2004). Work groups, structural diversity, and knowledge sharing in a global organization. Management science, 50(3), 352-364. Demsetz, H. (1991). The Theory of the firm revisited. In O. E. Williamson, S. G. Winter & R. H. Coase (Eds.), The Nature of the Firm: Origins, Evolution, and Development. (pp. 159–179). New York: Oxford University Press. Dierickx, I., & Cool, K. (1989). Asset stock accumulation and sustainability of competitive advantage. Management Science, 35(12), 1504-1511. Eisenhardt, K., & Tabrizi, B. N. (1995). Accelerating Adaptive Processes: Product Innovation in the Global Computer Industry. Administrative Science Quarterly, 40(1). 16 Freeman, L. C. (1979). Centrality in social networks conceptual clarification. Social Networks, 1(3), 215-239. Gauntlett, D. (2011). Three approaches to social capital. In Making is connecting: Polity. Granovetter, M. (1973). The strength of weak ties. American journal of sociology, 78(6), 1360. Granovetter, M. (1983). The strength of weak ties: A network theory revisited. Sociological theory, 1(1), 201-233. Griffin, A., & Hauser, J. R. (1992). Patterns of communication among marketing, engineering and manufacturing-a comparison between two new product teams. Management Science, 38(3), 360-373. Hanifan, L. J. (1916). The rural school community center. Annals of the American Academy of Political and Social Science, 67, 130-138. Hanneman, R. A., & Riddle, M. (2005). Introduction to social network methods. Hansen, M. T. (1999). The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits. Administrative science quarterly, 44(1), 82-85. Haque, A., & Ginsparg, P. (2009) . Positional effects on citation and readership in arXiv. Journal of the American Society for Information Science and Technology, 60(11), 2203-2218. Hirsch, J. (2005). An Index to quantify an individual's scientific research output. Proceedings of the National Academy of Sciences, 102(46), 16569. Krackhardt, D. (1992). The strength of strong ties: The importance of philos in organizations. Networks and organizations: Structure, form, and action, 216-239. Lehmann, S., Jackson, A., & Lautrup, B. (2006). Measures for measures. Nature, 444(7122), 1003-1004. Levin, D. Z., & Cross, R. (2004). The strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer. Management science, 1477-1490. Lin, N. (1982). Social Resources and Instrumental Action. In P. V. Marsden & N. Lin (Eds.), Social Sructure and Network Analysis (pp. 131-145). Beverlyy Hills, CA: Sage. Lin, N. (1999). Building a network theory of social capital. Connections, 22(1), 28-51. McFadyen, M., Semadeni, M., & Cannella, A. A. (2009). Value of strong ties to disconnected others: Examining knowledge creation in biomedicine. Organization Science, 20(3), 552-564. Narayan, D., & Cassidy, M. F. (2001). A dimensional approach to measuring social capital: development and validat ion of a social capital inventory. Current Sociology, 49(2), 59. Oh, W., Choi, J. N., & Kim, K. (2006). Coauthorship dynamics and knowledge capital: The patterns of cross -disciplinary collaboration in information systems research. Journal of Management Information Systems, 22(3), 266-292. Pinto, M. B., Pinto, J. K., & Prescott, J. E. (1993). Antecedents and consequences of project team cross -functional cooperation. Management Science, 39(10), 1281-1297. Podolny, J. M., & Baron, J. N. (1997). Resources and r elationships: Social networks and mobility in the workplace. American sociological review, 62(5), 673-693. Portes, A. (1998). Social capital: Its origins and applications in modern sociology. Annual review of sociology, 24, 1-24. Putnam, R. D. (1993). Making Democracy Work: Civic Traditions in Modern Italy . Princeton, NY: Princeton University Press. Putnam, R. D. (1995). Tuning in, tuning out: The strange disappearance of social capital in America. PS: Political science and politics, 28(4), 664-683. Putnam, R. D. (2001). Bowling alone: The collapse and revival of American community . New York: Simon & Schuster. Reagans, R., & Zuckerman, E. (2001). Networks, diversity, and productivity: The social capital of corporate R&D teams. Organization Science, 502-517. Sawyer, S., Crowston, K., & Wigand, R. T. (1999). ICT in the real estate industry: Agents and social capital, Americas Conference on Information Systems (AMCIS) 1999 Proceedings. : AIS Electronic Library. Scott, J. (1991). Social network analysis: a handbook.: Sage. Shen, C. (2010). The patterns, effects and evolution of player social networks in online gaming communities. University of Southern California. Takeda, H., Truex III, D., & Cuellar, M. (2010). Evaluating Scholarly Influence Through Social Network Analysis: the Next Step in Evaluating Scholarly Influence. AMCIS 2010 Proceedings, 573. Tsai, W., & Ghoshal, S. (1998). Social capital and value creation: The role of intrafirm networks. Academy of Management Journal, 41(4), 464-476. Uslaner, E. M. (2001). Volunteering and social capital: how trust and religion shape civic participation in the United States. In E. M. Uslaner (Ed.), Social Capital and Participation in Everyday Life . London: Routledge. Walker, G., Kogut, B., & Shan, W. (1997). Social capital , structural holes and the formation of an industry network. Organization Science, 109-125. Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications: Cambridge Univ Press. 17 Wellman, B. (1988). Structural analysis: From method and metaphor to theory and substance. In B. Wellman & S. D. Berkowitz (Eds.), Social structures: A network approach (pp. 19-61). Cambridge: Cambridge University Press. Wigand, R. T. (1988). Communication network analysis: A history and o verview. In Gerald Goldhaber and George Barnett (eds.), Handbook of Organizational Communication. Norwood, NJ: Ablex, pp. 319-358. Woolcock, M., & Narayan, D. (2000). Social capital: Implications for development theory, research, and policy. The world bank research observer, 15(2), 225. Yan, E., & Ding, Y. (2009). Applying centrality measures to impact analysis: A coauthorship network analysis. Journal of the American Society for Information Science and Technology, 60(10), 2107-2118. Zhuge, H., & Zhang, J. (2010). Topological centrality and its e -science applications. Journal of the American Society for Information Science and Technology, 61(9), 1824–1841. 18
1805.04022
1
1805
2018-05-10T15:25:46
Query for Architecture, Click through Military: Comparing the Roles of Search and Navigation on Wikipedia
[ "cs.SI", "cs.DL" ]
As one of the richest sources of encyclopedic information on the Web, Wikipedia generates an enormous amount of traffic. In this paper, we study large-scale article access data of the English Wikipedia in order to compare articles with respect to the two main paradigms of information seeking, i.e., search by formulating a query, and navigation by following hyperlinks. To this end, we propose and employ two main metrics, namely (i) searchshare -- the relative amount of views an article received by search --, and (ii) resistance -- the ability of an article to relay traffic to other Wikipedia articles -- to characterize articles. We demonstrate how articles in distinct topical categories differ substantially in terms of these properties. For example, architecture-related articles are often accessed through search and are simultaneously a "dead end" for traffic, whereas historical articles about military events are mainly navigated. We further link traffic differences to varying network, content, and editing activity features. Lastly, we measure the impact of the article properties by modeling access behavior on articles with a gradient boosting approach. The results of this paper constitute a step towards understanding human information seeking behavior on the Web.
cs.SI
cs
Query for Architecture, Click through Military: Comparing the Roles of Search and Navigation on Wikipedia Dimitar Dimitrov GESIS -- Leibniz Institute for the Social Sciences & University of Koblenz-Landau [email protected] Fabian Flöck GESIS -- Leibniz Institute for the Social Sciences [email protected] Florian Lemmerich RWTH Aachen University & GESIS -- Leibniz Institute for the Social Sciences [email protected] Markus Strohmaier RWTH Aachen University & GESIS -- Leibniz Institute for the Social Sciences [email protected] ABSTRACT As one of the richest sources of encyclopedic information on the Web, Wikipedia generates an enormous amount of traffic. In this paper, we study large-scale article access data of the English Wi- kipedia in order to compare articles with respect to the two main paradigms of information seeking, i.e., search by formulating a query, and navigation by following hyperlinks. To this end, we propose and employ two main metrics, namely (i) searchshare -- the relative amount of views an article received by search -- , and (ii) resistance -- the ability of an article to relay traffic to other Wikipedia articles -- to characterize articles. We demonstrate how articles in distinct topical categories differ substantially in terms of these properties. For example, architecture-related articles are often accessed through search and are simultaneously a "dead end" for traffic, whereas historical articles about military events are mainly navigated. We further link traffic differences to varying network, content, and editing activity features. Lastly, we measure the impact of the article properties by modeling access behavior on articles with a gradient boosting approach. The results of this paper con- stitute a step towards understanding human information seeking behavior on the Web. CCS CONCEPTS • Information systems → Web log analysis; Traffic analysis; KEYWORDS Search Behavior; Navigation Behavior; Log Analysis; Wikipedia ACM Reference Format: Dimitar Dimitrov, Florian Lemmerich, Fabian Flöck, and Markus Strohmaier. 2018. Query for Architecture, Click through Military: Comparing the Roles of Search and Navigation on Wikipedia. In WebSci '18: 10th ACM Conference on Web Science, May 27 -- 30, 2018, Amsterdam, Netherlands. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3201064.3201092 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-5563-6/18/05...$15.00 https://doi.org/10.1145/3201064.3201092 1 1 INTRODUCTION Before the age of the World Wide Web [1], information was pre- dominantly consumed in a linear way, e.g., starting at the first page of a book and following the laid out narrative until the end. With the introduction of hypertext [22] in digital environments, the way people consume information changed dramatically [4, 18 -- 20]. While on early websites, users still predominantly visited a main page through a fixed address and were sometimes even bounded by a more directory-like navigation structure, the rise of search en- gines and tighter interlinking of websites have corroded the linear consumption paradigm even further. Today, users access a single website through a multitude of webpages as entry points and can usually choose from numerous paths through the available linked content at any time. In such a setting, understanding at which (kind of) pages users typically begin and end their journey on a given website, vs. which pages relay traffic internally from and to these points, provides several useful insights. On one hand, it has high practical importance since it provides the first and last contact opportunity; pages could be shaped to leverage their function as an entry point (e.g., by prioritizing improvements of navigational guidance for these pages to retain visitors), or as an exit point (e.g., by surveying visitors for their user experience before leaving, or by providing increased incentives to continue navigation). On the other hand, knowledge about entry, relay and exit points is also closely tied to the relation of the major information seeking strate- gies, i.e., search and navigation: the first page visited in a session on a website is frequently reached via search engine results, after a query formulation, while navigation has been often used when the exact information need cannot be easily expressed in words [9, 10]. Understanding under which circumstances search or navigation dominate the users' information seeking behavior can help in devel- oping an agenda for improving the web content in order to optimize visitor rates and retention. Scope and research questions. Information consumption on the Web has been of special interest to researchers since the Web's earliest days [13, 14]. While both search [21, 32, 34] and naviga- tion [7, 11, 15 -- 17] have been investigated thoroughly in related work, they were mostly looked at separately. Consequently, so far little is known about which parts and content types of a spe- cific website (inter)act in which structural roles, begetting different information access patterns. WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands D. Dimitrov et al. In this work, we analyze how these patterns manifest on the online encyclopedia Wikipedia. With more than 5 million articles, Wikipedia is one of the primary information sources for many Web users and through its openly available pageview data provides an essential use case for studying information seeking behavior, as made apparent by numerous studies [6, 16, 24]. Yet, there is a lack of understanding how search and navigation as the two major information access forms in combination shape the traffic of large-scale hypertext environments, such as the world's largest online encyclopedia. To this end, we are interested in answering the following research questions: (i) How do search and navigation interplay to shape the article traffic on Wikipedia? Given an article, we want to know how its acting as a search entry point is related to (not) relaying navigation traffic into Wikipedia, and vice versa. This also addresses the issue of how search and navigation contribute to the article's popularity. Beyond these characteristics of the system in general, we also examine which specific properties of articles influence their roles in the search-vs-navigation ecosystem. We hence ask: (ii) Which article features (i.e., topic, network, content and edit features) are indicative for specific information access behavior? Materials, approach and methods. Building our analysis on large-scale, openly available log data for the English edition of Wikipedia, we propose two metrics capturing individual traffic be- havior on articles, i.e., (i) searchshare -- the amount of views an article received by search -- , and (ii) resistance -- the ability of an article to channel traffic into and through Wikipedia (cf. Section 2). We use searchshare and resistance to first explore the relation between search and navigation and their effect on the popularity of articles independent of their content (cf. Section 3). Depending on these two measures, we assign articles to four groups describing the role they assume for attracting and retaining visitors. Subsequently, we characterize the influence of several article attributes, including the general topical domain, edit activity and content structure on the preferred information access form (cf. Section 4). Finally, we fit a gradient boosting model to determine the impact of these article features on the preferred user access behavior (cf. Section 5). Contributions and findings. Our contributions are the following: (i) Regarding the general (collective) access behavior on Wikipedia, we provide empirical evidence that for the most viewed articles search dominates navigation in the number of articles accessed and received views. For the tail of the view distributions, navigation appears to become more and more important. (ii) We link article properties, i.e., position in the Wikipedia network, number of article revisions, and topic to preferred access behavior, i.e., search or navigation. Finally, (iii) we quantify the strength of the relationship between article properties and preferred access behavior. Our analysis suggests that (i) while search and navigation are used to access and explore different articles, both types of infor- mation access are crucial for Wikipedia, and (ii) that exit points of navigation sessions are located at the periphery of the link network, whereas entry points are located at the core. (iii) Edit activity is strongly related with the ability of an article to relay traffic, and thus with the preferred access behavior. Our results may have a variety of applications, e.g., improving and maintaining the visual appearance and hyperlink structure of 2 articles, identifying articles exhibiting changes in access behavior patterns due to vandalism or other online misbehavior. We consider our analysis as an initial step to better understand how search and navigation interplay to shape the user access behavior on platforms like Wikipedia and on websites in general. 2 TRANSITION DATA AND DEFINITIONS Below, we give an overview of the used dataset capturing the traffic on Wikipedia articles and define searchshare and resistance as our main metrics for describing the individual article traffic behavior. 2.1 Transition Data For studying the access behavior on Wikipedia articles, we use the clickstream dataset published by the Wikimedia Foundation [38]. The used dataset contains the transition counts between webpages and Wikipedia articles in form of (referrer, resource) pairs extracted from the server logs for August, 2016, and is limited to pairs that occur at least 10 times. The referrer pages are either external (e.g., search engines, social media), internal (other Wikipedia pages), or missing (e.g., if the article is accessed directly using the browser address bar). The navigation targets are purely internal pages.1 Since we are interested in contrasting Wikipedia article access from search engines and navigation (see also our discussion in Section 7), we focus our analyses only on those articles in the clickstream dataset that have received views through search or internal navigation, setting aside remaining view sources (mostly "no referrer"). Accordingly, we define total views of an article as the sum of all page accesses by either search or navigation. The resulting dataset consists of 2,830,709 articles accessed through search 2,805,238,298 times and 14,405,839 transitions originating from 1,370,456 articles and accounting for 1,251,341,103 views of 2,149,104 target articles. In total, the dataset consists of 3,104,702 ar- ticles viewed 4,056,579,401 times, with a ratio of 69% stemming from search and 31% from internal navigation -- in line with previous reports on the clickstream data [7, 15]. 2.2 Definitions To achieve a fundamental understanding of the parts that search and navigation each play for the distribution of views in Wikipedia, we take a look at the functional roles articles can assume for the overall traffic flow in respect to their searchshare and resistance. Searchshare. A high searchshare value indicates that search is the predominant paradigm of accessing an article, and thus that the article acts as an entry point for a site visit. In contrast, articles with a low value receive most of their views from users visiting them by means of navigation. The searchshare metric is defined as inse(a) searchshare(a) = inse(a) + innav(a) (1) where inse(a) is the number of pageviews an article a received directly from search engine referrers, and innav(a) is the number of views from navigation as recorded in the Wikipedia clickstream. Resistance. A low resistance value signals that an article forwards most of its received traffic to other articles within Wikipedia, hence 1Leaving a Wikipedia page is treated as the end of the visit in the logs, whether by clicking on an external link or closing the page. Query for Architecture, Click through Military: Comparing the Roles of Search and Navigation on Wikipedia WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands (a) Search and navigation vs. total (b) Search vs. navigation Figure 1: Ranking overlap. Four rankings are shown, accord- ing to the total number of pageviews (total), the number of pageviews coming from search (inse) as well as in- (innav ) and out-navigation (outnav ). The y-axis indicates overlaps between pairs of rankings, considering the top-k articles of each ranking as marked on the x-axis (log-scaled, top articles on the left). As a result, the overall ranking of to- tal pageviews shows a very high overlap with the incoming search ranking. The top pages by search and navigation dif- fer substantially. Notably, being a distribution point of traf- fic (high outnav , cf. (b)) is correlated most to receiving search, but only for top outnav articles, with lower ranks being sup- plied with traffic predominantly through innav . does not block the flow of incoming traffic onward. A high value in turn indicates that an article acts as an exit point. Thus, it rarely re- lays users to other Wikipedia articles. These articles are traffic sinks in the Wikipedia information network. We define the resistance metric as resistance(a) = 1 − outnav(a) inse(a) + innav(a) (2) where outnav(a) is the number of pageviews that had article a as a referrer. Additionally, we restrict the values to be in the interval [0,1]. This is necessary since a small number of articles generates more out-going traffic than they receive pageviews, e.g., due to a user opening several links in a new tab each. 3 GENERAL ACCESS BEHAVIOR In this section, we investigate how exogenous and endogenous traffic contribute to article popularity on Wikipedia, and we study the distribution of traffic features. We provide a first overview of the general access behavior on Wikipedia regarding search and navigation, aided by a division of articles into four groups with respect to searchshare and resistance; in Section 4, we will subse- quently take a deeper look at dissimilarities between different types of articles. Search and navigation in relation to total views. As can be expected from related research on Wikipedia and similar online platforms, the distribution of pageviews over articles is long-tailed with a heavy skew towards the head (80% views generated by the top-visited 5.2% of all articles). To better investigate the relationship between search and (incoming and outgoing) navigation on the ar- ticles popularity, we calculate the cumulative overlap (intersection) (a) Number of articles (b) Total views Figure 2: Articles and article views by access behavior. For a given searchshare (y-axis) and resistance (x-axis), the fig- ure shows (a) the number of articles and (b) the sum of their views in each heatmap square bin. Warm colors denote high values, using a logarithmic scale. We observe that search dominates navigation in terms of number of accessed arti- cles (note the single top data bin in (a)) and that a substantial amount of articles exhibits high resistance values. When fo- cusing on views, we see a more spread-out pattern, evidenc- ing that a relatively small amount of articles attracts a sub- stantial amount of search views and channels them onward to other articles (upper left side of (b)), corresponding to the search-relay group (cf. Table 1). of the descendingly ranked articles at each rank k, divided by k; this is an adaptation of the Rank Biased Overlap2 measure. Figure 1(a) shows that the top k articles ordered by search traffic (top-k-search) are highly overlapping with the top articles by total views (top-k-total) at any k, underscoring the general importance of search as a driver of incoming views. In-navigation, in contrast, is not a deciding factor to belong to the top most visited pages, but sees an extreme increase in the influence on overall views for articles up to top-k-total around 8000, at which point the increase continues, but levels off. Apparently, while search is the overall main driver for traffic, in-navigation rapidly becomes a more cen- tral source of traffic beyond the extremely popular articles. Turning to navigation passed on from articles to other articles, we can glean from Figure 1(a) that (i) while the very top of viewed articles con- tribute little in relation to their accumulated views to the internal traffic flow of Wikipedia (low overlap for outnav&total), we (ii) see a rapid and constant drop in the amount of traffic "dying" at a given page with increasing top-k-total. Further, while it is not surprising that the outgoing traffic accu- mulates generally in line with the overall received views, up until around top-k-total 1,500,000 it is generated at a rate surpassing the relative increase of total views, with the highest ranks of top-k-total contributing comparably little to it, just as to in-navigation. These observations are in line with Figure 1(b), where we see that a higher rank in receiving navigation - rather than from search - is more strongly correlated with distributing views to other articles for the 2Rank Biased Overlap [35] is a common metric for similarity between rankings using cumulative set overlap in cases where the two lists do not necessarily share the same elements (as is the case here). Top-weighting as can be specified for RBO is neither suited nor necessary for the distinction of different k that we aim for here. 3 1011021031041050.20.40.60.8inse&totalinnav&totaloutnav&total1011021031041050.20.30.40.50.60.7inse&innavinse&outnavinnav&outnav0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareWikipedia1021031041050.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareWikipedia106107 WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands D. Dimitrov et al. (a) Searchshare (b) Resistance (c) Searchshare-weighted (d) Resistance-weighted Figure 3: Traffic feature distributions. Figures (a) and (b) show an unweighted histogram of searchshare and resistance, while (c) and (d) respectively weight articles by their pageview counts. Most articles have a very high value for searchshare and resistance. However, extreme values close to 1.0 in (a), (b) stem mostly from rarely visited pages. largest portion of pages, after top-k-total 3000; up until that point, the largest share of channeled traffic stems from search views. As bottom line, we see a pattern that points to a small number of pages at the extreme top of the pageview counts that are mostly searched, but in relation to their popularity rather isolated in terms of nav- igation; with in- and out-navigation similarly gaining notably in correlation with overall views for lower top-k-total ranks. Traffic feature distributions. Figure 3 depicts the system-wide distribution of searchshare and resistance. Pages are generally much more searched than navigated to (searchshare median = 0.74, mean = 0.66) as seen in Figure 3(a). It is also apparent from Figure 3(b) that most articles do not tend to forward much of their received traffic internally, with the median for resistance for all articles lying at 1.0 and the mean at 0.88. This general tendency prevails when these scores are weighted by their received views (Figures 3(c) and 3(d)), but a notably less skewed distribution emerges, implying that -- even when accounting for regression-to-the-mean effects -- a majority of views is acquired via search and that a majority of views hits rather high-resistance targets. Relation between searchshare and resistance. We observe a light positive correlation (pearson = 0.26, spearman = 0.33) indicat- ing that the more likely an article is used to start a session, the more likely it is also to be the last article accessed in a session. Figure 2 depicts this association for all articles in our dataset. To explore this relation further, we assign each article to one of four groups, determined by the mean of both searchshare and resis- tance as the thresholds.3 We label each group according to its traffic behavior, i.e., (i) search-relay articles that are often searched while simultaneously contributing to further navigation (above-mean searchshare, below-mean resistance); (ii) search-exit articles with above-average searchshare that are often accessed from search but do not lead to users navigating further (above-mean searchshare, 3A delimitation by median yields groups with the sole resistance value 1.0 and was therefore not used. Cut-offs at 0.5 would have created extremely unbalanced groups. Table 1: Article group sizes and views. For each group, the ta- ble shows the percentage of articles and their received views. The majority of the articles are less visited and act as exit points of user session, whereas only popular articles are able to further relay traffic. search-exit search-relay nav.-relay nav.-exit articles views 43% 17% 9% 37% 21% 39% 27% 7% total 100% 100% above-mean resistance); (iii) navigation-exit articles that receive their traffic mostly from navigation but cannot channel traffic to other pages (below-mean searchshare, above-mean resistance); (iv) navigation-relay articles that are mainly accessed from within Wiki- pedia and able to pass traffic on internally (below-mean searchshare, below-mean resistance). Table 1 reports the share of articles and views pertaining to each group. We observe that a small group of highly visited articles is able to inject considerable amounts of traf- fic (search-relay) into Wikipedia while about a fifth of the articles' role is mainly to channel traffic internally (nav.-relay). On the other hand, exit points receive less views while covering a much bigger portion of Wikipedia articles. Overall, these observations are in line with Figure 3. Summary. Our analysis shows that search dominates navigation with respect to the number of articles accessed and visit frequency. However, the less viewed an article is, the more significant naviga- tion becomes as an information access form. Further, only popular articles are able to relay traffic while the majority of the articles acts as exit points for user search and navigation sessions. 4 CHARACTERIZING ACCESS BEHAVIOR In the previous section, we analyzed the general Wikipedia infor- mation access behavior, setting aside individual page attributes. However, Wikipedia articles have different properties that may influence the way they are retrieved (cf. Section 4.1). To this end, we analyze the general Wikipedia access behavior dependent on the article network (cf. Section 4.2), and content and edit properties (cf. Section 4.3). Subsequently, we highlight differences between general access behavior on Wikipedia and on Wikipedia topics dominated by search and navigation, respectively (cf. Section 4.4). 4.1 Wikipedia Article Data and Features To study the influence of the content on the preferred access be- havior, we focus on a snapshot of all Wikipedia articles contained in the main namespace of the English language version from Au- gust, 20164. We obtained the articles using the Wikipedia API5. The collected article data represent the HTML version of each article on which the transitions data used to study the Wikipedia traffic has been generated (cf. Section 2.1). By parsing and rendering the HTML version of the articles, we are able to extract article features 4https://archive.org/details/enwiki-20160801 5https://www.mediawiki.org/wiki/API:Main_page 4 0.00.20.40.60.81.002000004000006000008000001000000Frequency0.00.20.40.60.81.00500000100000015000002000000Frequency0.00.20.40.60.81.00.00.20.40.60.8Frequency1e90.00.20.40.60.81.00.00.20.40.60.8Frequency1e9 Query for Architecture, Click through Military: Comparing the Roles of Search and Navigation on Wikipedia WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands searchshare and resistance (article group nav.-relay) have higher median values across all network features, i.e., they are located more in the center of the network and consistently have more incoming and outgoing links. Although search-relay articles are not as well connected as nav.-relay, their relatively central position in the network and high number of outgoing connections is important in order to inject traffic into Wikipedia. By contrast, articles that are often used as exit points (search-exit and nav.-exit) are located more in the periphery of the network (low k-core value), are less often linked to, and contain less out-links themselves, which eventually results in higher resistance values, signifying the termination of user sessions. For further analysis, we sort the articles according to their k-core value and discretize them into 25 equally-sized bins. For each bin, we compute the quartiles for searchshare and resistance, as seen in Figure 4. Looking at the median (center red line), we find that for articles with increasing k-core values the searchshare indeed decreases (cf. Figure 4(a)). However, this effect stops at around 50% of the dataset, i.e., for half of the articles, which are located in high k-core network layers, the searchshare is mostly independent from the exact centrality. Regarding the resistance, there exists a substantial amount of nodes with a resistance of 1.0 for all k-core values, cf. the green line indicating the upper quartile. However, for the more central nodes, an increased number of pages have a significantly lower resistance (cf. Figure 4(b)). 4.3 Content and Edit Features Next, we characterize the article groups in terms of the article con- tent and edit history which account for the content presentation and content production process. Table 3 reports the median values of these features in the four article groups. We can observe that the content features (number of tables, number of sections, size of the article) are modestly increased for relay articles, i.e., articles that contain more content tend to be less often exit points of navigation sessions. By contrast, the revision history plays a more important role: we can see that articles in the search-relay group have (as a median) more than twice the number of editors and revisions com- pared to exit articles, and tend also to be somewhat older. Articles in the group nav.-relay show similar, but slightly lower values with the same tendency. The median feature values for both "exit" article Table 2: Network features. For each network feature, the ta- ble shows the median feature values of the articles in the re- spective group. The article network properties influence the preferred access behavior. Nav.-relay articles act as intersec- tions for the traffic as they occupy central network positions and provide lots of in- and outgoing links. Search-relay ar- ticles are similarly well-connected, which is important for injecting traffic into Wikipedia. Exit points (search-exit and nav.-exit articles) lack connectivity and are unable to chan- nel external and internal traffic, respectively. M search-exit search-relay nav.-relay nav.-exit overall in-degree out-degree degree k-core 14 33 51 44 38 56 105 76 54 71 131 95 18 35 57 49 22 41 69 57 (a) k-core vs. searchshare (b) k-core vs. resistance Figure 4: Network position. The figure shows the first (blue), second (red), and third (green) quartile of searchshare (a) and resistance (b) as function of the article position in the network indicated by its k-core. K-core values are divided into 25 bins. The access behavior on articles is influenced by their position in the network. The more central an arti- cle, the lower its searchshare and resistance -- i.e., the more traffic it relays through the network. capturing aspects related to the content of the articles. The dataset contains roughly 5 million articles connected by 391 million links. For these Wikipedia articles, we determine a wide variety of fea- tures describing their characteristics. We categorize these features into three different groups, i.e., (i) network properties, (ii) content and edit properties and (iii) article topics. The network features consist of in-, out- and total degree of the article in the Wikipedia link network as well as the k-core value for this network as a typi- cal centrality measure. Regarding the content and edit properties, we calculated for each article the number of sections, the number of figures and the number of lists contained in the article. These features capture visual appearance of the article, whereas the num- ber of revisions and editors represent content production process. We also consider the article age measured in years to account for differences between mature and young articles. To account for the amount of information provided in an article, we calculate its size in kilobytes. The features capturing the content production pro- cess are extracted from the TokTrack dataset [8] and consider the period between article creation and the end of August 2016. As the Wikipedia article categories are often too specific6, we fit a Latent Dirichlet Allocation (LDA) [2] model on article texts using Gensim [27] bag of words article vectors with removed stop words. To allow for manual interpretation of the topics, we fit a model for 20 topics. Subsequently, we asked five independent researchers to provide topic labels based on the top words and Wikipedia articles for each topic and summarized their labels. Section 4.4 describes the extracted topics. The following analyses are based on a random sample of 50000 articles. 4.2 Network Features To understand the role of the network features, we compute the median of the features for each of the four article groups search-exit, search-relay, nav.-relay, and nav.-exit (cf. Section 3). The results are shown in Table 2. We can observe that articles with below-average 6I.e., very specific categories of articles are not linked to the relevant super-category; in other cases, two conflicting categories are linked or fitting categories are missing completely. 5 051015200.00.20.40.60.81.0searchshareWikipedia051015200.00.20.40.60.81.0resistanceWikipedia WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands D. Dimitrov et al. (a) revisions vs. searchshare (b) revisions vs. resistance Figure 5: Edit activity. The figure shows the first (blue), sec- ond (red), and third (green) quartile of searchshare (a) and resistance (b) as function of the article editors' activity in- dicated by the number of revisions. Revisions values are di- vided into 25 bins. Except for the most edited articles, high edit activity has a negative effect on the resistance, which on the other hand has a positive effect on navigation indicated by the lower searchshare. groups are very similar and show slightly lower editor and revision numbers. Overall, content and edit features provide strong indica- tors for articles relaying traffic (as opposed to being exit points), but only weak indicators for being accessed by search or by navigation. We will have a more detailed look at an exemplary edit feature, i.e., the number of revisions. Analogously to above (network fea- tures), we assign the articles to one of 25 bins according to their revision count, compute the distribution of searchshare and resis- tance for each bin, and plot the quartiles. The results are shown in Figure 5. We can see that the median searchshare continuously decreases with increasing number of revisions. The effect is in par- ticular significant for very low number of revisions (cf. Figure 5(a)). Additionally, the spread of the distribution -- measured by the in- terquartile range (IQR) -- also substantially decreases the more revisions an article has. This can likely be explained by regression to the mean since articles with less revisions receive overall less views, making more extreme searchshare values more likely. With regard to the resistance, we can observe that specifically high number of revisions correlate with a lower resistance scores (cf. Figure 5(b)). The number of editors, and the age of an article is highly correlated with the number of revisions and reveal a very similar behavior with respect to searchshare and resistance. Table 3: Content and edit features. For each content and edit feature, the table shows the median feature values of the ar- ticles in the respective group. The content production pro- cess influences the access behavior as search- and nav.-exit points have low edit activity, and offer less content. On the other hand, relay articles are more frequently edited, and congruently, are generally more extensive. M search-exit search-relay nav.-relay nav.-exit overall editors revisions sections tables age size 21 38 6 3 9 41 52 97 7 3 11 50 46 86 7 4 10 54 21 37 4 3 8 41 25 46 6 4 9 44 6 (a) searchshare (b) resistance Figure 6: Access behavior for all topics. Topics are ordered from highest (left) to lowest (right) for searchshare (a) and resistance (b). Values over (blue) and below (red) the re- spective mean value are colored respectively. There are pro- nounced differences in the dominant access behavior on dif- ferent Wikipedia topics. 4.4 Topic Features Search-related popularity, navigability as well as other character- istics related to traffic might be highly dependent on the topical domain of an article. We hence investigate the access behavior across Wikipedia's numerous article themes, represented by the 20 topics we have extracted. Table 4 provides descriptive statistics of these topics. With 32% "TV and Movies" is the topic with the most views while consisting of a mere 7.5% of all articles on Wikipedia. "Technology, Stubs" and "Architecture" show an opposing dynamic, Table 4: Topic statistics. The table shows the percentage of articles and views for each topic. Additionally, it reports the median age in years, number of editors and revisions, and the size of the articles in kB. Not surprisingly, popular arti- cles are generally longer in terms of text, edited more and by higher number of editors, and relatively old. Technology, Stubs Architecture TV&Movies Fine Arts&Culture topic Sports Politics Biology Music Research&Education Media/Economics Military Industry&Chemistry North America Space&Racing Europe Asia Latin America&Iberia UK&Commonwealth Eastern Europe&Russia Awards&Celebrities % articles 19.3 12.4 12.0 8.1 7.5 7.2 7.0 6.9 4.8 3.3 3.1 3.0 1.2 1.2 0.9 0.7 0.5 0.5 0.4 0.0 % views 7 5 8 8 32 6 6 9 2 4 4 6 0 2 0.0 0.0 0.0 0.0 0.0 0.0 M age 7 8 7 8 8 8 7 8 7 8 8 9 9 8 7 5 7 7 7 6 M editors M revisions 20 31 37 47 96 49 29 64 40 54 47 66 23 52 19 8 20 19 15 22 36 61 86 103 197 100 57 136 87 115 105 126 39 114 36 14 33 40 24 42 M size 38 56 68 60 55 49 46 53 47 49 65 55 52 73 52 60 58 43 49 41 051015200.00.20.40.60.81.0searchshareWikipedia051015200.00.20.40.60.81.0resistanceWikipediaNorth AmericaResearch & EducationAsiaArchitectureMedia/EconomicsIndustry & ChemistryFine Arts & CultureLatin America & IberiaTechnology, StubsEuropeBiologySportsPoliticsTV & MoviesAwards & CelebritiesMusicSpace & RacingEastern Europe & RussiaMilitaryUK & Commonwealth0.460.560.660.76North AmericaAsiaResearch & EducationArchitectureEuropeMedia/EconomicsBiologyEastern Europe & RussiaIndustry & ChemistryFine Arts & CultureSportsLatin America & IberiaPoliticsSpace & RacingTechnology, StubsMusicTV & MoviesMilitaryAwards & CelebritiesUK & Commonwealth0.730.780.830.880.93 Query for Architecture, Click through Military: Comparing the Roles of Search and Navigation on Wikipedia WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands Figure 7: Relative difference of individual topics to the overall view distribution of searchshare vs. resistance (cf. Figure 2(b)). White denotes no relative difference, blue denotes underrepresentation (down to 0), while red denotes overrepresentation (max. over all topics at 2). The figure highlights the differences between search-heavy and navigation-heavy topics compared to the all-articles baseline. "Architecture", exhibiting above-mean searchshare and resistance (cf. Figure 6) stands represen- tative for six similarly distributed topics and mainly attracts search hits that it cannot pass on. "Military" shows an almost inverted pattern, mostly receiving as well as producing internal navigation. The bi-focal distribution of "Sports" can be found in "Politics" and "Fine Arts & Culture" as well, while patterns for "Music" and "TV & Movies" are more unique. (a) k-core vs. searchshare (b) k-core vs. resistance (c) revisions vs. searchshare (d) revisions vs. resistance (e) k-core vs. searchshare (f) k-core vs. resistance (g) revisions vs. searchshare (h) revisions vs. resistance Figure 8: Relation of traffic features with network and content features. For a topic dominated by search ("Architecture") and one dominated by navigation ("Military"), the figure shows the first (blue), second (red), and third (green) quartile of the article searchshare and resistance as function of its position in the network indicated by its k-core and editors' activity indicated by the number of revisions. Articles are divided into 25 bins by k-core and revision values. Apart from base-level differences of searchshare and resistance, the topics exhibit comparable trends, with the exception of searchshare not being influenced as much by network position or edit activity features for "Military" articles. providing a large amount of articles, but relatively few views.7 Overall, the amounts of articles and view counts are not strongly correlated. Consistent with previous research, we also observe that the popular articles are in general longer, relative old, and revised more often by more editors [32]. A look at the distribution of searchshare and resistance in the overview provided by Figure 6 reveals the different access behav- iors for Wikipedia topics. To examine these pronounced differences further, we set out to highlight the dissimilarities of the overall searchshare vs. resistance distribution for total views -- as shown 7 "Technology, Stubs" is a compound of general Wikipedia:Stub articles and often short technology articles that were not sufficiently distinguishable by LDA. We exclude it from discussion here due to its ambivalent nature. 7 in Figure 2(b) -- with the same distribution for the individual topics. To do so, we create heatmaps pinpointing the relative differences of each topic to the baseline of the overall distribution. This is achieved by performing a bin-wise division of a topic's normal- ized view count for a given searchshare-resistance bin with the respective normalized bin for the general Wikipedia traffic behavior. The resulting heatmaps are shown in Figure 7 for selected topics. They draw a clear picture of the over- and under-representation of certain article types (in terms of views) in each topic against the whole-system baseline. "Architecture" in Figure 7 stands as one representative for a group of topics ("Biology", "Industry & Chemistry", Research & Education, "Space & Racing") that all ex- hibit a very similar distribution with their article views occurring 0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareArchitecture0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareMilitary0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareSports0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareMusic0.00.20.40.60.81.0Resistance0.00.20.40.60.81.0SearchshareTV & Moviesunderrepr.no diff.overrepr.051015200.00.20.40.60.81.0searchshareArchitecture051015200.00.20.40.60.81.0resistanceArchitecture051015200.00.20.40.60.81.0searchshareArchitecture051015200.00.20.40.60.81.0resistanceArchitecture051015200.00.20.40.60.81.0searchshareMilitary051015200.00.20.40.60.81.0resistanceMilitary051015200.00.20.40.60.81.0searchshareMilitary051015200.00.20.40.60.81.0resistanceMilitary WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands D. Dimitrov et al. at high searchshare and high resistance, i.e., these topics are mostly searched and not used for further navigation. In stark contrast, views for "Military" topics occur to the largest part in comparably low-resistance articles, that are mostly navigated to (views for "UK & Commonwealth" are distributed almost analogously). "Sports" reveals a similar inclination for nav-relay types of articles attracting views, yet sports articles also frequently get accessed by search and abandoned immediately (closely related patterns: "Fine Arts & Culture" and "Politics"). Lastly, "Music" and "TV & Movies" ex- hibit remarkably idiosyncratic distribution patterns, not mirrored by another topic. "Music" attracts many views in a search-relay fashion, but on the other hand also explicitly acts as a "dead end" for internal navigation. As "maximally different" topics in respect to these traffic pat- terns and with overall high view counts, we select "Architecture" for search-heavy topics, and "Military" for navigation-heavy topics to conduct a deeper analysis regarding article network, content and edit properties. While "Architecture" includes articles covering pop- ular buildings, landmarks and municipalities, "Military" consists of articles covering significant historic events often associated with violence such as wars and notable battles, along with many articles dedicated to military units, personnel and equipment (cf. [28]). For the general access behavior concerning the network, content and edit features, we again assign the articles to one of 25 bins accord- ing to their k-core and revision counts, compute the distribution of searchshare and resistance for each bin, and plot the quartiles (cf. Figure 8). For "Architecture", searchshare (a) initially decreases for increasing k-core but sees an uptick for very central nodes, and a very similar behavior can be observed for resistance (b). "Military" is characterized by generally lower levels of both metrics, yet shares the trend of decreasing resistance with increasing k-core (e), mean- ing that for both topics, the more central articles in the network are able to channel visitors into Wikipedia, with the top-most central nodes excluded from this trend. Being edited more implies decreas- ing resistance for both topics ((d), (h)), although this trend reveals itself only for much higher revision counts for "Architecture", most likely to its generally higher resistance. Edit counts have no clearly distinguishable influence on "Military" articles' searchshare, for "Architecture" it, however, implies lower searchshare. Summary. The results presented in this section suggest that the content heavily influences the access behavior on Wikipedia. Par- ticularly, topical domains are accessed differently, i.e., users prefer to access articles about architecture and landmarks mainly through search, whereas more historical articles about military actions are navigated. Moreover, mature articles with high revision numbers and article located in the core of the network are more likely to channel traffic through Wikipedia, whereas articles located at the network periphery act as exit points. 5 MODELING ACCESS BEHAVIOR Our previous analysis characterized the user access behavior on Wikipedia articles with respect to their traffic from search and navigation dependent on the article features. However, this analysis does not reveal the impact of the feature groups on the access behavior. To this end, we set out to model the access behavior on articles in order to measure the influence of each feature group. The (a) searchshare (b) resistance Figure 9: Results. The figure shows the model performance (ROC AUC) for (a) searchshare and (b) resistance. Predict- ing searchshare is more challenging than predicting resis- tance. The article topic determines the preferred access be- havior (search or navigation). However, position in the net- work, content maturity and presentation of the article are indicative for the resistance, and thus if an article will be an entry-exit point or a relay point for the traffic. higher the predicative performance of a feature group, the higher the influence of the group is on the role articles play with respect to the traffic (entry-exit and relay articles), and thus on the preferred information access form (search and navigation). Modeling searchshare. We ask, given a Wikipedia article, if it is possible to classify it as dominated by search, i.e., searchshare > 0.66 or dominated by navigation, i.e., searchshare ≤ 0.66. The threshold used for the separation is the searchshare mean (cf. Sec- tion 3). In our experiments, we consider four different sets of article features: (i) network features, i.e., in-, out-degree, k-core, (ii) content & edit features, i.e., number of revisions and editors, article size, number of tables, pictures, lists, and (iii) topic. For predicting the preferred access form, we fit a model using gradient boosting and evaluate the model's performance with ROC AUC. The model is trained using 10-fold cross validation at a balanced dataset. On this dataset random guessing results in 50% accuracy, which is also used as baseline. Figure 9(a) shows the individual performance for each feature group, as well as the performance for the combination of all features. We observe that modeling searchshare is difficult even with all features (AUC = 0.70). As expected, the network features are the least indicative (AUC = 0.58). Further, the topic feature predicts searchshare best (AUC = 0.64), which suggests strong user prefer- ences for specific information access form, i.e., search or navigation for different topics. Modeling resistance. To model the resistance of Wikipedia arti- cles, i.e., they ability to relay traffic, we treat an article as a relay point if resistance ≤ 0.88 and an exit point if resistance > 0.88. Again, the separation of the articles is based on the resistance mean (cf. Section 3). We consider the same feature groups as for mod- eling searchshare and use random guessing as our baseline. For classifying the articles, we again utilize 10-fold cross validation to train a gradient boosting model on a balanced dataset. The perfor- mance is measured in terms of ROC AUC. Figure 9(b) shows the individual classification performance for that task for each feature group. The content and edit features are the most important (AUC = 0.76). This makes the case for an influence of the way content is 8 baselinenetworkcontent & edittopicall0.00.20.40.60.81.0AUC0.50.580.610.640.7baselinenetworkcontent & edittopicall0.00.20.40.60.81.0AUC0.50.680.760.640.8 Query for Architecture, Click through Military: Comparing the Roles of Search and Navigation on Wikipedia WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands presented to the user on lowering or increasing the resistance of a page. Unlike for searchshare, the network features are indicative for the resistance of an article (AUC = 0.68). This suggests that the network position of an article influences the extent to which it channels traffic. The topic plays only a small role, which again highlights the importance of the quality of the content presentation and production process. Summary. In general, modeling article resistance is easier than modeling searchshare as suggested by the higher ROC AUC values. Modeling searchshare is challenging due to the influence of external events (e.g., the transition data exhibits high view numbers on articles about the Summer Olympics 2016), and the content diversity. However, investing in diverse content from different topics seems to be the best way for Wikipedia to attract people as the article's topic is the most indicative feature regarding searchshare. On the other hand, the content presentation, and the article's position in the network are decisive for its ability to relay traffic. 6 RELATED WORK Since the inception of the Web, researchers have been studying the user content consumption behavior. Initially, content has been ac- cessed by traversing hyperlinks on the Web [14]. This navigational user behavior on the Web and on Wikipedia is often modeled using well-established methods such as Markov chains [3, 23, 25, 29, 30] and decentralized search models [5, 12]. Numerous navigational hy- potheses on Wikipedia have also been presented based on, e.g., click traces stemming from navigational games and on click data from server logs. For example, West and Leskovec observed a trade-off between similarity and popularity to the target article in the user sessions of Wikispeedia [37]. Lamprecht et al. studied the general navigability of several Wikipedia language editions and showed how the Wikipedia article structure influences the user click be- havior [15, 16]. Dimitrov et al. conducted a large-scale study on the navigational behavior on Wikipedia. They found that users tend to select links located in the beginning of Wikipedia articles and links leading to articles located in the network periphery [6, 7]. By constructing a navigational phase space from transition data, Gilderslave and Yasseri studied internal navigation on Wikipedia and identified articles with extreme, atypical, and mimetic behav- ior [11]. Web content can be also discovered by formulating and executing a search query. Kumar and Tomkins performed an initial characterization of the user search behavior [13], while Weber and Jaimes studied the search engine usage with respect to the users demographics, topics, and session length [36]. Earlier Wikipedia reading behavior studies focused on explaining bursts, dynamics of topic popularity and search query analysis to Wikipedia [17, 26, 32 -- 34]. A more recent study by Singer et al. investigated the Wikipedia readers motivations [31]. By complementing a reader survey with server log data, they discovered specific behavior patterns for dif- ferent motivations, i.e., bored readers tend to produce long article sequences spanning different topics. McMahon et al. focused on the interdependence between search engines, i.e., Google and Wiki- pedia [21]. They showed that Google is responsible for generating high traffic to Wikipedia articles, although, in some cases traffic is reduced due to the direct inclusion of Wikipedia content in search results. Compared to our work, McMahon et al. concentrate on the 9 peer production site and not on the content consumption. While there is a long line of research with respect to search and -- more so -- navigation, they have rarely been studied together which is the focus of this work. 7 DISCUSSION As a general observation, our results shed light on the different roles of articles with respect to traffic entering and leaving Wikipedia. On one hand, an overwhelming amount of pages attracts mostly direct search traffic and only little internal navigation, thanks to Wikipedia's strong symbiotic relationship with web search engines. Yet, notably, most of that traffic goes to articles that act mainly as exit points, i.e., users to not continue visiting Wikipedia directly afterwards. This is congruent with, but not necessarily because of, a pure "look up" nature of search. Only a very small share of searched articles is responsible for relaying disproportionally large amounts of traffic into the rest of Wikipedia. We see that these arti- cles are well-connected, more edited and more extensive than their exit counterparts, although we cannot yet conclude whether this is because of a "worn path" paradigm, wherein links and content are built because of the natural thematic positioning and suitabil- ity of an article to act as an entry point and as a bridge to more content, or because the a-priori structure of these article facilitates the observed navigational patterns. A longitudinal study, which we plan for future work, could obtain more detailed insights on this co-evolution of structural features and navigation. Furthermore, our data shows that articles, which are able to forward traffic, sit mostly at the very (k-)core of the link network. However, this is not necessarily the case for being a receiver of navigation traffic, with searchshare values stabilizing already at lower k-cores -- and with inlinks not being more highly correlated with k-core than outlinks. This hints to the fact that -- to some extent -- users enter Wikipedia by search on more central articles, and then navigate outwards from more to less central nodes. This is consistent with previous findings studying navigation on Wikipedia [7]. Regarding articles with different topical alignments, we see cer- tain evidence that the thematic domain of a user's information pursuit seems connected with the "mode" of how this informa- tion is attained. While the highly aggregate data used in this work does not allow for direct inferences as to the type of information retrieval in the continuum between a targeted and well-defined lookup and a completely serendipitous discovery process, we can nonetheless discern distinct patterns between article topics. Al- though "Architecutre" articles are not more devoid of in- or out- navigation opportunities than "Military" ones, they show far higher amounts of search views and exit points, while the latter one is navigated at a constantly high level, regardless of their connected- ness. A possible explanation of the navigation-heavy behavior on "Military" articles is that people like follow paths through events in order to understand historical developments. For our analysis, we utilize publicly available clickstream data about Wikipedia. However, due to privacy restrictions, the data con- tains only (referrer, resource) pairs that occurred at least ten times during the data collection period. This could lead to a skewed view on the access behavior when contrasting search and navigation. For example, if an article is navigated in total much more than ten times WebSci '18, May 27 -- 30, 2018, Amsterdam, Netherlands D. Dimitrov et al. over different links, but each individual link is transitioned less than ten times, all of these transitions will not be included in the data. In this case, the searchshare for this article might get substantially overestimated. Since this might occur specifically for articles with overall few page views, it may be a potential explanation for some findings, e.g., that article in the periphery of the link network show a stronger prevalence of search. 8 CONCLUSION AND FUTURE WORK In this work, we studied the prevalence of user access prefer- ences across articles on Wikipedia. For that purpose, we introduced searchshare and resistance as two key features to characterize article traffic. While we can identify search as the more dominant access paradigm compared to navigation on Wikipedia overall, we observe heterogeneous behavior at different types of articles. That is, de- pending on the article topic and other article properties, the share of navigation and search strongly varies, as well the amount of traffic an article relays to other Wikipedia pages. For example, articles on topics such as "Military" exhibit above average access by navigation, while topics such as "Architecture" show a strong prevalence of search. Furthermore, edit activity on a an article and its position in the network is strongly correlated with its ability to relay traffic on Wikipedia. Thus, we find overall that both, search and navigation play a crucial role for information seeking on Wikipedia. In the future, we plan to extend our studies over time intervals and to other language editions in order to further explore cultural differences in the identified access patterns. REFERENCES [1] Tim Berners-Lee, Mark Fischetti, and Michael L Foreword By-Dertouzos. 2000. Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor. HarperInformation. [2] David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent Dirichlet Alloca- tion. Journal of Machine Learning Research 3, Jan (2003), 993 -- 1022. [3] Flavio Chierichetti, Ravi Kumar, Prabhakar Raghavan, and Tamas Sarlos. 2012. Are web users really markovian?. In Proceedings of the 21st international conference on World Wide Web. ACM, 609 -- 618. [4] Julie Coiro and Elizabeth Dobler. 2007. Exploring the online reading compre- hension strategies used by sixth-grade skilled readers to search for and locate information on the Internet. Reading research quarterly 42, 2 (2007), 214 -- 257. [5] Dimitar Dimitrov, Philipp Singer, Denis Helic, and Markus Strohmaier. 2015. The Role of Structural Information for Designing Navigational User Interfaces. In Conference on Hypertext and Social Media. [6] Dimitar Dimitrov, Philipp Singer, Florian Lemmerich, and Markus Strohmaier. 2016. Visual Positions of Links and Clicks on Wikipedia. In Int. Conference Companion on World Wide Web. [7] Dimitar Dimitrov, Philipp Singer, Florian Lemmerich, and Markus Strohmaier. 2017. What Makes a Link Successful on Wikipedia?. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 917 -- 926. [8] Fabian FlÃűck, Kenan Erdogan, and Maribel Acosta. 2017. TokTrack: A Complete Token Provenance and Change Tracking Dataset for the English Wikipedia. https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15689 [9] George W Furnas. 1997. Effective view navigation. In Proceedings of the ACM SIGCHI Conference on Human factors in computing systems. ACM, 367 -- 374. [10] George W. Furnas, Thomas K. Landauer, Louis M. Gomez, and Susan T. Dumais. 1987. The vocabulary problem in human-system communication. Commun. ACM 30, 11 (1987), 964 -- 971. [11] Patrick Gilderslave and Taha Yasseri. 2017. Inspiration, Captivation, and Misdi- rection: Emergent Properties in Networks of Online Navigation. arXiv:1710.03326 (2017). [12] Denis Helic, Markus Strohmaier, Michael Granitzer, and Reinhold Scherer. 2013. Models of human navigation in information networks based on decentralized search. In Conference on Hypertext and Social Media. 10 [13] R Kumar and A Tomkins. 2009. A Characterization of Online Search Behaviour. Data Engineering Bullettin 32, 2 (2009), 2009. [14] Ravi Kumar and Andrew Tomkins. 2010. A characterization of online browsing behavior. In Proceedings of the 19th international conference on World wide web. ACM, 561 -- 570. [15] Daniel Lamprecht, Dimitar Dimitrov, Denis Helic, and Markus Strohmaier. 2016. Evaluating and improving navigability of Wikipedia: A comparative study of eight language editions. In Proceedings of the 12th International Symposium on Open Collaboration. ACM, 17. [16] Daniel Lamprecht, Kristina Lerman, Denis Helic, and Markus Strohmaier. 2017. How the structure of wikipedia articles influences user navigation. New Review of Hypermedia and Multimedia 23, 1 (2017), 29 -- 50. [17] Janette Lehmann, Claudia Müller-Birn, David Laniado, Mounia Lalmas, and Andreas Kaltenbrunner. 2014. Reader preferences and behavior on wikipedia. In Conference on Hypertext and Social Media. [18] Donald J Leu, Jill Castek, D Hartman, Julie Coiro, L Henry, J Kulikowich, and Stacy Lyver. 2005. Evaluating the development of scientific knowledge and new forms of reading comprehension during online learning. Final report presented to the North Central Regional Educational Laboratory/Learning Point Associates. Retrieved May 15 (2005), 2006. [19] Donald J Leu, Heidi Everett-Cacopardo, Lisa Zawilinski, Greg McVerry, and W Ian O'Byrne. 2012. New Literacies of online reading comprehension. The Encyclopedia of Applied Linguistics (2012). [20] Anne Mangen. 2008. Hypertext fiction reading: haptics and immersion. Journal of research in reading 31, 4 (2008), 404 -- 419. [21] Connor McMahon, Isaac Johnson, and Brent Hecht. 2017. The Substantial Inter- dependence of Wikipedia and Google: A Case Study on the Relationship Between Peer Production Communities and Information Technologies. (2017). [22] Theodor H Nelson. 1965. Complex information processing: a file structure for the complex, the changing and the indeterminate. In Proceedings of the 1965 20th national conference. ACM, 84 -- 100. [23] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The PageRank citation ranking: bringing order to the web. Stanford InfoLab. [24] Ashwin Paranjape, Robert West, Leila Zia, and Jure Leskovec. 2016. Improving Website Hyperlink Structure Using Server Logs. In Int. Conference on Web Search and Data Mining. [25] Peter LT Pirolli and James E Pitkow. 1999. Distributions of Surfers' Paths through the World Wide Web: Empirical Characterizations. World Wide Web 2, 1-2 (1999), 29 -- 45. [26] Jacob Ratkiewicz, Santo Fortunato, Alessandro Flammini, Filippo Menczer, and Alessandro Vespignani. 2010. Characterizing and modeling the dynamics of online popularity. Physical review letters 105, 15 (2010), 158701. [27] Radim Řehůřek and Petr Sojka. 2010. Software Framework for Topic Modelling with Large Corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, 45 -- 50. [28] Anna Samoilenko, Florian Lemmerich, Katrin Weller, Maria Zens, and Markus Strohmaier. 2017. Analysing Timelines of National Histories across Wikipedia Editions: A Comparative Computational Approach. In Proceedings of the Eleventh International AAAI Conference on Web an Social Media (ICWSM 2017). 210 -- 219. [29] Philipp Singer, Denis Helic, Andreas Hotho, and Markus Strohmaier. 2015. Hyp- trails: A bayesian approach for comparing hypotheses about human trails on the web. In Int. Conference on World Wide Web. [30] Philipp Singer, Denis Helic, Behnam Taraghi, and Markus Strohmaier. 2014. Detecting memory and structure in human navigation patterns using markov chain models of varying order. PloS One 9, 7 (2014), e102070. [31] Philipp Singer, Florian Lemmerich, Robert West, Leila Zia, Ellery Wulczyn, Markus Strohmaier, and Jure Leskovec. 2017. Why We Read Wikipedia. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 1591 -- 1600. [32] Anselm Spoerri. 2007. What is popular on Wikipedia and why? First Monday 12, 4 (2007). [33] Marijn ten Thij, Yana Volkovich, David Laniado, and Andreas Kaltenbrunner. 2012. Modeling and predicting page-view dynamics on Wikipedia. CoRR abs/1212.5943 (2012). [34] Vivienne Waller. 2011. The search queries that took Australian Internet users to Wikipedia. Information Research 16, 2 (2011). [35] William Webber, Alistair Moffat, and Justin Zobel. 2010. A similarity measure for indefinite rankings. ACM Transactions on Information Systems (TOIS) 28, 4 (2010), 20. [36] Ingmar Weber and Alejandro Jaimes. 2011. Who uses web search for what: and how. In International Conference on Web Search and Data Mining. [37] Robert West and Jure Leskovec. 2012. Human wayfinding in information net- works. In Int. Conference on World Wide Web. [38] Ellery Wulczyn and Dario Taraborelli. 2016. Wikipedia Clickstream. figshare. doi:10.6084/m9.figshare.1305770. Accessed: 2017-5-3.
1703.09774
1
1703
2017-03-06T15:44:13
Measuring the happiness of large-scale written expression: Songs, Blogs, and Presidents
[ "cs.SI", "physics.soc-ph" ]
The importance of quantifying the nature and intensity of emotional states at the level of populations is evident: we would like to know how, when, and why individuals feel as they do if we wish, for example, to better construct public policy, build more successful organizations, and, from a scientific perspective, more fully understand economic and social phenomena. Here, by incorporating direct human assessment of words, we quantify happiness levels on a continuous scale for a diverse set of large-scale texts: song titles and lyrics, weblogs, and State of the Union addresses. Our method is transparent, improvable, capable of rapidly processing Web-scale texts, and moves beyond approaches based on coarse categorization. Among a number of observations, we find that the happiness of song lyrics trends downward from the 1960's to the mid 1990's while remaining stable within genres, and that the happiness of blogs has steadily increased from 2005 to 2009, exhibiting a striking rise and fall with blogger age and distance from the equator.
cs.SI
cs
Measuring the happiness of large-scale written expression: Songs, Blogs, and Presidents. Peter Sheridan Dodds1, ∗ and Christopher M. Danforth1, † 1Vermont Complex Systems Center, Computational Story Lab, the Vermont Advanced Computing Core, Department of Mathematics & Statistics, The University of Vermont, Burlington, VT 05401. (Dated: March 30, 2017) The importance of quantifying the nature and intensity of emotional states at the level of pop- ulations is evident: we would like to know how, when, and why individuals feel as they do if we wish, for example, to better construct public policy, build more successful organizations, and, from a scientific perspective, more fully understand economic and social phenomena. Here, by incorpo- rating direct human assessment of words, we quantify happiness levels on a continuous scale for a diverse set of large-scale texts: song titles and lyrics, weblogs, and State of the Union addresses. Our method is transparent, improvable, capable of rapidly processing Web-scale texts, and moves beyond approaches based on coarse categorization. Among a number of observations, we find that the happiness of song lyrics trends downward from the 1960's to the mid 1990's while remaining stable within genres, and that the happiness of blogs has steadily increased from 2005 to 2009, exhibiting a striking rise and fall with blogger age and distance from the Earth's equator. Journal reference: Journal of Happiness Studies, 11(4), 441–456, 2010; doi:10.1007/s10902-009- 9150-9; first published online July 20, 2009; open access. I. INTRODUCTION The desire for well-being and the avoidance of suffer- ing arguably underlies all behavior [1–4]. Indeed, across a wide range of cultures, people regularly rank happiness as what they want most in life [1, 3, 5] and numerous countries have attempted to introduce indices of well- being, such as Bhutan's National Happiness Index. Such a focus is not new: Plato held that achieving eudaimonia (flourishing) was an individual's true goal [6], Bentham's hedonistic calculus and John Stuart Mill's refinements [7] sought to codify collective happiness maximization as the determinant of all moral action, and in the United States Declaration of Independence, Jefferson famously assert- ed the three unalienable rights of 'life, liberty, and the pursuit of happiness.' In recognizing the importance of quantifying well- being, we have seen substantial interest and progress in measuring how individuals feel in a wide range of con- texts, particularly in the fields of psychology [2, 8–10] and behavioral economics [1, 11]. Most methods, such as experience sampling [12] and day reconstruction [11], are based on self-reported assessments of happiness levels and are consequently invasive to some degree; dependent on memory and self-perception, which degrades reliabili- ty [13]; likely to induce misreporting [14]; and limited to small sample sizes due to costs. Complementing these techniques, we would ideally also have some form of transparent, non-reactive, population- level hedonometer [15] which would remotely sense and ∗ [email protected][email protected] Typeset by REVTEX levels, either post hoc or in real quantify emotional time [16]. Our method for achieving this goal based on large-scale texts is to use human evaluations of the emo- tional content of individual words within a given text to generate an overall score for that text. Our method could be seen as a form of data mining [17, 18], but since it involves human assessment and not just statistical or machine learning techniques, could be more appropriate- ly classed as 'sociotechnical data mining.' In what fol- lows, we explain the evaluations we use, how we combine these evaluations in analysing written expression, and address various issues concerning our measure. For human evaluations of the 'happiness' level of indi- vidual words, we draw directly on the Affective Norms for English Words (ANEW) study [19]. For this study, participants graded their reactions to a set of 1034 words with respect to three standard semantic differ- entials [8] of good-bad (psychological valence), active- passive (arousal), and strong-weak (dominance) on a 1–9 point scale with half integer increments. The specific words tested had been previously identified as bearing meaningful emotional content [20, 21]. Here, we focus specifically on ratings of psychological valence. (We note that other scales are possible, for example ones that do not presume a single dimension of good-bad, but rather independent scales for good and bad [22].) Of great utility to our present work was the study's explanation of the psychological valence scale to partici- pants as a 'happy-unhappy scale.' Participants were fur- ther told that "At one extreme of this scale, you are happy, pleased, satisfied, contented, hopeful. . . . The other end of the scale is when you feel completely unhappy, annoyed, unsatisfied, melancholic, despaired, or bored" [19]. We can thus reasonably take the average psychological valence scores for the ANEW study words 2 FIG. 1. Psychological valence (happiness) distribution for words in the Affective Norms for English Words (ANEW) study [19] along with representative words. Word valence was scored by study participants on a scale ranging from 1 (lowest valence) to 9 (highest valence) with resolution 0.5. as measures of average happiness experienced by a read- er. For consistency with the literature, we will use the term valence for the remainder of the paper. The measured average valence of the ANEW study words is well distributed across the entire 1–9 scale, as shown by the bar graph in Fig. 1. This suggests we may be able to fashion a measurement instrument based on the ANEW words that has sufficient sensitivity to be of use in evaluating and discriminating texts. Fig. 1 also provides some example words employed in the ANEW study along with their average valence scores. To estimate the overall valence score for a text, which we denote by vtext, we (a) determine the frequency fi that the ith word from the ANEW study word list appears in the text; and (b) compute a weighted average of the valence of the ANEW study words as where vi is the ANEW study's recorded average valence for word i. As a simple example, take the pangram "The quick brown fox jumps over the lazy dog." The three underlined words appear in the ANEW study word list with average valences 6.64, 4.38, and 7.57, respectively. We would therefore assign an overall valence score for 3 × (1× 6.64 + 1× 4.38 + 1× the sentence of vtext = 1 7.57) (cid:39) 6.20. We hasten to add that our method is only reasonable for large-scale texts where we can demonstrate robustness, and we discuss this in detail below. In Fig. 2, we also outline our measurement schematically, using the example of Michael Jackson's lyrics. To give a sense of range, for the texts we analyse here, we find that average valence typically falls between 4.5 and 7.5 (our results for lyrics below will give concrete examples for these limiting values). Our general focus is thus on quantifying how writings are received rather than on what an author may have vtext = (cid:80)n (cid:80)n i=1 vifi i=1 fi (1) intended to convey emotionally. Nevertheless, as we dis- cuss below, we attempt to understand the latter with our investigations of blogs. In using the ANEW data set, we also take the view- point that direct human assessment remains, in many complex contexts, superior to articial intelligence meth- ods. Describing the content of an image, for example, remains an extremely difficult computational problem, yet is trivial for people [23]. Since our method does not account for the meaning of words in combination, it is suitable only for large-scale texts. We argue that the results from even sophisti- cated natural language parsing algorithms [24] cannot be entirely trusted for small-scale texts, as individual expression is simply too variable [25] and must there- fore be viewed over long time scales (or equivalently via large-scale texts). Problematically, the desired scalability is a barrier for such parsing algorithms which run slow- ly and still suffer from considerable inaccuracy. With our method based on the ANEW data set, we are able to collect and rapidly analyze very large corpuses, giv- ing strength to any statistical assessment. Indeed, with advances in cloud computing, we see no practical limit in the size of meaningful corpuses we can analyse. A key aspect of our method is that it allows us to quan- tify happiness on a continuum. By comparison, previous analyses have focused on differences in frequency of words belonging to coarse, broad categories [26], such as 'nega- tive emotion', 'no emotion', and 'positive emotion'. For example, using a category-based approach and covering a smaller scale in time and population size than we do here, studies of blogs over a single day have found that content and style vary with age and gender, suggesting automated identification of author demographics is fea- sible [27]. However, comparisons between data sets using broad categorical variables are not robust, even if the categories can be ordered. Consider two texts that have 123456789050100150200funeral (1.39) / rape (1.25) / suicide (1.25)disgusted (2.45) / hostage (2.20) / trauma (2.10)fault (3.43) / lawsuit (3.37) / corrupt (3.32)neurotic (4.45) / vanity (4.30) / derelict (4.28)street (5.22) / paper (5.20) / engine (5.20)optimism (6.95) / church (6.28) / pancakes (6.08)luxury (7.88) / trophy (7.78) / glory (7.55)triumphant (8.82) / paradise (8.72) / love (8.72)valence vnormalized frequency fANEW 3 FIG. 2. A schematic example of our method for measuring the average psychological valence of a text, in this case the lyrics of Michael Jackson's Billie Jean. Average valences for the song Billie Jean, the album Thriller, and all of Jackson's lyrics are given at right. the same balance of positive and negative emotion words. Without a value of valence for individual words, we are unable to distinguish further between these texts, which may easily be distinct in emotional content. By using the ANEW data set, we are able to numerically quantify emotional content in a principled way that can be refined with future studies of human responses to words. II. DESCRIPTION OF LARGE-SCALE TEXTS STUDIED We use our method to study four main corpuses: song lyrics, song titles, blog sentences written in the first per- son and containing the word 'feel', and State of the Union addresses. Before exploring valence patterns in depth for these data sets, we first provide some summary statistics relevant to our particular interests, and we also detail our sources. Table I records the total number of words and ANEW words in each data set, along with the number of individ- ual authors. The relative proportions of ANEW words within the four corpuses range from 3.5% (State of the Union) to 9.2% (song titles). These percentages are not insubstantial due to Zipf's law [28] and the high preva- lence of articles, prepositions, etc., in language. Approx- imately 175 words account for half of all words in the British National Corpus, for example, with the five dis- tinctly neutral words 'the', 'of', 'and', 'a', and 'in' com- prising over 15%. Table II shows the five most frequent ANEW words for each data set, presenting a kind of essence for each corpus. The top five words in song lyrics and titles (which we obtained from different databases, see below) are very similar in prevalence, with 'love' unsurprisingly being the dominant word. Blogs evince a more social aspect with 'people' and 'life' in the top five, while the nature of State of the Union addresses is reflected in the disproportionate appearance of 'world' and 'war.' Fig. 3 shows the normalized abundances of ANEW study words appearing in our various corpuses, as a func- tion of their average valence. We include the example of Michael Jackson's lyrics for reference. The insets for each plot show the same distributions but now normal- ized by the underlying frequency distribution of ANEW words (Fig. 1). These insets reveal that song lyrics are weighted towards high valence words, and the mode bin is 8–9. Blogs, by contrast, have more low valence words resulting in a bimodal distribution, though the mode bin is again 8–9. State of the Union addresses favor high valence words in the 7–8 bin and show less negativity than blogs. We obtained our four data sets as follows. We down- loaded lyrics to 232, 574 songs composed by 20,025 artists between 1960 and 2007 from the website hotlyrics.net and tagged them with their release year and genre using the Compact Disc Data Base available online at freedb.org. We separately obtained from freedb.org a larger database of song titles and genre classifica- tions. Starting August, 2005, first person sentences ANEWwords11.perfume14.liek=1.love2.mother3.baby4.beauty5.truth6.people7.strong8.young9.girl10.movie12.queen13.name8.728.398.227.827.807.337.116.896.876.866.766.445.552.791131112411111fromamoviescene.'causetheliebecomesthetruth.AndbecarefulofwhatyoudoShe'sjustagirlwhoclaimsBillieJeanisnotmylover,thatIamtheone.MichaelJackson'sBillieJeanvMichaelJacksonvThriller=7.1=6.4=6.3=vtextXkfkvBillieJeanXkvkfkfk"Shewasmorelikeabeautyqueen2Andmotheralwaystoldme,becarefulwhoyoulove.vkLyricsfor 4 Counts Song lyrics Song titles Blogs ANEW words 3,477,575 (5.9%) 5,612,708 (9.2%) 8,581,226 (5.5%) 61,926 (3.5%) All words Individuals 58,610,849 ∼ 20,000 60,867,223 ∼ 632,000 155,667,394 ∼ 2,335,000 SOTU∗ 1,796,763 43 ∗ SOTU = State of the Union addresses TABLE I. Total number of words in each corpus along with the number and percentage of words found in the ANEW database. Individuals refers to the number of distinct artists, blogs, and presidents. Rank Song lyrics Song titles Blogs SOTU∗ 1 2 3 4 5 love (7.39%) love (7.37%) good (4.89%) time (4.18%) time (4.19%) time (4.72%) baby (2.75%) baby (2.75%) people (3.94%) present (3.45%) love (3.31%) life (2.59%) heart (2.14%) heart (2.15%) life (3.13%) people (5.49%) time (4.09%) world (3.10%) war (2.98%) life (2.60%) TABLE II. Top five most frequently occurring ANEW words in each corpus with frequency expressed as a percentage of all ANEW words. FIG. 3. Normalized frequency distribution of the ANEW study words binned by valence for the main corpuses (excluding song titles) we study here, along with the more specific example of Michael Jackson's lyrics. Insets show ratios of normalized frequencies for corpuses to that of the ANEW study word set. 12345678900.10.20.30.4Song lyrics:1234567890123456 vf / fANEW12345678900.10.20.30.4Michael Jackson's lyrics:1234567890123456 vf / fANEW12345678900.10.20.30.4valence vnormalized frequency fBlogs:1234567890123456 vf / fANEW12345678900.10.20.30.4State of the Union addresses:1234567890123456 vf / fANEW 5 III. RESULTS We analyse song lyrics first, in part to demonstrate the robustness of our approach. In Fig. 4A, we show how the average valence of lyrics declines from the years 1961 to 2007. The decline is strongest up until around 1985 and appears to level off after 1995. Since our esti- mate is based on a partial sample of all words, we need a way of checking its stability. In Fig. 4B, we repeat our analysis using 100 random subsets of the ANEW word list with 750 words, removing the overall average valence from each time series to facilitate comparison of the rela- tive change of valence. The downward trend remains for each measurement while the overall average valence shifts (as shown by the inset). For example, as we have noted, love is the most frequent word in song lyrics, and with its high valence, its inclusion or exclusion from the measure- ment has the most significant impact on the overall aver- age valence. Thus, we are confident that our estimates of relative as opposed to absolute valence are reasonable. We more finely examine the reason for this decline in valence in Fig. 5 where we compare individual word prevalence changes in lyrics before and after 1980 using what we term a 'Valence Shift Word Graph.' For these graphs, we rank words by their descending absolute con- tribution to the change in average valence between the two eras, δ. Word i's contribution depends on its change in relative frequency, and its valence relative to the pre- 1980 era average. In general, in comparing some text b with respect to a given text a, we define the valence difference as δ(b, a) = vb − va (2) and the percentage contribution to this difference by word i as ∆i(b, a) = 100 × (pi,b − pi,a)(vi − va) δ(b, a) (3) where pi,a and pi,b are the fractional abundances of word i in texts a and b. As required, summing ∆i(b, a) over all i gives +100% or -100% depending on whether δ(b, a) is positive or negative. Four basic possibilities arise for each word's contribu- tion, as indicated by the key in Fig. 5. A word may have higher or lower valence than the average of text a, and it may also increase or decrease in relative abundance. Further, the contribution of word i to ∆i(b, a) will be 0 if either the relative prevalences are the same, or the aver- age valence of word i matches the average of text a. Note that ∆i(b, a) is not symmetric in b and a and is meant only to be used to describe one text (b) with respect to another (a). Ranking words according to the above definition of ∆i gives us Fig. 5. We see that the decrease in average valence for lyrics after 1980 is due to a loss of positive words such as 'love', 'baby', and 'home' (italicized and in red) and a gain in negative words such as 'hate', 'pain', FIG. 4. A. Valence time series for song lyrics, showing a clear downward trend over the 47 year period starting in 1961. Valence is measured by averaging over the valences of individual words from the ANEW study [19] found in songs released in each year. B. Box and whisker plot of relative valence time series for song lyrics for 1000 random sets of 750 ANEW words. The overall mean valence vavg is removed from each time series for comparison; the inset histogram shows the distribution of overall means. Excluding the most fre- quent words such as 'love' (see Table II) shifts the time series vertically but the downward trend remains apparent in all cas- es. Boxes indicate first and third quartiles and the median; whiskers indicate extent of data or 1.5×interquartile range; and outliers are marked by a gray ×. using the word feel (or a conjugated form) were extract- ed from blogs and made available through the website wefeelfine.org, via a public API [29]. Demographic data was furnished by the site when available. These sentences appeared in over 2.3 million unique blogs dur- ing a 44 month span starting in August 2005. In total, we retrieved 9,563,128 sentences which appeared during the period August 26, 2005 to March 31, 2009, inclu- sive. For each day, we removed repeat sentences of six words or more to eliminate substantive copied materi- al. We obtained State of the Union messages from the American Presidency Project at presidency.ucsb.edu. Finally, we accessed the British National Corpus at www.natcorp.ox.ac.uk. 196019701980199020005.966.16.26.36.46.56.66.76.8yearvalence (v)A.1960196519701975198019851990199520002005−0.4−0.200.20.40.60.8rel. val. (v − vavg)yearB.5.866.26.46.60100200vavgcount 6 FIG. 5. Valence Shift Word Graph: Words ranked by their absolute contributions to the drop in average valence of song lyrics from January 1, 1980 onwards relative to song lyrics from before January 1, 1980. The contribution of word i is defined in Eq. (3) and explained in the surrounding text. and 'death' (normal font and in blue). These drops are countered by the trends of less 'lonely' and 'sad', and more 'life' and 'god'. The former dominates the latter and the average valence decreases from approximately 6.4 to 6.1. Even though the contribution of 'love' is clearly the largest, the overall drop is due to changes in many word frequencies. And while we are unable to assess words for which we do not have valence, we can make qualitative observations. For example, the word 'not', a generally negative word, accounts for 0.22% of all words prior to 1980 and 0.28% of all words after 1980, in keeping with the overall drop in valence. To help further unravel this decline in song lyric valence, we show the valence time series for some impor- tant music genres in Fig. 6. For this plot, we move to examining song titles for which we have a more complete data set involving genres. We observe that the valence of individual genres is relatively stable over time, with only rock showing a minor decrease. The ordering of genres by measured average valence is sensible: gospel and soul are at the top while several subgenres of rock including metal and punk, and related variants which emerged through the 1970's exhibit much lower valences. Rap and hip-hop, two other notable genres that appear halfway through the time series, are lower in valence than the main genres of rock and pop, but not to the same degree as metal and punk. Thus, the decline in overall valence does not occur within particular genres, but rather in the evolutionary appearance of new genres that accessed more negative emotional niches. Finally, we show the top ten and bot- tom ten artists ranked according to valence in Tab. III, given a certain minimum sampling of each artist's lyrics. While of considerable intrinsic interest, song lyrics of popular music provide us with a limited reflection of soci- ety's emotional state, and we move now to exploring more directly the valence of human expression. The pro- liferation of personal online writing such as blogs gives us the opportunity to measure emotional levels in real time. As of June 23, 2008, the blog tracking website technorati.org reported it was following 112.8 million blogs. Blogger demographics are broad with an even split between genders and high racial diversity with some skew −20−1001025242322212019181716151413121110987654321love ↓lonely ↓hate ↑pain ↑baby ↓death ↑dead ↑home ↓sick ↑fear ↑hit ↑hell ↑fall ↑sin ↑lost ↑sad ↓burn ↑lie ↑scared ↑afraid ↑music ↓life ↑god ↑trouble ↓loneliness ↓Per word valence shift ∆iWord number iPer word drop in valence of lyrics from 1980−2007 relative to valence of lyrics from 1960−1979:lonely ↓sad ↓trouble ↓loneliness ↓devil ↓Decreases in relativelylow valence wordscontribute to increasein average valencelife ↑god ↑truth ↑party ↑sex ↑Increases in relativelyhigh valence wordscontribute to increasein average valencehate ↑pain ↑death ↑dead ↑sick ↑Increases in relativelylow valence wordscontribute to dropin average valencelove ↓baby ↓home ↓music ↓good ↓Decreases in relativelyhigh valence wordscontribute to dropin average valenceKey: Rank 1 2 3 4 5 6 7 8 9 10 Top Artists All 4 One Luther Vandross S Club 7 K Ci & JoJo Perry Como Diana Ross & the Supremes Buddy Holly Faith Evans The Beach Boys Jon B Valence 7.15 7.12 7.05 7.04 7.04 7.03 7.02 7.01 7.01 6.98 Bottom Artists Slayer Misfits Staind Slipknot Darkthrone Death Black Label Society Pig Voivod Fear Factory 7 Valence 4.80 4.88 4.93 4.98 4.98 5.02 5.05 5.08 5.14 5.15 TABLE III. Average valence scores for the top and bottom 10 artists for which we have the lyrics to at least 50 songs and at least 1000 ANEW words. FIG. 6. Valence time series for song titles broken down by representative genres. For each genre, we have omitted years in which less than 1000 ANEW words appear. towards the young and educated [30]. We have examined nearly 10 million blog sentences retrieved via the website wefeelfine.org, as we have described in detail above. In focusing on this subset of sentences, we are attempting to use our valence mea- sures not only to estimate perceived valence but also the revealed emotional states of blog authors. We are thus able to present results from what might be considered a very basic remote-sensing hedonometer. In Fig. 7, we plot average monthly valence as a func- tion of time for blogs. We first see that over the time period examined, our subset of blog sentences gradually increase in valence, rising from an average of around 5.75 to over 6.0. Within individual years, there is generally an increase in valence over the last part of the year. In 2008, after a midyear dip, perhaps due to the economic recession, valence notably peaks in the last part of the year and appears to correlate with the US presidential election. We highlight a number of specific dates which most sharply depart from their month's average: Christmas Day; Valentine's Day; September 11, 2006, the fifth anniversary of the World Trade Center and Pentagon attacks in the United States; the US Presidential Elec- tion, November 4, 2008; the US Presidential Inaugura- tion, January 20, 2009; and the day of Michael Jackson's 19651970197519801985199019952000200520104.555.566.57yearvalence (v) Gospel/Soul (6.91)Pop (6.69)Reggae (6.40)Rock (6.27)Rap/Hip−Hop (6.01)Punk (5.61)Metal/Industrial (5.10) 8 FIG. 7. Time series of average monthly valence for blog sentences starting with "I feel..." show a gradual upward trend over 3 years and 8 months. Notable individual days that differ strongly in valence from that of the surrounding month are indicated, including Christmas Day (trees), Valentine's Day (hearts), 9/11 or 9/10 (squares), the US Presidential election and inauguration (circle and square), and Michael Jackson's death (star). The gray bar at the top of the graph indicates the days for which we have data with white gaps corresponding to missing data (we have no estimate of valence for Christmas Day, 2006, hence its absence). death, June 25, 2009 (June 26 and 27 were also equally low). In Fig. 8, we show three Valence Shift Word Graphs corresponding to September 11, 2006; Valentine's Day, 2008; and US Presidential Election Day, November 4, 2008. The first panel in Fig. 8 shows that the negative words most strongly driving down the average valence of the fifth anniversary of the 9/11 attacks are 'lost', 'anger', 'hate', and 'tragedy' ('terrorist' ranks 10th in valence shift). The impact of these words is augmented by a decrease in frequency of 'love' and 'happy', overwhelm- ing the appearance of more 'people' and less 'stupid' and 'alone.' In other years, September 10 rather than September 11 appears to be more clearly negative in tone, perhaps indicating an anticipatory aspect. Christmas Day and Valentine's Day are largely explained by the increase in frequency of the words Christmas and Valentine, both part of the ANEW word list. But other words contribute strongly. For Christ- mas Day, there is more 'family' and less 'pain', with an increase in 'guilty' going against the trend. As shown for Valentine's day in 2008 in the second panel of Fig. 8, 'love' and 'people' are more prevalent, 'hate' and 'pain' less so, countervailed by more 'sad,' 'lonely,' and 'bored.' The strongest word driving the spike in valence for the 2008 US Election, the happiest individual day in the entire data set, is 'proud' (third panel of Fig. 8). Valence increases also due to a mixture of more positive words such as 'hope' and 'win' as well as a decrease in the appearances of 'pain,' 'sad,' and 'guilty.' For some blogs, we also have self-reported demograph- ic and contextual information allowing us to make some deeper observations. Fig. 9A shows that the average valence of blog sentences follows a pronounced single maximum, convex curve as a function of age. Thirteen and fourteen year-olds produce the lowest average valence sentences (5.58 and 5.55 respectively). As age increas- es, valence rises until leveling off near 6.0 for ages 45– 60, and then begins to trend downwards. Fig. 10 com- pares 14 year-olds to those of age 45–60, and we see the former disproportionately using low valence words 'sick', 'hate', 'stupid', 'sad', 'depressed', 'bored', 'lonely', 'mad', and 'fat.' The increase is most marked throughout the teenage years with 20 year-olds (5.83) closer in average valence to 45–60 year-olds than to 14 year-olds. At the other end of the age spectrum, individuals in the 75 to 84 age range produce sentences with valence similar to those of 17 year olds. Our age dependent estimates of valence comport with and extend previous observations of blogs that suggested A S O N D J F M A M J J A S O N D J F M A M J J A S O N D J F M A M J J A S O N D J F M A M J5.75.85.966.16.26.36.49/119/109/109/10US Election 11/4US Inauguration 1/20MichaelJackson♥♥♥♥ 2005 2006 2007 2008 2009valence (v) 9 FIG. 8. Valence Shift Word Graphs for three example dates which are markedly different from the general valence trend shown in Fig. 7. The content of each date's blogs is compared with that of the surrounding month. See Fig. 5 for an explanation of these graphs. FIG. 9. A: Average valence as a function of blogger's self-reported age. We use the age a blogger will turn in the year of his or her post and an approximately logarithmically growing bin size such that all data points are based on at least 3000 ANEW words. Bin boundaries are indicated by the dashed vertical lines. B: Average valence as a function of blogger's absolute latitude. Bins are indicated by vertical gray lines. The first two bins have 8,390 and 26,071 ANEW words and the remainder all have approximately 105 or more. C: Valence averaged over days of the week for blogs showing a subtle seven-day cycle peaking on Sunday with a trough in the middle of the week. Each day's average is based on at least 106 ANEW words. −30−20−10010203025242322212019181716151413121110987654321lost ↑people ↑happy ↓love ↓anger ↑alone ↓stupid ↓tragedy ↑loved ↑terrorist ↑hate ↑safe ↑war ↑stress ↑grief ↑good ↓free ↓hell ↑home ↓god ↓angry ↑pretty ↓lonely ↓lucky ↑useless ↓Per word valence shift ∆iWord number iSep 11, 2006 vs. Sep, 2006−30−20−10010203025242322212019181716151413121110987654321love ↑people ↑hate ↓pain ↓sad ↑valentine ↑happy ↑guilty ↓hell ↓hurt ↓lost ↓waste ↑bored ↑hug ↑terrible ↓birthday ↑lonely ↑sick ↓kiss ↑useless ↓part ↓nervous ↓ugly ↑cut ↓desire ↑Per word valence shift ∆iFeb 14, 2008 vs. Feb, 2008−30−20−10010203025242322212019181716151413121110987654321proud ↑love ↓pain ↓sad ↓guilty ↓hope ↑alone ↓win ↑part ↑hopeful ↑joy ↑sick ↓people ↑depressed ↓hate ↓war ↑history ↑hurt ↓happy ↑free ↓home ↓victory ↑pride ↑afraid ↓life ↓Per word valence shift ∆iNov 04, 2008 vs. Nov, 20080102030405060705.75.755.85.85latitude degreesB.13203040506070805.55.65.75.85.966.1blogger agevalence (v)A.WTFSSMTW5.835.845.85day of weekC. 10 FIG. 10. Valence Shift Word Graph comparing bloggers who list themselves as turning 14 in year of post to those turning 45 to 60. The average valences are 5.55 and 5.98 respectively. an increase in valence over the age range 10–30 [27]. Our results are however at odds with those of studies based on self-reports which largely find little or no change in valence over life times [31, 32]. These latter results have been considered surprising as a rise and fall in valence- precisely what we find here-would be expected due to changes in income (rising) and health (eventually declin- ing) [31]. Our results do not preclude that self-perception of happiness may indeed be stable, but since our results are based on measured behavior, they strongly suggest individuals do present differently throughout their lifes- pan. And while we have no data regarding income, because income typically rises with age, our results are sympathetic to recent work that finds happiness increases with income [33], going against the well known Easterlin Paradox, popularized as the notion that 'money does not buy happiness' [34]. Fig. 9B shows that the average valence of blog sen- tences gently rolls over as a function of absolute latitude (i.e, combining both the Northern and Southern Hemi- spheres). Average valence ranges from 5.71 (for 0 to 11.5 degrees) up to 5.83 (for 29.5 to 44.5 degrees) and then back to 5.78 (for 52.5 to 69.5 degrees). Seasonal Affec- tive Disorder [35] may be the factor behind the small drop for higher latitudes, though a different mechanism would need to be invoked to account for lower valence near the equator. One possible explanation could be that the relatively higher population of the mid-latitudes leads to stronger social structures [1]. We find some support for the social argument for individuals near the equa- tor (absolute latitude ≤ 11.5), who we observe more fre- quently use the words 'sad', 'bored', 'lonely', 'stupid' and 'guilty' and avoid using 'good' and 'people.' On the oth- er hand, the valence drop at higher latitudes (between 52.5 and 69.5 degrees absolute latitude) is reflected in the frequency changes of a mixture of social, psycholog- ical, and some conditions-related words: 'sick', 'guilty', 'cold', 'depressed', and 'headache' all increase, 'love' and 'life' decrease, offset by less 'hurt' and 'pain' and more 'bed' and 'sleep.' At a much more subtle level, a weekly cycle in valence is visible in blog sentences (Fig. 9C). A relatively sharp peak in valence occurs on Sunday, after which valence steadily drops daily to its lowest point on Wednesday before climbing back up. Monday, contrary to common- ly held perceptions but consistent with previous stud- ies [36], exhibits the highest average valence after Sunday, perhaps indicating a lag effect. We also observe some variation among countries. Of the four countries with at least 1% representation, the United States has the highest average valence (5.83) fol- lowed by Canada (5.78), the United Kingdom (5.77), and Australia (5.74). In terms of gender, males exhibit essentially the same average valence as females (5.89 versus 5.91). Females however show a larger variance than males (4.75 versus 4.44) in agreement with past research [4]. We further find females disproportionately use the the most impactful high and low valence words separating the two genders: 'love', 'baby', 'loved' and 'happy' on the positive end, and 'hurt', 'hate', 'sad', and 'alone' on the negative end. In fact, of the top 15 words contributing to δ(female, male), the only one used more frequently by males is 'good.' We turn to our last data set, State of the Union (SOTU) addresses for the United States. These address- es, which include both speeches and written reports, grant us a starting point for assessing the emotional tem- perature of the United States over its 220 year history, as may or may not have been intended by the authors. −30−20−10010203025242322212019181716151413121110987654321sick ↑hate ↑stupid ↑sad ↑happy ↑love ↑depressed ↑bored ↑lonely ↑alone ↑god ↓mad ↑fat ↑hurt ↑life ↓upset ↑fun ↑loved ↑people ↑scared ↑dead ↑terrible ↑confused ↑friend ↑family ↓Per word valence shift ∆iWord number iBloggers age 14 vs. age 45−60 11 FIG. 11. Average valence of State of the Union addresses, binned by President and plotted against the average of the years the President was in office. Fig. 11 shows a valence time series for SOTU address- es binned by President. In comparison to our lyrics and blog data sets, SOTU addresses comprise far few- er words and the observations we make are consequent- ly tempered. Nevertheless, we do find some resonance between the valence level of SOTU addresses and major historical events. The presidents with the highest average valence scores are Kennedy (6.41), Eisenhower (6.38), and Reagan (6.38), all of whose speeches are tightly clustered around their means. Eisenhower and Kennedy reach a high point after a period of relatively low valence starting with the First World War through and beyond which Wilson's speeches steeply drop from an initial 6.58 in 1913 to 5.88 in 1920. The mean valence of Coolidge's addresses provide the single exception during this time. Coolidge's successor Hoover's low average is largely due to his speech in 1930, the first one given after the stock market crash of October 29, 1929-Black Tuesday- which marked the beginning of the Great Depression; his speeches are burdened with 'depression', 'debt', 'crisis', and 'failure.' While Franklin Roosevelt's overall aver- age valence is low, the first eight of his four term stay in office range from 6.06 to 6.34. His last four speeches, coming during the Second World War (1942–1945), are sharply lower in valence, ranging from 5.48 to 5.60; 'war' naturally dominates these later speeches and along with 'fight' and 'destroy', overwhelm the positives of 'peace' and 'victory.' The large-scale pattern of the 19th Century shows two periods of relatively high valence, 1820–1840 and 1880– 1890. The years before and during the American Civil War form a local minimum in valence corresponding to Buchanan and Lincoln. The recent era shows a drop from Eisenhower and Kennedy's level to that of Johnson (6.08), the latter's first SOTU speech coming just seven weeks after the assassination of Kennedy, and the remainder through the heightening Vietnam War. Valence rises through the 1970's to reach the high of Reagan in the 1980's, from which it has since declined. IV. CONCLUDING REMARKS Undoubtedly, the online recording of social interactions and personal experiences will continue to grow, provid- ing ever richer data sets and the consequent opportunity and need for a wide range of scientific investigations. A natural extension of our work here would be to examine the dynamics of emotions in online interactive contexts, particularly in the realm of contagion [37, 38]. If emo- tional contagion is observable, we would then be in a position to characterize its nature on the spectrum from analogous to an infectious disease [39] to the more com- plex threshold-based contagion [40, 41]. Our technique could also be useful in testing predictive theories of social interactions such as Heise's affect control theory [42] and Burke's identity control theory [43]. While we have been able to make and support a range of observations with our method for measuring the emo- tional content of large-scale texts, our approach can be improved in a number of ways. A first step would be to perform experiments and surveys to gather emotion- al content estimates for a more extensive set of indi- vidual words. The instrumental lens can also be made more sophisticated by coupling word assessments with detailed demographics of participants. Other approach- es not necessarily based on semantic differentials in the manner of the ANEW study could also be naturally explored. Game-based experiments could also be used to assess the emotional content of common word groups and phrases [23], allowing us to better characterize the micro-macro connection between the atoms of words and sentences, and differences in interpretations among vari- ous age groups and cultures. 1790181018301850187018901910193019501970199020105.55.65.75.85.966.16.26.36.46.5George WashingtonJohn AdamsThomas JeffersonJames MadisonJames MonroeJohn Quincy AdamsAndrew JacksonMartin van BurenJohn TylerJames K. PolkZacharyTaylorMillard FillmoreFranklin PierceJames BuchananAbraham LincolnAndrew JohnsonUlysses S. GrantRutherford B. HayesChester A. ArthurBenjaminHarrisonGrover ClevelandWilliam McKinleyTheodore RooseveltWilliam Howard TaftWoodrow WilsonWarren G. HardingCalvin CoolidgeHerbert HooverFranklin D. RooseveltHarry S. TrumanDwight D. EisenhowerJohn F. KennedyLyndon B. JohnsonRichard NixonGerald R. FordJimmy CarterRonald ReaganGeorge BushWilliam J. ClintonGeorge W. Bushyearvalence (v) 12 ACKNOWLEDGMENTS The authors are grateful to Jonathan Harris and Sep Kamvar, the creators of wefeelfine.org; for helpful dis- cussions with John Tucker, Lilian Lee, Andrew G. Reece, Josh Bongard, Mary Lou Zeeman, and Elizabeth Pinel; and for the suggestions of three anonymous reviewers. [1] R. Layard, Happiness (The Penguin Press, London, [22] E. Diener and R. A. Emmons, Journal of Personality and 2005). [2] D. Gilbert, Stumbling on Happiness (Knopf, New York, 2006). [3] M. Argyle, The Psychology of Happiness, Second ed., psy- chology (Routledge, New York, 2001). [4] C. R. Snyder and S. J. Lopez, Positive Psychology, 2nd ed., psychology (Oxford University Press, New York, NY, 2009). [5] S. Lyubomirsky, The How of Happiness (The Penguin Press, New York, 2007). Social Psychology 47, 1105 (1984). [23] L. von Ahn, IEEE Computer Magazine , 96 (2006). [24] E. Riloff and J. Wiebe, Conference on Empirical Meth- ods in Natural Language Processing (EMNLP-03), ACL SIGDAT , 105 (2003). [25] L. Lee, in Computer Science: Reflections on the Field, Reflections from the Field, edited by C. on the Funda- mentals of Computer Science: Challenges, C. S. Oppor- tunities, and N. R. C. Telecommunications Board (The National Academies Press, 2004) pp. 111–118. [6] W. T. Jones, The Classical Mind, philosophy (Harcourt, [26] M. A. Cohn, M. R. Mehl, and J. W. Pennebaker, Psy- Brace, Jovanovich, New York, 1970). chological Science 15, 687 (2004). [7] B. Russell, A History of Western Philosophy (Allen & Unwin, London, 1961). [8] C. Osgood, G. Suci, and P. Tannenbaum, The Mea- surement of Meaning (University of Illinois, Urbana, IL, 1957). [9] M. Csikszentmihalyi, R. Larson, and S. Prescott, Journal of Youth and Adolescence 6, 281 (1977). [10] M. Csikszentmihalyi, Flow, psychology (Harper & Row, New York, 1990). [11] D. Kahneman, A. B. Krueger, D. A. Schkade, N. Schwarz, and A. A. Stone, Science 306, 1776 (2004). [12] T. Conner Christensen, L. Feldman Barrett, E. Bliss- Moreau, K. Lebo, and C. Kaschub, Journal of Happiness Studies 4, 53 (2003). [13] P. D. Killworth and H. R. Bernard, Human Organization 35, 269 (1976). [14] C. Martinelli and S. W. Parker, Journal of the European Economic Association 7, 886 (2009). [15] F. Y. Edgeworth, Mathematical Physics: An Essay into the Application of Mathematics to Moral Sciences (Kegan Paul, London, UK, 1881). [16] G. Mishne and M. de Rijke, AAAI 2006 Spring Sym- posium on Computational Approaches to Analysing Weblogs (2005). [17] I. H. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques, 2nd ed., com- puting (Morgan Kaufmann, San Francisco, CA, 2005). [18] P.-N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining, computing (Addison Wesley, Boston, MA, 2005). [19] M. M. Bradley and P. J. Lang, Affective norms for English words (ANEW): Stimuli, instruction manual and affective ratings, Technical report C-1 (University of Florida, Gainesville, FL, 1999). [20] A. Mehrabian and J. A. Russell, An approach to environ- mental psychology (MIT Press, Cambirdge, MA, 1974). and M. R. Banaji, Behavior Research Methods, Instruments & Computers 18, 299 (1986). [21] F. S. Bellezza, A. G. Greenwald, [27] J. Schler, M. Koppel, S. Argamon, and J. Pennebak- er, in Computational Approaches to Analyzing Weblogs: Papers from the 2006 AAAI Spring Symposium (AAAI Press, Menlo Park, CA, 2006) pp. 199–205. [28] G. K. Zipf, Human Behaviour and the Principle of Least-Effort, patterns (Addison-Wesley, Cambridge, MA, 1949). [29] J. Harris and S. Kamvar, We Feel Fine: An Almanac of Human Emotion, psychology (Scribner, New York, NY, 2009). [30] A. Lenhart and S. Fox, Bloggers: A portrait of the Inter- net's new storytellers, Tech. Rep. (Pew Internet & Amer- ican Life Project, 2006) accessed August 1, 2011. [31] R. A. Easterlin, The Economic Journal 111, 465 (2001). [32] R. A. Easterlin, Proc. Natl. Acad. Sci. 100, 11176 (2003). [33] B. Stevenson and J. Wolfers, "Economic growth and sub- jective well-being: Reasssessing the Easterlin Paradox," (2008), brookings Papers on Economic Activity. [34] R. Easterlin, in Nations and Households in Economic Growth: Essays in Honour of Moses Abramowitz, edit- ed by P. A. David and M. W. Reder (Academic Press, New York and London, 1974) pp. 89–125. [35] N. E. Rosenthal, D. A. Sack, J. C. Gillin, A. J. Lewy, F. K. Goodwin, Y. Davenport, P. S. Mueller, D. A. New- some, and T. A. Wehr, Arch Gen Psychiatry 41, 72 (1984). [36] A. A. Stone, S. Hedges, J. M. Neale, and M. S. Satin, Journal of Personality and Social Psychology 49, 129 (1984). [37] E. Hatfield, J. T. Cacioppo, and R. L. Rapson, Emotion- al Contagion, sociology, Studies in Emotion and Social Interaction (Cambridge University Press, Cambridge, UK, 1993). [38] J. H. Fowler and N. A. Christakis, BMJ 337, article #2338 (2008). [39] J. D. Murray, Mathematical Biology, Third ed., contagion (Springer, New York, 2002). [40] M. Granovetter, Am. J. Sociol. 83, 1420 (1978). [41] P. S. Dodds and D. J. Watts, Phys. Rev. Lett. 92, 218701 (2004). [42] D. R. Heise, Understanding Events: Affect and the Con- struction of Social Action, psychology (Cambridge Uni- versity Press, New York, 1979). [43] J. E. Stets and T. M. Tsushima, Social Psychology Quar- terly 64, 283 (2001). 13
1308.3388
1
1308
2013-08-15T13:32:38
Models of on-line social networks
[ "cs.SI", "physics.soc-ph" ]
We present a deterministic model for on-line social networks (OSNs) based on transitivity and local knowledge in social interactions. In the Iterated Local Transitivity (ILT) model, at each time-step and for every existing node $x$, a new node appears which joins to the closed neighbour set of $x.$ The ILT model provably satisfies a number of both local and global properties that were observed in OSNs and other real-world complex networks, such as a densification power law, decreasing average distance, and higher clustering than in random graphs with the same average degree. Experimental studies of social networks demonstrate poor expansion properties as a consequence of the existence of communities with low number of inter-community edges. Bounds on the spectral gap for both the adjacency and normalized Laplacian matrices are proved for graphs arising from the ILT model, indicating such bad expansion properties. The cop and domination number are shown to remain the same as the graph from the initial time-step $G_0$, and the automorphism group of $G_0$ is a subgroup of the automorphism group of graphs generated at all later time-steps. A randomized version of the ILT model is presented, which exhibits a tuneable densification power law exponent, and maintains several properties of the deterministic model.
cs.SI
cs
MODELS OF ON-LINE SOCIAL NETWORKS ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG Abstract. We present a deterministic model for on-line social networks (OSNs) based on transitivity and local knowledge in social interactions. In the Iterated Local Transitivity (ILT) model, at each time-step and for every existing node x, a new node appears which joins to the closed neighbour set of x. The ILT model provably satisfies a number of both local and global properties that were observed in OSNs and other real-world complex networks, such as a densification power law, decreasing average distance, and higher clustering than in random graphs with the same average degree. Experimental studies of social networks demonstrate poor expansion properties as a consequence of the existence of communities with low number of inter-community edges. Bounds on the spectral gap for both the adjacency and normalized Laplacian matrices are proved for graphs arising from the ILT model, indicating such bad expan- sion properties. The cop and domination number are shown to remain the same as the graph from the initial time-step G0, and the automorphism group of G0 is a subgroup of the automorphism group of graphs generated at all later time-steps. A randomized version of the ILT model is presented, which exhibits a tuneable densification power law exponent, and maintains several properties of the deterministic model. 1. Introduction On-line social networks (OSNs) such as Facebook, MySpace, Twitter, and Flickr have become increasingly popular in recent years. In OSNs, nodes represent people on-line, and edges correspond to a friendship relation between them. In these complex real-world networks with sometimes millions of nodes and edges, new nodes and edges dynamically appear over time. Parallel with their popularity among the general pub- lic is an increasing interest in the mathematical and general scientific community on the properties of on-line social networks, in both gathering data and statistics about the networks, and finding models simulating their evolution. Data about social inter- actions in on-line networks is more readily accessible and measurable than in off-line social networks, which suggests a need for rigorous models capturing their evolutionary properties. The small world property of social networks, introduced by Watts and Strogatz [37], is a central notion in the study of complex networks, and has roots in the work of Milgram [31] on short paths of friends connecting strangers. The small world property 1991 Mathematics Subject Classification. 05C75, 68R10, 91D30. Key words and phrases. complex networks, on-line social networks, transitivity, densification power law, average distance, clustering coefficient, spectral gap, bad expansion, normalized Laplacian. The authors gratefully acknowledge support from NSERC and MITACS. 1 2 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG posits low average distance (or diameter) and high clustering, and has been observed in a wide variety of complex networks. An increasing number of studies have focused on the small world and other complex network properties in OSNs. Adamic et al. [1] provided an early study of an on-line social network at Stanford University, and found that the network has the small world property. Correlation between friendship and geographic location was found by Liben- Nowell et al. [30] using data from LiveJournal. Kumar et al. [27] studied the evolution of the on-line networks Flickr and Yahoo!360. They found (among other things) that the average distance between users actually decreases over time, and that these net- works exhibit power-law degree distributions. Golder et al. [23] analyzed the Facebook network by studying the messaging pattern between friends with a sample of 4.2 million users. They also found a power law degree distribution and the small world property. Similar results were found in [2] which studied Cyworld, MySpace, and Orkut, and in [32] which examined data collected from four on-line social networks: Flickr, YouTube, LiveJournal, and Orkut. Power laws for both the in- and out-degree distributions, low diameter, and high clustering coefficient were reported in the Twitter friendship graph by Java et al. [24]. In [25], geographic growth patterns and distinct classes of users were investigated in Twitter. For further background on complex networks and their models, see the books [6, 9, 12, 15]. Recent work by Leskovec et al. [28] underscores the importance of two additional properties of complex networks above and beyond more traditionally studied phenom- ena such as the small world property. A graph G with et edges and nt nodes satisfies a densification power law if there is a constant a ∈ (1, 2) such that et is proportional to na t . In particular, the average degree grows to infinity with the order of the network (in contrast to say the preferential attachment model, which generates graphs with constant average degree). In [28], densification power laws were reported in several real-world networks such as a physics citation graph and the internet graph at the level of autonomous systems. Another striking property found in such networks (and also in on-line social networks; see [27]) is that distances in the networks (measured by either diameter or average distance) decreases with time. The usual models such as preferen- tial attachment or copying models have logarithmically or sublogarithmically growing diameters and average distances with time. Various models (such as the Forest Fire [28] and Kronecker multiplication [29] models) were proposed simulating power law degree distribution, densification power laws, and decreasing distances. We present a new model, called Iterated Local Transitivity (ILT), for OSNs and other complex networks which dynamically simulates many of their properties. The present article is the full version of the proceedings paper [8]. Although modelling has been done extensively for other complex networks such as the web graph (see [6]), models of OSNs have only recently been introduced (such as those in [14, 27, 30]). The central idea behind the ILT model is what sociologists call transitivity: if u is a friend of v, and v is a friend of w, then u is a friend of w (see, for example, [18, 36, 38]). In its simplest form, transitivity gives rise to the notion of cloning, where u is joined to all of the neighbours of v. In the ILT model, given some initial graph as a starting point, nodes are repeatedly added over time which clone each node, so that the new nodes MODELS OF ON-LINE SOCIAL NETWORKS 3 form an independent set. The ILT model not only incorporates transitivity, but uses only local knowledge in its evolution, in that a new node only joins to neighbours of an existing node. Local knowledge is an important feature of social and complex networks, where nodes have only limited influence on the network topology. We stress that our approach is mathematical rather than empirical; indeed, the ILT model (apart from its potential use by computer and social scientists as a simplified model for OSNs) should be of theoretical interest in its own right. Variants of cloning were considered earlier in duplication models for protein-protein interactions [4, 5, 11, 35], and in copying models for the web graph [7, 26]. There are several differences between the duplication and copying models and the ILT model. For one, duplication models are difficult to analyze due to their rich dependence struc- ture. While the ILT model displays a dependency structure, determinism makes it more amenable to analysis. The ILT model may be viewed as simplified snapshot of the duplication model, where all nodes are cloned in a given time-step, rather than du- plicating nodes one-by-one over time. Cloning all nodes at each time-step as in the ILT model leads to densification and high clustering, along with bad expansion properties (as we describe in Subsection 1.2). We finish the introduction with some asymptotic notation. Let f and g be functions whose domain is some fixed subset of R. We write f ∈ O(g) if f (t) g(t) lim sup t→∞ exists and is finite. We will abuse notation and write f = O(g). We write f = Ω(g) if = 0, then f = o(g) f (t) g = O(f ), and f = Θ(g) if f = O(g) and f = Ω(g). If limt→∞(cid:12)(cid:12)(cid:12) (or g = ω(f )). So if f = o(1), then f tends to 0. g(t)(cid:12)(cid:12)(cid:12) 1.1. The ILT Model. We now give a precise formulation of the model. The ILT model generates finite, simple, undirected graphs (Gt : t ≥ 0). Time-step t, for t ≥ 1, is defined to be the transition between Gt−1 and Gt. (Note that a directed graph model will be considered in the sequel. See also Section 3.) The only parameter of the model is the initial graph G0, which is any fixed finite connected graph. Assume that for a fixed t ≥ 0, the graph Gt has been constructed. To form Gt+1, for each node x ∈ V (Gt), add its clone x′, such that x′ is joined to x and all of its neighbours at time t. Note that the set of new nodes at time t + 1 form an independent set of cardinality V (Gt). See Figure 1 for the graphs generated from the 4-cycle over the time-steps t = 1, 2, 3, and 4. We write degt(x) for the degree of a node at time t, nt for the order of Gt, and et for its number of edges. It is straightforward to see that nt = 2tn0. Given a node x at time t, let x′ be its clone. The elementary but important recurrences governing the degrees of nodes are given as degt+1(x) = 2 degt(x) + 1, degt+1(x′) = degt(x) + 1. (1.1) (1.2) 4 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG Figure 1. The evolution of the ILT model with G0 = C4, for t = 1, 2, 3, 4. 1.2. Main Results. We state our main results on the ILT model, with proofs deferred to the next section. We give rigorous proofs that the ILT model generates graphs satisfying a densification power law and in many cases decreasing average distance (properties shared by the Forest Fire [28] and Kronecker multiplication [29] models). A randomized version of the ILT model is introduced with tuneable densification power law exponent. Properties of the ILT model not shown in the models of [28, 29] are higher clustering than in random graphs with the same average degree, and smaller spectral gaps for both their normalized Laplacian and adjacency matrices than in ran- dom graphs. Further, the cop and domination numbers are shown to remain the same as the graph from the initial graph G0, and the automorphism group of G0 is a subgroup of the automorphism group of graphs generated at all later times. The ILT model does not, however (unlike the models of [28, 29]) generate graphs with a power law degree distribution. The number of nodes in the ILT model grows exponentially with time (as in the Kronecker multiplication model, but unlike in the Forest Fire model). MODELS OF ON-LINE SOCIAL NETWORKS 5 We first demonstrate that the model exhibits a densification power law. Define the volume of Gt by degt(x) = 2et. Theorem 1.1. For t > 0, the average degree of Gt equals vol(Gt) = Xx∈V (Gt) 2(cid:19)t(cid:18)vol(G0) (cid:18)3 n0 + 2(cid:19) − 2. Note that Theorem 1.1 supplies a densification power law with exponent a = log 3 log 2 ≈ 1.58. We think that the densification power law makes the ILT model realistic, especially in light of real-world data mined from complex networks (see [28]). We study the average distances and clustering coefficient of the model as time tends to infinity. Define the Wiener index of Gt as W (Gt) = d(x, y). 1 2 Xx,y∈V (Gt) The Wiener index may be used to define the average distance of Gt as We will compute the average distance by deriving first the Wiener index. Define the ultimate average distance of G0, as L(Gt) = W (Gt) . (cid:0)nt 2(cid:1) UL(G0) = lim t→∞ L(Gt) assuming the limit exists. Note that the ultimate average distance is a new graph parameter. We provide an exact value for L(Gt) and compute the ultimate average distance for any initial graph G0. Theorem 1.2. (1) For t > 0, W (Gt) = 4t W (G0) + (e0 + n0) 1 −(cid:18)3 4(cid:19)t!! . (2) For t > 0, L(Gt) = (3) For all graphs G0, 4t(cid:16)W (G0) + (e0 + n0)(cid:16)1 −(cid:0) 3 4tn2 4(cid:1)t(cid:17)(cid:17) 0 − 2tn0 . UL(G0) = W (G0) + e0 + n0 n2 0 . Further, UL(G0) ≤ L(G0) if and only if W (G0) ≥ (n0 − 1)(e0 + n0). 6 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG Note that the average distance of Gt is bounded above by diam(G0) + 1 (in fact, by diam(G0) in all cases except cliques). Further, the condition in (3) for UL(G0) < L(G0) holds for large cycles and paths. Hence, for many initial graphs G0, the average distance decreases, a property observed in OSNs and other complex networks (see [27, 28]). Let Nt(x) be the neighbour set of x at time t, let Gt ↾ Nt(x) be the subgraph induced by Nt(x) in Gt, and let e(x, t) be the number of edges in Gt ↾ Nt(x). For a node x ∈ V (Gt) with degree at least 2 define ct(x) = . e(x, t) 2 (cid:0)degt(x) (cid:1) C(Gt) = Px∈V (Gt) ct(x) nt . By convention ct(x) = 0 if the degree of x is at most 1. The clustering coefficient of Gt is The clustering coefficient of the graph at time t generated by the ILT model is estimated and shown to tend to 0 slower than a G(n, p) random graph with the same average degree. Theorem 1.3. Ω (cid:18) 7 8(cid:19)t t−2! = C(Gt) = O (cid:18)7 8(cid:19)t t2! . Observe that C(Gt) tends to 0 as t → ∞. If we let nt = n (so t ∼ log2 n), then this gives that C(Gt) = nlog2(7/8)+o(1). In contrast, for a random graph G(n, p) with comparable average degree pn = Θ((3/2)log2 n) = Θ(nlog2(3/2)) as Gt, the clustering coefficient is p = Θ(nlog2(3/4)) which tends to zero much faster than C(Gt). (For a discussion of the clustering coefficient of G(n, p), see Chapter 2 of [6].) Social networks often organize into separate clusters in which the intra-cluster links are significantly higher than the number of inter-cluster links. In particular, social net- works contain communities (characteristic of social organization), where tightly knit groups correspond to the clusters [21]. As a result, social networks possess bad expan- sion properties realized by small gaps between their first and second eigenvalues [17]. We find that the ILT model has bad expansion properties as indicated by the spectral gap of both its normalized Laplacian and adjacency matrices. For regular graphs, the eigenvalues of the adjacency matrix are related to several important graph properties, such as in the expander mixing lemma. The normalized Laplacian of a graph, introduced by Chung [10], relates to important graph properties even in the case where the underlying graph is not regular (as is the case in the ILT model). Let A denote the adjacency matrix and D denote the diagonal adjacency matrix of a graph G. Then the normalized Laplacian of G is L = I − D−1/2AD−1/2. MODELS OF ON-LINE SOCIAL NETWORKS 7 Let 0 = λ0 ≤ λ1 · · · ≤ λn−1 ≤ 2 denote the eigenvalues of L. The spectral gap of the normalized Laplacian is λ = max{λ1 − 1,λn−1 − 1}. , where d is the average degree. Chung, Lu, and Vu [13] observe that, for random power law graphs with some parame- ters (effectively in the case that dmin = c log2 n for some constant c > 0 and all integers n > 0), that λ ≤ (1 + o(1)) 4√d For the graphs Gt generated by the ILT model, we observe that the spectra behaves quite differently and, in fact, the spectral gap has a constant order. The following theorem suggests a significant spectral difference between graphs generated by the ILT model and random graphs. Define λ(Gt) to be the spectral gap of the normalized Laplacian of Gt. Theorem 1.4. For t ≥ 1, λ(Gt) > 1 2 . Theorem 1.4 represents a drastic departure from the good expansion found in random graphs, where λ = o(1) [10, 13, 19], and from the preferential attachment model [22]. If G0 has bad expansion properties, and has λ1 < 1/2 (and thus, λ > 1/2) then, in fact, this trend of bad expansion continues as shown by the following theorem. Theorem 1.5. Suppose G0 has at least two nodes, and for t > 0 let λ1(t) be the second eigenvalue of Gt. Then we have that λ1(t) < λ1(0). Note that Theorem 1.5 implies that λ1(1) < λ1(0) and this implies that the sequence {λ1(t) : t ≥ 0} is strictly decreasing. This follows since Gt is constructed from Gt−1 in the same manner as G1 is constructed from G0. If G0 is K1, then there is no second eigenvalue, but G1 is K2. Hence, in this case, the theorem implies that {λ1(t) : t ≥ 1} is strictly decreasing. Let ρ0(t) ≥ ρ1(t) ≥ . . . denote the eigenvalues of the adjacency matrix Gt. If A is the adjacency matrix of Gt, then the adjacency matrix of Gt+1 is M =(cid:18) A A + I A + I 0 (cid:19) , where I is the identity matrix of order nt. We note the following recurrence for the eigenvalues of the adjacency matrix of Gt. Theorem 1.6. If ρ is an eigenvalue of the adjacency matrix of Gt, then are eigenvalues of the adjacency matrix of Gt+1. ρ ±pρ2 + 4(ρ + 1)2 2 , We leave the reader to check that the eigenvectors of Gt can be written in terms of the eigenvectors of Gt−1. As in the Laplacian case, we show that there is a small spectral gap of the adjacency matrix. 8 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG Theorem 1.7. Let ρ0(t) ≥ ρ1(t) ≥ · · · ≥ ρn(t) denote the eigenvalues of the adja- cency matrix of Gt. Then ρ0(t) ρ1(t) = Θ(1). That is, ρ1(t) ≥ cρ0(t) for some constant c > 0. Theorem 1.7 is in contrast to the fact that in G(n, p) random graphs, ρ1 = o(ρ0) (see [10]). In a graph G, a set S of nodes is a dominating set if every node not in S has a neighbour in S. The domination number of G, written γ(G), is the minimum cardinality of a dominating set in G. We use S to represent a dominating set in G, where each node not in S is joined to some node of S. A graph parameter bounded below by the domination number is the so-called cop (or search) number of a graph. In Cops and Robbers, there are two players, a set of s cops (or searchers) C, where s > 0 is a fixed integer, and the robber R. The cops begin the game by occupying a set of s nodes of a simple, undirected, and finite graph G. While the game may be played on a disconnected graph, without loss of generality, assume that G is connected (since the game is played independently on each component and the number of cops required is the sum over all components). The cops and robber move in rounds indexed by non-negative integers. Each round consists of a cop's move followed by a robber's move. More than one cop is allowed to occupy a node, and the players may pass; that is, remain on their current nodes. A move in a given round for a cop or the robber consists of a pass or moving to an adjacent node; each cop may move or pass in a round. The players know each others current locations; that is, the game is played with perfect information. The cops win and the game ends if at least one of the cops can eventually occupy the same node as the robber; otherwise, R wins. As placing a cop on each node guarantees that the cops win, we may define the cop number, written c(G), which is the minimum cardinality of the set of cops needed to win on G. While this node pursuit game played with one cop was introduced in [33, 34], the cop number was first introduced in [3]. For a survey of results on Cops and Robbers, see [20]. We prove that the domination and cop numbers of Gt depend only on the initial graph G0. Theorem 1.8 shows that even as the graph becomes large as t progresses, the same number of nodes needed at time 0 to dominate the graph will be needed at time t. Theorem 1.8. For all t ≥ 0, γ(Gt) = γ(G0), and c(Gt) = c(G0). In Theorem 1.8, we prove that the cop number remains the same for Gt. This implies that no matter how large the graph Gt becomes, the robber can be captured by the same number of cops used at time 0. In terms of OSNs, Theorem 1.8 suggests that users in the network can easily spread and track information (such as gossip) no matter how large the graph becomes. An automorphism of a graph G is an isomorphism from G to itself; the set of all automorphisms forms a group under the operation of composition, written Aut(G). MODELS OF ON-LINE SOCIAL NETWORKS 9 We say that an automorphism ft ∈ Aut(Gt) extends to ft+1 ∈ Aut(Gt+1) if ft+1 ↾ V (Gt) = ft; that is, the restriction of the map ft+1 to V (Gt) equals ft. We show that symmetries from t = 0 are preserved at time t. This provides further evidence that the ILT model retains a memory of the initial graph from time 0. Theorem 1.9. For all t ≥ 0, Aut(G0) embeds in Aut(Gt). As shown in Theorem 1.1, the ILT model has a fixed densification exponent equalling log 3/ log 2. We consider a randomized version of the model which allows for this expo- nent to become tuneable. To motivate the model, in OSNs some new users are friends outside of the OSN. Such users immediately seek each other out as they join the OSN and become friends there. The stochastic model ILT(p) is defined as follows. Define H0 to be K1. A sequence (Ht : t ∈ N) of graphs is generated so that for all t, Ht is an induced subgraph of Ht+1. At time t + 1, first clone all the nodes of Ht as in the deterministic ILT model. Let n be the number new nodes are added at time t + 1. (Note that n is a function of t and is not a new parameter.) To form Ht+1, add edges independently between the new nodes with probability p = p(n). Hence, the new nodes form a random graph G(n, p). Several properties of the ILT model are inherited by the ILT(p) model. For example, as we are adding edges to the graphs generated by the ILT model, the average distance may only decrease, and the clustering coefficient may only increase. The following theorem proves that ILT(p) generates graphs following a densification power law with exponent log(3 + δ)/ log 2, where 0 ≤ δ ≤ 1. For T a positive integer representing time, we say that an event holds asymptotically almost surely (a.a.s.) if the probability that it holds tends to 1 as T tends to infinity. Theorem 1.10. Let 0 ≤ δ ≤ 1, and define p(n) = δn log(3+δ) log 2 /n2. Then a.a.s. vol(HT ) = (1 + o(1))(3 + δ)T . (1.3) Hence, by choosing an appropriate p, the densification power law exponent in graphs generated by the ILT(p) model may achieve any value in the interval [log 3/ log 2, 2]. We also prove that for the normalized Laplacian, the ILT(p) model maintains a large spectral gap. Theorem 1.11. A.a.s. λ(HT ) = Ω(1). 2. Proofs of Results This section is devoted to the proofs of the theorems outlined in Section 1. 10 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG 2.1. Proof of Theorem 1.1. We now consider the number of edges and average degree of Gt, and prove the following densification power law for the ILT model. Define the volume of Gt by The proof of Theorem 1.1 follows directly from the following Lemma 2.1, since the vol(Gt) = Xx∈V (Gt) degt(x) = 2et. average degree of Gt is vol(Gt)/nt. Lemma 2.1. For t > 0, In particular, vol(Gt) = 3tvol(G0) + 2n0(3t − 2t). et = 3t(e0 + n0) − nt. Proof. By (1.1) and (1.2) we have that vol(Gt+1) = Xx∈V (Gt) = Xx∈V (Gt) degt+1(x) + Xx′∈V (Gt+1)\V (Gt) (2 degt(x) + 1) + Xx∈V (Gt) = 3vol(Gt) + nt+1. degt+1(x′) (degt(x) + 1) Hence by (2.1) for t > 0, vol(Gt) = 3vol(Gt−1) + nt 3i2t−i! = 3tvol(G0) + n0 t−1 Xi=0 = 3tvol(G0) + 2n0(3t − 2t), where the third equality follows by summing a geometric series. (2.1) (cid:3) 2.2. Proof of Theorem 1.2. When computing distances in the ILT model, the fol- lowing lemma is helpful. Lemma 2.2. Let x and y be nodes in Gt with t > 0. Then dt+1(x′, y) = dt+1(x, y′) = dt+1(x, y) = dt(x, y), and dt+1(x′, y′) =(cid:26) dt(x, y) if xy /∈ E(Gt), dt(x, y) + 1 = 2 if xy ∈ E(Gt). Proof. We prove that dt+1(x, y) = dt(x, y). The proofs of the other equalities are analogous and so omitted. Since in the ILT model we do not delete any edges, the distance cannot increase after a "cloning" step occurs. Hence, dt+1(x, y) ≤ dt(x, y). Now suppose for a contradiction that there is a path P ′ connecting x and y in Gt+1 with length k < dt(x, y). Hence, P ′ contains nodes not in Gt. Choose such a P ′ with the least number of nodes, say s > 0, not in Gt. Let z′ be a node of P ′ not in Gt, and let the neighbours of z′ in P ′ be u and v. Then z ∈ V (Gt) is joined to u and v. Form MODELS OF ON-LINE SOCIAL NETWORKS 11 the path Q′ by replacing z′ by z. But then Q′ has length k and has s − 1 many nodes not in Gt, which supplies a contradiction. (cid:3) We now turn to the proof of Theorem 1.2. We only prove item (1), noting that items (2) and (3) follow from (1) by computation. We derive a recurrence for W (Gt) as follows. To compute W (Gt+1), there are five cases to consider: distances within Gt, and distances of the forms: dt+1(x, y′), dt+1(x′, y), dt+1(x, x′), and dt+1(x′, y′). The first three cases contribute 3W (Gt) by Lemma 2.2. The 4th case contributes nt. The final case contributes W (Gt) + et (the term et comes from the fact that each edge xy contributes dt(x, y) + 1). Thus, Hence, W (Gt+1) = 4W (Gt) + et + nt = 4W (Gt) + 3t(e0 + n0). W (Gt) = 4tW (G0) + t−1 Xi=0 4i(cid:0)3t−1−i(cid:1) (e0 + n0) = 4tW (G0) + 4t(e0 + n0) 1 −(cid:18) 3 4(cid:19)t! . (cid:3) Diameters are constant in the ILT model. We record this as a strong indication of the (ultra) small world property in the model. Lemma 2.3. For all graphs G0 different than a clique, diam(Gt) = diam(G0), and diam(Gt) = diam(G0) + 1 = 2 when G0 is a clique. Proof. This follows directly from Lemma 2.2. (cid:3) 2.3. Proof of Theorem 1.3. We introduce the following dependency structure that will help us classify the degrees of nodes. Given a node x ∈ V (G0) we define its descendant tree at time t, written T (x, t), to be a rooted binary tree with root x, and whose leaves are all of the nodes at time t. To define the (k + 1)th row of T (x, t), let y be a node in the kth row (y corresponds to a node in Gk). Then y has exactly two descendants on row k + 1: y itself and y′. In this way, we may identify the nodes of Gt with a length t binary sequence corresponding to the descendants of x, using the convention that a clone is labelled 1. We refer to such a sequence as the binary sequence for x at time t. We need the following technical lemma. Lemma 2.4. Let S(x, k, t) be the nodes of T (x, t) with exactly k many 0's in their binary sequence at time t. Then for all y ∈ S(x, k, t) 2k(deg0(x) + 1) + t − k − 1 ≤ degt(y) ≤ 2k(deg0(x) + t − k + 1) − 1. 12 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG Proof. The degree degt(y) is minimized when y is identified with the binary sequence beginning with k many 0's: (0, . . . , 0, 1, 1, . . . , 1). In this case, degt(y) = 2(2(. . . (2(2 deg0(x) + 1) + 1) . . . ) + 1) + 1 + (t − k) = 2k(deg0(x) + 1) + t − k − 1. The degree degt(y) is maximized when the sequence with the k many 0's at the end of the sequence: (1, 1, . . . , 1, 0, . . . , 0). Then degt(y) = 2(2(. . . (2(deg0(x) + t − k) + 1) . . . ) + 1) + 1 = 2k(deg0(x) + t − k + 1) − 1. (cid:3) It can be shown (using Lemma 2.4) that the number of nodes of degree at least j at time t, denoted by N(≥j), satisfies t X t Xi=log2 j(cid:18)t i(cid:19) ≤ N(≥j) ≤ i(cid:19). i=max{log2 j−log2 t−O(1),0}(cid:18)t Indeed, when a vertex is identified with the binary sequence with i ≥ log2 k many 0's, then the degree is at least k. We have (cid:0)t i(cid:1) such sequences. On the other hand, if the binary sequence has i ≤ log2 k − log2 t − O(1) many 0's, then the corresponding vertex has degree smaller than k. In particular, N(≥j) = Θ(nt) for j ≤ √nt, and therefore, the degree distribution of Gt does not follow a power law. Since (cid:0)t j(cid:1) nodes have degree around 2j, the degree distribution has "binomial-type" behaviour. As an example of the degree distribution of a graph generated by the ILT model, see Figure 2. Figure 2. A log-log plot of the degree distribution for G25 with G0 = K1. MODELS OF ON-LINE SOCIAL NETWORKS 13 We now prove the following lemma. Recall that e(x, t) is the number of edges in Gt ↾ Nt(x). Lemma 2.5. For all x ∈ V (Gt) with k 0's in their binary sequence, we have that Ω(3k) = e(x, t) = O(3kt2). We note that the constants hidden in Ω(·) and O(·) notations (both in the statement of the lemma and in the proof below) do not depend on k nor t. Proof of Lemma 2.5. For x ∈ V (Gt) we have that Xi=1 e(x, t + 1) = e(x, t) + degt(x) + degt(x) = 3e(x, t) + 2 degt(x). (1 + degGt↾Nt(x)(x)) For x′, we have that e(x′, t + 1) = e(x, t) + degt(x). Since there are k many 0's and e(x, 2) is always positive for all initial graphs G0, e(x, t) ≥ 3k−2e(x, 2) = Ω(3k) and the lower bound follows. For the upper bound, a general binary sequence corresponding to x is of the form (1, . . . , 1, 0, 1, . . . , 1, 0, 1, ..., 1, 0, 1, . . . , 1, 0, 1, . . . , 1) with the 0's in positions ik (1 ≤ i ≤ k). Consider a path in the descendant tree from the root of the tree to node x. By Lemma 2.4, the node on the path in the ith row (i < ij) has (at time i) degree O(2j−1t). Hence, the number of edges we estimate is O(t2) until the (i1 − 1)th row, increases to 3O(t2) + O(21t) in the next row, and increases to 3O(t2) + O(21t2) in the (i2 − 1)th row. By induction, we have that e(x, t) = 3(. . . (3(3O(t2) + O(21t2)) + O(22t2)) . . . ) + O(2kt2) = O(t2)3k = O(3kt2). (cid:3) k 3(cid:19)j Xi=0 (cid:18)2 We now prove our result on clustering coefficients. Proof of Theorem 1.3. For x ∈ V (Gt) with k many 0's in its binary sequence, by Lemmas 2.4 and 2.5 we have that and ct(x) = Ω(cid:18) 3k ct(x) = O(cid:18) 3kt2 (2kt)2(cid:19) = Ω (cid:18)3 4(cid:19)k (2k)2(cid:19) = O (cid:18)3 4(cid:19)k t−2! , t2! . 14 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG Hence, since we have n0(cid:0) t k=0 n0(cid:0)t C(Gt) = Pt k(cid:1) nodes with k many 0's in its binary sequence, k(cid:1)Ω(cid:16)(cid:0) 3 ! = Ω (cid:18) 7 8(cid:19)t 4(cid:1)t = Ω t−2(cid:0)1 + 3 4(cid:1)k t−2(cid:17) n02t 2t t−2! . In a similar fashion, it follows that C(Gt) = Pt k=0 n0(cid:0)t k(cid:1)O(cid:16)(cid:0) 3 n02t 4(cid:1)k t2(cid:17) = O (cid:18)7 8(cid:19)t t2! . (cid:3) 2.4. Proofs of Theorems 1.4, 1.5, 1.6, and 1.7. We present proofs of the spectral properties of the ILT model. For ease of notation, let λ(t) = λ(Gt). Proof of Theorem 1.4. We use the expander mixing lemma for the normalized Laplacian (see [10]). For sets of nodes X and Y we use the notation vol(X) for the volume of the subgraph induced by X, and e(X, Y ) for the number of edges with one end in each of X and Y. Lemma 2.6. For all sets X ⊆ G, e(X, X) − vol(X)vol( ¯X) (vol(X))2 vol(G) ≤ λ . We observe that Gt contains an independent set (that is, a set of nodes with no edges) with volume vol(Gt−1) + nt−1. Let X denote this set, that is, the new nodes added at time t. Then by (2.1) it follows that vol(G) (cid:12)(cid:12)(cid:12)(cid:12) (cid:12)(cid:12)(cid:12)(cid:12) vol( ¯X) = vol(Gt) − vol(X) = 2vol(Gt−1) + nt−1. Since X is independent, Lemma 2.6 implies that λ(t) ≥ vol(X) vol( ¯X) = vol(Gt−1) + nt−1 2vol(Gt−1) + nt−1 > 1 2 . (cid:3) Proof of Theorem 1.5. Before we proceed with the proof of Theorem 1.5, we begin by stating some notation and a lemma. For a given node u ∈ V (Gt), we let u ∈ V (G0) denote the node in G0 that u is a descendant of. Given uv ∈ E(G0), we define and for v ∈ E(G0), we set Auv(t) = {xy ∈ E(Gt) : x = u, y = v}, Av(t) = {xy ∈ E(Gt) : x = y = v}. We use the following lemma, for which the proof of items (1) and (2) follow from Lemma 2.1. The final item contains a standard form of the Raleigh quotient charac- terization of the second eigenvalue; see [10]. Lemma 2.7. (1) For uv ∈ E(G0), Auv(t) = 3t. MODELS OF ON-LINE SOCIAL NETWORKS 15 (2) For v ∈ V (G0), (3) Define Then λ1(t) = Av(t) = 3t − 2t. ¯d = Pv∈V (Gt) f (v) degt(v) vol(Gt) . (f (u) − f (v))2 Puv∈E(Gt) f 2(v) degt(v) − ¯d2vol(Gt) . (2.2) f :V (Gt)→R, inf f6=0 Pv Note that in item (3), ¯d is a function of f. Now let g : V (G0) → R be the harmonic eigenvector for λ1(0) so that and g(v) deg0(v) = 0, Xv∈V (G0) λ1(0) = Puv∈E(G0) Pv∈V (G0) (g(u) − g(v))2 g2(v) deg0(v) . Furthermore, we choose g scaled so that Pv∈V (G0) g2(v) deg0(v) = 1. This is the stan- dard version of the Raleigh quotient for the normalized Laplacian from [10], so such a g exists so long as G0 has at least two eigenvalues, which it does by our assumption that G0 ≇ K1. Our strategy in proving the theorem is to show that lifting g to G1 provides an effective bound on the second eigenvalue of G1 using the form of the Raleigh quotient given in (2.2). Define f : Gt → R by f (x) = g(x). Then note that Xxy∈E(Gt) (f (x) − f (y))2 = Xxy∈E(Gt), x=y (f (x) − f (y))2 + Xxy∈E(Gt) (f (x) − f (y))2 x6=y = Xuv∈E(G0) Xxy∈Auv = 3t Xuv∈E(G0) (g(u) − g(v))2 (g(u) − g(v))2. 16 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG By Lemma 2.7 (1) and (2) it follows that Xx∈V (Gt) x=u g2(u) f 2(x) f 2(x) degt(x) = Xx∈V (Gt) Xxy∈E(Gt) = Xu∈V (G0) Xxy∈E(Gt), g2(u) 1 + 2Au = Xu∈V (G0)  Xvu∈E(G0) Xxy∈Auv  = 3t Xu∈V (G0) g2(u) deg0(u) + 2(3t − 2t) Xu∈V (G0) = 3t + 2(3t − 2t) Xu∈G0 g2(u). g2(u) By Lemma 2.1 and proceeding as above, noting that Pv∈V (G0) g(v) deg0(v) = 0, we have that ¯d2vol(Gt) = = = ≤ vol(Gt) vol(Gt) f (x) degt(x)!2 Px∈V (Gt) g(u)!2 2(3t − 2t) Pu∈V (G0) 3(cid:1)t(cid:17)2 Pu∈V (G0) 4 · 32t(cid:16)1 −(cid:0) 2 3t(cid:16)vol(G0) + 2n0(cid:16)1 −(cid:0) 2 3(cid:1)t(cid:17)2 4 · 3t(cid:16)1 −(cid:0) 2 Pu∈V (G0) 3(cid:1)t(cid:17) ¯D + 2(cid:16)1 −(cid:0) 2 g(u)!2 3(cid:1)t(cid:17)(cid:17) g2(u) , where ¯D is the average degree of G0, and the last inequality follows from the Cauchy- Schwarz inequality. MODELS OF ON-LINE SOCIAL NETWORKS 17 By (2.2) we have that λ1(t) ≤ ≤ = (f (x) − f (y))2 Pxy∈E(Gt) f 2(x) degt(x) + ¯d2vol(Gt) Px∈V (Gt) 3t Puv∈E(G0) (g(u) − g(v))2 3(cid:1)t(cid:17)(cid:16)Pu∈V (G0) g2(u)(cid:17) − 3(cid:1)t(cid:17) Pu∈V (G0) g2(u)!(cid:18)1 − λ1(0) 3t + 2 · 3t(cid:16)1 −(cid:0) 2 1 + 2(cid:16)1 −(cid:0) 2 3)t(cid:17) 2(cid:16)1−( 2 ¯D+2(cid:16)1−( 2 3 )t(cid:17)(cid:19) 4·3t(cid:16)1−( 2 3 )t(cid:17)2 g2(u) Pu∈V (G0 ) 3 )t(cid:17) ¯D+2(cid:16)1−( 2 < λ1(0), where the strict inequality follows from the fact that ¯D ≥ 1 since G0 is connected and G0 ≇ K1. (cid:3) Proof of Theorem 1.6. We denote vectors in bold. We first assume that ρ 6= −1. Hence, ρ+, ρ− 6= 0. Let u be an eigenvector of A = A(Gt) such that Au = ρu. Let β = (ρ+1) , and let ρ Then we have that v =(cid:18) u βu (cid:19) . M v = (cid:18) A A + I A + I 0 (cid:19)(cid:18) u βu (cid:19) (cid:19) . = (cid:18) ρu + (ρ + 1)βu (ρ + 1)u Now βρ = ρ + 1, and so (ρ + 1)u = βρu. The condition is equivalent to ρ solving ρ = ρ + β(ρ + 1) = ρ + (ρ + 1)2 ρ x − ρ − (ρ + 1)2 x = 0. Hence, M v = ρv as desired. Now let ρ = −1. In this case, ρ− = −1. Let v =(cid:18) u 0 (cid:19) , 18 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG where 0 is the appropriately sized zero vector. Thus, A + I M v = (cid:18) A = (cid:18) −u 0 (cid:19) . A + I 0 (cid:19)(cid:18) u 0 (cid:19) Hence, M v = ρ−v as desired. In this case where ρ+ = 0 and ρ = −1, let v =(cid:18) 0 u (cid:19) , and so M v = ρ+v. (cid:3) Proof of Theorem 1.7. Without loss of generality, we assume that G0 is not the trivial graph K1; otherwise, G1 is K2, and we may start from there. Thus, in particular, we can assume ρ0(0) ≥ 1. We first observe that by Theorem 1.6 ρ0(t) ≥ 1 + √5 2 !t ρ0(0). By Theorem 1.6 and by taking a branch of descendants from the largest eigenvalue it follows that ρ1(t) ≥ 2(√5 − 1) (1 + √5)2 1 + √5 2 !t ρ0(0). Hence, to prove the theorem, it suffices to show that ρ0(t) ≤ c 1 + √5 2 !t ρ0(0). Observe that, also by Theorem 1.6 and taking the largest branch of descendants from the largest eigenvalues, ρ0(t) = ρ0(0) 1 +q5 + 8 ρ0(i) + 4 ρ2 0(i) 2 t−1 Yi=0     ≤ ρ0(0) t−1 Yi=0   1 +q5 + 6 2 ρ0(i)   . MODELS OF ON-LINE SOCIAL NETWORKS 19 Thus, 2tρ0(t) (1 + √5)t ≤ ρ0(0) ρ0(i) 6 t−1 t−1 t−1 ≤ ρ0(0) 1 +q5 + 6 Yi=0 1 + √5 √5 Yi=0 1 + 1 + √5 ≤ ρ0(0) exp 6√5 5(1 + √5) 6√5 ≤ ρ0(0) exp 5ρ0(i)! ρ0(i)−1! Xi=0 Xi=0 (cid:18) 2 5(1 + √5)ρ0(0) ρ0(0) ≥ ρ0(t) ≥ ρ1(t) ≥ d 1 + √5 2 !t c 1 + √5 2 !t In all we have proved that for constants c and d that ∞ 1 + √5(cid:19)−i! = ρ0(0)c. ρ0(t). (cid:3) 2.5. Proofs of Theorems 1.8 and 1.9. We give the proofs for the results on the cop number, domination number, and automorphism group of the ILT model. Proof of Theorem 1.8. We prove that for t ≥ 0, γ(Gt+1) = γ(Gt). It then follows that γ(Gt) = γ(G0). When a dominating node x ∈ V (Gt) is cloned, its clone x′ will be dominated by x. The clone y′ of a non-dominating node y ∈ V (Gt) will be joined to a dominating node since y is joined to one. Hence, a dominating set in Gt is a dominating set in Gt+1, and so γ(Gt+1) ≤ γ(Gt). If S′ is a dominating set in Gt+1, then form S by replacing (if necessary) nodes x′ ∈ S′ by nodes x. As S dominates Gt, it follows that γ(Gt) ≤ γ(Gt+1). We next show that c(Gt+1) = c(Gt). Let c = c(Gt). Assume that c cops play in Gt+1 so that whenever R is on x′ ∈ V (Gt+1) \ V (Gt), the cops C play as if he were on x ∈ V (Gt). Either C captures R on x′, or using their winning strategy in Gt, the cops move to x with R on x′. The cops then win in the next round. Hence, c(Gt+1) ≤ c(Gt). If b = c(Gt+1) < c, then we prove that c(Gt) ≤ b, which is a contradiction. Suppose that R and C play in Gt. At the same time this game is played, let the set of b cops C′ play with their winning strategy in Gt+1, under the assumption that R remains in Gt. Each time a cop in C′ moves to a cloned node x′, move the corresponding cop in C to x. As x and x′ are joined and share the exact same neighbours in Gt+1, C may win in Gt with b < c cops. (cid:3) Proof of Theorem 1.9. We first prove the following lemma. Lemma 2.8. Each f0 ∈ Aut(G0), extends to ft ∈ Aut(Gt). 20 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG Proof. Given f0 ∈ Aut(G0), we prove by induction on t ≥ 0 that f0 extends to ft ∈ Aut(Gt). The base case is immediate. Assuming that ft is defined, let ft+1(x) =(ft(x) if x ∈ V (Gt), (ft(y))′ where x = y′ . Let x, y be distinct nodes of V (Gt). It is straightforward to see that ft+1 is a bijection. We show that xy ∈ E(Gt+1) if and only if ft+1(x)ft+1(y) ∈ E(Gt+1). This will prove that ft+1 ∈ Aut(Gt), as ft+1 extends ft. The case for x, y ∈ V (Gt) is immediate as ft ∈ Aut(Gt). Next, we consider the case for x ∈ V (Gt) and y′ ∈ V (Gt+1). Now xy′ ∈ E(Gt+1) if and only if ft+1(x)ft+1(y′) = ft(x)(ft(y))′ ∈ E(Gt+1). Note that x′y′ /∈ E(Gt+1) for all x′, y′ ∈ V (Gt+1)\V (Gt). But ft+1(x′)ft+1(y′) /∈ E(Gt+1) by definition of Gt+1. (cid:3) We now prove that for all t ≥ 0, Aut(Gt) is isomorphic to a subgroup of Aut(Gt+1). The proof of Theorem 1.9 then follows from this fact by induction on t. Define by φ : Aut(Gt) → Aut(Gt+1) φ(f )(x) =(cid:26) f (x) (f (y))′ if x ∈ V (Gt), if x = y′ ∈ V (Gt+1) \ V (Gt). Note that φ(f )(x) is injective, since f 6= g implies that φ(f ) 6= φ(g) by the definition of φ. We prove that for all x ∈ V (Gt+1) and f, g ∈ Aut(Gt), φ(f g)(x) = φ(f )φ(g)(x). If x ∈ V (Gt), then φ(f g)(x) = f g(x) = φ(f )φ(g)(x). If x /∈ V (Gt), then say x = y′, with y ∈ V (Gt). We then have that φ(f g)(x) = (f g(y))′ = (φ(f )φ(g)(y))′ = φ(f )(g(y))′ = φ(f )φ(g)(x). (cid:3) 2.6. Proofs of Theorems 1.10 and 1.11. We give the proofs for the results on the randomized ILT model, ILT(p). Without loss of generality, we assume that 0 < p < 1. Proof of Theorem 1.10. By the definition of the ILT(p) model, we obtain the following conditional expectation: E(vol(Ht+1) vol(Ht)) = 3vol(Ht) + nt+1 + nt(nt − 1)p(nt). At the beginning of the process, we cannot control the random variable vol(Ht); it may be far from its expectation. However, if t is large enough, a number of additional MODELS OF ON-LINE SOCIAL NETWORKS 21 edges added in a random process may be controlled, and vol(Ht) eventually approaches its expected value. Let t0(T ) = 4 log log T log(3 + δ) (2.3) be the time from which we can control the process (note that t0(T ) tends to infinity with T ). Now suppose that vol(Ht0) = (3 + δ)t0(1 + A(t0)). The function A(t0) measures how far vol(Gt0) is from its expectation; we do not give a 3+δ(cid:1)t0 apply (deterministically; explicit formula for this, but the bounds −1 ≤ A(t0) ≤(cid:0) 4 3+δ(cid:1)t0 corresponds to a complete note that −1 corresponds to an empty graph, while (cid:0) 4 graph). We first demonstrate that for any t (where t0(T ) ≤ t ≤ T ) with probability at least (1 − T −2)t vol(Ht) = (1 + o(1))(3 + δ)t 1 +(cid:18) 3 3 + δ(cid:19)t−t0 A(t0)! . (2.4) We prove (2.4) by induction on t. The base case, where t = t0, trivially holds. For the inductive step, assume that (2.4) holds for t0 = t0(T ) ≤ t < T (with probability at least (1 − T −2)t). We want to show that (2.4) holds for t + 1 (with probability at least (1− T −2)t+1). Using (2.3) and (1.3) we have that the expected number of random edges added at time t + 1 (that is, edges added between new nodes) is EX = 2t(2t − 1)p(2t) = (1 − (1/2)t)δ(3 + δ)t ≥ (1 + o(1))δ(3 + δ)t0 ≥ (1 + o(1))δ log4 T. Using the Chernoff bound P(X − EX ≥ εEX) ≤ 2 exp(−ε2EX/3) with ε = 1/ log T, we derive that the number of random edges is not concentrated with probability at most 2 exp(cid:18)− ε2EX 3 (cid:19) ≤ 2 exp(cid:18)− δ log2 T 4 (cid:19) ≤ T −2. vol(Ht+1) = 3vol(Ht) + 2t+1 + (1 + O(log−1 T ))δ(3 + δ)t Thus, with probability at least (1 − T −2)t+1 we have that = (1 + o(1))(3 + δ)t 3 + 3(cid:18) 3 3 + δ(cid:19)t−t0 = (1 + o(1))(3 + δ)t+1 1 +(cid:18) 3 3 + δ(cid:19)t+1−t0 A(t0) + δ! A(t0)! . 22 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG By the bounds on A(t0) it follows that 3 + δ(cid:19)T−t0 (cid:18) 3 A(t0) = exp (−Ω(T ) + O(t0)) = o(1). Therefore, the assertion holds with probability at least (1 + T −2)T = exp((1 + o(1))T −1) = 1 + o(1). (cid:3) Proof of Theorem 1.11. Let and X = V (HT ) \ V (HT−1) ¯X = V (HT ) \ X = V (HT−1). By computation it follows that a.a.s. vol(X) = (1 + o(1))(1 + δ)(3 + δ)T−1, vol( ¯X) = (1 + o(1))2(3 + δ)T−1, vol(HT ) = (1 + o(1))(3 + δ)(3 + δ)T−1, and Thus, by Lemma 2.6 we have that a.a.s. e(X, X) = (1 + o(1))(3 + δ)T−1. λ(T ) ≥ (1 + o(1))3 + δ − (1 + δ)2 2(1 + δ) 2 − δ − δ2 2(1 + δ) = (1 + o(1)) = Ω(1). (cid:3) 3. Conclusion and further work We introduced the ILT model for OSNs and other complex networks, where the network is cloned at each time-step. We proved that the ILT model generates graphs with a densification power law, in many cases decreasing average distance (and in all cases, the average distance and diameter are bounded above by constants independent of time), have higher clustering than random graphs with the same average degree, and have smaller spectral gaps for both their normalized Laplacian and adjacency matrices than in random graphs. The cop and domination number were shown to remain the same as the graph from the initial time-step G0, and the automorphism group of G0 is a subgroup of the automorphism group of graphs generated at all later times. A randomized version of the ILT model was introduced with tuneable densification power law exponent. As we noted after the statement of Lemma 2.4, the ILT model does not generate graphs with a power law degree distribution, and neither does the ILT(p) model. An interesting problem is to design and analyze a randomized version of the ILT model MODELS OF ON-LINE SOCIAL NETWORKS 23 satisfying the properties displayed in the ILT model as well as generating power law graphs. Such a randomized ILT model should with high probability generate power law graphs with topological and spectral properties similar to graphs from the deterministic ILT model. Certain OSNs like Twitter are directed networks, where users may be either friends with other users (represented by undirected edges), or follow them (represented by a directed edge pointing to the follower). Hence, a more accurate model for such networks would be directed, and we will consider a directed version of the ILT model in the sequel. References [1] L.A. Adamic, O. Buyukkokten, E. Adar, A social network caught in the web, First Monday 8 (2003). [2] Y. Ahn, S. Han, H. Kwak, S. Moon, H. Jeong, Analysis of topological characteristics of huge on-line social networking services, In: Proceedings of the 16th International Conference on World Wide Web, 2007. [3] M. Aigner, M. Fromme, A game of cops and robbers, Discrete Applied Mathematics 8 (1984) 1 -- 12. [4] G. Bebek, P. Berenbrink, C. Cooper, T. Friedetzky, J. Nadeau, S.C. Sahinalp, The degree distri- bution of the generalized duplication model, Theoretical Computer Science 369 (2006) 234-249. [5] A. Bhan, D.J. Galas, T.G. Dewey, A duplication growth model of gene expression networks, Bioinformatics 18 (2002) 1486-1493. [6] A. Bonato, A Course on the Web Graph, American Mathematical Society Graduate Studies Series in Mathematics, Providence, Rhode Island, 2008. [7] A. Bonato, J. Janssen, Infinite limits and adjacency properties of a generalized copying model, Internet Mathematics 4 (2009) 199-223. [8] A. Bonato, N. Hadi, P. Horn, P. Pralat, C. Wang, Dynamic models of on-line social networks, In: Proceedings of the 6th Workshop on Algorithms and Models for the Web Graph (WAW'09), 2009. [9] G. Caldarelli, Scale-Free Networks, Oxford University Press, Oxford, 2007. [10] F. Chung, Spectral Graph Theory, American Mathematical Society, Providence, Rhode Island, 1997. [11] F. Chung, L. Lu, T. Dewey, D. Galas, Duplication models for biological networks, Journal of Computational Biology 10 (2003) 677-687. [12] F. Chung, L. Lu, Complex graphs and networks, American Mathematical Society, Providence, Rhode Island, 2006. [13] F. Chung, L. Lu, V. Vu, The spectra of random graph with given expected degrees, Internet Mathematics 1 (2004) 257 -- 275. [14] D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, S. Suri, Feedback effects between similarity and social influence in on-line communities, In: Proceedings of the 14th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, 2008. [15] R. Durrett, Random Graph Dynamics, Cambridge University Press, New York, 2006. [16] H. Ebel, J. Davidsen, S. Bornholdt, Dynamics of social networks, Complexity 8 (2003) 24-27. [17] E. Estrada, Spectral scaling and good expansion properties in complex networks Europhys. Lett. 73 (2006) 649-655. [18] O. Frank, Transitivity in stochastic graphs and digraphs, Journal of Mathematical Sociology 7 (1980) 199-213. [19] Z. Furedi, J. Komlos, The eigenvalues of random symmetric matrices, Combinatorica 1 (1981) 233-241. [20] G. Hahn, Cops, robbers and graphs, Tatra Mountain Mathematical Publications 36 (2007) 163 -- 176. 24 ANTHONY BONATO, NOOR HADI, PAUL HORN, PAWE L PRA LAT, AND CHANGPING WANG [21] M. Girvan, M.E.J. Newman. Community structure in social and biological networks, Proceedings of the National Academy of Sciences 99 (2002) 7821-7826. [22] C. Gkantsidis, M. Mihail, A. Saberi, Throughput and congestion in power-law graphs, In: Pro- ceedings of the 2003 ACM SIGMETRICS International Conference on Measurement Modeling of Computer Systems, 2003. [23] S. Golder, D. Wilkinson, B. Huberman, Rhythms of social interaction: messaging within a massive on-line network, In: 3rd International Conference on Communities and Technologies, 2007. [24] A. Java, X. Song, T. Finin, B. Tseng, Why we twitter: understanding microblogging usage and communities, In: Proceedings of the Joint 9th WEBKDD and 1st SNA-KDD Workshop 2007, 2007. [25] B. Krishnamurthy, P. Gill, M. Arlitt, A few chirps about Twitter, In: Proceedings of The First ACM SIGCOMM Workshop on Online Social Networks, 2008. [26] R. Kumar, P. Raghavan, S. Rajagopalan, D. Sivakumar, A. Tomkins, E. Upfal, Stochastic models for the web graph, In: Proceedings of the 41th IEEE Symposium on Foundations of Computer Science, 2000. [27] R. Kumar, J. Novak, A. Tomkins, Structure and evolution of on-line social networks, In: Pro- ceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006. [28] J. Leskovec, J. Kleinberg, C. Faloutsos, Graphs over time: densification Laws, shrinking diameters and possible explanations, In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005. [29] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, Realistic, mathematically tractable graph generation and evolution, using Kronecker multiplication, In: Proceedings of European Conference on Principles and Practice of Knowledge Discovery in Databases, 2005. [30] D. Liben-Nowell, J. Novak, R. Kumar, P. Raghavan, A. Tomkins, Geographic routing in social networks, Proceedings of the National Academy of Sciences 102 (2005) 11623-11628. [31] S. Milgram, The small world problem, Psychology Today 2 (1967) 60-67. [32] A. Mislove, M. Marcon, K. Gummadi, P. Druschel, B. Bhattacharjee, Measurement and analysis of on-line social networks, In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, 2007. [33] R. Nowakowski, P. Winkler, Vertex-to-vertex pursuit in a graph, Discrete Mathematics 43 (1983) 235 -- 239. [34] A. Quilliot, Jeux et pointes fixes sur les graphes, Ph.D. Dissertation, Universit´e de Paris VI, 1978. [35] R. Pastor-Satorras, E. Smith, R.V. Sole, Evolving protein interaction networks through gene duplication, J. Theor. Biol. 222 (2003) 199-210. [36] J.P. Scott, Social Network Analysis: A Handbook, Sage Publications Ltd, London, 2000. [37] D.J. Watts, S.H. Strogatz, Collective dynamics of 'small-world' networks, Nature 393 (1998) 440-442. [38] H. White, S. Harrison, R. Breiger, Social structure from multiple networks, I: Blockmodels of roles and positions, American Journal of Sociology 81 (1976) 730-780. MODELS OF ON-LINE SOCIAL NETWORKS 25 Department of Mathematics, Ryerson University, Toronto, ON, Canada, M5B 2K3 E-mail address: [email protected] Department of Mathematics, Wilfrid Laurier University, Waterloo, NS, Canada, N2L 3C5 E-mail address: [email protected] Department of Mathematics and Computer Science, Emory University, Atlanta, GA, U.S.A., 30322 E-mail address: [email protected] Department of Mathematics and Statistics, Dalhousie University, Halifax NS, Canada, B3H 3J5 E-mail address: [email protected] Department of Mathematics, Ryerson University, Toronto, ON, Canada, M5B 2K3 E-mail address: [email protected]
1508.03938
1
1508
2015-08-17T06:56:49
Using Bluetooth Low Energy in smartphones to map social networks
[ "cs.SI", "cs.CY" ]
Social networks have an important role in an individual's health, with the propagation of health-related features through a network, and correlations between network structures and symptomatology. Using Bluetooth-enabled smartphones to measure social connectivity is an alternative to traditional paper-based data collection; however studies employing this technology have been restricted to limited sets of homogenous handsets. We investigated the feasibility of using the Bluetooth Low Energy (BLE) protocol, present on users' own smartphones, to measure social connectivity. A custom application was designed for Android and iOS handsets. The app was configured to simultaneously broadcast via BLE and perform periodic discovery scans for other nearby devices. The app was installed on two Android handsets and two iOS handsets, and each combination of devices was tested in the foreground, background and locked states. Connectivity was successfully measured in all test cases, except between two iOS devices when both were in a locked state with their screens off. As smartphones are in a locked state for the majority of a day, this severely limits the ability to measure social connectivity on users' own smartphones. It is not currently feasible to use Bluetooth Low Energy to map social networks, due to the inability of iOS devices to detect another iOS device when both are in a locked state. While the technology was successfully implemented on Android devices, this represents a smaller market share of partially or fully compatible devices.
cs.SI
cs
Using  Bluetooth  Low  Energy  in  smartphones  to  map  social  networks     Samuel  Townsend  a,  Mark  E.  Larsen  a,  Tjeerd  W.  Boonstra  a  and  Helen  Christensen  a   a  Black  Dog  Institute,  University  of  New  South  Wales,  Sydney,  Australia   Email:  [email protected],  [email protected],  [email protected],   [email protected]       Abstract   Social  networks  have  an  important  role  in  an  individual’s  health,  with  the  propagation  of  health-­‐ related  features  through  a  network,  and  correlations  between  network  structures  and   symptomatology.  Using  Bluetooth-­‐enabled  smartphones  to  measure  social  connectivity  is  an   alternative  to  traditional  paper-­‐based  data  collection;  however  studies  employing  this   technology  have  been  restricted  to  limited  sets  of  homogenous  handsets.  We  investigated  the   feasibility  of  using  the  Bluetooth  Low  Energy  (BLE)  protocol,  present  on  users’  own   smartphones,  to  measure  social  connectivity.  A  custom  application  was  designed  for  Android   and  iOS  handsets.  The  app  was  configured  to  simultaneously  broadcast  via  BLE  and  perform   periodic  discovery  scans  for  other  nearby  devices.  The  app  was  installed  on  two  Android   handsets  and  two  iOS  handsets,  and  each  combination  of  devices  was  tested  in  the  foreground,   background  and  locked  states.  Connectivity  was  successfully  measured  in  all  test  cases,  except   between  two  iOS  devices  when  both  were  in  a  locked  state  with  their  screens  off.  As   smartphones  are  in  a  locked  state  for  the  majority  of  a  day,  this  severely  limits  the  ability  to   measure  social  connectivity    on  users’  own  smartphones.  It  is  not  currently  feasible  to  use   Bluetooth  Low  Energy  to  map  social  networks,  due  to  the  inability  of  iOS  devices  to  detect   another  iOS  device  when  both  are  in  a  locked  state.  While  the  technology  was  successfully   implemented  on  Android  devices,  this  represents  a  smaller  market  share  of  partially  or  fully   compatible  devices.     Keywords   smartphone,  social  networks,  mental  health,  mobile  applications       Using  Bluetooth  Low  Energy  in  smartphones  to  map  social  networks   1   Introduction   Social  networks  have  an  important  role  in  an  individual’s  health  and  wellbeing,  and  features   such  as  obesity  (1),  smoking  status  and  happiness  (2)  have  been  shown  to  propagate  through  an   individual’s  network.  The  topology  of  social  networks  has  also  been  shown  to  relate  to  mental   health,  such  as  the  clustering  of  individuals  with  depressive  symptoms  (3)  and  differing  degrees   of  connectivity  (4).  Changes  in  social  connectivity  can  also  be  indicative  of  change  in  mental   health  state  and  significant  events,  such  as  suicidal  behaviour  (5,  6).     Traditional  techniques  for  mapping  social  network  structures  involve  using  name  generators  to   ask  people  to  self-­‐report  their  degree  of  connectivity  with  a  range  of  identified  individuals.   Smartphones  with  Bluetooth  have  been  used  to  accurately  infer  friendship  networks  (7),   indicating  the  potential  for  mobile  apps  to  measure  social  networks  (8).  However,  previous   studies  using  Bluetooth  technology  in  smartphones  have  relied  on  providing  study-­‐specific   handsets,  which  limits  the  scalability  of  such  data  collection  processes.  We  propose  using  users’   own  handsets  as  a  means  of  facilitating  studies  into  social  networks.     Although  Bluetooth  has  been  shown  to  be  a  suitable  technology  for  inferring  social  networks   information,  it  is  not  officially  supported  on  iOS  devices.  The  newer  Bluetooth  Low  Energy  (BLE)   protocol  is,  however,  supported  on  iOS  devices  as  well  as  newer  Android  handsets.  BLE  is  used   in  iBeacon  technology  (9)  to  detect  when  handsets  are  in  proximity  to  a  particular  device,  which   suggests  it  is  a  suitable  platform  for  detecting  other  nearby  users  as  a  basis  for  mapping  social   networks.     Here  we  investigate  the  capabilities  of  BLE  technology  implemented  in  a  custom  application   designed  for  Android  and  iOS  devices.  Implementing  this  technology  on  users’  own  handsets  will   enable  mapping  social  networks  on  much  larger  scale.     Methods   A  custom  application  was  designed  for  both  Android  and  iOS  devices  which  utilises  the   Bluetooth  Low  Energy  protocol  to  determine  the  user’s  social  network.  This  application  was   targeted  at  Android  devices  running  KitKat  (version  4.4)  and  above  (52%  of  Android  devices  as  of   June  2015  (10))  and  Apple  devices  running  iOS  7  and  above  (98%  of  iOS  devices  as  of  June  2015   (11)).   Using  Bluetooth  Low  Energy  in  smartphones  to  map  social  networks   2     The  app  was  configured  to  simultaneously  advertise  the  handset’s  presence  via  BLE,  and  to   perform  a  periodic  discovery  scan  for  other  nearby  devices.  Following  previous  work,  the   handset’s  Media  Access  Control  (MAC)  address  was  initially  used  to  uniquely  identify  each   handset  and  user.  A  MAC  address  is  a  unique  identifier  which  is  used  by  a  device’s  network   interface,  such  as  WiFi  and  Bluetooth  chips  present  in  a  smartphone,  in  order  to  communicate   and  direct  the  flow  of  data  on  a  network  segment.  These  identifiers  are  usually  written  into  the   hardware  itself  by  the  manufacturer,  and  are  generally  guaranteed  to  be  unique  between   devices.     However,  as  of  iOS  8,  these  unique  and  consistent  MAC  addresses  have  been  replaced  by   random,  constantly  changing  addresses.  This  is  a  privacy-­‐maintaining  feature  (12)  to  restrict   passive  tracking  of  user  habits  and  behaviours  by  third  parties  without  consent.  This  feature  is   not  present  in  current  Android  devices,  which  provide  access  to  the  device’s  unique  MAC   address.  To  allow  social  connections  to  be  mapped  in  the  absence  of  a  consistent  MAC  address,   a  custom  BLE  service  was  implemented.  This  allowed  detection  only  by  other  handsets  that   shared  the  pre-­‐defined  service  identifier.  Each  handset  generated  a  unique  identifier  which  was   advertised  as  a  characteristic  within  the  shared  service.  This  identifier  could  then  be  shared  with   other  handsets  with  the  app  installed,  allowing  all  users  to  be  correctly  identified.     To  test  the  ability  to  map  social  networks  using  BLE,  the  custom  app  was  installed  on  a  Samsung   Galaxy  S4  mini,  a  Samsung  Galaxy  S5,  iPhone  5s,  and  an  iPad  mini.  Initial  testing  involved  using   each  handset  in  three  states:  foreground  (when  the  app  is  shown  to  the  user  in  the  foreground,   and  the  screen  is  active),  background  (when  the  app  is  running  in  running  the  background,  the   home  screen  is  active,  and  the  screen  is  on),  and  locked  (when  the  app  is  running  in  the   background,  the  home  screen  is  active,  and  the  screen  is  off).  A  series  of  tests  were  performed   to  determine  if  each  of  the  devices  could  detect  each  other  in  the  three  different  app  states.  For   initial  testing,  only  two  devices  were  used  in  order  to  avoid  the  possibility  of  extra  devices   impacting  on  the  ability  to  correctly  detect  the  other  device.  This  meant  the  testing  of  three   combinations  (Android  to  Android,  Android  to  iOS,  and  iOS  to  iOS),  with  each  pair  being  tested   in  one  of  the  three  states  outlined  above.  For  the  Android  to  iOS  combination,  the  test  was   repeated  with  each  combination  of  device  to  ensure  consistent  results  were  obtained.     Using  Bluetooth  Low  Energy  in  smartphones  to  map  social  networks   3   Results   The  results  of  testing  the  devices  in  the  various  configurations  are  shown  in  Table  1.  Each  device   could  detect  each  other  in  all  configurations,  except  one:  two  iOS  devices  could  not  detect  each   other  when  they  were  both  in  the  locked  state.  This  meant  that  while  the  iOS  users  would  be   able  to  record  their  interactions  with  other  users  with  Android  devices,  they  would  not  detect   an  interaction  with  other  users  with  an  iOS  device  that  is  in  a  locked  state.     Table  1:  Results  of  tests  to  determine  if  handsets  could  detect  each  other.   Device   Android   Configuration   Android   iOS   FG   BG   L   FG   BG   L   FB   Pass   Pass   Pass   Pass   Pass   Pass   BG   Pass   Pass   Pass   Pass   Pass   Pass   L   Pass   Pass   Pass   Pass   Pass   Pass   FG   Pass   Pass   Pass   Pass   Pass   Pass   iOS   BG   Pass   Pass   Pass   Pass   Pass   Pass   L   Pass   Pass   Pass   Pass   Pass   Fail     FB  =  app  in  foreground  state,  BG  =  app  in  background  state,  L  =  app  in  locked  state.  Pass  =   handsets  detected  each  other,  Fail  =  handsets  failed  to  detect  each  other.     While  this  may  seem  to  impact  only  a  small  fraction  of  use  cases,  in  fact  this  is  the  largest  use   case.  A  recent  Nielsen  study  measured  smartphone  usage  at  an  average  of  37  hours  per  month   (13),  equating  to  a  period  of  1hr  and  15  minutes  per  day  for  which  a  user’s  phone  could  be   expected  to  be  unlocked.  Assuming  a  sleep  duration  of  eight  hours  per  day,  during  which  time   no  connectivity  would  be  detected,  this  means  an  iOS  handset  would  be  unable  to  detect  other   locked  iOS  devices  for  92%  of  the  waking  day.  Therefore  the  probability  of  any  two  iOS  devices   failing  to  detect  each  other  during  this  16-­‐hour  period  is  85%.  The  ability  to  detect  devices   during  this  time  is  therefore  critical  for  the  implementation  of  this  technology.     The  reason  for  the  inability  to  detect  locked  iOS  devices  is  not  clear,  but  appears  to  be  related  to   the  operating  system  partially  removing  advertising  data  from  the  BLE  packet  when  the  device  is   in  a  locked  state.  This  is  unlikely  to  be  the  sole  reason,  however,  as  Android  devices  and   unlocked  iOS  devices  can  still  detect  a  locked  iOS  device  broadcasting  this  reduced  packet.   Using  Bluetooth  Low  Energy  in  smartphones  to  map  social  networks   4     Conclusions   Using  Bluetooth  Low  Energy  to  map  social  networks  appears  to  be  unviable  at  this  time,  due  to   inability  of  iOS  devices  to  detect  one  another  when  both  devices  are  in  a  locked  state  with  their   screens  off.  However,  iOS  devices  in  locked  state  advertised  and  scanned  periodically,  as  they   could  still  detect  and  be  detected  by  Android  devices.  While  the  app  functioned  successfully  on   Android  devices,  the  current  market  share  of  handsets  which  are  partially  compatible  (version   4.4  and  above)  has  not  reached  saturation,  with  fewer  being  fully  compatible  (version  5.0  and   above)  with  the  BLE  technology.  Future  updates  of  the  operating  system  may  resolve  the  issue   with  iOS  devices,  during  which  time  the  number  of  compatible  Android  devices  will  increase.     Acknowledgements   This  project  was  supported  by  the  NHMRC  Centre  of  Research  Excellence  in  Suicide  Prevention   APP1042580,  NHMRC  John  Cade  Fellowship  APP1056964  and  the  Young  and  Well  Cooperative   Research  Centre.         Using  Bluetooth  Low  Energy  in  smartphones  to  map  social  networks   5   Van  Orden  KA,  Witte  TK,  Cukrowicz  KC,  Braithwaite  SR,  Selby  EA,  Joiner  TE,  Jr.  The   Larsen  ME,  Cummins  N,  Boonstra  T,  O'Dea  B,  Tighe  J,  Nicholas  J,  et  al.,  editors.  The  use  of   Rosenquist  JN,  Fowler  JH,  Christakis  NA.  Social  network  determinants  of  depression.   Pachucki  MC,  Ozer  EJ,  Barrat  A,  Cattuto  C.  Mental  health  and  social  networks  in  early   Christakis  NA,  Fowler  JH.  The  spread  of  obesity  in  a  large  social  network  over  32  years.  The   Eagle  N,  Pentland  AS,  Lazer  D.  Inferring  friendship  network  structure  by  using  mobile  phone   Fowler  JH,  Christakis  NA.  Dynamic  spread  of  happiness  in  a  large  social  network:  longitudinal   References   1.   New  England  journal  of  medicine.  2007;357(4):370-­‐9.   2.   analysis  over  20  years  in  the  Framingham  Heart  Study.  Bmj.  2008;337:a2338.   3.   Molecular  psychiatry.  2011;16(3):273-­‐81.   4.   adolescence:  a  dynamic  study  of  objectively-­‐measured  social  interaction  behaviors.  Social  science  &   medicine.  2015;125:40-­‐50.   5.   interpersonal  theory  of  suicide.  Psychological  review.  2010;117(2):575-­‐600.   6.   technology  in  suicide  prevention.  Conference  of  the  IEEE  Engineering  in  Medicine  and  Biology   Society;  2015.   7.   data.  Proceedings  of  the  National  Academy  of  Sciences  of  the  United  States  of  America.   2009;106(36):15274-­‐8.   8.   modeling  personal  interactions.  ICMI-­‐MLMI  '09  Workshop  on  Multimodal  Sensor-­‐Based  Systems  and   Mobile  Phones  for  Social  Computing  2009  2009.   9.   https://support.apple.com/en-­‐us/HT202880.   10.   https://developer.android.com/about/dashboards/.   11.   https://developer.apple.com/support/app-­‐store/.   12.   http://www.ieee802.org/PrivRecsg/.   13.   the  globe  2015  [6  July  2015].  Available  from:   http://www.nielsen.com/us/en/insights/news/2014/how-­‐smartphones-­‐are-­‐changing-­‐consumers-­‐ daily-­‐routines-­‐around-­‐the-­‐globe.html.     Apple.  iOS:  Understanding  iBeacon    [6  July  2015].  Available  from:   Google.  Android  Platform  Versions  Dashboard    [6  July  2015].  Available  from:   Apple.  App  Store  Distribution  Support    [6  July  2015].  Available  from:   Chronis  I,  Madan  A,  Pentland  A,  editors.  SocialCircuits:  the  art  of  using  mobile  phones  for   IEEE  802  EC  Privacy  Recommendation  Study  Group    [6  July  2015].  Available  from:   The  Nielsen  Company.  How  smartphones  area  changing  consumers'  daily  routines  around   Using  Bluetooth  Low  Energy  in  smartphones  to  map  social  networks   6  
1201.1512
1
1201
2012-01-06T22:08:32
Community detection and tracking on networks from a data fusion perspective
[ "cs.SI", "math.PR", "physics.soc-ph" ]
Community structure in networks has been investigated from many viewpoints, usually with the same end result: a community detection algorithm of some kind. Recent research offers methods for combining the results of such algorithms into timelines of community evolution. This paper investigates community detection and tracking from the data fusion perspective. We avoid the kind of hard calls made by traditional community detection algorithms in favor of retaining as much uncertainty information as possible. This results in a method for directly estimating the probabilities that pairs of nodes are in the same community. We demonstrate that this method is accurate using the LFR testbed, that it is fast on a number of standard network datasets, and that it is has a variety of uses that complement those of standard, hard-call methods. Retaining uncertainty information allows us to develop a Bayesian filter for tracking communities. We derive equations for the full filter, and marginalize it to produce a potentially practical version. Finally, we discuss closures for the marginalized filter and the work that remains to develop this into a principled, efficient method for tracking time-evolving communities on time-evolving networks.
cs.SI
cs
Community detection and tracking on networks from a data fusion perspective James P. Ferry Metron, Inc. Reston, VA, U.S.A. J. Oren Bumgarner Metron, Inc. Reston, VA, U.S.A. Email: [email protected] Email: [email protected] Abstract - Community structure in networks has been investigated from many view- points, usually with the same end result: a community detection algorithm of some kind. Recent research offers methods for combining the results of such algorithms into timelines of community evolution. This paper investigates community detection and tracking from the data fusion perspective. We avoid the kind of hard calls made by traditional community detection algorithms in favor of retaining as much uncer- tainty information as possible. This results in a method for directly estimating the probabilities that pairs of nodes are in the same community. We demonstrate that this method is accurate using the LFR testbed, that it is fast on a number of standard network datasets, and that it is has a variety of uses that complement those of stan- dard, hard-call methods. Retaining uncertainty information allows us to develop a Bayesian filter for tracking communities. We derive equations for the full filter, and marginalize it to produce a potentially practical version. Finally, we discuss closures for the marginalized filter and the work that remains to develop this into a principled, efficient method for tracking time-evolving communities on time-evolving networks. Keywords: Community detection, community tracking, Bayesian filter, co-membership proba- bility, dynamic stochastic blockmodel. 1 Introduction The science of networks has a large and multidisciplinary literature. Freeman traces the sociological literature on networks from its pre-cursors in the 1800s and earlier, through the sociometry of the 1930s and Milgram's "Small Worlds" experiments in the 1960s, to its current form [29]. Sociologists and statisticians introduced the idea of defining network metrics: simple computations that one can perform on a network, accompanied by argu- ments that explain their significance: e.g., the clustering coefficient and various measures of network centrality [77]. What Lewis calls the "modern period" of network science [50] began in 1998 with the influx of physicists into the field (e.g., Barab´asi and Newman). The physicists brought novel interests and techniques (power laws, Hamiltonians, mean field approximation, etc.), particularly from statistical physics, along with an overarching drive toward universality -- properties of network structure independent of the particular nature of the nodes and links involved [55]. Mathematicians have their own traditions of graph theory [9], and, in particular, random graph theory [37, 10] which emphasizes rigorously for- mulated models and what properties the graphs they produce have (with high probability) in different asymptotic regions of the models' parameter spaces. Finally, computer scientists have developed a wide variety of efficient network algorithms [15], and continue to contribute broadly because ultimately the processing of data into usable results is always accomplished via an algorithm of some kind, and because solid computer science is needed for processing megascale, real-world networks. Each of the above communities brings important, complementary talents to network science. The data fusion community has important perspectives to offer too, due both to the broad range of practical issues that it addresses, and to characteristics of the mathematical techniques it employs [2]. The defining problem of data fusion is to process data into useful knowledge. These data may be of radically different types. One might consider a single data point to be, e.g., the position estimate of a target, a database record containing entries for various fields, an RDF triple in some specified ontology, or a document such as an image, sound, or text file. Data mining deals with similar issues, but focuses on the patterns in and transformations of large data sets, whereas data fusion focuses on distilling effective situational awareness about the real world. A central paradigm in data fusion is the hierarchy of fusion levels needed to transform raw data into high-level knowledge, the most widespread paradigm being the JDL (Joint Directors of Laboratories) hierarchy [69]. In this paradigm, level 0 comprises all the pre-processing that must occur before one can even refer to "objects." In some cases it is clear that a data point corresponds to some single object, but it is unclear which object: this is an entity resolution problem [6]. In other cases, a data point contains information about multiple objects, and determining which information corresponds to which object is a data association problem [53, 25]. Processing speech or images requires solving a segmentation problem to map data to objects [30], and natural language processing involves a further array of specific techniques (Named Entity Recognition, etc.). One benefit of a data-fusion approach to network science is its careful consideration, at level 0, of how to abstract representations from raw data. In the network context, this applies not just to nodes (i.e., objects), but to the links between them. Sometimes one imposes an arbitrary threshold for link formation; sometimes multi-node relationships (i.e., hypergraph edges) are replaced with edges between all nodes involved. Edges can have natural direction, weights, or types (and nodes may have attributes) that are retained or ignored in a graph representation. When data are inappropriately shoehorned into a network format, or important node or link attributes are ignored, then the results derived from that graph representation may be much less powerful than they could be, or even completely misleading. Level-0 data fusion encompasses these pre-processing techniques, drawn from computer science, data mining, and the domains specific to the data being considered. Higher-level fusion (say, JDL levels 3 -- 5) addresses another set of issues important to a complete theory of network science. These issues relate to human knowledge and intent. Just as level-0 fusion has similarities with the computer-science approach to networks, higher-level fusion has some overlap with the sociological approach. Levels 1 and 2, on the other hand, correspond 2 loosely to the more theoretical approaches of mathematics and physics. Level 1 addresses the detection, state estimation, and tracking of individual objects [17]; whereas level 2 broadens the scope to tracking groups of objects [22] and to the general assessment of multiple-object situations [7]. In data fusion, however, the overriding problem is how to achieve cohesion between the various levels [32]. Achieving such cohesion would be a valuable contribution to network science. This paper addresses a specific network problem from the data fusion perspective. Over the past decade, there has been a great deal of work on the community detection problem [28]: discerning how a graph's nodes are organized into "communities." There is no universally accepted definition of community structure: it can correspond to some unobserved, ground- truth organizational structure; it can refer to some attribute that nodes share that drives them to "flock" together [52]; or communities can be defined as sets of nodes more densely connected to each other than to the rest of the graph. Whatever the definition of commu- nity structure, it nearly always results in communities being densely connected subsets of nodes (the Newman -- Leicht algorithm being a notable exception [57]). In practice, studies of community structure in graphs (e.g., [45]) define a community to be, in effect, the output of a community detection algorithm. Weighted and/or directed edges are allowed in some methods, but accounting for more general features on nodes and/or edges is problematic for network research because this information tends to be domain-specific. Community detection is nearly always formulated in terms an algorithm which ingests a network and outputs some indication of its community structure. With a few exceptions, community detection algorithms produce a single, hard-call result. Most often this result is a partition of nodes into non-overlapping communities, but a few algorithms produce overlap- ping communities (e.g., CFinder [60]), and some produce a dendrogram -- i.e., a hierarchy of partitions [66]. The dominant framework for finding the best partition of nodes is to specify some quality function of a partition relative to a graph and seek to maximize it. Methods that maximize modularity [56] (explicitly or implicitly) are among the most numerous and successful today. From a data fusion perspective, however, it is important to assess the uncertainty associ- ated with community detection. Quality functions such as modularity are only motivated by intuition or physical analogy, whereas probability is the language of logical reasoning about uncertainty [38]. The reason principled fusion of disparate data types is possible is that one can posit an underlying model for reality, along with measurement models that specify the statistics of how this reality is distorted in the data. One can then update one's prior distribution on reality to a posterior via Bayesian inference [76]. There are some methods that formulate community detection as an inference problem: a prior distribution over all possible community structures is specified, along with a likeli- hood function for observing a graph given a community structure. Hastings, for example, formulated the community detection problem in terms of a Potts model that defines the Hamiltonian H for a given graph -- partition pair, and then converted this to a probability proportional to e−βH [33]. Minimizing H therefore yields the MAP (Maximum A posteriori Probability) partition for given structural parameters of the Potts model. Hofman and Wig- gins extended this approach by integrating the structural parameters against a prior [34]. In both cases, if all one does with the posterior probability distribution is locate its maximum, then it becomes, in effect, just another quality function (albeit a principled one). On the 3 other hand, the entire posterior distribution is vast, so one cannot simply return the whole thing. The question, then, is what such a probability distribution is good for. Clauset et al. made greater use of the posterior distribution by devising a Monte Carlo method for generating dendrograms, and using it to estimate the probabilities of missing links [12]. Reichardt and Bornholdt employed a similar Monte Carlo method to estimate the pairwise co-membership probabilities p{v,w} between nodes [61, 62], where p{v,w} is defined to be the probability that nodes v and w are in the same community. The set of all p{v,w} is much smaller than the full posterior distribution, and thus provides a useful, if incom- plete, summary of the uncertainty information. It is expensive to compute exactly, however. Therefore we will derive an accurate approximation with which to summarize uncertainty information for community structure more efficiently than Monte Carlo methods. A key benefit of retaining uncertainty information is that it enables principled track- ing [70]. We may track time-varying communities in time-varying graph data by deriving an efficient Bayesian filter for tracking time-varying communities from time-varying graph data. The term "filter" is somewhat strange in this context: the original, signal-processing context of filters (e.g., the Wiener filter [78]) was that of algorithms which filter out noise in order to highlight a desired signal. The Kalman filter changed this framework to one of distinct state and measurement spaces [40]. This was soon generalized to the concept of a Bayesian filter [39]. To develop a Bayesian filter, one constructs (a) an evolution model over a state space that specifies the probability distribution of the state at some future time given its value at the current time, and (b) a measurement model that specifies the probability distri- bution of the current measurement given the current state. Thus, despite the connotations of the word "filter," a Bayesian filter can have quite different state and measurements spaces. To track communities, a model for the co-evolution of graphs and community structure will be constructed, and the measurement model will be that only the graph component of the state is observable. In Section 2 we derive exact inference equations for the posterior probabilities of all possible community structures for a given graph. This result is essentially the same as can be found elsewhere (e.g., [33, 34, 41]), but is included here in order to introduce notation and clarify subsequent material. In Section 3 we derive an approximation of the co-membership probabilities p{v,w} based on using only the most important information from the graph. The p{v,w} matrix provides the uncertainty information that the usual hard-call algorithms lack. In Section 4 we demonstrate that the p{v,w} approximation is accurate and also surprisingly efficient: despite the fact that it provides so much information, it is significantly faster than the current, state-of-the-art community detection algorithm (Infomap [64, 43]). We also demonstrate the uses for this alternative or supplemental form of community detection, which are embodied in the software IGNITE (Inter-Group Network Inference and Tracking Engine). One benefit of maintaining uncertainty information is that it allows principled tracking. In Section 5 we present a continuous-time Markov process model for the time-evolution of both the community structure and the graph. We then derive an exact Bayesian filter for this model. The state space for this model is far too large to use in practice, so in Section 6 we discuss efficient approximations for the exact filter. The community tracking material is less developed than the corresponding detection material: there are several issues that must be resolved to develop accurate, efficient tracking algorithms. However, we believe that the principled uncertainty management of the data fusion approach provides a framework for 4 the development of more reliable, robust community tracking methods. 2 Community Detection: Exact Equations Suppose that out of the space K of all possible networks on n nodes we are given some particular network κ. If we have some notion of a space Φ of all possible "community structures" on these n nodes, then presumably the network κ provides some information about which structures are plausible. One way to formalize this notion is to stipulate a quality function Q : K × Φ → R that assigns a number to every network -- structure pair (κ, φ). It would be natural, for example, to define quality as a sum over all node pairs {v, w} of some metric for how well the network and community structure agree at {v, w}. That is, in the network κ, if {v, w} is a link (or a "strong" link, or a particular kind of link, depending on what we mean by "network"), then it should be rewarded if φ places v and w in the same community (or "nearby" in community space, or in communities consistent with the observed link type, depending on what we mean by "community structure"). Modularity is a popular, successful example of a quality function [56]. Quality functions are easy to work with and can be readily adapted to novel scenarios. However, the price of this flexibility is that unless one is guided by some additional structure or principle, the choice of quality function is essentially ad hoc. In addition, the output of a quality function is a number that provides nothing beyond an ordering of the community structures in Φ. The "quality" itself has little meaning. One way to give quality functions additional meaning is to let them represent an energy. In this case, the quality function may be interpreted as a Hamiltonian. The qualities assigned to various community structures are no longer arbitrary scores in this case: meaningful probabilities can be assigned to community structures can be computed from their energies. The language of statistical physics reflects the dominance of that field in network science [28], but from a fusion standpoint it is more natural to dispense with Hamiltonians and work directly with the probabilities. A probabilistic framework requires models: these necessarily oversimplify real-world phenomena, and one could argue that specifying a model is just as arbitrary as specifying a quality function directly. However, the space of probabilistic models is much more constrained than the space of quality functions, and, more importantly, formulating the problem in terms of a formal probability structure allows for the meaningful management of uncertainty. For this reason, modularity and other quality functions tend to be re-cast in terms of a probability model when possible. For example, the modularity function of Newman and Girven [56] was generalized and re-cast as the Hamiltonian of a Potts model by Reichardt and Bornholdt [62], while Hastings demonstrated that this is essentially equivalent to inference (i.e., the direct manipulation of probability) [33]. A probabilistic framework for this community structure problem involves random vari- ables K for the graph and Φ for the community structure. We require models for the prior probabilities Pr(Φ = φ) for all φ ∈ Φ and for the conditional probability Pr(K = κΦ = φ) for all κ ∈ K and φ ∈ Φ. (We will typically use less formal notation such as Pr(φ) and Pr(κφ) when convenient.) Bayes' theorem then provides the probability Pr(Φ = φK = κ) of the community structure φ given the graph data κ. The models Pr(φ) and Pr(κφ) typically have unknown input parameters (cid:126)µ, so that the probability given by Bayes' theorem could 5 be written Pr(φκ, (cid:126)µ). This must be multiplied by some prior probability Pr((cid:126)µ) over the parameter space and integrated out to truly give Pr(φκ) [34]. A simpler, but non-rigorous, alternative to integrating the input parameters against a prior is to estimate them from the data. This can be accurate when they are strongly determined by the graph data: i.e., when Pr((cid:126)µκ) is tightly peaked. The issue of integrating out input parameters will be addressed in Section 3, but for now we will not include them in the notation. Section 2.1 will derive Pr(κφ) using a stochastic blockmodel [20] with multiple link types for κ. In Section 2.2, this will be simplified to the special case of a planted partition [14] model in which links are only "on" or "off." 2.1 Stochastic blockmodel case Let m denote the number of communities, and r be the number of edge types. The notation [p] will denote the set of integers {1, 2, . . . , p}, and [p]0 denote the zero-indexed set {0, 1, . . . , p− 1}. We will let [n] denote the set of nodes; [m], the set of communities; and [r]0, the set of edge types. Let S{2} denote the set of (unordered) pairs of a set S so that [n]{2} denotes the set of node pairs. It is convenient to consider [n]{2} to be the set of edges: because there are an arbitrary number of edge types r, one of them (type k = 0) can be considered "white" or = n(n − 1)/2 edges, but in sparse graphs most of these are . "off." Thus, all graphs have N the trivial type k = 0. The community structure will be specified by a community assignment φ : [n] → [m], i.e., a function that maps every node v ∈ [n] to a community φ(v) ∈ [m]. The graph will be specified as a function κ : [n]{2} → [r]0, which maps every edge e ∈ [n]{2} to its type κ(e) ∈ [r]0. (This unusual notation κ will be replaced with the more usual G when dealing with the r = 2 case: i.e., when there is only edge type aside from "off.") The stochastic blockmodel H(n, p, Q) is parametrized by the the number of nodes n, the stochastic m-vector p, and a collection Q of stochastic r-vectors qij [41]. Here "stochastic m-vector" simply means a vector of length m whose components are non-negative and sum to one. The vector p comprises the prior probabilities pi of a node belonging to the community i ∈ [m] -- the communities for each node are drawn independently. For 1 ≤ i ≤ j ≤ m, the vector qij comprises the probabilities qij,k of an edge between nodes in communities i and j being of type k -- the types of each edge are drawn independently once the communities of the nodes are given. (For i > j, let qij = qji: i.e., the edges are undirected.) The model H(n, p, Q) defines the random variables Φ and K whose instances are denoted φ and κ, respectively. The derivation of Pr(Φ = φK = κ) proceeds in six steps. Step 1. The probability that a node v belongs to the community φ(v) is, by definition, Step 2. The probability that an instance of Φ is the community assignment φ equals Pr(Φ(v) = φ(v)) = pφ(v). Pr(Φ = φ) = pφ(v) (2.1) (2.2) n(cid:89) v=1 6 because the communities of each node are selected independently. Step 3. For a fixed value φ of Φ, the probability that the edge e = {v, w} has type κ(e) is, by definition, Pr(K(e) = κ(e)Φ = φ) = qφ(v),φ(w),κ(e). (2.3) Step 4. For a fixed value of φ of Φ, the probability that an instance of K is the graph κ equals Pr(K = κΦ = φ) = qφ(e1),φ(e2),κ(e), (2.4) because the types of each edge are selected independently given φ. Step 5. The probability of a specific assignment φ and graph κ equals (cid:89) e∈[n]{2} n(cid:89) (cid:89) e∈[n]{2} Pr(Φ = φ, K = κ) = pφ(v) qφ(e1),φ(e2),κ(e), (2.5) because Pr(φ, κ) = Pr(κφ)Pr(φ). v=1 Step 6. Finally, the posterior probability of Φ = φ for a given graph κ is Pr(Φ = φK = κ) ∝ Pr(Φ = φ, K = κ), (2.6) where the constant of proportionality is 1/Pr(K = κ). 2.2 Planted partition case In many applications one does not have any a priori knowledge about specific communities. In such cases, the community labels [m] are arbitrary: the problem would be unchanged if the communities were labeled according to another permutation of [m]. Thus, if one has a prior distribution over p and Q (as in [34]), then that distribution must be invariant under permutations of [m]. In the case of fixed input parameters p and Q, this translates to p and Q themselves being invariant under permutations. Making this simplification, and considering only r = 2 edge types ("off" (k = 0) and "on" (k = 1)) yields the special case called the planted partition model [14]. In this case, symmetry implies that pi = 1/m for all i ∈ [m], and that qij,1 = pI for i = j and qij,1 = pO for i (cid:54)= j. Here pI denotes the edge probability between nodes in the same community, and pO, the edge probability between nodes in different communities. Thus, the m + m(m + 1)(r − 1)/2 input parameters of H(n, p, Q) reduce to only four to give the planted partition model H(n, m, pI, pO). Having only two edge types suggests using the standard notation G to denote a graph, with E(G) denoting the set of ("on") edges. The symmetry of the community labels implies that Pr(φκ) is invariant under permutations of [m], so that is more efficient to formulate the problem in terms of a partition π of the nodes into communities rather than φ (because 7 partitions are orbits of community assignments under permutations of [m]). We may then replace (2.5) by (m)π mn peI I (1 − pI)eI peO O (1 − pO)eO. Pr(π, G) = (2.7) Here π denotes the number of (non-empty) communities in the partition π, and (m)k denotes the falling factorial m!/(m − k)!, which counts the number of assignments φ represented by the equivalence class π. The number of edges between nodes in the same community is denoted eI(G) (abbreviated to eI in (2.7)), and the number of non-edges (or "off" edges) between nodes in the same community is denoted eI(G). The analogous quantities for nodes in different communities are eO(G) and eO(G). The posterior probability Pr(πG) is proportional to Pr(π, G). 3 Community Detection: Approximate Methods Community detection methods that employ quality functions return hard calls: an optimiza- tion routine is applied to determine the community structure that maximizes the quality f (κ, φ) over all φ ∈ Φ for a given graph κ. There is little else one can do with a quality function: one can return an ordered list of the k-best results, but a probability framework is required to interpret the relative likelihoods of these. In contrast, the formulas (2.5) and (2.7) provide the information necessary to answer any statistical question about the community structure implied by κ. Unfortunately, an algorithm that simply returns the full distribution is grossly impractical. The number of partitions of n nodes is the Bell number B(n), which grows exponentially with n: e.g., B(60) ≈ 1060. What, then, are these probabilities good for? One answer is that the formula for posterior probability can be used as a (more principled) quality function [33]. Another is that Monte Carlo methods can be used to produce a random sample of solutions [61, 12]. These random samples can be used to approximate statistics of Φ. In this section we will consider how such statistics might be computed directly. 3.1 Stochastic blockmodel The most natural statistical question to ask is this: what is the probability that a node v is = Pr(Φ(v) = iK = κ), where the . in community i? We may express this probability as pv i dependence on the graph κ is suppressed from the notation. For the model H(n, p, Q), we may compute pv i from (2.5): pφ(v) qφ(e1),φ(e2),κ(e). (3.1) (cid:88) n(cid:89) φ∈Φ φ(v)=i v=1 pv i = 1 Pr(κ) (cid:89) e∈[n]{2} Unfortunately, this exact expression does not appear to simplify in any significant way. (Ironically, its dynamic counterpart does simplify: cf. Section 6.) A strategy for approximating pv i is to use only the most relevant information in the graph. For example, we could divide the edges into two classes: those that contain v and those that do not. Edges in the former class have more direct relevance to the question of 8 which community v belongs to. If we let κv denote the restriction of the graph κ to edges containing v, and Kv be the corresponding random variable, then we may approximate pv i by pv i = Pr(Φ(v) = iKv = κv). By Bayesian inversion this equals . i ∝ Pr(Φ(v) = i)Pr(Kv = κvΦ(v) = i) pv = pi Pr(K({v, x}) = κ({v, x})Φ(v) = i) = pi pjqij,κ({v,x}). (3.2) (cid:89) m(cid:88) x(cid:54)=v j=1 (cid:89) x(cid:54)=v This equation exploits the statistical distribution of edge types that tend to emanate from a given community: if Q is such that this information is distinctive, then (3.2) will perform well. However, because it assesses each node in isolation, it does not exploit network structure and will not perform well when Q fails to produce distinctive edge-type distributions. If there were multiple, conditionally independent graph snapshots for a given ground- in (3.2), and pj with px− truth φ, then one could replace pi with pv− , to get an updated . One could initialize these values pv− value pv+ to the prior pi and apply the update equation for each graph snapshot κ: this would introduce communication between the results for individual nodes and thus exploit network structure. The approach in Section 6 is a more sophisticated version of this, which allows the temporal sequence of graphs to be correlated and nodes to move between communities. j i i i To derive useful probabilistic information that exploits network structure rather than just the statistical characteristics of edge-type distributions we turn to the second-order = Pr(Φ(v) = i, Φ(w) = jK = κ). To approximate this, we may divide . statistics pvw the edges into three classes: the edge {v, w}, the edges containing either v or w (but not ij both), and the edges containing neither. One gets a rather trivial approximation using only the single edge {v, w}, but using edges from the first two classes yields the approximation = Pr(Φ(v) = i, Φ(w) = jKv = κv, Kw = κw). This quantity has a formula similar . pvw ij to (3.2): ij ∝ Pr(Φ(v) = i, Φ(w) = j)Pr(Kv = κv, Kw = κwΦ(v) = i, Φ(w) = j) pvw = pipjPr(K({v, w}) = κ({v, w})Φ(v) = i, Φ(w) = j)× Pr(K({v, x}) = κ({v, x}), K({w, x}) = κ({w, x})Φ(v) = i, Φ(w) = j) (3.3) = pipjqij,κ({v,w}) pkqik,κ({v,x})qjk,κ({w,x}). (The version that uses only the single edge {v, w} as evidence is given by omitting the final product in (3.3).) This formula provides important statistical information even when Q is completely symmetric. Indeed, to exploit pvw it is simpler to work with the symmetric case. ij 3.2 Planted partition model When p and Q are symmetric under permutations of [m], then (3.1) reduces to pv i = 1/m (and (3.2) to pv i = 1/m). This is because in the symmetric case H(n, m, pI, pO) community labels have no meaning, so first-order statistics become trivial. The simplest, non-trivial 9 (cid:89) x(cid:54)=v,w (cid:89) m(cid:88) x(cid:54)=v,w k=1 quantities to compute are the second-order statistics pvw In the symmetric case, they ij . reduce to the single probability p{v,w} that v and w are in the same community: i.e., p{v,w} . = Pr(Φ(v) = Φ(w)K = κ). To compute p{v,w} exactly requires a summation over all partitions. Reichardt and Bornholdt estimated the p{v,w} matrix by a Monte Carlo sampling of the partition space, but this is slow [62]. Instead of this, we may approximate p{v,w} directly by simplifying (3.3). This leads to fairly simple expressions. The meaning of these expressions is opaque, however, when derived through straightforward mathematical manipulations, which creates problems when trying to adapt the results to engineering contexts. Therefore we proceed along more general lines to demonstrate which aspects of the partition -- graph model lead to which aspects of the resulting expressions. Suppose instances of some random process P are partition -- graph pairs (π, G) on n nodes. This process is not necessarily H(n, m, pI, pO): we will later take P to be a somewhat more complex process in which the parameters m, pI, and pO are first drawn from some distribution, and then an instance of H(n, m, pI, pO) is generated. Let Mvw be the indicator random variable for the event that v and w are in the same community (i.e., Mvw = 1 when v and w are in the same community, and 0 otherwise), and Kvw be the indicator random variable for the existence of an edge between v and w. Now let κvw indicate the presence or absence of the edge {v, w} in some given graph G (i.e., κvw = 1 if {v, w} is an edge of G, and 0 otherwise). Thus, the κvw are data, rather than instances of Kvw. We define Jvw to be the indicator random variable for Kvw agreeing with this datum κvw (i.e., Jvw = 1 if Kvw = κvw, and 0 otherwise. We may express Jvw as (3.4) Now let Ξvw be the indicator random variable for P agreeing exactly with G on all edges containing v and/or w. We may express this as Jvw = 1 − κvw − (−1)κvwKvw. . (cid:89) x(cid:54)=v,w Ξvw . = Jvw JvxJwx. (3.5) The approximation to p{v,w} based on using only local graph information may then be = Pr(Mvw = 1Ξvw = 1) = E[MvwΞvw = 1]. This can be expressed as written p{v,w} . p{v,w} = Pr(Ξvw = 1Mvw = 1)Pr(Mvw = 1) Pr(Ξvw = 1) = Λvw Λvw + E[Mvw]−1 − 1 , (3.6) where the likelihood ratio Λvw is given by . = Λvw E[ΞvwMvw = 1] E[ΞvwMvw = 0] . (3.7) To evaluate E[ΞvwMvw] we would like to use (3.5), requiring that P have suitably fa- vorable properties. If P = H(n, m, pI, pO), then the random variables Jvw, and each of the JvxJwx for x (cid:54)= v, w are conditionally independent given Mvw. E.g., if Mvw = 1 (i.e., v and w are in the same community), then Kvw = 1 with probability pI, independent of the values of any other Kxy. However, if P is a process in which a parameter vector (cid:126)µ is first drawn from some distribution, and then a draw is made from some process P((cid:126)µ), then assumption 10 of conditional independence is far too restrictive. In such a case the existence of many edges elsewhere in the graph would suggest a large value of a parameter like pI, and hence a larger value of Kvw, so this random variable would not be conditionally independent of the other Kxy given Mvw. This problem is easily overcome, however. We simply decompose the expected value into the conditional expectation for a specified value of (cid:126)µ, followed by an expectation over (cid:126)µ. E.g., we write E[ΞvwMvw] as (3.8) We then stipulate that Jvw and each of the JvxJwx for x (cid:54)= v, w are conditionally independent given Mvw and (cid:126)µ. Then E[ΞvwMvw] = E(cid:126)µ[E[ΞvwMvw, (cid:126)µ]]. E[ΞvwMvw, (cid:126)µ] = E[JvwMvw, (cid:126)µ] E[JvxJwxMvw, (cid:126)µ]. (3.9) (cid:89) x(cid:54)=v,w We may express the factors in the product in terms of a covariance: E[JvxJwxMvw, (cid:126)µ] = E[JvxMvw, (cid:126)µ]E[JwxMvw, (cid:126)µ] + Cov(Jvx, JwxMvw, (cid:126)µ). (3.10) We make the further assumption that Kvx is conditionally independent of Mvw given (cid:126)µ (which, again, holds for H(n, m, pI, pO)). Then, using (3.4) we have E[JvxJwxMvw, (cid:126)µ] = E[Jvx(cid:126)µ]E[Jwx(cid:126)µ] + (−1)κvx+κwxCov(Kvx, KwxMvw, (cid:126)µ). (3.11) We introduce the following notation = E[Mvw(cid:126)µ], . = E[Kvx(cid:126)µ], . µ δ ψ+ . ψ− . = Cov(Kvx, KwxMvw = 1, (cid:126)µ), = Cov(Kvx, KwxMvw = 0, (cid:126)µ). (3.12) (3.13) In this symmetric scenario all quantities are invariant under node permutations. Thus µ is the probability that two randomly chosen nodes are in the same community (for fixed parameters (cid:126)µ), and δ is the probability that two random chosen nodes have an edge between them. We write E[JvxJwxMvw, (cid:126)µ] in terms of these quantities: (3.14) (3.15) (3.16) (3.17) (1 − δ)2 + ψ if κvx + κwx = 0, (cid:40) δ(1 − δ) − ψ if κvx + κwx = 1, δ2 + ψ if κvx + κwx = 2, ψ− if Mvw = 0, ψ+ if Mvw = 1. E[JvxJwxMvw, (cid:126)µ] = where . = ψ We may use this to express (3.9) as where f (δ, ψ) E[ΞvwMvw, (cid:126)µ] = E[JvwMvw, (cid:126)µ]f (δ, ψ), =(cid:0)(1 − δ)2 + ψ(cid:1)n0(cid:0)δ(1 − δ) − ψ(cid:1)n1(cid:0)δ2 + ψ(cid:1)n2. . 11 Here nj denotes the number of nodes (aside from v and w) adjacent to exactly j of {v, w}, and n0 + n1 + n2 = n − 2. Now to compute E[ΞvwMvw] we substitute (3.16) into (3.8). To evaluate the expectation E(cid:126)µ[·] of (3.16) requires a specific random graph model P. We will use the following P: we will select the number of communities m in a manner to be discussed below, and select pI and pO uniformly from 0 ≤ pO ≤ pI ≤ 1. Then we shall make a draw from H(n, m, pI, pO) to generate a partition -- graph pair (π, G). For this model we have and δ = µpI + (1 − µ)pO, µ = 1/m, (3.18) as well as ψ+ = (δ − pO)(pI − δ) = µ(1 − µ)(pI − pO)2 ≥ 0, and ψ− = −(δ − pO)2 = −µ2(pI − pO)2 ≤ 0. (3.19) (3.20) Finally, the leading factor in (3.16) is E[JvwMvw = 1, (cid:126)µ] = pI if κvw = 1, E[JvwMvw = 1, (cid:126)µ] = 1 − pI if κvw = 0, (3.21) E[JvwMvw = 0, (cid:126)µ] = pO if κvw = 1, E[JvwMvw = 0, (cid:126)µ] = 1 − pO if κvw = 0. (3.22) We may split the expectation E(cid:126)µ[·] into an integral over pI and pO followed by an expec- tation with respect to m. Then (3.8) becomes E[ΞvwMvw] = Em 2 E[JvwMvw, (cid:126)µ]f (δ, ψ) dpOdpI . (3.23) (cid:20) (cid:90) 1 (cid:90) pI 0 0 (cid:21) We may change coordinates from (pO, pI) to (δ, ψ+) for Mvw = 1 and to (δ, ψ−) for Mvw = 0. This introduces complications due to Jacobians and complicated regions of integration R+ and R−, but it is helpful to be in the natural coordinate system of f : E[ΞvwMvw = 1] = Em E[ΞvwMvw = 0] = Em (cid:34)(cid:90)(cid:90) (cid:20)(cid:90)(cid:90) E[JvwMvw = 1, (cid:126)µ] (cid:112)µ(1 − µ)ψ+ √−ψ− E[JvwMvw = 0, (cid:126)µ] µ R+ R− (cid:35) f (δ, ψ−) dδdψ−(cid:21) f (δ, ψ+) dδdψ+ , . (3.24) (3.25) In the Mvw = 1 case, the range 0 ≤ pO ≤ pI ≤ 1 is transformed into the following region R+: ψ+ = 0 to δ2(1−µ)/µ for δ = 0 to µ and ψ+ = 0 to (1−δ)2µ/(1−µ) for δ = µ to 1. Similarly, in the Mvw = 0 case it is transformed into the following region R−: ψ− = −δ2 to 0 for δ = 0 to µ and ψ− = −(1− δ)2(µ/(1− µ))2 to 0 for δ = µ to 1. To compute (3.24) and (3.25) numerically one would transform the expressions (3.21) and (3.22) into (δ, ψ) space, although it seems to be more numerically stable to use the expressions (3.19) and (3.20) in (3.23). For small n, this numerical integration is feasible. The following example employs numerical integration for a dataset with n = 34 nodes. Figure 1 shows which pairs of nodes are particularly likely or unlikely to be in the same community for Zachary's karate club data [79]. This is a social network of 34 members of a karate club at a university which split into two communities. Nodes 4 and 8 are most 12 Figure 1: p{v,w} plot for Zachary's karate club: blue: p{v,w} ≥ 60%; red: p{v,w} ≤ 1.8% likely, with p{4,8} = 98.8%, and nodes 1 and 34 least likely to be in the same community with p{1,34} = 0.65%. Being adjacent does not guarantee a high value of p{v,w}: the node pairs {1, 32} and {14, 34} each have p{v,w} = 8.9%. Nor is it necessary for nodes to be adjacent to have a high value of p{v,w}: among nodes 15, 16, 19, 21, and 23 p{v,w} = 84.5% for every pair, and p{8,14} = 96.1%. Note that the node pairs {8, 14} and {1, 34} are each non-adjacent, and each has four common neighbors (i.e., n2 = 4), but their values of p{v,w} differ by a factor of 150 because of the degrees of the nodes involved. Finally, although nodes 9 and 31 are in different ground-truth communities, p{9,31} = 92.1%. When numerical integration is not feasible, it is difficult to obtain good asymptotic estimates as n → ∞, so we will resort to heuristics. The function f has a global maximum which is increasingly sharp as n → ∞. This occurs at . = δp n1 + 2n2 2(n − 2) , ψp . = 4n0n2 − n2 4(n − 2)2 . 1 (3.26) If ψp ≥ 0, then this peak lies within R+ when ψp/(ψp+(1−δp)2) ≤ µ ≤ δ2 p). Assuming the expectation Em[·] has significant weight in this range, one can replace f with a delta function at (δp, ψp) to estimate E[ΞvwMvw = 1] (i.e., parameter estimation is an appropriate approximation to the full, Bayesian integration). To estimate E[ΞvwMvw = 0] in this case, one could make the same argument, but with the maximum of f (δ, ψ−) constrained to ψ− ≤ 0. Conveniently, this constrained maximum occurs at (δp, 0). The analogous argument works when ψp ≤ 0. Therefore, if the integrals in (3.24) and (3.25) contained nothing but Ignoring the f (δ, ψ) we could approximate them by f (δp, ψp) or f (δp, 0) as appropriate. expectation over m as well, we could substitute these expressions into (3.7) to obtain the p/(ψp+δ2 following approximation(cid:101)Λvw ≈ (cid:40) f (δp, ψp)/f (δp, 0) f (δp, 0)/f (δp, ψp) if ψp ≥ 0, and if ψp < 0. (3.27) 13 We may decompose Λ as Λ = (cid:101)ΛΛk, where Λ1 encompasses all corrections to the crude approximation (cid:101)Λ when there is an edge between v and w, and Λ0 when there is no edge. For this, we need to specify the prior on m. Here, we let log m vary uniformly from log 2 to log n. It is convenient to treat m (or, equivalently, µ) as a continuum variable here to avoid the accidents of discreteness. With this prior, we may compute the value of E[Mvw] required in (3.6) as When ψp differs greatly from 0, the (cid:101)Λ factor is very large or small and dominates the (3.28) . ¯µ = E[Mvw] = correction term Λk. Therefore we seek to approximate the correction factor only in the critical case ψp = 0. Typically, real-world graphs are sparse, in which case the lack of an edge between v and w decreases their co-membership probability only slightly, but the presence of an edge greatly enhances it. Numerical experimentation confirms this intuition: the correction factor Λ0 due to the absence of an edge is roughly constant, but the factor Λ1 due to the presence of the edge {v, w} increases rapidly as δp decreases until it hits a constant plateau (which varies with n): Λ0 = min(0.7197, 0.46 δ−0.15 ), and Λ1 = min(0.5605 n + 1.598, δ−0.7 ). p p (3.29) (3.30) 1/2 − 1/n log(n/2) The four-digit coefficients in these formulas are obtained from an asymptotic analysis of exact results obtained in the n1 = n2 = 0 case. These exact results involve combinations of generalized hypergeometric functions (i.e., pFq(a; b; z)), and are not particularly enlightening, although they can be used to obtain accurate coefficients, such as 0.56051044368284805729 rather than 0.5605 in (3.30). Putting the above together into (3.6), we obtain the following approximation to p{v,w}: Λκvw(cid:101)Λ Λκvw(cid:101)Λ + ¯µ−1 − 1 p{v,w} = . (3.31) This formula could certainly be improved. It often yields results such as p{v,w} = 1 − 10−20: this figure might be accurate given the model assumptions, but such certainty could never be attained in the real world. To make it more accurate a more sophisticated model could be used, or the priors on pI, pO, and m could be matched more closely to reality. Only limited improvement is possible, however, because in reality multiple, overlapping, fuzzily-defined community structures typically exist at various scales, and it is unclear what p{v,w} means in such a context. Certainly the integral approximations could be performed more rigorously and accurately. The broad outlines of the behavior of p{v,w} are captured in (cid:101)Λ, Λ0, and Λ1, however. Finally, using only local evidence constitutes a rather radical pruning of the information in G. However, it is because of this pruning that the approximation (3.31) can be implemented so efficiently. 4 Community Detection: Results Direct visualizations like Figure 1 are impractical for larger networks. It can be useful to use the blue edges in Figure 1 (those with p{v,w} above a certain threshold) in place of a 14 Figure 2: Visualization of p{v,w} matrix for the Enron email network graph's edges in network algorithms (such as graph layout): this is discussed in Section 4.3. However, a more direct use of the co-membership matrix p{v,w} for network visualization is simply to plot the matrix itself with the values of p{v,w} ∈ [0, 1] as intensities [61, 62]. An example of this is shown in Figure 2, using the approximation (3.31), for the Enron email communication network, which has 36,692 nodes and 367,662 edges [48]. The insets depict the hierarchical organization of community structure in networks [12, 44]: communities with various structures exist at all scales. Although the model H(n, m, pI, pO) does not account for hierarchical structure, a benefit of integrating over the number of communities m (rather than estimating it) is that this accounts for co-membership at different scales. 4.1 Accuracy One may rightly question whether the approximation p{v,w} is accurate, given the modeling assumptions and approximations that it is based on. To address this, we observe that the values of p{v,w} may be used to define a certain family expected utility functions (parameter- ized by a threshold probability θ: cf. (A.14) in Appendix A), and optimizing this expected utility yields a traditional community detection algorithm. Because a great many community detection algorithms have been developed, one can assess the quality of the approximation p{v,w} ≈ p{v,w} by comparing the performance of the resulting community detection algorithm to those in the literature. The most comprehensive comparison to date is based on the LFR benchmark graphs which have power-law distributions both on degree and on community size [43]. The conclu- sion is that all algorithms prior to 2008 were eclipsed by a set of three more recent algorithms: the Louvain algorithm [8], the Ronhovde -- Nussinov (RN) algorithm [63], and Infomap [64]. Infomap performed somewhat better than RN, and both somewhat better than Louvain, but all three were much better than the previous generation. Figure 3 compares our algorithm to the Infomap, RN, and Louvain algorithms, and to the other algorithms tested in [43]. (This figure is a correction of Figure 3 from [27]. Also, the Simulated Annealing method 15 (a) 1000 nodes, small communities (b) 1000 nodes, large communities (c) 5000 nodes, small communities (d) 5000 nodes, large communities Figure 3: Comparison of community detection algorithms: (cid:78): Louvain; - - - : Other methods. •: Uopt; (cid:7): Infomap; (cid:4) : RN; which works so well in panel (b) is highlighted (purple with shorter dashes) in all panels for comparison.) Our method is labeled Uopt because numerical optimization over all θ ∈ [0, 1] has been used to set θ to the value that maximizes NMI. Both the 1000- and 5000-node cases are shown, for small communities (10 to 50 nodes) and large ones (20 to 100). The x-axis is the mixing parameter µ -- the fraction of a node's neighbors outside its community (not the expected edge probability µ of (3.12)) -- and the y-axis is a particular version (cf. the appendix of [44]) of the Normalized Mutual Information (NMI) between the computed and the true partition. In all cases, our method Uopt exhibits the performance characteristic of the three state-of-the-art methods cited by [43]. The Uopt method has an unfair advantage in optimizing over all θ: in a deployable algorithm one would need a method for setting θ. On the other hand, the purpose of Figure 3 is simply to show that the p{v,w} computation retains enough information about community structure to reconstruct high-quality hard-call solutions. From this perspective, it is surprising that it does so well, because Uopt is based on (a) the simple utility function of Appendix A, (b) an approximation p{v,w} to p{v,w} based only on limited evidence, and (c) an approximation p{v,w} to p{v,w} based on a heuristic evalution of the required integral. 16 0.10.20.30.40.50.60.70.800.20.40.60.81ΜNMI0.10.20.30.40.50.60.70.800.20.40.60.81ΜNMI0.10.20.30.40.50.60.70.800.20.40.60.81ΜNMI0.10.20.30.40.50.60.70.800.20.40.60.81ΜNMI 4.2 Efficiency The algorithm for computing the p{v,w} begins with pre-computing the value of n2 for all pairs of nodes for which n2 > 0, then creating a cache of p{v,w} values for triples (κvw, n1, n2). For any node pair {v, w}, the value of p{v,w} can be computed by first looking up its value of n2, computing n0 and n1 from n and the degrees of v and w, then looking up the p{v,w} value for its triple (κvw, n1, n2). Occasionally the value for this triple must be computed from (3.31) and cached, but the number of such distinct triples is relatively small in practice. An optional additional step one can perform is to loop over all node pairs with non-zero n2 in order to both fill in the value of p{v,w} for each triple (κvw, n1, n2), and count the number of times each triple occurs. (Because only the {v, w} pairs with n2 > 0 are looped over, some additional bookkeeping is needed to fill in and provide a count for the (κvw, n1, 0) triples without actually iterating over all O(n2) node pairs.) These values and counts are useful for the statistical analysis of the p{v,w} distribution. We tested the algorithm on five different Facebook networks (gathered from various uni- versities) [74], and networks generated from Slashdot [49], Amazon [47], LiveJournal [49], and connections between .edu domains (Wb-edu) [19]. Table 1 shows various relevant net- work statistics. The sum of the values n2 for each node pair is the number of calculations needed to compute the n2 data structure, whereas the number of values of n2 > 0 reflects its size. The next column is the number of distinct (κvw, n1, n2) triples -- this is the number of distinct p{v,w} values that must be computed, and the final one is the number of communities that a randomly chosen instance of the algorithm Infomap [64] found for the dataset. For the last two rows the n2 data structure was too large to hold in memory, and the second step of counting the triples was not performed, nor could Infomap be run successfully on our desktop. (cid:80) n2 Dataset Nodes Edges #(n2 > 0) Triples Groups Caltech Princeton Georgetown Oklahoma UNC Slashdot Amazon 769 6,596 9,414 17,425 18,163 82,168 262,111 16,656 293,320 425,638 892,528 766,800 504,230 899,792 1,231,412 46,139,701 67,751,053 186,722 8,776,074 14,120 83,004 15,616,610 113,722 194,235,901 47,202,925 239,162 140,796,299 47,576,619 191,482 19 51 90 233 167 74,983,589 49,450,449 104,330 5,209 9,120,350 6,434,638 7,178 12,851 LiveJournal 4,847,571 42,851,237 7,269,503,753 4,193,393,006 Wb-edu 9,450,404 46,236,105 12,203,737,639 4,232,928,806 Table 1: Network datasets Table 2 contains timing results based on a Dell desktop with 8GB of RAM, and eight 2.5GHz processors. The first column is the number of seconds it took the version of Infomap described in [64] to run. This code is in C++, runs single-threaded, includes a small amount of overhead for reading the network, and uses the Infomap default setting of picking the best result from ten individual Infomap trial partitions. The next four columns compare methods 17 of using our Java code to compute n2. The first two are single-threaded, and the other two use all eight cores. The columns labeled n2 → ∅ are the timing for the computation only: results are nulled out immediately after computing them. These columns are included for two reasons. First, they show that the computation itself displays good parallelization: the speedup is generally higher than 6.5 for eight processors. Second, the computation itself for the two larger datasets is quite fast (just under three minutes on eight cores), but the algorithm is currently designed only to maintain all results in RAM, and these datasets are too large for this. The last two columns are the timing results for explicitly filling in the p{v,w} information ahead of time and providing the counts required for statistical analysis. As Infomap is one of the fastest community detection algorithms available, these results are quite impressive. Comparing the first two columns of timing data, we find the speed-up ranges up to 107 and 862 times as fast as Infomap for the two largest networks on which we ran Infomap, respectively. The relative performance falls off rapidly for denser networks, but even in these cases or method performed roughly 10 times as fast as Infomap (i.e., as fast as an individual Infomap run). Computing the counts for p{v,w} statistics increases the run time, but only by a constant factor (of 2 to 3). It must be emphasized that the timing results are for producing a very different kind of output than Infomap does. However, the usual method for estimating p{v,w} [62] is many times slower than producing partitions, rather than many times faster. Infomap 10 trials 1.0 45.4 77.5 310.8 446.6 1553.4 2075.8 n2 1 proc 0.11 4.5 7.2 23.5 19.2 14.5 2.4 Dataset Caltech Princeton Georgetown Oklahoma UNC Slashdot Amazon LiveJournal Wb-edu n2 8 proc 0.02 0.67 1.2 4.2 3.6 3.0 0.59 n2 → ∅ 1 proc 0.09 3.9 6.4 19.4 16.3 12.6 2.2 1246.2 1243.0 n2 → ∅ Count Count 8 proc 8 proc 0.02 0.03 0.70 0.55 1.2 0.93 2.8 4.6 4.0 2.5 3.6 1.9 0.44 0.69 172.9 174.6 1 proc 0.09 3.9 7.0 33.7 22.9 21.8 3.2 Table 2: Timing results (in seconds) 4.3 Uses Visualizing the p{v,w} matrix provides insight into the hierarchical community structure of a network [62]. To do so requires an appropriate ordering on the nodes: one that places nodes nearby when they are in the same small community, and small communities nearby when they are in the same larger community. Therefore, it is useful to have a dendrogram of hierar- chical community clustering. There are standard routines for producing such dendrograms, provided one has a distance metric between points [36]. The community non-co-membership probabilities p{v}{w} = 1 − p{v,w} may be used for this purpose. They satisfy the triangle 18 (a) Dendrogram for node ordering (b) p{v,w} matrix Figure 4: Visualization of community structure for Princeton Facebook network inequality p{v}{w} ≤ p{v}{x} + p{w}{x} (although distinct nodes have distance 0 between them if they are known to be in the same community). The approximation (3.31) does not obey this triangle inequality, however, and [26] indicates that this can cause problems in certain contexts. An approximation of p{v,w} which does obey it is a topic for future research. In the meantime, we will rely on this version, which tends to obey it for most node triples. To order the nodes of a graph we use this (approximate) distance metric p{v}{w} with a hierarchical clustering scheme that defines cluster distance as the average distance between nodes. The output of this is a binary tree (ties having been broken arbitrarily), so the order of the clusters at each branch point must still be determined. This is done by starting at the root of the tree and testing which ordering at each branch point yields a smaller average distance to its neighboring clusters on the right and left. Figure 4 shows the resulting dendrogram for the Princeton Facebook network (cf. Table 1), and the corresponding p{v,w} matrix. (This method was used to generate the ordering in Figure 2 as well.) Visualizations like Figure 4 are useful for network analysis. We have combined them other visualizations in the code IGNITE (Inter-Group Network Inference and Tracking Engine). Figure 5 uses IGNITE to the Georgetown Facebook network (cf. Table 1). The dendrogram on which the ordering for the p{v,w} matrix is based is shown in the upper left panel. Two levels in this dendrogram have been selected: the lower level is used to coarse-grain the network by merging communities of nodes together into meta-nodes; the upper level is used to determine which sets of meta-nodes to consider communities. The selection of these levels is reflected in the p{v,w} matrix panel below. The meta-nodes are indicated by translucent green squares, and communities of nodes are outlined in different colors (corresponding to similar outlines in the dendrogram). The meta-nodes and communities are then displayed in panels on the right: the upper panel corresponding to a coarse-grained version of the original network; the lower, to a variant where the edges have been replaced with averaged p{v,w} values between meta-nodes. The sizes of the meta-nodes indicates how many true nodes they contain. In the lower right panel, blue lines indicate average p{v,w} above a certain threshold, and red below another (much lower) threshold, as in Figure 1. 19 Figure 5: Screen shot of IGNITE network probability visualization tool for Georgetown Facebook network 5 Community Tracking: Exact Equations The study of dynamic networks is much less developed than its static counterpart. There is substantial work on processes evolving on networks. For example, see [18] for a discussion of the complex dynamical systems which arise in economics and traffic engineering, along with mathematically rigorous results about their equilibria. Diffusion equations on networks have particularly elegant properties. They are governed by the Laplacian matrix of a graph, the discrete analog of continuum Laplacian operator, and are therefore an important topic in spectral graph theory [54]. These may be generalized to reaction -- diffusion equations and used to model the spread of disease [13], but the more common model in network epidemiology is the SIR model [42]. Such models have been extended to model the spread of rumors [3], obesity [11], and innovations [75]. The term "dynamic networks" implies that the networks themselves are evolving in time, however. Stokman and Doreian edited several influential special editions of the Journal of Mathematical Sociology on network evolution, the first of which was in 1996 and published in book form as [21]. This work illustrated how macroscopic behavior of network evolution arises from local governing laws. Snijders emphasizes [68] the benefits of casting the dy- namic network problem in the continuous-time, Markov process framework first proposed by Leenders [46]. In particular, there is a small body of literature on communities evolving in dynamic networks. Much of this work is summarized in 3 1/2 pages of Fortunato's 100-page review of group finding [28]. The field begins with the 2004 work of Hopcroft et al. [35], which studied the persistence of robust communities in the NEC CiteSeer database. The most prominent publication is the 2007 work of Palla et al. [59], which analyzed the evo- lution of overlapping groups in cell phone and co-authorship data and presented a method for tracking communities based on the clique percolation method used in CFinder [60]. The 20 various researchers in the community have come to agree on the key fundamental events of community evolution: birth/death, expansion/contraction, and merging/splitting [31]. Berger-Wolf and colleagues propose an optimality criterion for assigning time-evolving com- munity structure to a sequence of network snapshots, prove that it is NP-hard to find the optimal structure, and develop various approximation techniques [73, 72, 71]. Most of the work on community tracking considers discrete network snapshots and at- tempts to match up the community structure at different time steps. From the perspective of the data fusion community, such an approach to tracking may seem ad hoc: one could argue that (a) the "matching up" criteria are necessarily heuristic, and (b) one gets only a single best solution with no indication of the uncertainty. In contrast, the tracking work in data fusion is based on formal evolution and measurement models for the full probability distribution over some state space, followed by principled approximations [39]. A sensible response to this critique, however, is that the state space in the community tracking problem is so much larger that data-fusion-style tracking techniques do not apply. The truth is per- haps somewhere in between: it is, in fact, possible to derive a formal Bayesian filter for the community tracking problem and to produce tractable approximations to it. Indeed, this is the topic of the remainder of this paper. On the other hand, the filter derived is more a proof of concept than an algorithm ready to supplant the more informal methods. It may be that the formal approach we present here can be developed into a true, practical "Kalman filter for networks." On the other hand, it may be that concerns about uncertainty management can be addressed without appeal to a formal model. For example, Rosvall and Bergstrom have devised a re-sampling technique to estimate the degree to which the data support the various assignments of nodes to time-evolving communities [65]. Similarly, the work of Fenn et al. tracks the evolution of groups by gathering evidence that each node belongs to one of a number of known groups [23], thus providing output similar to one version of the method outlined below. We model community and graph evolution as a continuous-time Markov process [16], {(Φt, Kt) : t ≥ 0}, the continuous-time analog of a Markov chain. The continuous-time approach is more general (in that it can always be sampled at discrete times to produce a Markov chain) and is simpler to work with due to the sparsity of the matrices involved. We will not explicitly indicate any dependence on structural parameters (cid:126)µ, because we will not integrate these out as was done in the static case. In this section we will use = {Kt(cid:48) : 0 ≤ t(cid:48) ≤ t} to denote the time-history of the network process up through time . K[0,t] = {Kt(cid:48) : 0 ≤ t(cid:48) < t} for the history not including the current time t (with similar . t, and K[0,t) definitions for Φ[0,t] and Φ[0,t)). The purpose of this section is to derive a Bayesian filter Pr(ΦtK[0,t]): i.e., assuming some initial distribution Pr(Φ0) is given, Section 5.1 derives the expressions for evolving the distribution of the community structure to time t, given all network evidence up through time t. In the community detection case, the next step was to approximate marginals of the full distribution using limited graph evidence. In the tracking case, however, it is possible to obtain exact formulas for the marginals: this is done in Section 5.2. These formulas, though exact, are not closed, however: the approximations required to close them are discussed in Section 6. 21 Figure 6: An instance of H(12, 3, 0.5, 16, 4, 2, 18) 5.1 Evolution of the full distribution A dynamic stochastic blockmodel H(n, A, B) may be defined analogously to the static version H(n, p, Q) introduced in Section 2.1. Whereas H(n, p, Q) defines a pair of random variables Φ and K, H(n, A, B) defines a pair of stochastic processes {Φt : t ≥ 0} and {Kt : t ≥ 0}. The joint process {(Φt, Kt) : t ≥ 0} will be modeled as a continuous-time Markov process. The parameter A is an m×m matrix, and B is a collection of r×r matrices Bij for 1 ≤ i ≤ j ≤ m (and for convenience we define Bji = Bij for j > i). Just as p and the qij were required to be stochastic vectors (i.e., vectors with non-negative entries that sum to one) in Section 2.1, so the matrices A and Bij are required to be transition rate matrices: i.e., they must have non-negative off-diagonal entries, and their columns must sum to zero. The entry aij of A defines the transition rate of a node in group j switching to group i: i.e., the probability of a node in group j being in group i after an infinitesimal time ∆t is δij + aij ∆t + O((∆t)2). Similarly, the entry bij,kl of Bij defines the rate that an edge connecting nodes in groups i and j transitions from edge type l to type k. We may define a dynamic planted partition model H(n, m, a, λI, µI, λO, µO) as a special case of H(n, A, B). As in Section 2.2, this cases is obtained by requiring that A and B be invariant under permutations of [m] and using only r = 2 edge types ("off" (k = 0) and "on" (k = 1)). In this case, the transition rate matrix A reduces to a single rate a at which nodes jump between communities, while the collection B of transition rate matrices reduces to four rate parameters: λI, the rate at which edges turn on for pairs of nodes in the same community; µI, the rate at which edges turn off for pairs of nodes in the same community; and λO and µO, the corresponding rates for pairs of nodes in different communities. Figure 6 depicts and instance of this model with n = 12 nodes and m = 3 communities with rate parameters a = 0.5, λI = 16, µI = 4, λO = 2, and µO = 18 for t = 0 to 5. If two independent random variables X and Y have respective probabilities xi and yj for their various outcomes i and j, then the joint random variable Z = (X, Y ) has outcomes indexed by (i, j) with probabilities z(i,j) = xiyj. The analog of this for Markov processes is expressed by the Kronecker sum [58]. I.e., Suppose two independent Markov processes {X(t) : t ≥ 0} and {Y (t) : t ≥ 0} have respective probabilities xi(t) and yj(t) for their various outcomes i and j at time t, and that these probabilities are governed by x = Ax and y = By, respectively (where x(t) collects all the xi(t), and y(t), the yj(t)). Then the joint Markov process {Z(t) : t ≥ 0}, where Z(t) = (X(t), Y (t)), has outcomes indexed by (i, j) with probabilities z(i,j) that are governed by z = (A ⊕ B)z (where z(t) collects all the z(i,j)). 22 The Kronecker sum A ⊕ B is defined by (A ⊕ B)(i,j),(i(cid:48),j(cid:48)) . = aii(cid:48)δjj(cid:48) + δii(cid:48)bjj(cid:48). (5.1) The interpretation of this is that in an infinitesimal time the Markov process Xt may tran- sition from i to another state i(cid:48), or Yt may transition from j to j(cid:48), but for both to change simultaneously is infinitely less likely than for only one to change. The derivation of the Bayesian filter for Pr(ΦtK[0,t]) follows the same six steps as the static derivation in Section 2.1. Indeed, the purpose of including the six-step derivation in Section 2.1 was to make the following derivation easier to follow by analogy. Step 1. Let pv(t) ∈ Rm denote the vector of probabilities pv community i at time t: i.e., pv transition rate matrix A. Therefore i (t) that a single node v is in . = Pr(Φt(v) = i). These probabilities are governed by the i (t) dpv dt = Apv, which has the solution pv(t(cid:48)) = eA(t(cid:48)−t)pv(t). (5.2) Step 2. Let P ∈ Rmn denote the vector of probabilities Pφ(t) that the communities of all n nodes are specified by the assignment φ at time t: i.e., Pφ(t) . = Pr(Φt = φ). The transition rate matrix for this joint process on all nodes is the Kronecker sum of the (identical) transition rate matrices for each node: dP dt = AP, where A = n(cid:77) v=1 A. (5.3) The components Aφ(cid:48)φ of A may be expressed as n(cid:88)  Aφ(cid:48)φ = aφ(v)φ(v), v=1 aφ(cid:48)(v∗)φ(v∗), 0, if φ(cid:48) = φ, if φ(cid:48)(v) = φ(v) for all v (cid:54)= v∗, otherwise. (5.4) Step 3. Let qe(t) ∈ RN (where N = n(n − 1)/2) denote the vector of probabilities qe k(t) that a single edge e has type k at time t given the current communities of its endpoints: i.e., = Pr(Kt(e) = kΦt(v), Φt(w)). These probabilities are governed by the transition rate . qe k(t) matrix Bij, where i = φt(v) and j = φt(w) are the current communities of v and w: dqe dt = Bφt(v)φt(w)qe. (5.5) The matrix Bφt(v)φt(w) is piecewise constant in time, so the solution to (5.5) is a (continuous) piecewise exponential function. Step 4. Let Q ∈ RrN denote the vector of probabilities Qκ(t) that the graph is κ at time t given the current communities of all nodes: i.e., Qκ(t) = Pr(Kt = κΦt). The transition rate . 23 matrix for this joint process on all edges is the Kronecker sum of the transition rate matrices for each edge: Bφ(e1)φ(e2). (5.6) (cid:77) e∈[n]{2} The components Bφ,κ(cid:48)κ of Bφ may be expressed as = BφtQ, where Bφ = (cid:88) bφ(e1)φ(e2),κ(e)κ(e), dQ dt  e∈[n]{2} bφ(e∗ 0, Bφ,κ(cid:48)κ = 1)φ(e∗ 2),κ(cid:48)(e∗)κ(e∗), if κ(cid:48) = κ, if κ(cid:48)(e) = κ(e) for all e (cid:54)= e∗, otherwise. (5.7) Step 5. Let R ∈ RmnrN denote the vector of probabilities R(φ,κ) that the community . assignment is φ and the graph is κ at time t: = Pr(Φt = φ, Kt = κ). The transition rate matrix for this process is not quite a Kronecker sum due to the dependence of Bφ on φ -- it loses the various nice properties that Kronecker sums have, but the formula is quite similar: i.e., R(φ,κ)(t) dR dt = CR, where C(φ(cid:48),κ(cid:48))(φ,κ) = Aφ(cid:48)φδκ(cid:48)κ + δφ(cid:48)φBφ,κ(cid:48)κ. (5.8) A Bayesian filter has a prediction step (which applies while the graph data remains constant) and an update step (which applies when the graph data changes). Therefore, we need to decompose (5.8) into a component which is zero while the graph is constant and a component which is zero when the graph changes. The required decomposition uses slightly modified matrices A(cid:48) κ and B(cid:48) φ: C(φ(cid:48),κ(cid:48))(φ,κ) = A(cid:48) κ,φ(cid:48)φδκ(cid:48)κ + δφ(cid:48)φB(cid:48) A(cid:48) κ,φ(cid:48)φ = Aφ(cid:48)φ + δφ(cid:48)φBφ,κκ, κ,φ(cid:48)φ of A(cid:48) The components A(cid:48) κ may be expressed as φ,κ(cid:48)κ, where and B(cid:48) φ,κ(cid:48)κ = Bφ,κ(cid:48)κ − δκ(cid:48)κBφ,κκ. (5.9) (5.10) (5.11) (5.12) A(cid:48) κ,φ(cid:48)φ = (cid:88) e∈[n]{2} n(cid:88)  aφ(v)φ(v) + v=1 aφ(cid:48)(v∗)φ(v∗), 0, (cid:40) φ,κ(cid:48)κ of B(cid:48) B(cid:48) φ,κ(cid:48)κ = bφ(e∗ 0, The components B(cid:48) φ may be expressed as 1)φ(e∗ 2),κ(cid:48)(e∗)κ(e∗), if κ(cid:48)(e) = κ(e) for all e (cid:54)= e∗, otherwise. bφ(e1)φ(e2),κ(e)κ(e), if φ(cid:48) = φ, if φ(cid:48)(v) = φ(v) for all v (cid:54)= v∗, otherwise. Step 6. The prediction and update steps of the Bayesian filter are now determined by the matrices A(cid:48) and B(cid:48). For the prediction step, suppose that the graph data through time t0 24 is κ[0,t0] and let κ = κt0 be a concise notation for the graph at time t0. From a previous step of the filter (or from an initialization) we are given the distribution on the community assignments Pr(Φt0K[0,t0] = κ[0,t0]). Starting with this distribution on φ at time t0, let Rκ(t) ∈ Rmn (for all t ≥ t0) be a vector whose φ component is the probability that (a) the graph remains κ during the time interval [t0, t), and (b) the community assignment is φ at time t. The initial value of Rκ is then Rκ(t0) = Pr(Φt0K[0,t0] = κ[0,t0]). Its evolution law is given by dRκ dt = A(cid:48) κRκ. Note that A(cid:48) κ is not a transition rate matrix: it allows probability to leak out of the vector Rκ(t) so that its sum does not remain 1, but rather equals the probability Pr(K[t0,t) = κK[0,t0] = κ[0,t0]). Normalizing Rκ(t), however, gives us the probability distribution of φ given that the graph has remained κ during the time interval [t0, t): Pr(cid:0)Φt = φK[0,t) = κ[0,t) (cid:1) ∝(cid:0)Rκ(t)(cid:1) φ. (5.13) (5.14) This, then, is the prediction step of the Bayesian filter. The update step is obtained from B(cid:48): given that the community assignment is φ, the probability of a single edge e = {v, w} transitioning from type k = κt−(e) to type k(cid:48) = κt(e) in some infinitesimal time period ∆t is given by (5.12) as bφ(v)φ(w),k(cid:48)k∆t. The conditional probabilities of the posterior distribution on φ given this single edge transition are proportional to this. Therefore Pr(cid:0)Φt = φK[0,t] = κ[0,t] (cid:1) ∝ bφ(v)φ(w),k(cid:48)kPr(cid:0)Φt− = φK[0,t) = κ[0,t) (cid:1). (5.15) This equation holds only for a single edge transitioning. When multiple edges transition at exactly the same time, the correct update procedure would be to average, over all possible orderings of the edge transitions, the result of applying (5.15) successively to each transition. Figure 7 shows the exact evolution for the very simple, dynamic planted partition case H(3, 2, 1, 3, 1, 1, 3). Here there are n = 3 nodes and m = 2 communities, so only four possible partitions of the nodes (all in one community, or one of the three nodes by itself). Each partition corresponds to two community assignments φ (of equal probability), and we plot the probability Pr(Φt = φK[0,t] = κ[0,t]) for assignments from each of these four partitions. The graph data is shown in top row of the figure: the graph is initially empty, then an edge turns on, then another, and then an edge turns off. We observe that while the graph is some constant κ the probabilities decay exponentially toward a steady state vector (the null vector of A(cid:48) κ). When the graph changes, the probability of each community assignment hypothesis φ jumps, then begins decaying toward a new steady state. The bottom row of Figure 7 shows the ground truth time-history φt of community assignments which were used to generate the graph data, and the yellow highlighting in the figure indicates which community assignment hypothesis is the true one. Further details may be found in [24]. 5.2 Marginalization Using notation similar to that in Section 3.1, let pv i (t) probability that node v is in community i at time t, pvw κ[0,t]), and so on. Note that the same notation pv = Pr(Φt(v) = iK[0,t] = κ[0,t]) be the . = Pr(Φt(v) = i, Φt(w) = jK[0,t] = . i (t) was used in Step 1 of the derivation in ij (t) 25 Figure 7: Temporal evolution of the probabilities of all community assignments φ for H(3, 2, 1, 3, 1, 1, 3) i (t−) the previous section to denote a prior probability, but henceforth it will indicate a quantity conditioned on the graph data K[0, t]. To indicate conditioning on K[0, t) we will use the = Pr(Φt(v) = iK[0,t) = κ[0,t)). The prediction and update equations notation t−: e.g., pv . for the full probability distribution are linear (up to a constant factor), so we can sum them over the groups of all nodes aside from v to obtain an expression for pv i (t). When we apply this marginalization to (5.13), we get a quantity pv i (t) (note that this . use of the notation pv = κt be a concise notation for the graph at time t. The marginalization of (5.13) is then i differs from that of Section 3.1). We let κ i (t) proportional to pv pv i = aiι pv ι + bij,κ({v,w})κ({v,w}) pvw ij + bjk,κ({w,x})κ({w,x}) pvwx ijk . (5.16) m(cid:88) ι=1 (cid:88) m(cid:88) w∈[n] w(cid:54)=v j=1 (cid:88) m(cid:88) m(cid:88) {w,x}⊆[n] w,x(cid:54)=v j=1 k=1 i (t) from i = 1 to m is Pκ(t) for every v. Because pv i (t) itself (albeit a nonlinear one) by expressing pv i i (t) from i = 1 to m equals 1 for every node v, so the i (t)Sκ(t), i (t)/Pκ(t) − pv i (t) = pv i (t) = pv i (t)/Pκ(t). The sum of pv We may convert this to an equation for pv as pv sum of pv where Sκ(t) m(cid:88) i = − pv pv . = Pκ(t)/Pκ(t), we have m(cid:88) (cid:88) i Sκ+ aiιpv ι + bij,κ({v,w})κ({v,w})pvw ij + ι=1 w∈[n] w(cid:54)=v j=1 (cid:88) {w,x}⊆[n] w,x(cid:54)=v m(cid:88) m(cid:88) j=1 k=1 bjk,κ({w,x})κ({w,x})pvwx ijk . (5.17) Here Sκ may be expressed as (cid:88) m(cid:88) m(cid:88) i=1 j=1 bij,κ({v,w})κ({v,w})pvw ij (t). (5.18) Sκ(t) = {v,w}⊆[n] We now marginalize the update equation (5.15) when the edge e transitions from type i (t) that node v is in l = κt−(e) to type l(cid:48) = κt(e). To get the updated probability pv 26 TimeProbability0.20.40.60.81.00.10.20.3 Figure 8: First-order marginals for community membership community i after the transition there are two cases: v ∈ e (say, e = {v, w}) and v /∈ e (say e = {w, x}): m(cid:88) m(cid:88) j=1  pv i (t) = 1 Sl(cid:48)l(t−) bij,l(cid:48)lpvw ij (t−) m(cid:88) if e = {v, w}, bjk,l(cid:48)lpvwx ijk (t−) if e = {w, x}. The normalization constant Sl(cid:48)l(t−) is independent of the node v: j=1 k=1 m(cid:88) m(cid:88) Sl(cid:48)l(t−) = bij,l(cid:48)lpe1e2 ij (t−). (5.19) (5.20) i=1 j=1 Whereas the Bayesian filter (5.14) and (5.15) specifies the exact evolution of probabilities in an unmanageably large state space (mn elements), the marginalized filter (5.17) and (5.19) involves only mn elements. It is still an exact filter -- no approximations have been made -- but it is not useful as it stands because it is not closed. The equations for the first-order statistics pv ijk . One could write down equations for these, but they would involve still higher-order statistics, and so on. Instead, a closure model is needed for the second- and third-order statistics in terms the pv i . The topic of closures is discussed in Section 6. i involve second- and third-order statistics pvw ij and pvwx To verify (5.17) and (5.19), one can run the full filter (5.14) and (5.15) and use it to compute the required second- and third-order statistics. The results of evolving pv i (t) using these oracular terms should then agree with those obtained by marginalizing the full solution direction. Figure 8 shows the results of such a verification. A simulation of H(n, A, B) with n = 12 nodes, m = 3 communities, and r = 4 edge types was used to generate graph data κ[0,0.8] and ground-truth community assignment data φ[0,0.8]. The transition rate matrices A and Bij used are given in [24]. The final frame (φ0.8, κ0.8) of this run is shown in Figure 8: the centers of each disk correspond to the communities (green, yellow, or purple) which 27 φ0.8 assigns to each node; the colors of each edge (white, black, blue, or red) are given by κ0.8. The same parameters A and B were then used in the Bayesian filter (5.14) and (5.15), which required evolving a system of 312 ≈ 530, 000 quantities. The marginalized probabilities pv i (0.8) are depicted in the outer bands, so accuracy is indicated by the outer band largely agreeing with the center. In the case of the dynamic planted partition model H(n, m, a, λI, µI, λO, µO), the first- order statistics are trivial: the prediction and update equations reduce to the observation that the probability a node v is in some community equals 1. Instead, with some bookkeeping, one can derive a Bayesian filter for the second-order statistics pvw ij (t) and reduce these to a filter for the co-membership probabilities p{v,w}(t): this is similar to what was done in Section 3.2, although that was for an approximation based on limited graph evidence, and this is exact. The filter for p{v,w} depends on third- and fourth-order statistics. There are 5 third-order statistics, which sum to 1, and we denote them p{v}{w}{x}, p{v}{w,x}, p{w}{v,x}, p{x}{v,w}, and p{v,w,x}. These correspond to the probabilities that v, w, and x are in different communities, that two are in the same community with v, w, and x, respectively, being in another, and that all three are in the same community. Similarly there are 15 fourth-order statistics. The two that matter here are p{v,w,x,y} and p{v,w}{x,y}. The sum of these two is the probability that v is in the same community as w and that x is in the same community as y. The prediction step of the Bayesian filter for p{v,w}(t) may be expressed as − p{v,w}(cid:19) (cid:18) 1 m p{v,w} = 2am m − 1 − γvwqvw vw − vw + γwxrwx vw The form of the update step for p{v,w} depends on whether the edge e that is flipping at time t has 2, 1, or 0 nodes in common with {v, w}: Rvw x∈[n] x(cid:54)=v,w (cid:122) (cid:125)(cid:124) (cid:88) (cid:0)γvxrvx γvw t− qvw γwx t− rwx γxy t− sxy vw(t−) vw (t−) vw(t−) (cid:123) (cid:1)− (cid:125)(cid:124) (cid:123)(cid:88) (cid:122) Svw γxysxy vw . {x,y}⊆[n] x,y(cid:54)=v,w (5.21) if e = {v, w}, if e = {w, x}, if e = {x, y}. (5.22) p{v,w}(t) = p{v,w}(t−) + 1 δe1e2(t−) The notation used in (5.21) and (5.22) is defined as follows. We define γvw I,t to be the transition rate for an edge to flip (i.e., turn on or off) between nodes v and w at time t under the hypothesis that they are in the same community. This transition rate depends on whether there is currently an edge between v and w. Therefore, γvw I,t , and its counterpart γvw O,t for the hypothesis that v and w are in different communities, are given by µO if {v, w} ∈ E(Gt), λO if {v, w} ∈ E(Gt). if {v, w} ∈ E(Gt), if {v, w} ∈ E(Gt), and γvw O,t (cid:40) (cid:40) (5.23) µI λI γvw I,t . = . = The quantity γvw between the flip rates under the two hypotheses: t , which plays an important role in (5.21) and (5.22), is the difference γvw t . = γvw I,t − γvw O,t. 28 (5.24) Figure 9: Histograms of third- and fourth-order statistics On the other hand, the normalization constant δvw(t) in (5.22) is the expected flip probability given our current knowledge of the probabilities of the two hypotheses: δvw(t) . = γvw (5.25) where p{v}{w} = 1−p{v,w} is the probability of v and w being in different communities. Finally, the q, r, and s quantities represent modified second-, third-, and fourth-order statistics, respectively: I,t p{v,w}(t) + γvw O,tp{v}{w}(t), = p{v,w}p{v}{w}, . = p{v,w,x} − p{v,w}p{v,x}, and . = p{v,w,x,y} + p{v,w}{x,y} − p{v,w}p{x,y}. . qvw vw rvx vw sxy vw (5.26) (5.27) (5.28) The r and s quantities measure deviations from independence. That is, if the event Φt(v) = Φt(w) (i.e., v and w are in the same group at time t) were independent of Φt(v) = Φt(x), then the probability of both events occurring (i.e., Φt(v) = Φt(w) = Φt(x)) would equal the product of their probabilities: that is, p{v,w,x} = p{v,w}p{v,x}, or rvx vw = 0. Similarly, if v and w being in the same community were independent of x and y being in the same community (which seems more plausible), then we would have sxy vw = 0. The terms Rvw and Svw represent the accumulated effects on p{v,w} of the third- and fourth-order deviations from independence, respectively. Understanding the role of these quantities is important for developing an effective closure for this marginalized filter. 6 Community Tracking: Approximation vw and sxy To develop closures for the rvx vw terms in (5.21) and (5.22) it helpful to know how they behave statistically. In this section we present a preliminary investigation of these statistics and a possible closure for them using, as an example, the H(12, 3, 0.5, 16, 4, 2, 18) case depicted in Figure 6. For this case we compute histograms for the Rvw and Svw terms in (5.21). In each case, we compile separate histograms for the case of v and w being in the same ground-truth community (case I) and in different communities (case O). The histograms for the I and O cases of Rvw are shown in Figure 9. In the I case, we tend to have Rvw < 0, which makes a positive contribution to p{v,w} in (5.21); whereas in the O 29 case the opposite occurs. Thus these third-order statistics make an important contribution to the evolution of p{v,w}. On the other hand, Svw appears to be much less important. In the I case, also shown in Figure 9, Svw is tightly and symmetrically clustered near 0. The O case is similar. This makes sense intuitively: as mentioned at the end of Section 5.2, it seems more plausible for v and w being in the same community to be independent of x and y being in the same community than for v and w to be independent of v and x. Therefore, we will make this independence assumption to obtain the fourth-order closure sxy vw = 0. It remains to develop a closure for rvx vw. The five third-order statistics must sum to one and be consistent with the second-order statistics. This is expressed by the following four equations: p{v}{w}{x} + p{v}{w,x} + p{w}{v,x} + p{x}{v,w} + p{v,w,x} = 1, p{v}{w,x} + p{v,w,x} = p{w,x}, p{w}{v,x} + p{v,w,x} = p{v,x}, and p{x}{v,w} + p{v,w,x} = p{v,w}. (6.4) This leaves one degree of freedom, which we choose p{v,w,x} to represent. The constraint that the variables in (6.1) -- (6.4) are non-negative imposes the following bounds on p{v,w,x}: (cid:0)p{w,x} + p{v,x} + p{v,w}(cid:1), and = min(cid:0)p{w,x}, p{v,x}, p{v,w}(cid:1). 1 2 p− . = p+ . (6.1) (6.2) (6.3) (6.5) (6.6) For consistency, a closure for p{v,w,x} should satisfy p− ≤ p{v,w,x} ≤ p+. We will consider closure models that select p{v,w,x} ∈ [p−, p+] as a function of p{w,x}, p{v,x}, and p{v,w}. Many natural approximations (such as a symmetric version of p{v,w,x} ≈ p{v,w}p{v,x}) fail to satisfy p− ≤ p{v,w,x} ≤ p+. The approximations p{v,w,x} ≈ p+ and p{v,w,x} ≈ p− = max(p−, 0) have . poor properties. A least-squares solution is possible, but a better principle to employ is maximum entropy [38]. 0 When applying the maximum entropy principle, one needs a suitable underlying measure space. In this discrete case, this simply means a set of atomic events which are equally likely a priori. Such events arise naturally in this case: there are m3 of them with probabilities equal to pvwx ijk . In the absence of graph data, symmetry implies that their probabilities are each m−3. Thus the entropy is defined as In this symmetric case, the m3 values of pvwx ijk re-write (6.7) as take only five distinct values, so we may i=1 j=1 k=1 ijk log pvwx pvwx ijk . (6.7) H = − m(cid:88) m(cid:88) m(cid:88) H = − p{v}{w}{x} log − p{v}{w,x} log − p{x}{v,w} log − p{v,w,x} log p{v}{w}{x} (m)3 p{x}{v,w} (m)2 p{v,w,x} , m 30 p{v}{w,x} (m)2 − p{w}{v,x} log p{w}{v,x} (m)2 + (6.8) Figure 10: Third-order statistics: exact vs. closure = m!/(m − r)! denotes the falling factorial. We may use (6.1) -- (6.4) to express . where (m)r the other variables in terms of p{v,w,x}, then take the derivative of H with respect to p{v,w,x}. This reduces to (cid:0)p{w,x} − p{v,w,x}(cid:1)(cid:0)p{v,x} − p{v,w,x}(cid:1)(cid:0)p{v,w} − p{v,w,x}(cid:1) (cid:33) p{v,w,x}(cid:0)p{v,w,x} − p−(cid:1)2 (cid:32) dH dp{v,w,x} = log (m − 2)2 4(m − 1) . (6.9) 0 < p+, the function in (6.9) is strictly decreasing from ∞ to −∞ on [p− Provided p− 0 , p+], so it has a unique zero within this interval, and this zero is where H attains its maximal value on [p− 0 , p+]. Finding this zero involves solving a cubic equation, which yields the maximum entropy closure for rvx vw. Figure 10 indicates how well this closure performed in the H(12, 3, 0.5, 16, 4, 2, 18) exam- ple. The histograms show good agreement: each has values that are predominantly positive, with a peak in the same place, and distributions of similar shapes, although the closure distribution is a little more spread out. This suggests that using this closure for rvx vw along with the fourth-order closure sxy vw is a promising idea. Unfortunately, this closure has nothing built into it that ensures p{v,w} stays in the range [0, 1], and, indeed numerical simulations that use it quickly produce probabilities outside this range. To see why it fails, consider the consistency requirement p− ≤ p+ mentioned above. This may be re-written (cid:12)(cid:12)p{v}{x} − p{w}{x}(cid:12)(cid:12) ≤ p{v}{w} ≤ p{v}{x} + p{w}{x}, (6.10) i.e., the probabilities p{v}{w} satisfy the triangle inequality. In particular, if p{v,w} = 1, then p{v,x} = p{w,x} for all nodes x (cid:54)= v, w. This makes sense: if v and w are definitely in the same community C, then both p{v,x} and p{w,x} mean "the probability that x ∈ C," so it would be illogical for these values to differ. Furthermore, in the special case a = 0, if p{v,w} = 1 at some time, then it will remain 1, which implies p{v,x} = p{w,x}. The direct verification of this fact using (5.21) leads to an expression in which Svw = −Rvw (cid:54)= 0. In this case, the fourth- order terms play a crucial role in maintaining consistency, so it is not surprising truncating them entirely leads to inconsistencies. This is but one of the issues that must be addressed before principled community tracking algorithms along these lines can be developed, but we 31 believe there is much promise in this approach of Bayesian filtering using formal evolution and measurement models 7 Conclusion Network science has benefited from the perspectives and expertise of a variety of scientific communities. The data fusion approach has much to offer as well. It provides an integrated framework for synthesizing high-level situational awareness from messy, real-world data. It also develops tracking algorithms based on formal evolution models that maintain represen- tations of the uncertainty of the ground-truth state. We have applied this perspective to the community detection problem in network science. We began with a derivation of the poste- rior probability distribution of community structure given some graph data: this is similar to the approach of [33, 34]. However, rather than seeking the community structure that maximizes this posterior probability, we developed approximations to the marginals of these distributions. In particular, we consider the pairwise co-membership probability p{v,w}: the probability that nodes v and w are in the same community. We develop an estimate of p{v,w} based on using limited information from the graph G and approximating an integral over the model's structural parameters. The resulting method is very fast, and, when exploited to produce a single community detection result (via the utility formulation in Appendix A) yields state-of-the-art accuracy. Various uses for these p{v,w} quantities are combined in the network analysis and visualization product IGNITE. We extended our community detection approach to tracking the evolution of time-varying communities in time-varying graph data. We proposed dynamic analogs of the stochastic blockmodel and planted partition models used in static community detection: these models are continuous-time Markov processes for the joint evolution of the communities and the graph. We derived a Bayesian filter for the current probability distribution over all com- munity structures given the previous history of the graph data. This filter decomposes into prediction steps (during periods of constant graph data) and update steps (at times when the graph changes). The filter is over too large a state space to use directly, so we marginalized it to get state spaces of a reasonable size. These marginalized equations require closures for their higher-order terms, and we discussed one possible closure based on maximum entropy. The community detection work could be extended to more realistic graph models, such as the degree-corrected blockmodel of [41], and the integral approximation developed in Sec- tion 3.2 could certainly be improved. There is much more work to do in the community tracking case, however. In the spectrum of methods that handle dynamic network data, the models presented are intermediate between those that use the data only to discern a static community structure (e.g., [67]) and those mentioned in Section 5 that allow not just individual node movements, but the birth, death, splitting, and merging of communities. Extending this methodology to account for these phenomena would be important for appli- cations. Whatever model is used, some method for parameter selection must be developed. Integrating over the parameter space may be too complicated in the community tracking case, but one may be able to extend the Bayesian filter by making the input parameters themselves hidden variables, and use Hidden Markov Model (HMM) techniques for param- eter learning [4]. Closures must be developed, preferably with proofs of their properties, 32 rather than just experimental justification. Finally, to be truly useful, community tracking need to be able to incorporate ancillary, non-network information about the properties of the nodes and edges involved. Bayesian data fusion provides an excellent framework for coping with this kind of practical problem by identifying what expert knowledge is needed to extend the uncertainty management in a principled manner. Acknowledgments Research partially supported by ONR Contract N0001409C0563. The material presented here draws on the conference papers [24, 26, 27]. The authors thank Andrea Lancichinetti for the LFR benchmark data shown in Figure 3. References [1] E. Airoldi, D. M. Blei, S. E. Fienberg, A. Goldenberg, E. P. Xing, and A. X. Zheng (eds.), Statistical network analysis: Models, issues, and new directions, Springer, 2007. [2] Y. Bar-Shalom, P. K. Willett, and X. Tian, Tracking and data fusion: A handbook of algo- rithms, Yaakov Bar-Shalom, 2011. [3] W. F. Basener, B. P. Brooks, and D. Ross, Brouwer fixed point theorem applied to rumour transmission, Applied Mathematics Letters 19 (2006), no. 8, 841 -- 842. [4] L. E. Baum and T. Petrie, Statistical inference for probabilistic functions of finte state Markov chains, Annals of Mathematical Statistics 37 (1966), 1554 -- 1563. [5] J. O. Berger, Statistical decision theory and bayesian analysis, Springer, 1993. [6] I. Bhattacharya and L. Getoor, Entity resolution in graphs, Mining Graph Data (D. J. Cook and L. B. Holder, eds.), John Wiley & Sons, Inc., Hoboken, NJ, 2006. [7] E. Blasch, I. Kadar, J. Salerno, M. M. Kokar, S. Das, G. M. Powell, D. D. Corkill, and E. H. Ruspini, Issues and challenges in situation assessment (level 2 fusion), J. Advances Information Fusion 1 (2006), no. 2, 122 -- 139. [8] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, Fast unfolding of communities in large networks, J. Stat. Mech. (2008), P10008. [9] B. Bollob´as, Modern graph theory, Springer, New York, 1998. [10] , Random graphs, Cambridge University Press, New York, 2001. [11] N. A. Christakis and J. H. Fowler, The spread of obesity in a large social network over 32 years, New England Journal of Medicine 357 (2007), 370 -- 379. [12] A. Clauset, C. Moore, and M. E. J. Newman, Hierarchical structure and the prediction of missing links in networks, Nature 453 (2008), 98 -- 101. [13] V. Colizza, R. Pastor-Satorras, and A. Vespignani, Reaction -- diffusion processes and metapop- ulation models in heterogeneous networks, Nature Physics 3 (2007), 276 -- 282. 33 [14] A. Condon and R. M. Karp, Algorithms for graph partitioning on the planted partition model, Random Structures and Algorithms 18 (2001), no. 2, 116 -- 140. [15] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to algorithms, third ed., MIT Press, 2009. [16] D. R. Cox and H. D. Miller, The theory of stochastic processes, Chapman & Hall/CRC, 1965. [17] D. F. Crouse, P. Willett, and Y. Bar-Shalom, Generalizations of Blom and Bloem's PDF decomposition for permutation-invariant estimation, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP, 2011, pp. 3840 -- 3843. [18] P. Daniele, Dynamic networks and evolutionary variational inequalities, Edward Elgar Pub- lishing, 2006. [19] T. A. Davis and Y. Hu, The University of Florida sparse matrix collection. [20] P. Doreian, V. Batagelj, and A. Ferligoj, Generalized blockmodeling, Cambridge University Press, New York, 2005. [21] P. Doreian and F. N. Stokman (eds.), Evolution of social networks, Routledge, 1997. [22] M. Feldmann, D. Franken, and W. Koch, Tracking of extended objects and group targets using random matrices, IEEE Transactions on Signal Processing 59 (2011), no. 4, 1409 -- 1420. [23] D. J. Fenn, M. A. Porter, M. McDonald, S. Williams, N. F. Johnson, and N. S. Jones, Dynamic communities in multichannel data: An application to the foreign exchange market during the 2007 -- 2008 credit crisis, Chaos 19 (2009), 033119. [24] J. P. Ferry, Group tracking on dynamic networks, Proc. 12th Int. Conf. on Information Fusion, July 2009, pp. 930 -- 937. [25] , Exact association probability for data with bias and features, J. Advances Information Fusion 5 (2010), no. 1, 41 -- 67. [26] J. P. Ferry and J. O. Bumgarner, Tracking group co-membership on networks, Proc. 13th Int. Conf. on Information Fusion, July 2010. [27] J. P. Ferry, J. O. Bumgarner, and S. T. Ahearn, Probabilistic community detection in networks, Proc. 14th Int. Conf. on Information Fusion, July 2011. [28] S. Fortunato, Community detection in graphs, Physics Reports 486 (2010), no. 3 -- 5, 75 -- 174. [29] L. C. Freeman, The development of social network analysis: A study in the sociology of science, Empirical Press, 2004. [30] L. Grady, Random walks for image segmentation, IEEE transactions on pattern analysis and machine intelligence 28 (2006), no. 11, 1768 -- 1783. [31] D. Greene, D. Doyle, and P. Cunningham, Tracking the evolution of communities in dynamic social networks., ASONAM'10, 2010, pp. 176 -- 183. [32] D. L. Hall, R. Nagi, J. Llinas, J. Lavery, and A. Shirkhodaie, Multidisciplinary research in hard and soft information fusion, Proc. 13th Int. Conf. on Information Fusion, July 2010. 34 [33] M. B. Hastings, Community detection as an inference problem, Phys. Rev. E 74 (2006), no. 3, 035102. [34] J. M. Hofman and C. H. Wiggins, A Bayesian approach to network modularity, Phys. Rev. Lett. 100 (2008), 258701. [35] J. Hopcroft, O. Khan, B. Kulis, and B. Selman, Tracking evolving communities in large linked networks, Proc. Natl. Acad. Sci. USA 101 (2004), no. suppl. 1, 5249 -- 5253. [36] A. Jain and R. Dubes, Algorithms for clustering data, Prentice Hall, 1988. [37] S. Janson, T. (cid:32)Luczak, and A. Ruci´nski, Random graphs, John Wiley & Sons, New York, 2000. [38] E. T. Jaynes, Probability theory: The logic of science (vol 1), Cambridge University Press, 2003. [39] A. H. Jazwinski, Stochastic processes and filtering, Academic Press, 1970. [40] R. E. Kalman, A new approach to linear filtering and prediction problems, Transactions of the ASME -- Journal of Basic Engineering, Series D 82 (1960), 35 -- 45. [41] B. Karrer and M. E. J. Newman, Stochastic blockmodels and community structure in networks, Phys. Rev. E 83 (2011), no. 1, 016107. [42] W. O. Kermack and A. G. McKendrick, A contribution to the mathematical theory of epi- demics, Proc. Roy. Soc. Lond. A 115 (1927), 700 -- 721. [43] A. Lancichinetti and S. Fortunato, Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities, Phys. Rev. E 80 (2009), no. 1, 016118. [44] A. Lancichinetti, S. Fortunato, and J. Kert´esz, Detecting the overlapping and hierarchical community structure in complex networks, New Journal of Physics 11 (2009), 033015. [45] A. Lancichinetti, M. Kivela, J. Saramaki, and S. Fortunato, Characterizing the community structure of complex networks, PLoS One 5 (2010), no. 8, e11976. [46] R. T. A. J. Leenders, Models for network dynamics: A markovian framework, Journal of Mathematical Sociology 20 (1995), no. 1, 1 -- 21. [47] J. Leskovec, L. Adamic, and B. Huberman, The dynamics of viral marketing, ACM Transac- tions on the Web 1 (2007), no. 1, 5 -- es. [48] J. Leskovec, J. Kleinberg, and C. Faloutsos, Graphs over time: Densification laws, shrink- ing diameters and possible explanations, KDD '05: Proc. 11th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD) (New York, NY), ACM Press, 2005. [49] J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney, Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters, Internet Mathe- matics 6 (2009), no. 1, 29 -- 123. [50] T. G. Lewis, Network science: Theory and applications, Wiley, 2009. 35 [51] M. E. Liggins, D. L. Hall, and J. Llinas (eds.), Handbook of multisensor data fusion, 2nd edition ed., CRC Press, Boca Raton, FL, 2009. [52] M. McPherson, L. Smith-Lovin, and J. M. Cook, Birds of a feather: Homophily in social networks, Ann. Rev. Sociology 27 (2001), 415 -- 444. [53] S. Mori and C.-Y. Chong, Track-to-track association metric -- i.i.d.-non-Poisson cases -- , Proc. 6th Int. Conf. on Information Fusion, July 2003. [54] B. Nadler, S. Lafon, R. R. Coifman, and I. G. Kevrekidis, Diffusion maps, spectral clustering and eigenfunctions of Fokker -- Planck operators, Advances in Neural Information Processing Systems 18 (2005), 955 -- 962. [55] M. E. J. Newman, Networks: An introduction, Oxford University Press, USA, 2010. [56] M. E. J. Newman and M. Girvan, Finding and evaluating community structure in networks, Phys. Rev. E 69 (2004), 026113. [57] M. E. J. Newman and E. A. Leicht, Mixture models and exploratory analysis in networks, Proc. Natl. Acad. Sci. USA 104 (2007), 9564 -- 9569. [58] J. M. Ortega, Matrix theory: A second course, Springer, 1987. [59] G. Palla, A.-L. Barab´asi, and T. Vicsek, Quantifying social group evolution, Nature 446 (2007), 664 -- 667. [60] G. Palla, I. Der´enyi, I. Farkas, and T. Vicsek, Uncovering the overlapping community structure of complex networks in nature and society, Nature 435 (2005), 814 -- 818. [61] J. Reichardt and S. Bornholdt, Detecting fuzzy community structures in complex networks with a Potts model, Phys. Rev. Lett. 93 (2004), 218701. [62] , Statistical mechanics of community detection, Phys. Rev. E 74 (2006), 016110. [63] P. Ronhovde and Z. Nussinov, Multiresolution community detection for megascale networks by information-based replica correlations, Phys. Rev. E 80 (2009), no. 1, 016109. [64] M. Rosvall and C. T. Bergstrom, Maps of random walks on complex networks reveal community structure, Proc. Natl. Acad. Sci. USA 105 (2008), no. 4, 1118 -- 1123. [65] [66] , Mapping change in large networks, PLoS One 5 (2010), no. 1, e8694. , Multilevel compression of random walks on networks reveals hierarchical organization in large integrated systems, PLoS One 6 (2011), no. 4, e18209, arXiv:1010.0431v1. [67] C. R. Shalizi, M. F. Camperi, and K. L. Klinkner, Discovering functional communities in dynamical networks, in Airoldi et al. [1], pp. 140 -- 157. [68] T. A. B. Snijders, G. G. van de Bunt, and C. E. G. Steglich, Introduction to stochastic actor- based models for network dynamics, Social Networks 32 (2010), no. 1, 44 -- 60. [69] A. N. Steinberg and C. L. Bowman, Revisions to the JDL data fusion model, in Liggins et al. [51], pp. 45 -- 68. 36 [70] L. D. Stone, C. A. Barlow, and T. L. Corwin, Bayesian multiple target tracking, Artech House, Inc., Norwood, MA, USA, 1999. [71] R. Sulo, T. Berger-Wolf, , and R. Grossman, Meaningful selection of temporal resolution for dynamic networks, Proc. 8th Workshop on Mining and Learning with Graphs (Washington, DC), ACM Press, July 2010, pp. 127 -- 136. [72] C. Tantipathananandh and T. Berger-Wolf, Constant-factor approximation algorithms for identifying dynamic communities, Proc. 15th ACM SIGKDD international conference on knowledge discovery and data mining (Paris, France), ACM Press, July 2009, pp. 827 -- 836. [73] C. Tantipathananandh, T. Berger-Wolf, and D. Kempe, A framework for community identi- fication in dynamic social networks, Proc. 13th ACM SIGKDD international conference on knowledge discovery and data mining (San Jose, CA), ACM Press, August 2007, pp. 717 -- 726. [74] A. L. Traud, E. D. Kelsic, P. J. Mucha, and M. A. Porter, Comparing community structure to characteristics in online collegiate social networks, to appear in SIAM Review (2011). [75] T. W. Valente, Social network thresholds in the diffusion of innovations, Social Networks 18 (1996), 69 -- 89. [76] P. K. Varshney, Distributed detection and data fusion, Springer, 1996. [77] S. Wasserman and K. Faust, Social network analysis, Cambridge University Press, 1994. [78] N. Wiener, Extrapolation, interpolation, and smoothing of stationary time series, Wiley, 1949. [79] W. W. Zachary, An information flow model for conflict and fission in small groups, J. Anthro- pological Research 33 (1977), 445 -- 473. A Expected Utility Formulation Figure 11 depicts the data fusion approach this paper takes toward community detection and tracking. Part (1) represents the model of the hidden state space in which we are interested (in this case the community assignments φ or community partitions π), including some prior probability distribution over it, and, in the dynamic case, an evolution model. Part (2) represents observed data, and the red arrow from (1) to (2) is the measurement model which assigns conditional probabilities of the data given the true state. Part (3) is Bayesian inversion, which yields the conditional probabilities of the true state given the data. When the number of possible states is large, the combinatorial explosion of part (3) must be dealt with in some manner. Thus, part (4) is some reduced representation of the full in this case the pairwise co-membership probabilities p{v,w}. posterior distribution in (3): Finally, part (5) represents the end user of this inference process. The full posterior could, in principle, answer every question the end user might have about the true state, given the limitation of the data available. The reduced representation (4) should be chosen in such a way that it may be gleaned efficiently from (3), but also meet the needs of the end user (5). The body of this paper addresses parts (1) -- (4) for the community detection and tracking problems. This appendix connects that analysis to part (5). Bayesian decision theory [5] provides a way to formalize the connection. Consider the problem of how to assess the quality 37 of some proposed (or computed) partition π. The usual approach is to stipulate some quality function of π and the graph G. Bayesian decision theory argues for assessing the quality of π in terms of its agreement with the true partition π. Thus, with the cooperation of the end user in (5), we should construct a utility function U (ππ) which defines the value of being provided the answer π when the true partition is π. Because the ground truth partition π is unknown, we cannot compute U (ππ). However, if we know the posterior distribution Pr(πG), we can compute the expected utility E[U ](πG). In general, summing over all possible partitions π to get this expected utility is not practical, but we shall provide a generic example in which the summation reduces to one over all pairs of nodes, with the set of pairwise co-membership probabilities p{v,w} providing all necessary statistical information. In this sense, the values of p{v,w} comprise the reduced representation in part (4) of Figure 11. Let V = [n] denote the set of n nodes, and Π(V ) denote the set of all partitions of V . For any particular π ∈ Π(V ), let U (ππ) denote the utility of the decision that π is the correct partition when π is in fact correct. For any graph G on V , one may define the quality of π for G to be the expected value of its utility: E[U ](πG) = U (ππ)Pr(πG), (A.1) where Pr(πG) is the posterior probability of π given G. To simplify (A.1), assume U (ππ) is additive: i.e., that it can be expressed as U (ππ) = (cid:88) u(π[ C]) (A.2) for some function u, where π[ C] is the partition of C induced by π (that is, the sets into which π "chops up" C). In this case, one can compute the expected utility of each community C ∈ π given G, E[U ]( CG) = u(π[ C])Pr(πG), (A.3) and sum them over C ∈ π afterward to get E[U ](πG). Grouping the sum in (A.3) into classes based on the value of π[ C] yields E[U ]( CG) = Pr(πG). (cid:88) (cid:88) (A.4) u(ρ) (cid:88) π∈Π(V ) C∈π (cid:88) π∈Π(V ) ρ∈Π( C) π:π[ C]=ρ Figure 11: Five-part inference framework 38 The inner sum in (A.4) is the probability of ρ given G, denoted Pr(ρG). By grouping the sum in (A.3) less aggressively, however, one obtains a more general result which includes (A.3) and (A.4) as special cases. For any C + ⊇ C, E[U ]( CG) = u(ρ+[ C])Pr(ρ+G). ρ+∈Π( C+) In particular, we let C + = C ∪ {v} and define δ( C, v) = E[U ]( C +G) − E[U ]( CG) − E[U ]({v}G) (A.5) (A.6) (cid:88) (cid:88) (cid:16) to be the increase in expected utility of merging the community C with the singleton com- munity {v}. Using (A.5), δ( C, v) may be expressed as δ( C, v) = u(ρ+) − u(ρ+[ C]) − u({{v}}) Pr(ρ+G). (A.7) ρ+∈Π( C+) This equation allows the expected utility of a community to be computed by adding one node at a time. A.1 A generic utility model (cid:17) Here we consider a simple, generic utility function in which some node v has been identified as "bad," implying that the nodes in his ground-truth community C = π(v) are bad as well, but that decision makers are using some other partition π, resulting in all nodes in C = π(v) ending up "dead." Let uBD and uBA be the respective utilities of a bad node being dead and being alive, and uGD and uGA be the corresponding utilities for good nodes. Summing the utilities over the cases v ∈ V being identified as bad yields the utility function (cid:88) (cid:88) (cid:18) (cid:88) U (ππ) = 1 2 U∗(ππ) =(uBD − uBA − uGD + uGA) C ∩ C2+ (uBA − uGA) C∈π, C∈π C2 + (uGD − uGA) C2 + uGAn2 (A.8) (cid:88) C∈π after some rearrangement. Assuming uGA ≥ uGD and uBD ≥ uBA (and equality does not hold for both), a convenient choice of translation and scaling yields (cid:88) C∈π (cid:19) C ∩ C2 − θ C2 − (1 − θ)n , (A.9) C∈π, C∈π C∈π where the threshold θ = (uGA− uGD)/(uGA− uGD + uBD − uBA) ∈ [0, 1] reflects the emphasis of killing bad nodes (small θ, yielding large communities) versus not killing good nodes (large θ, small communities). This utility function is additive: it may be decomposed according to (A.2) with (cid:19) C2 − θ C2 − (1 − θ) C , (A.10) (cid:18) (cid:88) C∈ρ u(ρ) = 1 2 39 for any ρ ∈ Π( C). Note that u(ρ) = 0 for singleton partitions ρ = {{v}}. Substituting into (A.10) into (A.7) yields (cid:88) (cid:16)ρ+(v) − 1 − θ C(cid:17) δ( C, v) = ρ+∈Π( C+) Pr(ρ+G). (A.11) This may be written δ( C, v) = E[ρ+(v) − 1G] − θ C. The first term here is the expected number of nodes in C that are in the same community as v in a random partition of C +, given the evidence G. Linearity of expectation implies E[ρ+(v) − 1G] = p{v,w}, (A.12) (cid:88) w∈ C where p{v,w} = Pr({{v, w}}G) is the probability that v and w lie in the same community, given G. This may be used to build up E[U ]( CG) by adding nodes v to C one at a time, which yields the simple formula E[U ]( CG) = (cid:88) (cid:0)p{v,w} − θ(cid:1). {v,w}⊆ C Summing this over C yields an expression for the expected utility of a partition π given the graph G which involves only sums over pairs of nodes in the same community C ∈ π: (cid:88) (cid:88) (cid:0)p{v,w} − θ(cid:1). E[U ](πG) = (A.13) (A.14) C∈π {v,w}⊆ C 40
1602.01258
2
1602
2016-06-27T09:28:00
A network-based rating system and its resistance to bribery
[ "cs.SI", "cs.GT" ]
We study a rating system in which a set of individuals (e.g., the customers of a restaurant) evaluate a given service (e.g, the restaurant), with their aggregated opinion determining the probability of all individuals to use the service and thus its generated revenue. We explicitly model the influence relation by a social network, with individuals being influenced by the evaluation of their trusted peers. On top of that we allow a malicious service provider (e.g., the restaurant owner) to bribe some individuals, i.e., to invest a part of his or her expected income to modify their opinion, therefore influencing his or her final gain. We analyse the effect of bribing strategies under various constraints, and we show under what conditions the system is bribery-proof, i.e., no bribing strategy yields a strictly positive expected gain to the service provider.
cs.SI
cs
A network-based rating system and its resistance to bribery Umberto Grandi1 and Paolo Turrini2 1IRIT, University of Toulouse 2Department of Computing, Imperial College London Abstract We study a rating system in which a set of individuals (e.g., the customers of a restaurant) evaluate a given service (e.g, the restaurant), with their aggregated opinion determining the probability of all individuals to use the service and thus its generated revenue. We explicitly model the influence relation by a social network, with individuals being influenced by the evaluation of their trusted peers. On top of that we allow a malicious service provider (e.g., the restaurant owner) to bribe some individuals, i.e., to invest a part of his or her expected income to modify their opinion, therefore influencing his or her final gain. We analyse the effect of bribing strategies under various constraints, and we show under what conditions the system is bribery-proof, i.e., no bribing strategy yields a strictly positive expected gain to the service provider. 1 Introduction Imagine to be the owner of a new and still relatively unknown restaurant. The quality of food is not spectacular and the customers you have seen so far are only limited to a tiny number of friends of yours. Your account on Tripadvisor R(cid:13) has received no review and your financial prospects look grim at best. There is one easy solution to your problems: you ask your friends to write an enthusiastic review for you, in exchange for a free meal. After this, Tripadvisor R(cid:13) lists your restaurant as excellent and the number of customers, together with your profit, suddenly florishes. Systems such as Tripadvisor R(cid:13), where a small proportion of customers writes re- views and influences a large number of potential customers, are not bribery-proof: each restaurant owner - or the owner of whichever service - is able to offer a compensation - monetary or not - in exchange for positive evaluation, having an impact on the whole set of potential customers. Tripadvisor R(cid:13) is based on what we call "Objective Rating", or -aig: individual evaluations are aggregated into a single figure, which is seen by, and thus influences, every potential customer. What we study in this paper is a system in which each individual only receives the evaluation given by the set of trusted peers, his or her friends, and only this aggregated 1 opinion influences his or her decision. This is what we call "Personalised Rating", or -aig, which can be seen a generalisation of -aig in which influence has a complex network-structure. So, while in the case of -aig the restaurant owner knows exactly how influence flows among the customers, this might not be the case with -aig. Our contribution We analyse the effect of bribing strategies in the case of -aig and -aig under various constraints, depending on the presence of customers who do not express any opinion and the knowledge of the network by the service provider: the exact network is known, the network is known but not the customers' exact posi- tion, the network is completely unknown. We show under what conditions the system is bribery-proof, i.e., there is no bribe yielding a strictly positive expected gain to the ser- vice provider, and we provide algorithms for the computation of (all) optimal bribing strategies when they exist. Intuitively, being able to know and bribe influential customers is crucial for guaran- teeing a positive expected reward of a bribing strategy. However, while with large pop- ulations of non-voters "random" bribes can still be profitable, the effect of -aig is largely different from that of -aig and, as we show, the expected profit in the for- mer can be severely limited and drops below zero in all networks, under certain (mild) conditions on the cost of bribes. Our study can be applied to all situations in which individuals influence one another in the opinion they give and bribery can have a disruptive role in determining collective decisions. Related research lines Our approach relates to several research lines in artificial intelligence, game theory and (computational) social choice Brandt et al. [2015]. Network-based voting and mechanism design We study social networks in which individuals' local decisions can be manipulated to modify the resulting global properties. A similar approach is taken by Apt and Markakis [2014] and Simon and Apt [2015], which study the changes on a social network needed to make a certain product adopted among users. Further contributions include rational secret shar- ing and multi-party computation Abraham et al. [2006], the strategic manipula- tion of peer reviews Kurokawa et al. [2015], and the growing literature on voting in social networks Conitzer [2012]; Salehi-Abari and Boutilier [2014]; Elkind [2014]; Tsang et al. [2015]; Procaccia et al. [2015]. Lobbying and Bribery Our framework features an external agent trying to influence individual decisions to reach his or her private objectives. Lobbying in decision- making is an important problem in the area of social choice, from the semi- nal contribution of Helpman and Persson [1998] to more recent studies in multi- issue voting Christian et al. [2007]. Lobbying and bribery are also established concepts in computational social choice, with their computational complexity being analysed extensively Faliszewski et al. [2009]; Baumeister et al. [2011]; Bredereck et al. [2014]; ?. Reputation-based systems We study the aggregation of possibly insincere individ- ual evaluations by agents that can influence one another through trust relations. In this sense ours can be seen as a study of reputation in Multi Agent Systems, 2 which has been an important concern of MAS for the past decades Conte and Paolucci [2002]; Sabater and Sierra [2005]; Garcin et al. [2009]. In particular, our frame- work treats reputation as a manipulable piece of information, not just a static ag- gregate of individual opinions, coherently with the work of Conte et al. [2008] and Pinyol and Sabater-Mir [2013]. Paper structure Section 2 presents the basic setup, introducing -aig, -aig and bribing strategies. Section 3 focusses on -aig, studying its bribery-proofness under various knowledge conditions. Section 4 evaluates -aig against the same knowledge conditions. In Section 5 we compare the two systems, taking the cost of bribery into account. We conclude by summarising the main findings and pointing at future research directions (Section 6). 2 Basic setup In this section we provide the basic formal definitions. 2.1 Restaurant and customers Our framework features an object r, called restaurant, being evaluated by a finite non- empty set of individuals C = {c1, . . . , cn}, called customers. Customers are connected by an undirected graph E ⊆ C × C, called the customers network. Given c ∈ C we call N (c) = {x ∈ C (c, x) ∈ E} the neighbourhood of c, always including c itself. Customers concurrently submit an evaluation of the restaurant, drawn from a set of values Val ⊆ [0, 1], together with a distinguished element {∗}, symbolising no opinion. Examples of values are the set [0, 1] itself, or a discrete assignment of 1 to 5 stars, as common in online rating systems. We make the assumption that {0, 1} ⊆ Val and that Val is closed under the operation min{1, x + y} for all x, y ∈ Val. The vast majority of known rating methods can be mapped onto the [0, 1] interval and analysed within our framework. We represent the evaluation of the customers as a function eval : C → Val ∪ {∗} and define V ⊆ C as the subset of customers that expresses an evaluation over the restaurant, i.e., V = {c ∈ C eval(c) 6= ∗}. We refer to this set as the set of voters and we assume it to be always non-empty, i.e., there is at least one customer that expresses an evaluation. 2.2 Two rating systems In online rating systems such as Tripadvisor R(cid:13) every interested customer can see - and is therefore influenced by - (the average of) what the other customers have written. We call this method -aig, which stands for objective rating. Given an evaluation function eval of a restaurant, the associated -aig is de- fined as follows: -aig(eval) = avg c∈V eval(c) 3 Where avg is the average function across real-valued eval (c), disregarding ∗. We omit eval when clear from the context. -aig flattens individual evaluations into a unique objective aggregate, the rat- ing that a certain restaurant is given. What we propose is a refinement of -aig, which takes the network of influence into account. In this system customers are only interested in the evaluation of other customers they can trust, e.g., their friends. We call our method -aig, which stands for personalised rating. It is defined for a pair customer-evaluation (c, eval) as follows: -aig(c, eval) = avg eval(k) k∈N (c)∩V So the -aig(c, eval) calculates what customer c comes to think of the restaurant, taking the average of the opinions of the customers c is connected to. Again we omit eval whenever clear from the context. Observe that in case a customer has no connection with a voter, then -aig is not defined. To facilitate the analysis we make the technical assumption that each customer is connected to at least one voter. Also observe that when E = C × C, i.e., in case the network is complete and each individual is influenced by each other individual, then for all c ∈ C and eval we have that -aig(c, eval) = -aig(eval). 2.3 Utilities and strategies We interpret a customer evaluation as a measure of his or her propensity to go to the restaurant. We therefore assume that the utility that a restaurant gets is proportional to its rating. To simplify the analysis we assume a factor 1 proportionality. The case of -aig. For the -aig, we assume that the initial utility u0 of the restaurant is defined as: u0 O = C-aig(eval). Intuitively, the initial utility amounts to the number of customers that actually go to the restaurant, weighted with their (average) predisposition. At the initial stage of the game, the restaurant owner receives u0, and can then decide to invest a part of it to influence a subset of customers and improve upon the initial gain. We assume utility to be fully transferrable and, to facilitate the analysis, that such transfers translate directly into changes of customers' predispositions. Definition 1. A strategy is a function σ : C → Val such that Pc∈C σ(c) ≤ u0. Definition 1 imposes that strategies are budget balanced, i.e., restaurants can only pay with resources they have. Let Σ be the set of all strategies. We denote σ0 the strategy that assigns 0 to all customers and we call bribing strategy any strategy that is different from σ0. After the execution of a bribing strategy, the evaluation is updated as follows: Definition 2. The evaluation evalσ(c) after execution of σ is eval σ(c) = min{1, eval(c)+ σ(c)}, where ∗ + σ(c) = σ(c), if σ(c) 6= 0, and ∗ + σ(c) = ∗, if σ(c) = 0. 4 In this definition we are making the assumption that the effect of bribing a non-voter to vote is equivalent to that of bribing a voter that had a 0-level review, as, intuitively, the individual has no associated predisposition to go to the restaurant. A strategy is called efficient if σ(c) + eval(c) ≤ 1 for all c ∈ C. Let B(σ) = {c ∈ C σ(c) 6= 0} be the set of bribed customers. Let V σ be the set of voters after the execution of σ. Executing σ induces the following change in utility: O = C-aig(evalσ) − X uσ σ(c). c∈C Intuitively, uσ O is obtained by adding to the initial utility of the restaurant the rating obtained as an effect of the money invested on each individual minus the amount of money spent. We define the revenue of a strategy σ as the marginal utility obtained by executing it: Definition 3. Let σ be a strategy. The revenue of σ is defined as rO(σ) = uσ say that σ is profitable if rO(σ) > 0. O − u0. We Finally, we recall the standard notion of dominance: Definition 4. A strategy σ is weakly dominant if uσ dominant if uσ O for all σ∈Σ. O > uσ′ O ≥ uσ′ O for all σ′∈Σ. It is strictly Hence a non-profitable strategy is never strictly dominant. The case of -aig. The previous definitions can be adapted to the case of -aig as follows: P = X u0 -aig(c, eval) c∈C which encodes the initial utility of each restaurant, and P = X uσ -aig(c, evalσ) − X σ(c) c∈C c∈C which encodes the utility change after the execution of a σ. Finally, let the revenue σ(c) for of σ be rP(σ) = uσ -aig(evalσ, c). If clear from the context, we use -aig P. P − u0 In order to determine the dominant strategies, we need to establish how the cus- tomers vote, how they are connected, and what the restaurant owner knows. In this paper we assume that the restaurant knows eval, leaving the interesting case when eval is unknown to future work. We focus instead on the following cases: the restaurant knows the network, the restaurant knows the shape of the network but not the individ- uals' position, and the network is unknown. We analyse the effect of bribing strategies on -aig in each such case. Notice how for the case of -aig the cases col- lapse to the first. We also look at the special situation in which every customer is a voter. Given a set of such assumptions, we say that -aig (or -aig) are bribery- proof under those assumptions if σ0 is weakly dominant. 5 Discussion Our model is built upon a number of simplifying assumptions which do not play a significant role in the results and could therefore be dispensed with: (i) customers' ratings correspond to their propensity to go to the restaurant. (ii) the restau- rant utility equals the sum of all such propensities (iii) bribe σ(c) affects evaluation eval(c) linearly. All these assumptions could be generalised by multiplicative factors, such as an average price R paid at the restaurant, and a "customer price" Dc, such that evalσ(c) = eval(c) + σ(c) Dc . 3 Bribes under -aig In this section we look at bribing strategies under -aig, first focussing on the case where everyone expresses an opinion, then moving on to the more general case. 3.1 All vote Let us now consider the case in which V = C. Recall that B(σ) is the set of customers bribed by σ. We say that two strategies σ1 and σ2 are disjoint if B(σ1)∪B(σ2) = ∅. By direct calculation it follows that the revenue of disjoint strategies exhibits the following property: Lemma 1. If V = C and σ1 and σ2 are two disjoint strategies, then rO(σ1 ◦ σ2) = rO(σ1) + rO(σ2). We now show that bribing a single individual is not profitable. Lemma 2. Let σ be a bribing strategy, V = C and B(σ) = 1. Then, rO(σ) ≤ 0, i.e., σ is not profitable. Proof sketch. Let ¯c be the only individual such that σ(¯c) 6= 0. By calculation, r(σ) = σ − -aig −Pc σ(c) = min{1, eval(¯c) + σ(¯c)} − eval(¯c) − O − u0 uσ σ(¯c) ≤ 0. O = -aig By combining the two lemmas above we are able to show that no strategy is profitable for bribing the -aig. Proposition 3. If V = C, then no strategy is profitable. Proof sketch. Any bribing strategy σ can be decomposed into n pairwise disjoint strate- gies such that σ = σc1 ◦ · · · ◦ σcn and B(σcj ) = 1 for all 1 ≤ j ≤ n. By applying Lemma 1 and Lemma 2 we then obtain that rO(σ) ≤ 0. From this it follows that σ0 is weakly dominant and thus -aig bribery-proof when all customers voted. 6 3.2 Non-voters Let us now consider the case of V ⊂ C, i.e., when there is at least one customer who is not a voter. In this case Lemma 1 no longer holds, as shown in the following example. Example 1. Let C = {A, B, C}, and let eval(A) = 0.5, eval(B) = 0.5, and eval(C) = ∗. The initial resources are u0 = -aig × 3 = 1.5. Let now σ1(A) = 0.5 and σ1(B) = σ1(C) = 0, and let σ2(C) = 0.5 and σ2(A) = σ2(B) = 0. Now = 0.¯6×3−1 = 1. uσ1 O = 0.75×3−0.5 = 1.75 and uσ2 The example (in particular σ1) also shows that -aig in this case is not bribery- O = 0.5×3−0.5 = 1, but uσ1 ◦σ2 O proof. We now turn to characterise the set of undominated bribing strategies. We begin by showing that bribing a non-voter is always dominated. Let first σ be a strategy such that σ(¯c) 6= 0 for some c ∈ C \ V and recall that V σ is the set of voters after execution of σ. Let us define the c-greedy restriction of σ to be any strategy σ−¯c such that: • V σ−¯c = V σ \ {c}, i.e., the greedy restriction eliminates ¯c from the set of voters. • For each c ∈ V σ \ c, max(1, eval(c) + σ(c)) = max(1, eval(c) + σ−¯c(c)), i.e., the greedy restriction does not waste further resources. • If there exists c ∈ V σ \ c such that eval(c) + σ−¯c(c) < 1 then Pc∈C σ−¯c(c) = Pc∈C σ(c), i.e., the σ−¯c redistributes σ(¯c) among the remaining voters. We now show that each strategy bribing a non-voter is strictly dominated by any of its greedy restrictions. Proposition 4. Let V 6= C, and ¯c ∈ C \ V . Then each strategy σ with σ(c) 6= 0 is strictly dominated by σ−¯c. Proof. Let σ be a strategy with σ(c) 6= 0 for some non-voter c, and let σ−¯c be one of its greedy restriction defined above. C(-aig σ−¯c −-aig σ)+ X σ(c)− X σ−¯c(c) = c∈C c∈C uσ−¯c O − uσ O = C(Pc∈C evalσ−¯c V (c) − Pc∈C evalσ(c) ) + V ∪ c σ(c) − X c∈C +(X c∈C σ−¯c(c)) Observe first that σ−¯c is a redistribution, hence Pc σ(c) − Pc σ−¯c(c) ≥ 0, i.e., the second addendum in the above equation is positive. Consider now the case where there exists c ∈ V σ \c such that eval(c)+σ−¯c(c) < 1. Then by the definition of σ−¯c we have that Pc∈V σ evalσ(c) = Pc∈V σ−¯c evalσ−¯c (c), i.e., the greedy restriction preserves the overall evaluation. By straightforward calculation this entails that uσ−¯c O > 0. If σ < 1 no such c exists, and therefore -aig or, by the efficiency requirement and the fact that σ(c) 6= 0, we have that Pc∈C σ(c) > Pc∈C σ−¯c(c). In either cases we have that uσ−¯c = 1 we have that either -aig O − uσ O − uσ O > 0. σ−¯c 7 Let an O-greedy strategy be any efficient strategy that redistributes all the initial re- O among voters. Making use of the previous result, we are able to characterise sources u0 the set of all dominant strategies for -aig. Proposition 5. Let V 6= C. A strategy is weakly dominant for -aig if and only if it is an O-greedy strategy. Proof sketch. For the right-to-left direction, first observe that all O-greedy strategies are payoff-equivalent, and that a non-efficient strategy is always dominated by its ef- ficient counterpart. By Proposition 4 we know that strategies bribing non-voters are dominated, and by straightforward calculations we obtain that in presence of non-voters it is always profitable to bribe as much as possible. For the left-to-right direction, ob- serve that a non-greedy strategy is either inefficient, or it bribes a non-voter, or does not bribe as much as possible. In either circumstance it is strictly dominated. While there may be cases in which the number of weakly dominant strategies under -aig is exponential, all such strategies are revenue equivalent, and Proposition 5 gives us a polynomial algorithm to find one of them: starting from an evaluation vector eval, distribute all available resources u0 O to the voters, without exceeding the maximal evaluation of 1. By either exhausting the available budget or distributing it all, we are guaranteed the maximum gain by Proposition 5. 4 Bribes under -aig In this section we look at bribing strategies under -aig, against various knowledge conditions on the social network. As for Section 3 we start by looking at the case where everyone votes and later on allowing non-voters. Before doing that, we introduce a useful graph-theoretic measure of influence. Definition 5. The influence weight of a customer c ∈ C in a network E and and a set of designed voters V is defined as follows: c = X wV k∈N (c) 1 N (k) ∩ V Recall that we assumed that every customer can see a voter, thus wV for every c. If V = C, i.e., when everybody voted, we let wc = wC obtain wc = Pk∈N (c) is defined by a bribing strategy σ, we write wσ c are well-defined c . In this case, we deg(k) , where deg(c) = N (c) is the degree of c in E. When V . 1 c = wV σ c Intuitively, each individual's rating influences the rating of each of its connections, with a factor that is inversely proportional to the number of second-level connections that have expressed an evaluation. We formalise this statement in the following lemma: Lemma 6. The utility obtained by playing σ with -aig is uσ evalσ(c) − Pc∈C σ(c). P = Pc∈V σ wσ c × 8 Proof. By calculation: P + X uσ σ(c) = X -aig σ(c) = X c∈C c∈C c∈C avg evalσ(k) = k∈N (c)∩V σ = X (cid:2) c∈C 1 N (c) ∩ V σ X k∈N (c)∩V σ evalσ(k)(cid:3) = = X (cid:2) evalσ(k) × X k∈V σ k′ ∈N (k) 1 N (k′) ∩ V σ(cid:3) = = X wσ c × evalσ(c) c∈V σ 4.1 All vote, known network We begin by studying the simplest case in which the restaurant knows the evaluation eval, the network E as well as the position of each customer on the network. The following corollary is a straightforward consequence of Lemma 6: Corollary 7. Let V = C and let σ1 and σ2 be two disjoint strategies, then rP(σ1 ◦ σ2) = rP(σ1) + rP(σ2). We are now able to show a precise characterisation of the revenue obtained by any efficient strategy σ: Proposition 8. Let V = C, let E be a known network, and let σ be an efficient strategy. Then rP(σ) = Pc∈C(wc − 1)σ(c). Proof. By calculation, where Step (2) uses Lemma 6, and Step (4) uses the fact that σ is efficient: = [X wc evalσ c − X σ(c) − X c∈C c∈C c∈C rP(σ) = uσ P − u0 P = wc eval(c)] = = X (cid:2)wc [min{1, eval(c) + σ(c)} − eval(c)](cid:3) − X σ(c) c∈C c∈C (wc − 1)σ(c). = X c∈C (1) (2) (3) (4) Proposition 8 tells us that the factors wc are crucial in determining the revenue of a given bribing strategy. Bribing a customer c is profitable whenever wc>1 (provided its evaluation was not 1 already), while bribing a customer c with wc≤1 is at most as profitable as doing nothing, as can be seen in the example below. Most importantly, it shows that -aig is not bribery-proof when the restaurant knows both the network and the customers' evaluations. 9 Example 2. Let E be a four arms stars, and let A be the individual in the centre. Assume each individual values the restaurant 0.5. We have that wA = 2.2 and wc = 0.7 for all c different from A. Consider now two bribing strategies: σA which bribes A with 0.5, and σB which bribes a single individual B 6= A with the same amount. What we obtain is that rP(σA) = 0.6, while rP(σB) = −0.15. Given a network E and an evaluation vector eval, let Algorithm 1 define the P- greedy bribing strategy. P P : C → Val Input: Evaluation function eval and network E Output: A bribing strategy σG Budget=u0 P (c) = 0 for all c ∈ C σG Compute wc for all c ∈ C Sort c ∈ C in descending order c0, . . . , cm based on wc for i=0,. . . ,m do if Budget6= 0 then if wci > 1 then P (ci) = min{1 − eval(ci), Budget} σG Budget=Budget-σG P (ci) end end return σG P end Algorithm 1: The P-greedy bribing strategy σG P As a consequence of Proposition 8 we obtain: Corollary 9. The P-greedy bribing strategy defined in Algorithm 1 is weakly dominant. As in the case of -aig, Corollary 9 has repercussions on the computational complexity of bribery: it shows that computing a weakly dominant strategy can be done in polynomial time. Notice how the most costly operation lies in the computation of the influence weights wc, which can be performed only once, assuming the network is static. Similar problems, such as recognising whether bribing a certain individual is profitable, or estimating whether individuals on a network can be bribed above a certain threshold, are also computable in polynomial time. 4.2 All vote, unknown network We now move to study the more complex case of an unknown network. Surprisingly, we are able to show that no bribing strategy is profitable (in expectation), and hence -aig is bribery-proof in this case. Recall that we are still assuming that the restau- rant knows eval and everybody voted. We begin by assuming that the restaurant knows the structure of the network, but not the position of each participant. Formally, the restaurant knows E, but considers 10 n! [uσ ρ − u0 ρ as uσ any permutation of the customers in C over E as possible. Let us thus define the expected revenue of a strategy σ over a given network E as the average over all possible permutations of customers: E[rP(σ)] = P 1 ρ], where we abuse notation by P under permutation ρ over the network E. What we are able to show writing uσ is that all strategies are at most as profitable as σ0 in expected return: Proposition 10. Let V = C, let the network structure of E be known but not the relative positions of customers on E. Then E[rP(σ)] = 0 for all strategies σ. Proof sketch. Let C = n. We show the result for any strategy σ that bribes a single customer ¯c. The general statement follows from the linearity of E[r(σ)]. Equation (5) uses Proposition 8 to compute the revenue for each permutation ρ of customers C on the network: E[σ] = X ρ 1 n! (uσ ρ − u0 ρ) = X ρ 1 n! (wρ(¯c) − 1)σ(¯c) = = X c∈C (n − 1)! n! (wc − 1)σ(¯c) = (n − 1)! n! X c∈C (wc − 1) = 0 (5) (6) The last line follows from the observation that Pc wc = C and hence Pc(wc − 1) = 0, by a consequence of Definition 5 when everybody votes. Hence, if we assume a uniform probability over all permutations of customers on the network, a straightforward consequence of Proposition 10 concludes that it is not profitable (in expectation) to bribe customers. Corollary 11. If V = C and the network is unknown, then no bribing strategy for -aig is profitable in expected return. 4.3 Non-voters, known network With -aig it is possible to find a network where bribing a non-voter is profitable: Example 3. Consider 4 individuals {B, C, D, E} connected only to a non-voter in the middle. Let eval(j) = 0.2 for all j but the center. We have u0 P = 1. Let A be the non-voter, and let σ1(A) = 1 and 0 otherwise. The utility of σ1 is: σ1 (j) − 1 = 1.76 σ1 (A) + 4-aig -aig All other strategies can be shown to be dominated by σ1. Take for instance a strategy σ2 such that σ2(B) = 0.8, σ2(C) = 0.2 and 0 otherwise. The utility of σ2 is uσ2 P = 1.25. It is quite hard to obtain analytical results for strategies bribing non-voters, due to the non-linearity of the -aig in this setting. We can however provide results in line with those of the previous section if we restrict to voter-only strategies, i.e., strategies σ such that σ(c) = 0 for all c 6∈ V . In this case, a similar proof to Proposition 8 shows the following: Proposition 12. Let V 6= C, E be a known network, and σ be an efficient bribing strategy such that B(σ) ⊆ V . Then, rP(σ) = Pc∈V (wV The difference with the case of V = C is that wV presence of non-voters, such as in our Example 3. c can be arbitrarily large in the c − 1)σ(c). 11 A0.2 B0.2 C* A0.2 B0.2 C* B0.2 C* A0.2 Figure 1: Customers permutations in Example 4. 4.4 Non-voters, unknown positions Unlike the case of V = C, in this case it is possible to define bribing strategies that are profitable (in expected return). Example 4. Let C = {A, B, C}, and the initial evaluation eval(A) = eval(B) = 0.2 and eval(C) = ∗. Assume that the structure of the network is known, but the position of the individuals is not. Let the three possible network positions (without counting the symmetries) be depicted in Figure 1. Let σ(B) = 0.2 and σ(A) = σ(C) = 0. In the first case: 1 P (σ)=-aig(A) + ... + -aig(C) − 0.2 − u0 P = r = 0.3 + 0.3 + 0.4 − 0.2 − 0.6 = 0.2 In the second case r2 P(σ) = 0 while in the third: r 3 P (σ) = 0.4 + 0.3 + 0.2 − 0.2 − 0.6 = 0.1 Therefore, -aig is not bribery-proof (in expectation) in the presence of non- voters when the network is unknown. Interesting computational problems open up in this setting, such as identifying the networks that allow for profitable bribing strategies, and their expected revenue. 5 Boundaries of bribery-proofness The previous sections have shown that having a network-based rating systems, where individuals are influenced by their peers, is not bribery-proof, even when the position of individuals in a given network is not known. However bribing strategies have a different effect in the overall score. While the utility of -aig is a sum of the global average of voters' evaluation, the utility of -aigis a sum of local averages of voters' evalution against the one of their peers. Therefore a strategy bribing one voter affects everyone in the case of -aig, but it can be shown to have a limited effect in the case of -aig. Proposition 13. Let σ be an efficient strategy s.t. B(σ) = 1, and let ¯c be such that σ(c) 6= 0. Then rP(σ) < N (¯c). 12 Proof. By calculation, we have that: rP(σ) = X -aig σ(c)−σ(¯c)− X -aig(c) = c∈C c∈C X -aig σ(c) − σ(¯c) − X -aig(c) ≤ c′∈N(¯c) c′∈N(¯c) ≤ 1 × N (¯c) − σ(¯c) − X -aig(c) < N (¯c) c′ ∈N(¯c) The previous result shows that increasing the number of individuals that are not connected to an agent that is bribed, even if these are non-voters, does not increase the revenue of the bribing strategy. This is not true when we use -aig. Proposition 14. Let σ be an efficient strategy. The revenue rO(σ) of σ is monotonically increasing with the number of non-voters, and is unbounded. Proof. It follows from our definitions that: rO(σ) = ( C V σ − 1)(cid:2) X eval(c) + σ(c)(cid:3) c∈C The above figure is unbounded and monotonically increasing in the number of non- voters, which can be obtained by increasing C keeping V σ fixed. So while -aig and -aig are not bribery-proof in general, it turns out that the impact of the two in the overall network are significantly different. In particular, under realistic assumptions such as a very large proportion of non-voters and with par- ticipants having a few connections, bribing under -aig is increasingly rewarding, while under -aig this is no longer the case. 6 Conclusive remarks We introduced -aig, a network-based rating system which generalises the com- monly used -aig, and analysed their resistance to external bribery under various conditions. The main take-home message of our contribution can be summarised in one point, deriving from our main results: -aig and -aig are not bribery-proof in general. However, if we assume that a service provider has a cost for bribing an individual, there are situations in which -aig is fully bribery proof, while -aig is not. For instance, if the cost of bribing an individual c is at least N (c) then -aig is bribery-proof. As observed previously, this is not necessarily true for -aig. In particular, if we assume the presence of unreachable individuals the difference is more significant. As shown, for -aig we need to bribe individuals with wc > 1. With -aig is sufficient to find one voter who accepts a bribe. There is a number of avenues open to future research investigation. The most im- portant ones include the case of partially known customers' evaluation, and the study of ratings of multiple restaurants, where the probability of a customer choosing a restau- rant determines his or her probability not to choose the others. 13 Acknowledgments Umberto Grandi acknowledges the support of the Labex CIMI project "Social Choice on Networks" (ANR-11-LABX-0040-CIMI). Paolo Turrini the support of Imperial College London for the Junior Research Fellowship Designing negotiation spaces for collective decision-making (DoC-AI1048). This work has also been partly supported by COST Action IC1205 on Computational Social Choice. References I. Abraham, D. Dolev, R. Gonen, and J. Halpern. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In Proceedings of the 25th ACM symposium on Principles of distributed computing (PODC'06), 2006. Krzysztof R. Apt and Evangelos Markakis. Social networks with competing products. Fundamenta Informaticae, 129(3):225–250, 2014. Dorothea Baumeister, G´abor Erd´elyi, and Jorg Rothe. How hard is it to bribe the judges? A study of the complexity of bribery in judgment aggregation. In Pro- ceedings of the Second International Conference on Algorithmic Decision Theory (ADT-2011), 2011. Felix Brandt, Vincent Conitzer, Ulle Endriss, J´erome Lang, and Ariel Procaccia, edi- tors. Handbook of Computational Social Choice. Cambridge University Press, 2015. R. Bredereck, J. Chen, S. Hartung, S. Kratsch, R. Niedermeier, O. Such´y, and G. J. Woeginger. A multivariate complexity analysis of lobbying in multiple referenda. Journal of Artificial Intelligence Research, 50:409–446, 2014. R. Christian, M. Fellows, F. Rosamond, and A. Slinko. On complexity of lobbying in multiple referenda. Review of Economic Design, 11(3):217–224, 2007. Vincent Conitzer. Should social network structure be taken into account in elections? Mathematical Social Sciences, 64(1):100–102, 2012. Rosaria Conte and Mario Paolucci. Reputation in Artificial Societies: Social Beliefs for Social Order. Kluwer Academic Publishers, 2002. Rosaria Conte, Mario Paolucci, and Jordi Sabater-Mir. Reputation for innovating social networks. Advances in Complex Systems, 11(2):303–320, 2008. Edith Elkind. Coalitional games on sparse social networks. In 10th International Conference on Web and Internet Economics (WINE-2014), 2014. Piotr Faliszewski, Edith Hemaspaandra, and Lane A. Hemaspaandra. How hard is Journal of Artificial Intelligence Research (JAIR), 35:485– bribery in elections? 532, 2009. 14 F. Garcin, B. Faltings, and R. Jurca. Aggregating reputation feedback. In Proceedings of the International Conference on Reputation, 2009. Elhanan Helpman and Torsten Persson. Lobbying and legislative bargaining. Working Paper 6589, National Bureau of Economic Research, June 1998. David Kurokawa, Omer Lev, Jamie Morgenstern, and Ariel D. Procaccia. Impartial peer review. In Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, (IJCAI-2015), pages 582–588, 2015. Isaac Pinyol and Jordi Sabater-Mir. Computational trust and reputation models for open multi-agent systems: a review. Artificial Intelligence Review, 40(1):1–25, 2013. Ariel D. Procaccia, Nisarg Shah, and Eric Sodomka. Ranked voting on social networks. In Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, (IJCAI-2015), 2015. Jordi Sabater and Carles Sierra. Review on computational trust and reputation models. Artificial Intelligence Review, 24(1):33–60, 2005. Amirali Salehi-Abari and Craig Boutilier. Empathetic social choice on social net- works. In Proceedings of the 13th International conference on Autonomous Agents and Multi-Agent Systems, (AAMAS-2014), 2014. Sunil Simon and Krzysztof R. Apt. Social network games. Journal of Logic and Computation, 25(1):207–242, 2015. Alan Tsang, John A. Doucette, and Hadi Hosseini. Voting with social influence: Us- ing arguments to uncover ground truth. In Proceedings of the 15th International Conference on Autonomous Agents and Multiagent Systems, (AAMAS-2015), 2015. 15
1607.03914
2
1607
2016-12-30T12:45:37
A simple multiforce layout for multiplex networks
[ "cs.SI", "physics.soc-ph" ]
We introduce multiforce, a force-directed layout for multiplex networks, where the nodes of the network are organized into multiple layers and both in-layer and inter-layer relationships among nodes are used to compute node coordinates. The proposed approach generalizes existing work, providing a range of intermediate layouts in-between the ones produced by known methods. Our experiments on real data show that multiforce can keep nodes well aligned across different layers without significantly affecting their internal layouts when the layers have similar or compatible topologies. As a consequence, multiforce enriches the benefits of force-directed layouts by also supporting the identification of topological correspondences between layers.
cs.SI
cs
A simple multiforce layout for multiplex networks Zahra Fatemi, Mostafa Salehi*, and Matteo Magnani Abstract-We introduce multiforce, a force-directed layout for multiplex networks, where the nodes of the network are organized into multiple layers and both in-layer and inter-layer relationships among nodes are used to compute node coordinates. The proposed approach generalizes existing work, providing a range of intermediate layouts in-between the ones produced by known methods. Our experiments on real data show that multiforce can keep nodes well aligned across different layers without significantly affecting their internal layouts when the layers have similar or compatible topologies. As a consequence, multiforce enriches the benefits of force-directed layouts by also supporting the identification of topological correspondences between layers. Index Terms-Layout, Multiplex Network, Force-directed, Visualization. ! 1 INTRODUCTION technology networks, N ETWORK analysis is a widely applied discipline, due to the fact that many realities can be mod- eled as sets of interconnected entities – for example, social networks, transportation networks, utility networks and biological networks. In the following, we use the term monoplex to indicate a network consisting of nodes with a single type of relationship among them. The simplicity of monoplex network models is at the same time a strength, making them applicable to diverse contexts, and a limit, because it may hide many details of the modeled reality. There- fore, multiplex networks are often used as a richer but still simple and general model, as they allow multiple types of relationships between nodes. For example, two people in an online social network like Facebook can be friends, while being colleagues in a work environment. Many aspects of multiplex networks from spreading processes to structural measures such as clustering co- efficient and node centrality have been recently inves- tigated [21], [3], [30], [2], [16], [27], [9], building on a long-standing literature in Social Network Analysis [32], but only a few works have specifically investigated how to draw multiplex networks. Several layouts have been proposed to visualize monoplex networks, arranging nodes so that users can easily identify special network structures like hubs or communities, and quickly locate important nodes [31], but drawing multiplex networks is significantly more challenging. A multiplex network visualization should support two main types of tasks: the analysis of the single layers, each corresponding to a traditional monoplex network for which existing graph layouts can be used, and the analysis of the relationships between layers, for which it is useful to identify where the same nodes or net- • Zahra Fatemi and Mostafa Salehi (*corresponding author) are with Uni- versity of Tehran. E-mail: [email protected], mostafa [email protected] • Matteo Magnani is with Uppsala University. Email: [email protected] (a) Flattened visualization (b) Sliced visualization Fig. 1: Two alternative ways of visualizing a multiplex network with 180 nodes and 863 edges of 6 types work structures are located on the different layers [9]. Representing multiple relationship types in the same graph as in Figure 1(a) can quickly lead to a very dense representation hiding relevant network structures [26]. Therefore, different relationship types can be organized into different layers, with the same node replicated on multiple layers, as in Figure 1(b). This approach has been used in the literature to represent different types of multiplex networks, from traffic networks [19], [7] to biological [7] and social/historical [22], [21] networks. In the literature, two main approaches for visualizing layers, losing our ability to quickly locate the same node across layers. To enable an objective evaluation of our approach with respect to its ability to keep nodes aligned across layers but also preserve layer-specific structures we have de- fined two quality metrics representing these two criteria, called respectively external fit and internal fit. These are naturally defined as the forces which would be active on the nodes if we were only trying to respectively align them across layers or draw them according to the internal structure of the layer. We have then performed an evaluation on several real networks showing how existing approaches would optimize only one of these two metrics, while our algorithm can obtain good scores on both at the same time. In addition to this evaluation, we have also executed our algorithm on a simple dataset to characterize the resulting diagrams. A practically valuable result is that a visualization of two layers (or relationship types) whose structures are similar only at specific locations would highlight these similarities, by keeping only those nodes well-aligned - something that global layer similarity measures cannot capture. In Section 2 we quickly review existing layouts for monoplex and multiplex networks. In Section 3 our multiforce algorithm is introduced. Section 4 presents an example using a small synthetic dataset, to characterize the impact of different settings, while Section 5 proposes an evaluation on real data. 2 RELATED WORK In this section we describe previous works on monoplex and multiplex network visualization. 2.1 Monoplex Network visualization Many layouts have been designed to visualize monoplex networks. Here we briefly review the ones that are more relevant for our approach. For an extensive review, the reader may consult [31]. Multi-scale layouts first create some core sub graphs, then they add other nodes until all nodes and edges are added [31], [17]. Random layouts [8] and circular layouts [20] are two categories of layouts which are appropriate for small graphs with few nodes and edges, because they do not consider aesthetic criteria: many edge crossings and node overlappings can appear. Among the most used visualization methods, force- directed algorithms consider a graph as a physical system where forces change the position of nodes. The two best known force-directed layouts are Fruchterman-Reingold [11] and Kamada-Kawai [15], [14]. In the Fruchterman- Reingold layout nodes have repulsive power and push other nodes away, while edges attract neighbor nodes. In this layout nodes are considered as steel rings haing similar loads and edges are like springs attracting neigh- bouring rings. This algorithm consists of three main steps. First, all nodes are distributed randomly. Second, Fig. 2: The effect of in-layer and inter-layer forces on node positions multiplex networks sliced into layers have been used: keeping the same layout in all layers, meaning that each node keeps the same position in all layers and all its replicas would result aligned on a straight line if the layers are visualized one besides the other, or visualizing each layer independently of the others. The first approach focuses only (or mainly) on inter-layer relationships, highlighting node correspondences across layers, while the second focuses only on in-layer edges. In our view these approaches are just two specific cases of a more general method. To fill the gap between these two extremes we propose to define a range of intermediate layouts with a controllable balance between in-layer and inter-layer relationships. We call our general layout multiforce. Multiforce is based on a force-directed algorithm (Fruchterman-Reingold) and uses two main types of forces: in-layer and inter-layer, that can be tuned to impact specific layers more or less than others. In-layer forces attract neighbors inside the same layer, making them closer, as in traditional layouts for monoplex networks. Inter-layer forces try to align instances of the same node on different layers1. Figure 2 gives an intuition of how these forces operate. In addition, we also use repulsive forces as in the original algorithm. A specific problem of multiplex network visualization is that different layers can expose different structures, for example two nodes connected on one layer may be disconnected on another. Therefore, in general it is impossible to produce a good layout for each layer and keep nodes perfectly aligned across different layers at the same time. As an example, node 2 in the lower layer of Figure 2 would be attracted towards node 1 on the same layer because of the edge between them, but this would increase the distance between the position of node 2 on the lower layer and the position of node 2 on the upper layer. In this way we would negatively affect our visual understanding of the relationships between the different 1. In theory inter-layer forces can also be used to visualize more general networks, where edges can cross layers, but in this work we focus on multiplex networks. repulsive forces separate all nodes. The value of repul- sive force depends on the positions of the nodes. Third, for each edge and based on the position of nodes after repulsion, attractive forces are calculated [11]. In the Kamada-Kawai layout an energy function is defined for the whole graph based on shortest paths between nodes, and positions are iteratively updated until the graph's energy is minimized [15]. Bannister et al. [1] proposed a force-directed layout to change the position of nodes so that more graph- theoretically central nodes pushed towards the centre of the diagram. In this algorithm, an additional force called gravity is used to change the position of more central nodes. For each node v in a graph G the position of the node is influenced by the following force: I[v] = fr(u, v) + fa(u, v) + fg(v) (1) (cid:88) u,v∈V (cid:88) (u,v)∈E (cid:88) v∈V where fr and fa are respectively repulsive and attractive forces, and fg is the gravity force, measured as: fg(v) = γtM [v](ξ − P [v]) (2) In this equation M [v] is the mass of node v, which can be set according to the node degree, P [v] is the position of v, γt is the gravitational parameter and ξ = ΣvP [v]/V is the centroid of all nodes. Notice that forces in the equations above are vectors. Other extensions of force-directed layouts have con- sidered the inclusion of additional domain-specific infor- mation in the definition of the forces. An example is [36], where the defiinitions of attractive and repulsive forces include terms representing trust in social networks. Force-directed methods have two main drawbacks. First, they are typically suitable for networks with at most 100 nodes, because attractive forces result in hiding some relationships among nodes and node-overlapping increases. Second, their run time is high in comparison with other approaches. However, they are very popular, because they often practically succeed in separating clus- ters and increasing graph readability. To address these shortcomings, layout algorithms are sometimes split into multiple phases, with an initial preprocessing of the data to generate good starting node dispositions or to reduce data complexity. As an example, Gajer et al.'s method first partitions the graph into subgraphs [34]. The smallest subgraph is then processed independently and thus more efficiently. Afterwards, a force-directed refinement round changes the values of initial node positions and the next smallest subgraph is added to the previous one, with these steps being repeated untill all nodes have been processed. [37] follows the same steps, setting initial node positions in a different way. Similarly, Peng et al. proposed the Social Network Analysis Layout (SNAL) by also separating a network into subgroups, analyzing relationships between them and positioning nodes based on their relative centralities [35]. Another family of layouts, that can also be combined with force-directed algorithms, are constraint-based lay- outs [10]. These layouts force nodes to appear at specific positions. For example, nodes are placed on a frame in a way that they do not overlap, or are horizontally and vertically aligned, as in the orthogonal layout [31], [10]. In these layouts, it is more difficult to isolate special struc- tures like communities and time complexity is noticeably high. One important assumption in graph drawing is that there is a correspondence between some aesthetic fea- tures of the diagrams and their readability. Therefore, some visualization algorithms explicitly target these fea- tures. One such criterion is that too many edge crossings make a graph more difficult to interpret. The crossing number, cr(G), of a graph G is the smallest number of crossings appearing in any drawing of G [28]. Several algorithms have been proposed to reduce edge crossing in monoplex networks. For example, Shabbeer et al. [29] developed a stress majorization algorithm. In [28] and [4] the concept of edge crossing is elaborated and equations for measuring the number of edge crossings in different graphs are reviewed. Another aesthetic feature impact- ing graph readability is node overlapping. Two popular methods to reduce node overlapping are proposed in [12], [18]. 2.2 Multiplex Network Visualization Different methods have been discussed for visualizing multiplex networks. We can categorize these methods into three main classes: • Slicing: One way of visualizing multiplex networks is to show each layer or relationship type as a monoplex network and to connect these monoplex networks using inter-layer edges [7]. The layers can have aligned layouts or independent layouts. Aligned layouts help users find similar nodes in different layers by forcing the same node to have the same coordinates on all layers, but structures ex- isting only on one layer (for example communities) may not be clearly visualized. Independent layouts can show specific structures of each layer, but may hide inter-layer patterns [26]. • Flattening: In these methods, all nodes and edges are placed on the same plane. In a node-colored network, nodes from different layers are shown with different colors [16], while for multiplex networks colors can be used to distinguish edges of different types. Apart from suffering from the same problems of aligned slicing, the disadvantage of this method is that for networks with high edge density rela- tionships among nodes can be hidden by edges from non-relevant layers and readability quickly decreases due to the network's clutter [26]. • Indirect: This approach tries to visualize informa- tion derived from the network instead of directly visualizing the original layers, which are considered to be too complex to allow a simple visual rep- resentation. Renoust et al. [24] proposed a system for visual analysis of group cohesion in flattened multiplex networks. This system, called Detangler, creates a so-called substrate network from unique nodes of the multiplex network and a so-called catalyst network from edges of different types. Erten et al. [33] proposed three modified force-directed approaches for creating slicing, flattened and split views of multilayer networks by considering edge weights and node weights. The weights of nodes and edges are based on the number of times they appear in different layers. In this approach inter- layer relationships between nodes are ignored and node weights are the same for all nodes when multi- plex networks are visualized, so this approach does not consider the specific features of the networks targeted in our work. An extreme case of indirect methods, that we men- tion for completeness, consists in not visualizing nodes and edges at all but only indirect network properties, such as the degree of the nodes in the different layers or other summary measures [7], [26], [23]. These approaches are complementary to graph drawing, and can also be used in combination with our proposal. Our method belongs to the slicing class, and is different from existing approaches because it allows a balancing of the effects of in-layer and inter-layer relationships. 3 THE MULTIFORCE LAYOUT Multiforce extends the Fruchterman-Reingold algorithm [11], and as mentioned in the introduction is based on two types of attractive forces. The nodes are posi- tioned on a set of planes, one for each layer or type of relationship – this setting is sometimes called 2.5- dimensional, because it looks 3-dimensional but the z- coordinates of the nodes are fixed and limited to the number of planes/layers. In-layer forces, that can be weighted differently in each layer, attract pairs of nodes connected on the same layer. Inter-layer forces influence the position of nodes in different layers connected by inter-layer edges, or corresponding to the same node in the case of multiplex networks. The pseudo-code of multiforce is presented in Al- gorithm 1. The algorithm takes a multiplex network G = (N, L, V, E) as input, where N is a set of nodes, L a set of layers, (V, E) is a graph and the elements of V are pairs (cid:104)node, layer(cid:105). We notate v.layer the layer of an element v ∈ V and v.node the node corresponding to an element v ∈ V . Lines 13-29 are the same as in the original algorithm, and compute the displacement of each node based on its neighbors (attractive forces) and other nodes (repulsive forces), with the addition of weights that can be used to specify on which layers the layout should be computed according to the original algorithm (27-28). Lines 30-37 extend the original algorithm and compute the displace- ment caused by the position of the node on other layers, to control node alignment. This is also weighted, to allow the user to turn this feature on and off for all or some layers (34-35). Some details of the algorithm can be changed without affecting its underlying idea. First, we can modify lines 6-12 to assign the same initial random coordinates to the same node across different layers, anticipating line 8 before the for loop. A weighting factor INLA[v] can also be added at line 20, so that both attractive and repulsive forces are reduced or reinforced together - in practice, this does not seem to have a significant effect on the result; all diagrams in Section 4 have been computed without these weights. Finally, lines 41 and 42 have been retained from the original algorithm and ensure that the nodes do not exit the frame specified by the user, but are not necessary if the final coordinates are re-scaled to fit it. 3.1 Time Complexity Separating nodes based on repulsive forces has time complexity O(N2) for each layer. For a complete network with N nodes and L layers, there are at most (LN(N−1) N) inter-layer relationships in the whole network. So, the time complexity of multiforce without using indexes is O(LN2 + L2N). ) in-layer edges and ( L(L−1) 2 2 4 A SIMPLE EXAMPLE Before providing a quantitative evaluation of our al- gorithm, we show the resulting layouts on a simple synthetic network and different weights, to give a vi- sual intuition of it. As we have briefly discussed in Section 2 there is a connection between aesthetic features of graph diagrams and their readability [14]. Typical metrics are the number of edge crossings, the number of overlapping nodes, the separation of communities, and the representation of high-degree centrality nodes in a specific position, for example in the centre of each layer. These features can be easily manually inspected in the following diagrams. In addition, the simple network used in this section allows us to check the impact of different settings for the in-layer and inter-layer weights. The structures of the synthetic dataset used in the following is shown in Figure 3. This dataset contains two layers, each with 13 nodes; the whole network has 53 in-layer edges. Some nodes that are present in one community in one layer belong to another in the second layer, making this small example useful to show how these nodes are handled by varying the weights. The results of drawing this multiplex network with multiforce and different combinations of weights are shown in Table 1. While this is just a first illustrative example it highlights the main features of the proposed method, later tested with a larger qualitative example on real data and a quantitative evaluation. • When a good compromise between in-layer and inter-layer forces can be found, as in this simple Fig. 3: The structure of the synthetic network First Layer Second Layer TABLE 1: Visualizing the synthetic network using different weights Inter-layer Force=0 Inter-layer Force=0.5 Inter-layer Force=1 In-layer Force=0 In-layer Force=0.5 In-layer Force=1 example, the method is stable with respect to its parameters. All the examples in Table 1 where both forces are not null (that is, the four bottom-right plots) are very similar. • If we focus on the bottom-right plot, we can see how despite some differences in structure most of the nodes are aligned, with the nodes being part of different communities in the different layers having slightly different positions that preserve the local structures. In other words, we can highlight the local structures in both layers at the same time, still keeping the ability to easily identify corresponding nodes across layers. • If we extend our analysis from single nodes to whole structures, such as communities or sub-graphs, an inspection of the inter-layer connections may reveal which parts of the layers are similar and which parts are significantly different. We will in fact find sim- ilar structures well aligned across different layers, with approximately parallel inter-layer connections among nodes. Dissimilar parts of the network will instead be characterized by more oblique and ca- hotic inter-layer connections (if in-layer forces are prevalent, preventing alignment across layers) or meaningless/random layouts (if inter-layer forces are prevalent, removing local structures) or com- binations of these two cases. Notice that this is even better than what we can do using existing layer correlation metrics (such as degree-degree cor- relation or the jaccard coefficient), which compare whole layers and are thus not able to identify locally aligned regions. Algorithm 1 Multiforce Require: G = (N, L, V, E): a multiplex network Require: W : width of the frame Require: L: length of the frame Require: #iterations 1: fr = function(z, k){ return k2/z; } 2: fa = function(z, k){ return z2/k; } 3: area := W · L 4: k := (cid:113) areaN ; 5: t :=(cid:112)N; end for for (v ∈ V s.t. v.node = n) do (x, y) = random coordinates; pos[v] = (x, y) z[v] := index(v.layer); 6: for (n ∈ N) do 7: 8: 9: 10: 11: 12: end for 13: for ( i = 1 to #iterations ) do // calculate repulsive forces 14: for (v ∈ V ) do 15: disp[v] := (cid:126)0; 16: for (u ∈ V ) do 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: end if end for if (u (cid:54)= v and u.layer = v.layer) (cid:52) := pos[v] − pos[u]; disp[v] := disp[v] + ((cid:52)/ (cid:52) ) ∗ fr( (cid:52) ); then end for // calculate attractive forces inside each layer for ((u, v) ∈ E) do (cid:52) := pos[v] − pos[u]; disp[v] := disp[v]−((cid:52)/(cid:52))∗fa((cid:52), k)∗INLA[v]; disp[u] := disp[u]+((cid:52)/(cid:52))∗fa((cid:52), k)∗INLA[u]; end for // calculate attractive forces across layers for (n ∈ N) do for ({u, v} with u, v ∈ V , u.node = v.node = n) do (cid:52) := pos[v] − pos[u]; disp[v] := disp[v] − ((cid:52)/ (cid:52) ) ∗ fa( (cid:52) , k) ∗ INTERLA[v, u]; disp[u] := disp[u] + ((cid:52)/ (cid:52) ) ∗ fa( (cid:52) , k) ∗ INTERLA[u, v]; 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: end for end for // assign new positions for (v ∈ V ) do := pos[v] + (disp[v]/disp[v]) ∗ pos[v] min(disp[v], t); pos[v].x := min(W/2, max(−W/2, pos[v].x)); pos[v].y := min(L/2, max(−L/2, pos[v].y)); 41: 42: 43: 44: 45: 46: end for end for // reduce the temperature t := cool(t); 5 EXPERIMENTAL EVALUATION In this section we present a more structured evaluation of our method, using real datasets. Our algorithm does not replace existing slicing ap- proaches: it unifies and complements them with new options, given by the recognition of the existence of in-layer and inter-layer forces and the introduction of balancing parameters between them. In theory, all the available options can be valuable, including those pro- vided by existing methods: for a user it can be good to keep all the nodes strictly aligned, while for another it can be better to visualize the layers one by one. Therefore, we will not try to prove the superiority of one approach over the other, and the main value of our proposal is to have a single flexible algorithm that can emphasize different aspects of the data. However, we can also unambiguously show that our algorithm can generate valuable visualizations that cannot be obtained using existing methods. By being less strict and, for example, allowing some small disalignment between nodes in different layers, still not preventing their quick identification, we can get the best from both extremes. More precisely, we compare different layouts against an ideal case where each layer is drawn independently of the others, to optimize its internal readability, and at the same time all occurrences of the same node across different layers are perfectly aligned. Notice that such a visualization is impossible to obtain in general, except when the two layers are (almost) identical. To compute the distance between the ideal case and our tests we can define two measures representing these two criteria: the sum of the forces still active on the nodes inside each layer (called internal fit) and the displacement between nodes in different layers (caled external fit), also computed as the sum of the inter-layer forces still active at the end of the algorithm. Notice that an optimal diagram as defined above would contain both internally stable and aligned nodes, so both measures would be 0, indicating the best possible layout (assuming that a force-based approach is used). The hypothesis we test in the following experiments is that existing approaches optimize only one of these two criteria, while multiforce can obtain good scores on both at the same time when using both in-layer and inter-layer forces. In the follow- ing we call this setting, allowed by our method, balanced. To give an intuition of how a balanced drawing may look like, consider Figure 4 where we have visualized a real 5-layer social network previously used in multiplex visualization research [26]. To make the diagram more readable on paper we have drawn each layer besides the others instead of in a 2.5D space. The different layers are drawn according to their internal organization, showing peculiar structures: for example, the lower community indicated in the top-left diagram (continuous line) is not present in some of the other layers. However, we can see how the nodes belonging to this community have been visualized at similar locations in the other layers, Chemical Polyadic) [6]. • A transport network with flight connections in Eu- rope [5]. For each network, Figure 5 shows how different lay- outs behave with respect to the two aforementioned measures, indicated as Intra (internal fit) and Inter (exter- nal fit) in the plots. We remind the reader that high val- ues of the former means that some layers have not been correctly visualized according to their internal structure - for example, the nodes in a community may have been spread around the frame instead of being close to each other. A high value of the latter means that nodes are not aligned across layers - for example, a node may have been visualized in the top left corner in one layer and in the top right in the other. The ideal case would be to have 0 for both metrics. In each figure, several settings are tested, each represented by two bars corresponding to the two metrics. The first setting corresponds to a balanced layout, where our algorithm is executed with weight 1 for all inter- and in-layer forces. The second setting corresponds to the case where all layers are visualized independently of the others. In the remaining settings the layout is computed based on one of the layers, and nodes are kept aligned on the other layers. As expected, for each network (that is, for each plot in Figure 5) the independent visualization (second case) generates nodes that are not well aligned, represented by a tall second bar, and in the following cases we can see that computing the layout based on one layer prevents other layers from having good internal layouts, as shown by the tall first bars. The balanced option (first case) presents internal layouts that are less good than the ideal case, and node alignments that are also less good than the best possible option, but both are close to optimal and significantly better than the aspect not optimized in other experiments. In practice, this corresponds to layouts similar to the one shown in Figure 4. 6 CONCLUSION An optimal layout for multiplex networks would be able to reveal the structure of each layer and the relationships between different layers at the same time. Unfortunately, this is not possible in general, because these two aspects may not be aligned in real data, with some layers being very uncorrelated with the others. To address this problem, we proposed multiforce, a force-directed algorithm in which both in-layer and inter-layer forces can affect the position of nodes. In- layer forces keep together connected nodes and im- prove the identification of communities, while inter-layer forces help users finding the same nodes in different layers. In the evaluation of the method we showed that while the algorithm supports more traditional layouts it can also generate what we call balanced visualizations where both internal properties and node alignments are handled. This has been presented on a simple synthetic Fig. 4: Alignment of network structures across layers using a balanced visualization, with both in-layer and inter-layer forces active providing information about inter-layer relationships. We can see, for example, that some of the nodes in this community are not present in the second layer, that this community is split into two sub-communities in the third layer, that it is not present in the fourth layer, where the same nodes are connected to different parts of the graph, and that they form a similar but less dense community in the fifth layer. Notice that in the fourth layer the nodes are still more or less in the same position as in the first layer, despite the fact that they do not form a community. In this way it becomes easier to locate them – in the real 2.5-dimensional visualization we would also have lines connecting nodes across layers, as in the previous section, making the task straightforward as long as the nodes are more or less aligned. In the figure we have also marked a second community with a fuzzy rectangle, so that the reader may observe another example. To quantitatively support our claim we have executed the algorithm on eight real datasets from different do- mains, summarized in Table 2: • Three traditional multiplex networks from the the Social Network Analysis literature. • A hybrid online/offline social network with five types of relationships among the employees of a Computer Science Department [26]. • A dataset showing the relationship among physi- cians in four different cities, collected to investigate information diffusion about drugs [13]. • A criminal network [25]. • A biological network in which every layer shows a synaptic junction (Electric, Chemical Monadic, TABLE 2: Properties of Real-world Networks Network Social – Padgett Social – Kaptail Social – Wiring Hybrid – AUCS Social – Physicians Criminal – Noordin Biological – synapses Transport – airlines # Layers 2 4 6 5 3 4 3 37 # Nodes 15 39 14 61 241 74 279 417 # Edges 35 552 108 1240 1370 318 3108 3588 (a) Social – Padgett (b) Social – Kaptail (c) Social – Wiring (d) Hybrid – AUCS (e) Social – Physicians (f) Criminal – Noordin (g) Biological – synapses (h) Transport – airlines Fig. 5: Results of experiments on real data 01020304050balindl.1l.2strategyMean forcesTypeIntraInter010002000balindl.1l.2l.3l.4strategyMean forcesTypeIntraInter050010001500balindl.1l.2l.3l.4l.5l.6strategyMean forcesTypeIntraInter0200040006000balindl.1l.2l.3l.4l.5strategyMean forcesTypeIntraInter0200040006000balindl.1l.2l.3strategyMean forcesTypeIntraInter020004000balindl.1l.2l.3l.4strategyMean forcesTypeIntraInter0500100015002000balindl.1l.2l.3strategyMean forcesTypeIntraInter010002000300040005000strategyMean forcesTypeIntraInter example, to highlight the main features of our method, on a real dataset, to give a qualitative idea of how the layouts produced by this approach look like, and quan- titatively, introducing two quality metrics and showing how a balanced approach can satisfactorily address both at the same time on several real datasets from different domains. In this paper we only considered static multiplex networks, but nodes and edges can change over time and appropriate layouts considering dynamical features could be valuable tools. In addition, other aesthetic features of graph diagrams like symmetry and uniform edge length could be investigated in the context of multiplex networks. Finally, other types of inter-layer links can also be considered in the future, as in more general multilayer network models. REFERENCES [1] Michael J. Bannister, David Eppstein, Michael T. Goodrich, and Lowell Trott. Force-directed graph drawing using social gravity and scaling. In Proceedings of the 20th International Conference on Graph Drawing, pages 414–425. Springer-Verlag, Berlin, Heidel- berg, 2013. Federico Battiston, Vincenzo Nicosia, and Vito Latora. Structural measures for multiplex networks. Physical Review E, 89(3):032804, 2014. [2] [3] Michele Berlingerio, Michele Coscia, Fosca Giannotti, Anna Mon- reale, and Dino Pedreschi. Multidimensional networks: founda- tions of structural analysis. World Wide Web, 16(5-6):567–593. [4] Christoph Buchheim, Markus Chimani, Carsten Gutwenger, Michael Jnger, and Petra Mutzel. Crossings and Planarization. CRC Press, 2013. [5] Alessio Cardillo, Jes ´us G´omez-Garde nes, Massimiliano Zanin, Miguel Romance, David Papo, Francisco del Pozo, and Stefano Boccaletti. Emergence of network features from multiplexity. Scientific reports, 3:1344, 2013. [6] Beth L. Chen, David H. Hall, and Dmitri B. Chklovskii. Wiring op- timization can relate neuronal structure and function. Proceedings of the National Academy of Sciences of the United States of America, 103(12):4723–4728, 2006. [7] Manlio De Domenico, Mason A. Porter, and Alex Arenas. MuxViz: a tool for multilayer analysis and visualization of networks. Journal of Complex Networks, pages 159–176, 2014. Josep D´ıaz, Jordi Petit, and Maria Serna. A survey of graph layout problems. ACM Comput. Surv., 34(3):313–356, September 2002. [9] Mark E. Dickison, Matteo Magnani, and Luca Rossi. Multilayer [8] Social Networks. Cambridge University Press, 2016. [10] Tim Dwyer, Kim Marriott, Falk Schreiber, Peter Stuckey, Michael Woodward, and Michael Wybrow. Exploration of networks using overview+detail with constraint-based cooperative layout. IEEE transactions on visualization and computer graphics, 14(6):1293–300, January 2008. [11] Thomas M. J. Fruchterman and Edward M. Reingold. Graph Softw. Pract. Exper., drawing by force-directed placement. 21(11):1129–1164, November 1991. [12] Xiaodi Huang, Wei Lai, A.S.M. Sajeev, and Junbin Gao. A new algorithm for removing node overlapping in graph visualization. Information Sciences, 177(14):2821 – 2844, 2007. [13] Herbert Menzel James Coleman, Elihu Katz. The diffusion of an innovation among physicians. Sociometry, 20(4):253–270, 1957. [14] Skye BenderdeMoll James Moody, Daniel McFarland. Dynamic network visualization. American Journal of Sociology, 110(4):1206– 1241, 2005. [15] Tomihisa Kamada and Satoru Kawai. An algorithm for drawing Inf. Process. Lett., 31(1):7–15, April general undirected graphs. 1989. [16] Mikko Kivela, Alexandre Arenas, Marc Barthelemy, James P. Glee- son, Yamir Moreno, and Mason A. Porter. Multilayer Networks. Journal of Complex Networks, 2(3):203–271, sep 2014. [17] Yehuda Koren, L. Carmel, and D. Harel. Ace: a fast multiscale eigenvectors computation for drawing huge graphs. In Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on, pages 137– 144, 2002. [18] Pushpa Kumar and Kang Zhang. Visualization of clustered directed acyclic graphs with node interleaving. In Proceedings of the 2009 ACM Symposium on Applied Computing, SAC '09, pages 1800–1805, New York, NY, USA, 2009. ACM. [19] Maciej Kurant and Patrick Thiran. Layered Complex Networks. Physical Review Letters, 96(13):138701, apr 2006. [20] Ding Ma. Visualization of social media data: mapping changing social netwroks . Master's thesis, the Faculty of Geo-Information Science and Earth Observation of the University of Twent, 2012. [21] Matteo Magnani and Luca Rossi. The ML-Model for Multi-layer In Proceedings of the International conference on Social Networks. Social Network Analysis and Mining (ASONAM), pages 5–12. IEEE Computer Society, 2011. [22] John F Padgett and Paul D McLean. Organizational Invention and Elite Transformation: The Birth of Partnership Systems in Renaissance Florence. American Journal of Sociology, 111(5):pp. 1463–1568, 2006. [23] Denis Redondo, Arnaud Sallaberry, Dino Ienco, Faraz Zaidi, and Pascal Poncelet. Layer-Centered Approach for Multigraphs In Proceedings of the International Conference on Visualization. Information Visualisation (iV), pages 50–55, 2015. [24] Benjamin Renoust, Guy Melanon, and Tamara Munzner. Detan- gler: Visual analytics for multiplex networks. Computer Graphics Forum, 34(3):321–330, 2015. [25] Nancy Roberts and Sean F. Everton. Roberts and Everton Terrorist Data: Noordin Top Terrorist Network (Subset), 2011. [26] Luca Rossi and Matteo Magnani. Towards effective visual ana- lytics on multiplex and multilayer networks. Chaos, Solitons & Fractals, 72:68 – 76, 2015. [27] Mostafa Salehi, Rajesh Sharma, Moreno Marzolla, Matteo Mag- nani, Payam Siyari, and Danilo Montesi. Spreading processes in multilayer networks. Network Science and Engineering, IEEE Transactions on, 2(2):65–83, 2015. [28] Marcus Schaefer. The graph crossing number and its variants: a survey. The electronic journal of combinatorics, 1000:DS21–May, 2013. [29] A Shabbeer, C Ozcaglar, M Gonzalez, and KP Bennett. Optimal embedding of heterogeneous graph data with edge crossing In Presented at NIPS Workshop on Challenges of Data constraints. Visualization, page 1, 2010. [30] Albert Sol´e-Ribalta, Manlio De Domenico, Sergio G´omez, and Alex Arenas. Centrality rankings in multiplex networks. In Proceedings of the 2014 ACM Conference on Web Science, WebSci '14, pages 149–155, New York, NY, USA, 2014. ACM. [31] Tatina von Landesberger, Arjan Kuijper, Tobias Schreck, Jorn Kohlhammer, Jean-Daniel. Fekete, and Dieter Fellner. Visual analysis of large graphs: State-of-the- art and future research challenges. Computer Graphics Forum, 30(6):1719–1749, 2011. Jarke van Wijk, [32] Stanley Wasserman and Katherine Faust. Social Network Analysis: Methods and Applications, volume 8 of Structural analysis in the social sciences, 8. Cambridge University Press, 1994. [33] Cesim Erten, Stephen G. Kobourov, Vu Le, and Armand Navabi. Simultaneous Graph Drawing: Layout Algorithms and Visualization Schemes, pages 437–449. Springer Berlin Heidelberg, Berlin, Hei- delberg, 2004. [34] Pawel Gajer, Michael T. Goodrich, and Stephen G. Kobourov. A multi-dimensional approach to force-directed layouts of large graphs. Computational Geometry, 29(1):3 – 18, 2004. [35] Wu Peng, Li SiKun. Social network analysis layout algorithm under ontology model. SOFTWARE, 6(7):3 – 18, JULY 2011. [36] Na; Ma Yao; Lu Hongwei Gan, Zaobin; Li. [ieee 2013 10th web information system and application conference (wisa) - yangzhou, china (2013.11.10-2013.11.15)] 2013 10th web information system and application conference - trust network visualization based on force-directed layout. 2013. [37] Michael Baur, Ulrik Brandes, Marco Gaertler, and Dorothea Wag- ner. Drawing the AS Graph in 2.5 Dimensions, pages 43–48. Springer Berlin Heidelberg, Berlin, Heidelberg, 2005.
1205.0038
1
1205
2012-04-30T21:40:37
Percolation Computation in Complex Networks
[ "cs.SI", "physics.soc-ph" ]
K-clique percolation is an overlapping community finding algorithm which extracts particular structures, comprised of overlapping cliques, from complex networks. While it is conceptually straightforward, and can be elegantly expressed using clique graphs, certain aspects of k-clique percolation are computationally challenging in practice. In this paper we investigate aspects of empirical social networks, such as the large numbers of overlapping maximal cliques contained within them, that make clique percolation, and clique graph representations, computationally expensive. We motivate a simple algorithm to conduct clique percolation, and investigate its performance compared to current best-in-class algorithms. We present improvements to this algorithm, which allow us to perform k-clique percolation on much larger empirical datasets. Our approaches perform much better than existing algorithms on networks exhibiting pervasively overlapping community structure, especially for higher values of k. However, clique percolation remains a hard computational problem; current algorithms still scale worse than some other overlapping community finding algorithms.
cs.SI
cs
Percolation Computation in Complex Networks Fergal Reid Clique Research Cluster Complex Adaptive Systems Laboratory University College Dublin Email: [email protected] Aaron McDaid Clique Research Cluster Complex Adaptive Systems Laboratory University College Dublin Dublin 4, Ireland Neil Hurley Clique Research Cluster Complex Adaptive Systems Laboratory University College Dublin Dublin 4, Ireland 2 1 0 2 r p A 0 3 ] I S . s c [ 1 v 8 3 0 0 . 5 0 2 1 : v i X r a Abstract—K -clique percolation is an overlapping community finding algorithm which extracts particular structures, comprised of overlapping cliques, from complex networks. While it is conceptually straightforward, and can be elegantly expressed using clique graphs, certain aspects of k-clique percolation are computationally challenging in practice. In this paper we investigate aspects of empirical social networks, such as the large numbers of overlapping maximal cliques contained within them, that make clique percolation, and clique graph representations, computationally expensive. We motivate a simple algorithm to conduct clique percolation, and investigate its performance compared to current best-in-class algorithms. We present im- provements to this algorithm1 , which allow us to perform k-clique percolation on much larger empirical datasets. Our approaches perform much better than existing algorithms on networks ex- hibiting pervasively overlapping community structure, especially for higher values of k . However, clique percolation remains a hard computational problem; current algorithms still scale worse than some other overlapping community finding algorithms. I . IN TRODUC T ION One particular type of percolation, important in the study of complex networks, studied by Palla et al. [1] is k-clique per- colation, which Fortunato’s review [2] of community detection methods describes as the most popular overlapping community detection method. A clique is a group of nodes in a network, such that every node is connected to each other node. Palla et al. argue that percolated k-cliques – groups of cliques of size k , that are connected together by cliques of size (k-1) – are important structures in complex networks, and a good way to find community structure. They discuss k-clique percolation in a variety of application contexts, including authorship networks, word association networks, and certain biological contexts, for example, claiming that percolated k-cliques in protein-protein interaction networks correspond to functional units of protein structure. Additionally, Palla, Barabasi, and Vicsek [3] apply k-clique percolation to the study of social dynamics, in mobile telecoms social network datasets. More generally, the work of Evans [4] motivates ‘clique graphs’ as interesting constructions to use when studying structure in networks and finding communities. A ‘clique graph’ of a specific source network is formed by representing each clique in the source network by a node in the ‘clique graph’. Pairs of nodes in the clique graph are then connected by edges where the corresponding pair of cliques overlap 1 Source code available: http://sites.google.com/site/CliquePercComp in the source network. Clique graphs have many interesting properties, not least that k-clique percolation can be expressed as a simple thresholding on the clique graph. Clique graph construction and k-clique percolation are thus linked. Evans argues that different types of partitioning and thresholding of the clique graph are interesting to examine for the purposes of overlapping community detection, and also to examine structure in complex networks generally. However, in practice these approaches to find network struc- ture present computational challenges. In a naive algorithmic approach to k-clique percolation, one algorithm to percolate k- cliques – for example as described in the review of Fortunato, citing the work of Everett and Borgatti [5] – is “In order to find k-clique communities, one searches first for maximal cliques. Then a clique-clique overlap matrix O is built, which is an nc × nc matrix, nc being the number of cliques; Oij is the number of vertices shared by cliques i and j . To find k-cliques, one needs simply to keep the entries of O which are larger than or equal to k − 1, set the others to zero and find the connected components of the resulting matrix.” This simple algorithm, which essentially finds k-clique percolations by finding connected components in a certain construction of the clique graph, is quadratic in the number of maximal cliques in the graph, by virtue of the way that it builds the complete clique-clique overlap matrix. Furthermore, the number of cliques, and maximal cliques, in an empirical network may be very large, as we will discuss. Some work has presented faster computational methods of obtaining percolated k-clique structures. The authors of the original Palla et al. paper have provided a faster CFinder [6] implementation to find percolated k-cliques. More recent work has been done by Kumpula et al. with their ‘Sequen- tial Clique Percolation’ algorithm (SCP) [7] which further improves efficiency. However, these improved methods often perform poorly on networks with the kind of pervasively overlapping community structure we see in many real world social networks – an area of increasing interest in the applied study of community structure – and particularly poorly when performing percolation with high values of k . In this work, we consider several computational aspects of the problem of percolating structures in large complex networks. We focus our discussion on k-clique percolation, but the techniques we describe could be applied to the computation of many similar percolation problems. We note that there are many other overlapping community finding methods, some of which are much more scalable than clique percolation; however in this paper we focus on clique percolation, due to its popularity. We also hope that k- clique percolation will serve as a case study for computational techniques that could later be used to improve the scalability of algorithms for other types of percolation. A. Structure of the paper In Section II we define clique percolation. We also discuss clique graphs, which are a useful conceptual tool to understand the problem and to gain insight into various algorithms. We show how, even though cliques are indicative of community structure, there can be many more cliques than communities. Algorithms typically fall into one of two classes: either they are based on finding the k-cliques or else they limit themselves to the maximal cliques with at least k nodes in them. We explain how these are equivalent and discuss an example of each kind from the literature. In Section III we discuss some challenges that face all the examples in the literature and which are also faced by our algorithms. The number of cliques can be very large, as can the size of the clique graph. Also we explain why, while it is tempting to attempt to represent a community of cliques merely as the union of the nodes in its constituent cliques, such a method will lead to an incorrect algorithm. In Section IV, we define and motivate our algorithms and evaluate the speed of them against SCP on a variety of synthetic networks and on empirical social networks. In Section V, we briefly mention other approaches to this problem that we considered and other overlapping community finding algorithms of interest. I I . K -C L IQU E P ERCO LAT ION We now give a description of k-clique percolation, con- straining ourselves to computationally relevant properties. For a detailed introduction to the method, and arguments motivating it as a tool for overlapping community finding, consult Palla et al. [1]. In k-clique percolation, if two cliques of size k share k-1 nodes, we say that these two cliques percolate into each other. The maximal sets of cliques, which satisfy the property that every clique in the set is reachable from every other clique in the set, through a path connecting percolating pairs, form the communities output by k-clique percolation. These communities are then typically output as the sets of nodes contained within each set of cliques – and may overlap. Typically, for a given community found by k- clique-percolation, a particular application requires these sets of nodes as the representation of the communities found. However, as we will see later, in order to maintain a correct understanding of clique percolation it is best to think about k- clique communities as sets of overlapping cliques, rather than the set of nodes that each set of percolated cliques contains. A. Clique Graphs A clique graph is formed from a source network by creating a node in the clique graph for each clique in the source network and joining two nodes in the clique graph if their corresponding cliques in the source network share nodes, or ‘overlap’ – see Figure 1 for a visualisation. This is a simple visualisation of a small clique graph extracted from a simple network; such relationships are difficult to visualise due to the heavily overlapping nature of cliques in networks; this is especially true as the value of k used is increased. The edges in a clique graph may be weighted, corresponding to the overlap between the cliques. Thresholding such a graph – removing the nodes corresponding to cliques of size less than some value k , and removing edges with weight lower than (k − 1) – yields a graph in which the connected components are the cliques that would have percolated into each other, in k-clique percolation. Figures 4a, 4b, and 4c illustrate this process. As both thresh- olding the edges of a graph and calculating the connected components of a graph are computationally inexpensive, it is inexpensive to calculate the k-clique percolations, given the clique graph. The clique graph is a useful conceptual tool to understand the definition of k-clique percolation, and to understand the particular algorithms that have been used to recover these structures. Evans [4] discusses some other general advantages of using clique graphs: “The advantage is that there are many well established methods for analysing the properties of vertices of a graph and for the price of a simple transformation, these can be applied to obtain the same information about the cliques”, and goes on to state that “In terms of computational efficiency, the clique graphs are generally bigger [than the source network] but by how much depends on the detailed structure of the graph. The speed savings of a good fast vertex partitioning algorithm [...] may compensate for the larger size of the clique graph.” However, while clique graphs are an elegant construction, and a useful tool for reasoning about clique percolation, there are computational obstacles to their use on many empirical networks, as we shall see; in practice, the clique graph often takes a very long time to construct. We will also later see that, in the specific case of k-clique percolation, it is in fact not necessary to compute the entire clique graph in order to compute the percolated communities. B. Cliques vs. Maximal Cliques Throughout this paper, we discuss k-clique percolation, with reference to two definitions of ‘clique’: A ‘clique’ is a fully connected sub-graph – a set of nodes all of which are connected to each other. A ‘maximal clique’ is a clique that is contained in no larger clique. Every maximal clique is a clique, by definition, but the opposite does not hold. Thus there are maximal clique of size n will always have (cid:0)n (cid:1) cliques of always more cliques than maximal cliques. In fact, as has been previously [1][7] pointed out, any k size k , for each k < n, within it. Note, however, that these contained cliques will not be distinct across maximal cliques. Nonetheless, by definition, each maximal clique will have at Fig. 1. This illustration shows a very simple network, and its clique graph. We represent the source network with circular nodes. We represent the maximal cliques in this network as squares, placing a square at the center of each 4- clique. The corresponding maximal clique graph, with threshold of overlap 3, is shown below. The connected components in this graph – there is only one in our example – correspond to the cliques that percolate into each other – this entire graph would be one k-clique percolation, for k = 4. Fig. 2. A maximal 6-clique. If the dashed edges are removed, this diagram shown now contains 4 maximal cliques. This counter-intuitive behaviour, whereby missing edges can increase the number of maximal cliques in a network, partly illustrates why a particular empirical network can have many more maximal cliques than it has edges, nodes, and communities. least one clique within it that is not contained in any other clique, and usually many more. Thus, the number of cliques in any non-trivial network is always greater than the number of maximal cliques. This is an important consideration, as some algorithms have complexity in terms of cliques, and others in terms of maximal cliques. It is important to realise that cliques of size k will always percolate within a larger clique of size greater than k ; thus a maximal clique of size greater than k contains a k-clique percolation (which may also extend outside it). Further, any k-clique sharing k-1 nodes with this maximal clique will be part of the same percolation. Hence, clique percolation can be equivalently defined in these two different ways; one definition is based on a clique graph of every clique with exactly k nodes, while another definition is based on a maximal-clique graph of every maximal clique of at least k nodes. Various algorithmic implementations make use of each of these definitions, with consequences for computational performance. C. More cliques than communities The large numbers of maximal cliques found in the ‘Facebook 100’ networks [8] shown in Table II – much greater than the number of nodes in each network – may be surprising, given the sociological interpretation of cliques as a community structure [9]; if a clique corresponds to the idea of a community, we may wonder why social networks contain so many more maximal cliques than nodes. However, in empirical social networks, we often observe a situation where a large maximal clique may overlap heavily with many other smaller maximal cliques that differ from it by only a few nodes. It is also the case, that if edges are randomly deleted from a single maximal clique, this maximal clique will often be replaced by many smaller maximal cliques. A visualisation of this is shown in Figure 2, where a single maximal clique, after having 2 edges removed, turns into 4 maximal cliques. Thus, in a social network setting, if not every friendship is present between a strong community of individuals, many maximal cliques may emerge within this single ‘community’ of nodes. This goes some way to intuitively explaining the large numbers of maximal cliques seen in datasets from on-line social networks. D. Previous approaches 1) CFinder: The original CFinder implementation, as de- scribed by Palla et al. in supplementary material [1], follows the method of Everett and Borgatti, finding all maximal cliques, by a custom method, and generating the overlap ma- trix between these cliques. Once this overlap matrix is found, percolations for all values of k can then easily be calculated. However, building the full overlap matrix – equivalent to c ) clique-clique the full clique graph – naively requires O(n2 comparisons, in nc the number of maximal cliques. Thus, CFinder performs poorly on the empirical networks we study. 2) SCP: SCP [7], on the other hand, works off a custom clique finding algorithm to find, not all the maximal cliques, but all cliques of size k . For each clique of size k , or ‘k-clique’, it is trivial to find the cliques of size k-1 inside it. SCP is based on a bipartite graph with the k-cliques on one side and the (k-1)-cliques on the other side. A (k-1)-clique is linked to every k-clique containing it. The connected components in this bipartite network correspond to the clique percolation communities. The idea is that two (k-1)-cliques percolate into each other if they are both members of the same k-clique, and this is equivalent to the conventional definition of two k-cliques being linked if they share k-1 nodes. While SCP consistently outperforms CFinder [7], the im- portant term for the performance of SCP on a network is thus not the number of maximal cliques of size at least k , but the number of cliques of size k-1. As we discuss in our experimental work, empirical social networks often contain maximal cliques of substantial size; given that such large maximal cliques contain very many smaller k-cliques, the fact that SCP has complexity in terms of the number of cliques of size k-1 often leads to poor performance in practice. We note that, as stated by Kumpula et al., SCP is most efficient for low sizes of k , and performs poorly as the value of k increases. I I I . COM PU TAT IONA L CHA LL ENGE S In this section, we look at some of the challenges that face any k-clique percolation algorithm. We discuss our specific solutions and algorithms in the next section. A. Quantity of cliques To understand why k-clique percolation is so computation- ally expensive on certain types of online social networks, we first quantify the numbers of maximal cliques in these empirical networks. The various algorithms deal with the edges in the clique graph differently, but each algorithm requires all the (maximal) cliques be found first. As shown in Table I, even networks that have small numbers of nodes and edges, can have very large numbers of maximal cliques. It is worth noting that the worst case networks, in terms of the ratio of maximal cliques to nodes in the network, are online social networks; such datasets, for example the Facebook networks, feature highly overlapping community structure and have very large numbers of maximal cliques. Our primary interest, in this work, is in clique percolation in the challenging domain of modern online social networks, which exhibit pervasive overlap [10] [11]. The ‘Facebook 100’ dataset of Traud et al. [8] provides us with a range of similar empirical networks of differing size. We focus on the smallest 10 of these networks – shown in Table II – which capture the general topological features, in terms of densely overlapping community structure, but are also small enough to benchmark existing algorithms efficiently on. There are very large numbers of maximal cliques in these networks, many more than the number of nodes or edges. TABLE I TH E VA S T NUMB ER O F MAX IMAL C L IQU E S ( S I Z E≥4 ) PRE SENT IN MANY EM P IR ICAL N E TWORK S . O F PART ICU LAR NOTE AR E TH E FACEBOOK AND TW I T TER DATA SE T S , W I TH MANY MOR E MAX IMAL C L IQU E S THAN NOD E S OR EDG E S . DATA S ET S FROM SNAP [12 ] AND OTH ER SOURC E S ; S EE [11 ] FOR D E TA I L S . Network Nodes Email-Enron Email-EuAll Mobile1 Mobile2 Mobile3 Facebook-caltech Facebook-princeton Facebook-georgetown Twitter1 Twitter2 Twitter3 Slashdot0811 Collab-AstroPhysics Collab-CondMat Collab-HighEnergy Cite-HighEnergy Amazon0302 Epinions Web-NotreDame Web-Stanford Wiki-Vote ProteinInteract-Collins 36,692 265,009 10,001 10,001 10,001 769 6,596 9,414 2,001 2,001 2,001 77,360 18,771 23,133 9,875 27,769 262,111 75,879 325,729 281,903 7,115 1,622 Edges Maximal Cliques 205,712 93,267 1,550 3,538 951 31,745 1,286,678 1,440,853 23,570 554,489 130,399 441,941 27,997 8,824 2,636 419,942 117,054 1,596,598 130,965 774,555 436,629 4,310 367,662 420,045 48,556 91,930 88,714 16,656 293,320 425,638 47,000 71,264 48,914 516,575 396,160 186,936 237,010 421,578 1,234,877 841,372 1,497,134 2,312,497 103,689 9,070 Largest Clique 20 16 10 10 9 20 34 33 12 27 22 26 57 26 32 23 7 23 155 61 17 33 B. Clique Graph size From the large numbers of cliques present in these types of pervasively overlapping network, it can be seen that naively performing O(n2 in nc the number of c ) intersection tests, cliques, in order to populate a clique-clique intersection matrix would be computationally prohibitive. TABLE II TH E VA S T NUMB ER O F MAX IMAL C L IQU E S ( S I ZE>=3 ) PR E SENT, EVEN IN R ELAT IVE LY SMA LL EM P IR ICA L ON - L IN E SOC IA L N ETWORK S . ‘CGBOUND ’ I S TH E NUMB ER O F EDG E S , IN 1000 S , W E CA LCU LATED IN EACH k = 5 MAX IMA L CL IQUE GRA PH , A FT ER S EV ERA L W E EK S COM PU TAT ION , AND I S AN UND ER E ST IMAT E O F TH E TRU E VA LUE . (*R EED98 I S THE EXAC T NUMBER , NOT AN UND ER E S T IMAT E . ) Network Nodes Caltech36 Reed98 Simmons81 Haverford76 Swarthmore42 USFCA72 Mich67 Bowdoin47 Oberlin44 Amherst41 769 962 1,518 1,446 1,659 2,682 3,748 2,252 2,920 2,235 Edges Maximal Cliques 32,207 33,991 45,538 475,567 306,542 108,929 154,971 331,738 198,803 599,430 16,656 18,812 32,988 59,589 61,050 65,252 81,903 84,387 89,912 90,954 Largest Clique 20 16 19 24 20 29 27 23 22 21 CGBound (1000s) 2,475 1,774* 2,244 127 282 1,128 843 235 644 79 However, in addition, by attempting to measure the size of the maximal clique graph, we can see that even if we had a fast way to generate the full clique graph, it would be extremely unwieldy to work with, because of the vast number of edges in it. It is computationally expensive to obtain all the edges in the clique graph for these networks. Running a process to calculate maximal clique graph edges on one of the smallest Facebook networks (Caltech) for a period of 12 hours calculated in excess of 449,000 edges in the clique graph; this was the clique graph of maximal cliques of size greater than 7, with edges of intersection of at least 6 nodes. Similarly, looking at maximal cliques of size greater than 5 with intersections of 4 nodes, we generated over 1,700,000 edges over a period of several days computation. We note that the total number of edges in the clique graph, in this small network with only 769 nodes, may even be much larger than this. Here, we are calculating these clique graph edges by performing set-set intersection tests, for each clique, against the set of cliques with which it shares a node. Table II shows an underestimate of the number of edges in each clique graph, formed after over one week of computation. The number of actual edges present may be vastly greater, but merely dealing with clique graphs that are sometimes so many orders of magnitude larger than the original source network would be computationally prohibitive. Even if there were a way to speed up these intersection tests, merely dealing with clique graphs that are so many orders of magnitude larger than the original source network fast becomes computationally prohibitive. These figures illustrate that methods of clique percolation, or indeed general graph analysis, which require the full clique graph to be built, are unscalable on these networks. This motivates methods, such as those we present, which build only a subset of the clique graph. C. The necessity of dealing with individual cliques Given the vast numbers of cliques present in empirical graphs, a second complication exists that makes clique per- colation particularly computationally hard. As cliques are percolating, we would ideally discard the individual cliques that comprise a percolating structure, and instead describe that structure as a set of nodes and edges. As there are so many more cliques than nodes or edges, this would increase efficiency. However, we cannot do this, because it is not possible to tell, given a set of nodes, and the edges between them, whether a given clique percolates into this structure, without knowing the (k-1)-cliques that comprise this structure. Counter-intuitively, a percolating k-clique structure can con- tain (k-1)-cliques that are not part of the k-cliques that yield it. Figure 3 shows an example of this. As such, it is not possible to test a candidate clique for percolation, against a percolating structure, without maintaining a list of the k , or k-1, cliques that make it up. We believe this is a core computational issue in k-clique percolation. Fig. 3. We cannot use an intermediate representation to store a percolating k-clique structure, without storing the individual cliques that comprise it: Consider the case where we store just the nodes and edges of the percolating 4- clique structure shown in the diagram. Even if the highlighted dashed triangle was part of another 4-clique, with an additional node, not shown, this other 4-clique would not percolate into the 4-clique-community comprising all the shown nodes; even though all three nodes and edges in the highlighted triangle are part of the percolated 4-clique community, the triangle is not part of any of the constituent 4-cliques. IV. OUR A LGOR I THM S In this section we describe two algorithms. Our algo- rithms initially obtain the maximal cliques in the graph, and then attempt to minimise the number of clique overlap tests that must be carried out to obtain k-clique communities. Algorithm 1 attempts to build a minimal spanning forest over the maximal cliques, using a simple data structure to reduce unnecessary clique intersection tests. Algorithm 2 uses a hierarchical data structure to further reduce the number of full intersection tests needed, further improving performance. 1) Maximal Cliques: Like CFinder we have chosen to build our algorithms around maximal cliques with at least k nodes; this is in contrast to SCP, which uses k-cliques. This is because large maximal cliques are often present in empirical data; these contain large numbers of k-cliques and thus it is often more efficient to work with the maximal cliques. Figure 5 shows the clique- and maximal-clique distributions on a typical Facebook network – though there are many maximal cliques, there are many more k-cliques than there are maximal cliques of size greater than k , for all but the smallest values of k . 2) Clique finding: The Bron-Kerbosch clique finding algo- rithm [13] provides us with a fast way to find all maximal cliques in the network. While finding all cliques, or maximal cliques, is computationally hard on an arbitrary graph, on the networks that we examine in practice, this method finds all clique extremely fast, such that clique-finding is a small part of the computational time in our algorithms. Instead computation is dominated by comparing cliques against each other. A. Algorithmic framework Our goal is to find which cliques are in which connected components of the thresholded clique graph. We follow a pro- cedure similar to the well known [14] connected components algorithm. We process one component at a time, by taking an arbitrary starting clique and identifying all the cliques in the same connected component as it. This process repeats until all cliques have been assigned to a component. The key point is that we do not first generate the full clique graph; instead we integrate the process of generating clique graph edges, with that of finding connected components; and only generate clique graph edges as we need them for the connected components calculation. We can do this because, to calculate the k-clique percolations, we only need the minimal spanning forest of the clique graph (Fig 4); any other edges in the clique graph are essentially wasted intersection tests. the cliques are initially unvisited, and We say that all that they each become visited as they are assigned to their component. As the component expands, there is a set of cliques described as the frontier. The expansion proceeds until the frontier is empty. At each iteration, a clique is selected from the frontier (the ‘current frontier clique’) and its unvisited neighbours in the clique graph are identified. A ‘neighbouring’ clique is a clique which has an intersection of at least k-1 nodes with the current frontier clique; this corresponds to an edge in the clique graph. These neighbours are moved into the frontier and marked as visited and our current frontier clique is moved out of the frontier, as it has now been fully processed. Eventually, there will be no unvisited neighbours of any of the frontier cliques and the frontier will gradually become empty – this completes the identification of this component. If we know that clique A is connected to clique B in the clique graph, and B to C, then there is no need to test if A is connected to C; thus we can ignore cliques that have already been visited, when searching for the neighbours of the current frontier clique. Our two algorithms differ in how they identify the unvisited neighbouring cliques of the current frontier node. Otherwise, they both use the framework which has just been described. One naive way to identify the neighbouring unvisited cliques of the current frontier clique is to iterate through all the other cliques, testing the size of their intersection with the current frontier clique. If the intersection has at least k-1 nodes and if the clique is unvisited then it is a neighbouring unvisited clique. Our two algorithms embody different strategies to speed up this identification. B. Algorithm 1 1) Node-to-cliques maps: For a given current frontier clique, testing against every other clique is expensive. We can vastly improve this, by realizing that two cliques can only neighbour each other in the clique graph, if they share at least one node (i.e. are adjacent by at least one node). We maintain (a) The source network. (b) Maximal cliques of size at least 4, represented by a red box at their centroids. (c) The corresponding clique graph of maximal cliques over- lapping by at least 3 nodes. (d) A minimal spanning forest of the clique graph. Fig. 4. A clique graph visualisation, showing the construction of the clique graph from a source network; the connected components in this graph, which correspond to clique percolations; and minimal spanning trees of these components – the minimum set of edges in the clique graph which must be found, and which put an absolute lower bound the number of clique-clique intersection tests to be done in these methods. a list, for each node, of all the cliques that the node is present in. Then, for each node in the current clique, we check the list of other cliques that node is in, to generate the set of cliques that overlap with the current clique by at least one node. 2) Visiting the cliques: The key step in Algorithm 1 is that as cliques are added to the current connected component, they are deleted from the map of nodes-to-cliques. This is how a clique is marked as ‘visited’, and not considered further. Pseudo-code is given in Listing 1. C. Experiments We performed several benchmarking experiments, of a C++ version of our algorithm, against the binary implementations of both SCP and CFinder v2.0.5. We do not show benchmark results for CFinder, as, similar to Kumpula et al. [7] we found that it was generally very much slower than SCP. As such, all benchmarks will be shown against SCP. 1) GN benchmarks: After Kumpula et al. [7], we per- formed benchmarks based on the Girvan-Newman synthetic benchmark, creating networks of increasing size, containing increasing numbers of communities, each of 32 nodes. We first note that these synthetic benchmarks are poor proxies for many real world social networks, in terms of the clique size distributions contained within them. Figure 5 shows a typical example of this difference in the size distributions of cliques, and maximal cliques, in these GN networks, versus the Facebook networks; the Facebook networks have more and larger cliques and maximal cliques. While the main advantage of our method over SCP is on networks with larger numbers of cliques, which these GN networks do not contain, we present, in Figure 6, present performance results as we increase the number of nodes in the GN network. At k = 4 our method, while slightly slower than SCP, is competitive, and scales similarly. However, when we start to look at higher values of k , we notice that the scaling behaviour of SCP degrades considerably faster than our method. 2) CondMat benchmark: An example of using k-clique percolation to find communities in co-authorship data in the field of condensed matter physics, is described by Palla et al. [1]. The SCP paper [7] extends this benchmark, comparing the times of SCP and CFinder for finding k-clique percolations, in the Arxiv Condensed Matter e-print archive. We produce a similar benchmark, using the Arxiv ca-CondMat network from the SNAP dataset collection [12]. Figure 7 shows the runtime of SCP against that of our implementation, on this network, for varying values of k . Note that y -axis, showing runtime, is logarithmic. Both implementations quickly complete for low values of k , and, as shown in [7], far outperform CFinder; but 1 3 5 7 9 11 13 15 f o r i n c l i q u e s : c l i q u e i f n o t t o c o m p o n e n t s d i c t : c l i q u e i n c l i q u e s c u r r e n t c o m p o n e n t += 1 c l i q u e s t o c o m p o n e n t s d i c t [ c l i q u e ] = c u r r e n t c o m p o n e n t f r o n t i e r = s e t ( ) f r o n t i e r . a d d ( c l i q u e ) w h i l e l e n ( f r o n t i e r ) > 0 : c u r r e n t c l i q u e = f r o n t i e r . p o p ( ) f o r n e i g h b o u r i n g e t u n v i s i t e d a d j a c e n t c l i q u e s ( c u r r e n t c l i q u e , n o d e s l e n ( c u r r e n t c l i q u e . i n t e r s e c t i o n ( n e i g h b o u r ) ) >= ( k −1 ) : i f c l i q u e s t o c o m p o n e n t s d i c t [ n e i g h b o u r ] = c u r r e n t c o m p o n e n t f r o n t i e r . a d d ( n e i g h b o u r ) f o r n o d e i n n e i g h b o u r : n o d e s t o c l i q u e s d i c t [ n o d e ] . r e m o v e ( n e i g h b o u r ) t o c l i q u e s d i c t ) : Listing 1. Python-like pseudo-code description of simple algorithm for improved clique percolation. (a) Runtimes for K=4. (b) Runtimes for K=5. Fig. 6. GN benchmark results, on a similar benchmarking setup to [7]. SCP runtimes are shown by red squares; runtimes of our method are shown by blue triangles. Runtimes are observed to be similar when k = 4, with SCP marginally ahead; but for k = 5 our method appears to do much better. There are insufficient numbers of cliques of size 6 or greater present to allow higher values of k to be examined on the GN benchmarks. as the value of k increases, the runtime of SCP deteriorates. As noted in the original SCP work “for networks containing large cliques the SCP method performs best for rather small values of k” [7]. Our method, by contrast, seems well suited to this particular type of network, and performs quickly, even as k is increased. 3) Empirical social network data: We now produce a set of empirical benchmarks, not previously investigated in the k- clique percolation literature. We analyse the performance of SCP against our algorithm, for various values of k , on the ten smallest of the Facebook 100 networks. This allows us easily obtain results for higher values of k where SCP cannot complete in reasonable lengths of time. Figure 9 shows perfor- mance results for four values of k across these 10 Facebook networks. These empirical networks vary in their individual performance characteristics. In common with previous work on k-clique percolation, it is difficult to give meaningful closed form analysis of expected performance characteristics in terms of more general network parameters, such as the number of nodes, or edges; but the trend is clearly that as k increases, the performance of our method versus SCP clearly increases, across all networks. Even for the lowest value of k that we examine, our method finishes within a few minutes of SCP, while as the value of k increases, it becomes difficult to obtain runtimes for SCP. Furthermore, in additional to increasing runtime, the memory usage of SCP’s data structures, which allow for fast intersection tests, grows prohibitive. When analysing these networks, we often find that, for low values of k , a giant connected component emerges in the network, due to the pervasively overlapping structure of community in these networks. Figure 8 shows, for each value of k on the Mich67 Facebook network, the proportion of nodes which are in the largest k-clique percolation community with respect to the number of nodes which have been assigned to at least one k-clique percolation community. As can be clearly seen from this chart, smaller values of k do not usefully find modular structure in the network. An investigation of how meaningful these structures are as communities is, however, beyond the scope of this computational work; but this question cannot even be investigated without an algorithm which runs reasonably quickly for higher values of k . This particular chart should not be taken as characteristic of all pervasively overlapping networks; while we do commonly find that for low values of k , a giant percolation component is present in the Facebook 100 datasets, the nature of how this changes as k increases, varies from network to network. D. Counting the failed intersection tests This type of algorithm involves testing pairs of cliques that share a node, to see if they intersect by at least k-1 nodes. For 0204060801001201401000s Of Nodes010203040Time (Seconds)0204060801001201401000s Of Nodes0200400600800100012001400Time (Seconds) (a) K=4 (Note smaller y-axis) (b) K=5 (c) K=6 (d) K=7 Fig. 9. Benchmark results on the smallest 10 Facebook 100 graphs, for values of k between 4 and 7. Red columns denote SCP runtimes, blue denote Algorithm 1. Processes were terminated if they failed to complete within 2 hours (7200 seconds). Running SCP for additional time sometimes resulted in it using more than 50GB of RAM; the SCP binary implementation consumes a vast amount of RAM for some networks and values of k , presumably for its disjoint-set forest fast intersection data structure. Our method never uses more than a small multiple of the amount used to store the maximal cliques; never more than 512MB in these experiments. Experiments are run on a multiprocessor machine, in random sequence. SCP outperforms our algorithm for k = 4, but performs substantially worse, in both time and space requirements, as values of k get larger. speed, our goal is to minimize the number of tests required, as this typically takes up the major portion of the runtime of such an algorithm. Each test either succeeds, if there are >= (k-1) nodes in the intersection, or else fails. We cannot change the minimum number of successful intersection tests – there will be one such test for each edge in the minimal spanning tree, i.e. numC liques − numC ommunities. But we can try to minimize the number of failed tests. In this subsection, we will look at a lower bound on the number of failed tests that must occur in Algorithm 1 described above. In many networks, the number of these failed tests is very large in comparison to the number of the successful tests, and dominates the computational cost. This motivates our second algorithm, which we describe in the next section. Consider every pair of cliques that share at least one node. We do not need to perform an intersection test for every such pair – we can potentially avoid testing most pairs of cliques which percolate into the same community. But we cannot avoid testing the pairs of cliques which share a node, but never percolate into the same community. For each network, and for each value of k , we count the pairs of cliques which share at least one node and which do not percolate, and divide this by the necessary number of successful tests. Some of the highest ratios are shown in Table III. Even though Algorithm 1 is much faster than SCP for higher k , this is a computational bottleneck. Each failed intersection test is akin to a ‘false positive’; we tested the cliques that shared a node, in case they shared k-1, but this turned out not to be the case. We aim to minimize the ‘false positive’ rate – the pairs of cliques that our heuristic ‘suspects’ might percolate together, and hence need to be expensively tested for overlap against each other – while of course ensuring we still pick up all the true positives – the cliques that actually do intersect by k-1 nodes. E. Algorithm 2 Our second algorithm uses the same framework described in Section IV-A. The only change is that we have a faster way, given the current frontier clique, of finding its unvisited neighbouring cliques: a cheaper way of avoiding intersection tests, by detecting when two cliques will percolate in way that gives fewer ‘false positives’ than checking only whether they share a single node. We use a complete binary tree where there are as many leaf nodes as there are maximal cliques. We will refer to the nodes in this binary tree as tree-nodes, and the tree-nodes which are at the leaves of our tree will be referred to as leaf-nodes. To avoid confusion, we use graph-node to refer to the nodes in our original network. Each tree-node will have a set of graph- CaltechReedSimmonsUSFCAMichOberlinSwarthmoreBowdoinHaverfordAmherst0100200300400500600700Time (seconds)SCPAlg.1CaltechReedSimmonsUSFCAMichOberlinSwarthmoreBowdoinHaverfordAmherst0100020003000400050006000>7200 Time (seconds)SCPAlg.1CaltechReedSimmonsUSFCAMichOberlinSwarthmoreBowdoinHaverfordAmherst0100020003000400050006000>7200 Time (seconds)SCPAlg.1CaltechReedSimmonsUSFCAMichOberlinSwarthmoreBowdoinHaverfordAmherst0100020003000400050006000>7200 Time (seconds)SCPAlg.1 (a) Clique size distribution for Simmons81 Facebook network. (b) Maximal clique size distribution for Simmons81 Facebook network. (c) Clique size distribution, GN benchmark. (d) Maximal clique size distribution, GN benchmark. Fig. 5. Clique and maximal clique size distributions, for benchmark and empirical networks. The benchmark network is a GN network, of 10,000 nodes, constructed to a similar specification as in [7]. The Facebook network is that of the Simmons81 Facebook 100 dataset, and is typical of Facebook 100 data. We note that there are typically very many more cliques than maximal cliques; that the peak of the distributions for the empirical network is further to the left for the maximal cliques, than for all cliques; and that more cliques of much larger sizes are found in empirical data, than in these GN benchmarks, despite this particular GN benchmark network’s larger size. Fig. 7. Results on the Arxiv CondMat network, from the SNAP dataset collection [12]. This network was also benchmarked in the work of Kumpula et al. [7]. This is a network which, perhaps due to the fact it is a one- mode projection of a bipartite author network, our algorithm seems to be particularly well on, as K grows, in contrast to SCP. The SCP implementation was terminated, on values of K larger than 8, for exceeding available memory. Any single process exceeding 75GB of RAM was terminated. nodes associated with it. For the leaf-nodes, this will be the set of graph-nodes that are in the maximal clique which we associated with that leaf-node. For the other tree-nodes in the binary tree, the set of graph-nodes will be the union of the graph-nodes associated with the leaf-nodes descended from it. This tree is built once at the start of the algorithm and does not change. But each leaf-node has a boolean field associated with it which records whether the associated clique has already been percolated into a community (i.e. it has been visited). Fig. 8. The proportion of nodes assigned to any community, that are assigned to the largest community, for each value of k , on the Mich67 Facebook network. Clearly, on this particular network, low values of k simply find a core structure of the network with pervasive overlap, and do not serve to reveal modular units; larger values of k are required for k-clique percolation to be in any way meaningful on these networks. These visited fields will be initialized to False at the beginning, and will all gradually be set True as the algorithm proceeds and visits the cliques. For the other tree-nodes, this boolean field will be set to True when the fields of its children have been set to True. This means that a boolean field will be True if and only if all of its descendants have already been visited. Given the current frontier clique, we could visit all the leaf nodes and perform an intersection test against each. This would be the naive algorithm again. But we can ignore cliques that have been visited already. In particular, if a tree-node has been marked as visited, then we can ignore all the cliques that are descended from it. Also, given a particular tree-node we can test the intersection between the current frontier clique and the set of graph-nodes which are stored at this tree-node. If this intersection is less than k-1, then we know that there cannot be a neighbouring clique among the cliques descended from this tree-node. These two observations allow us to skip most of the intersection tests via the information present in the binary tree. The search is a recursive search which starts at the root-node of the binary tree. Listing 2 contains pseudo-code illustrating this algorithm. At each tree-node, we check if this tree-node has been marked as visited, and also check the size of the intersection. If the intersection is large enough and if the tree- node is still unvisited, then the search will proceed recursively into each of the two children of the tree-node. Otherwise, the recursive function will return and that tree-node (and all its descendants) will not be considered any further. To save memory, we do not explicitly maintain a set of graph-nodes at each non-leaf tree-node. Instead we use a Bloom filter – a fast and memory-efficient structure which probabilistically records whether a given element is a member of a set. It sometimes produces false positives, which in our algorithm would sometimes lead to an overestimate of the size of the intersection between two cliques; this does not cause a correctness problem, but does mean that sometimes the recursive search proceeds slightly deeper than necessary. 2468101214161820Size of Clique05001000150020002500300035001000s of Cliques2468101214161820Size of Maximal Clique01234567891000s of Maximal Cliques3456Size of Clique0204060801001201401000s of Cliques3456Size of Maximal Clique05101520253035401000s of Maximal Cliques4567891011K024681012Log (Time in Seconds)456789k0.40.50.60.70.80.91.0Proportion Largest Community 1 d e f g e t u n v i s i t e d a d j a c e n t c l i q u e s ( c u r r e n t c l i q u e , b i n a r y t r e e , b i n a r y s e a r c h i n t r e e ( c u r r e n t c l i q u e , b i n a r y t r e e . r o o t n o d e ( ) , f r o n t i e r ) : f r o n t i e r ) 3 5 7 9 11 13 15 d e f b i n a r y s e a r c h i n t r e e ( c u r r e n t c l i q u e , f r o n t i e r ) : t r e e n o d e , t r e e n o d e . v i s i t e d f l a g : i f n o t l e n ( c u r r e n t c l i q u e . i n t e r s e c t i o n ( t r e e . m y s e t o f g r a p h n o d e s ) ) >= k −1 : i f # t e s t s p a s s , t h e c h i l d n o d e s a r e s t i l l c a n d i d a t e s t r e e n o d e . i s a l e a f n o d e ( ) : i f f r o n t i e r . a p p e n d ( t r e e n o d e ) t r e e n o d e . v i s i t e d f l a g = T r u e t r e e n o d e . c h e c k i f s i b l i n g h a s b e e n v i s i t e d a n d p r o p a g a t e ( ) e l s e : b i n a r y s e a r c h i n t r e e ( c u r r e n t c l i q u e , b i n a r y s e a r c h i n t r e e ( c u r r e n t c l i q u e , t r e e n o d e . l e f t c h i l d ) t r e e n o d e . r i g h t c h i l d ) e l s e : # t h e c h i l d r e n c a n n o t b e s u i t a b l e , d o n ’ t s e a r c h t h e d e s c e n d a n t s Listing 2. Python-like pseudo-code description of our more complex clique percolation. k 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 University Berkeley13 UC33 JMU79 JMU79 Baylor93 JMU79 JMU79 UC61 Bingham82 UC61 Rutgers89 Rutgers89 MIT8 MIT8 Howard90 Howard90 UC61 Howard90 Howard90 Howard90 Howard90 Howard90 Howard90 Howard90 Howard90 Howard90 Howard90 Howard90 Howard90 Wake73 Wake73 Tulane29 Wake73 Wake73 FSU53 FSU53 FSU53 Failed tests 10,466,831 36,722,163 87,790,729 202,207,552 7,979,454,075 2,639,954,200 4,148,901,179 5,257,215,707 3,490,950,418 6,271,564,288 2,988,388,319 2,388,357,546 3,941,888,908 3,183,156,718 3,675,540,181 3,235,463,119 15,499,684,499 2,770,597,042 2,595,044,785 2,443,483,517 2,278,591,525 2,090,574,938 1,893,432,720 1,644,566,572 1,356,613,382 957,002,789 588,629,576 312,582,980 111,014,036 558,217,752 243,637,026 15,603,680 33,370,824 6,927,976 1,081,780,785 231,651,220 73,496,336 TABLE III U S ING TH E FACEBOOK100 N ETWORK S . FOR EACH K B ETW EEN 4 AND 20 , THE UN IV ER S I TY W I TH THE H IGHE ST RAT IO O F FA I LED INT ER S EC T ION T E ST S TO THE NUMB ER O F SUCC E S S FU L INT ER S EC T ION T E S T S I S SHOWN . Successful tests 1,888,501 1,396,585 1,007,912 942,903 5,667,415 852,264 817,621 948,764 511,790 849,242 386,558 339,698 322,212 285,917 148,661 138,158 582,658 125,715 121,188 117,057 112,454 107,072 101,098 92,900 82,661 67,611 53,215 42,017 33,669 136,027 99,631 8,202 54,029 38,747 4,032,339 3,728,247 3,396,986 Ratio 5.5424 26.294 87.101 214.45 1407.9 3097.5 5074.3 5541.1 6821.0 7384.8 7730.7 7030.8 12233. 11133. 24724. 23418. 26601. 22038. 21413. 20874. 20262. 19524. 18728. 17702. 16411. 14154. 11061. 7439.4 3297.2 4103.7 2445.3 1902.4 617.64 178.80 268.27 62.134 21.635 F. Evaluation of Algorithm 2 When considering a single value of k , Algorithm 2 was always faster than Algorithm 1, except sometimes when k = 3. In Table IV, we see the runtimes of Algorithm 2 on a number of Facebook networks. These runtimes are the time taken to compute the communities for all values of k . This algorithm Time(s) 50.94 51.84 115.10 372.39 235.93 215.22 421.19 246.39 263.45 424.96 338.81 389.64 421.62 477.63 524.29 376.70 500.21 411.83 622.84 840.05 1454.71 844.91 967.06 788.16 1158.68 1289.66 1047.59 751.05 921.42 2395.45 University Caltech36 Reed98 Simmons81 Haverford76 Swarthmore42 USFCA72 Mich67 Bowdoin47 Oberlin44 Amherst41 Wellesley22 Hamilton46 Smith60 Trinity100 Williams40 Vassar85 Middlebury45 Brandeis99 Wesleyan43 Santa74 Pepperdine86 Colgate88 UC64 Bucknell39 Rochester38 Rice31 JohnsHopkins55 Vermont70 Lehigh96 Howard90 Edges Nodes 16,656 769 18,812 962 32,988 1,518 59,589 1,446 61,050 1,659 65,252 2,682 81,903 3,748 84,387 2,252 89,912 2,920 90,954 2,235 94,899 2,970 96,394 2,314 97,133 2,970 111,996 2,613 112,986 2,790 119,161 3,068 124,610 3,075 137,567 3,898 138,035 3,593 151,747 3,578 152,007 3,445 155,043 3,482 155,332 6,833 158,864 3,826 161,404 4,563 184,828 4,087 186,586 5,180 191,221 7,324 198,347 5,075 4,047 204,850 TABLE IV TH E RUN T IM E S O F OUR MORE O PT IM I Z ED A LGOR I THM , TO COM PU T E AL L VALU E S O F k , ON TH E SMA LL E S T 10 FAC EBOOK N E TWORK S , AND A S ELEC T ION O F LARG ER ON E S . TH I S ALGOR I THM WA S O FT EN AB LE TO COM PL ET E AL L VALU E S O F k IN L E S S T IM E THAN A LGOR I THM 1 TOOK TO COM PL ET E k = 4 . FOR EV ERY DATA SE T TE STED , TH I S A LGOR I THM CALCULAT E S ANY VA LU E O F k FA STER THAN A LGOR I THM 1 . frequently computes all values of k quicker than Algorithm 1 can compute the communities for k = 4. V. OTH ER A P PROACH E S We now briefly mention other approaches to this problem that we have considered, as well as other overlapping com- munity finding algorithms of interest. A. Hierarchical Partitioning The work of Narasimhamurthy et al. [15] investigates speeding up k-clique percolation by dividing the network into partitions using a graph partitioning algorithm. CFinder is then run on each partition, generating a set of k-clique communities for each partition. The union of these sets of percolated communities is reported as the set of k-clique communities. To evaluate their approach, they compare the set of communities found on the partitioned network against the communities found by running CFinder on the whole unpartitioned network. This method fails to account for the case where k-clique communities span the border of the graph partitions. This may not be a large problem in networks where communities – even k-clique communities – do not overlap. However, as shown in our previous work [11] and discussed in other work [10], [16], it will not be possible, on many networks, to partition the network without splitting many communities; as such, this method is an approximation technique not suitable for networks with pervasive community overlap, such as modern on-line social networks. We have tried adapt this approximate method into an exact method, inspired by kd-Trees [17], where cliques that overlap partitions are explicitly handled, by pushing them up the partition hierarchy, and testing them for percolation against the cliques at the same level, or below them, in the partition tree; however, we find that this method does not work as well as the related methods described in this paper; it may be useful in other percolation contexts. B. Stochastic Approximation As there are many more cliques than nodes, we consid- ered whether working with a random subset of the maximal cliques would yield similar community structure, at lower computational cost than working with all maximal cliques. We investigated randomly sampling a subset of the maximal cliques, and performing percolation with this sampled subset. However, results were poor; the overlapping NMI [18] of the k-clique communities found by this approach, compared with the communities found using all cliques, decreased rapidly when even a small percentage of cliques (< 10%) were randomly omitted. Perhaps a more sophisticated sampling approach will be found in future work; but simple approaches to stochastic approximation appear unsuitable for this problem. C. Other structure definitions Many other definitions of community structure exist. While it was the goal of this work to focus on improving the performance of k-clique percolation, researchers have done work on other definitions of structure, such as K -plexes, K -cores, and K -trusses. A highly scalable K -truss imple- mentation in particular has been provided [19]. Types of percolation structure which lack the properties described in Figure 3, so that sub-structures can easily be composed into higher level units discarding the sub-structure, avoid some of the computational problems of k-clique percolation. However, these structures are fundamentally different than k-clique percolation, and a discussion of them should also consider the field of community finding as a whole, which is beyond the scope of this computational work. D. Other overlapping community finding methods We have focused on k-clique percolation in this work. However, many other modern overlapping community finding algorithms exist, many of them with good scaling properties, such as link partitioning methods [20] [10], relatively scalable methods which approximate statistical objectives [21] [22], information theoretic approaches [23], methods explicitly de- signed to be scalable, such as label propagation [24], other clique-based methods more scalable than k-clique percolation [25] [26] and many other methods; Xie et al. [27] provide a comparative analysis. We have not investigated these algorithms in this compu- tational work, focusing instead on the properties of k-clique percolation; but for many application domains the structures found by these often more scalable algorithms may be more suitable than percolated k-cliques. E. Better, as yet unknown, k-clique percolation methods In our work, we have focused on algorithms for k-clique percolation that either find all the cliques, or all the maximal cliques. We have not definitively ruled out the possibility of creating a better k-clique percolation algorithm which does not need to calculate this information, or which uses some other form of intermediate structure when percolating k-cliques, that somehow leads to more efficient clique intersection testing. This may be a potential area of future work, especially if k- clique percolation were to continue to be widely used, and not be superseded by more recent overlapping community finding algorithms. V I . CONC LU S ION We have examined k-clique percolation as a specific exam- ple of a computationally challenging percolation problem. We have shown that vast numbers of cliques exist in empirical social networks, and that k-clique percolation is a hard prob- lem to implement well, due to the difficulty of producing in- termediate representations of percolating structures. From the large number of overlapping cliques and maximal cliques that we observe in empirical networks, and the consequent large number of edges in the clique graphs we have constructed, we conclude that while clique graphs are an attractive conceptual tool, their utility is limited in applications of social network analysis. We have developed and thoroughly benchmarked a k-clique percolation algorithm that is conceptually simple, yet performs better than existing methods on many real world networks, especially when considering k-clique percolation with higher values of k . This method is challenged by the large numbers of cliques which share at least one node, but do not percolate. We introduce a second method which uses a more sophisticated data structure. With this method we can conduct clique percolation on larger pervasively overlapping networks than ever before. However, these methods remain fundamentally limited by the necessity of testing cliques [23] Y. Kim and H. Jeong, “Map equation for link communities,” Physical Review E, vol. 84, no. 2, p. 26110, 2011. [24] S. Gregory, “Finding overlapping communities in networks by label propagation,” New Journal of Physics, vol. 12, p. 103018, 2010. [25] H. Shen, X. Cheng, K. Cai, and M. Hu, “Detect overlapping and hierarchical community structure in networks,” Physica A: Statistical Mechanics and its Applications, vol. 388, no. 8, pp. 1706–1712, 2009. [26] C. Lee, F. Reid, A. McDaid, and N. Hurley, “Detecting highly overlap- ping community structure by greedy clique expansion,” KDD SNA 2010, 2010. [27] J. Xie, S. Kelley, and B. Szymanski, “Overlapping community detection in networks: the state of the art and comparative study,” Arxiv preprint arXiv:1110.5813, 2011. against other cliques with which they share some nodes, but do not percolate. Given the number of cliques, clique perco- lation remains computationally challenging; other overlapping community detection methods appear more promising, from a computational standpoint. We provide software for researchers studying other percolation problems to leverage our results. V I I . ACKNOW LEDG EM EN T S This work is supported by Science Foundation Ireland under grant 08/SRC/I1407: Clique: Graph and Network Analysis Cluster. R E F ER ENC E S [1] G. Palla, I. Der ´enyi, I. Farkas, and T. Vicsek, “Uncovering the overlap- ping community structure of complex networks in nature and society,” Nature, vol. 435, no. 7043, pp. 814–818, 2005. [2] S. Fortunato, “Community detection in graphs,” Physics Reports, 2009. [3] G. Palla, A. Barabasi, and T. Vicsek, “Quantifying social group evolu- tion,” Nature, vol. 446, no. 7136, pp. 664–667, 2007. [4] T. Evans, “Clique graphs and overlapping communities,” Journal of Statistical Mechanics: Theory and Experiment, vol. 2010, p. P12037, 2010. [5] M. Everett and S. Borgatti, “Analyzing clique overlap,” Connections, vol. 21, no. 1, pp. 49–61, 1998. [6] B. Adamcsek, G. Palla, I. Farkas, I. Der ´enyi, and T. Vicsek, “CFinder: locating cliques and overlapping modules in biological networks,” Bioin- formatics, vol. 22, no. 8, p. 1021, 2006. [7] J. Kumpula, M. Kivel a, K. Kaski, and J. Saram aki, “Sequential algorithm for fast clique percolation,” Physical Review E, vol. 78, no. 2, p. 026109, 2008. [8] A. Traud, E. Kelsic, P. Mucha, and M. Porter, “Community structure in online collegiate social networks,” arXiv, vol. 809, 2008. [9] R. Luce and A. Perry, “A method of matrix analysis of group structure,” Psychometrika, vol. 14, no. 2, pp. 95–116, 1949. [10] Y. Ahn, J. Bagrow, and S. Lehmann, “Link communities reveal multi- scale complexity in networks,” Nature, vol. 466, no. 7307, pp. 761–764, 2010. [11] F. Reid, A. McDaid, and N. Hurley, “Partitioning Breaks Communities,” 2011 Advances in Social Network Analysis and Mining, 2011. [12] J. Leskovec, “SNAP Stanford Network Analysis Project,” http://snap. stanford.edu, 2009. [13] C. Bron and J. Kerbosch, “Finding all cliques of an undirected graph,” Communications of the ACM, vol. 16, no. 9, pp. 575–577, 1973. [14] J. Hopcroft and R. Tarjan, “Algorithm 447: efficient algorithms for graph manipulation,” Communications of the ACM, vol. 16, no. 6, pp. 372–378, 1973. [15] A. Narasimhamurthy, D. Greene, N. Hurley, and P. Cunningham, “Parti- tioning large networks without breaking communities,” Knowledge and Information Systems, pp. 1–25, 2010. [16] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney, “Statistical prop- erties of community structure in large social and information networks,” in Proceeding of the 17th international conference on World Wide Web. ACM, 2008, pp. 695–704. [17] J. Bentley, “Multidimensional binary search trees used for associative searching,” Communications of the ACM, vol. 18, no. 9, pp. 509–517, 1975. [18] A. Lancichinetti, S. Fortunato, and J. Kert ´esz, “Detecting the overlap- ping and hierarchical community structure in complex networks,” New Journal of Physics, vol. 11, p. 033015, 2009. [19] J. Cohen, “Graph twiddling in a mapreduce world,” Computing in Science & Engineering, vol. 11, no. 4, pp. 29–41, 2009. [20] T. Evans and R. Lambiotte, “Line graphs, link partitions, and overlapping communities,” Physical Review E, vol. 80, no. 1, p. 016105, 2009. [21] A. McDaid and N. Hurley, “Detecting highly overlapping communities with model-based overlapping seed expansion,” in Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Confer- ence on. IEEE, 2010, pp. 112–119. [22] A. Lancichinetti, F. Radicchi, J. Ramasco, and S. Fortunato, “Finding statistically significant communities in networks,” PloS one, vol. 6, no. 4, p. e18961, 2011.
1912.05140
1
1912
2019-12-11T07:04:27
Beyond Node Embedding: A Direct Unsupervised Edge Representation Framework for Homogeneous Networks
[ "cs.SI", "cs.LG" ]
Network representation learning has traditionally been used to find lower dimensional vector representations of the nodes in a network. However, there are very important edge driven mining tasks of interest to the classical network analysis community, which have mostly been unexplored in the network embedding space. For applications such as link prediction in homogeneous networks, vector representation (i.e., embedding) of an edge is derived heuristically just by using simple aggregations of the embeddings of the end vertices of the edge. Clearly, this method of deriving edge embedding is suboptimal and there is a need for a dedicated unsupervised approach for embedding edges by leveraging edge properties of the network. Towards this end, we propose a novel concept of converting a network to its weighted line graph which is ideally suited to find the embedding of edges of the original network. We further derive a novel algorithm to embed the line graph, by introducing the concept of collective homophily. To the best of our knowledge, this is the first direct unsupervised approach for edge embedding in homogeneous information networks, without relying on the node embeddings. We validate the edge embeddings on three downstream edge mining tasks. Our proposed optimization framework for edge embedding also generates a set of node embeddings, which are not just the aggregation of edges. Further experimental analysis shows the connection of our framework to the concept of node centrality.
cs.SI
cs
Beyond Node Embedding: A Direct Unsupervised Edge Representation Framework for Homogeneous Networks Sambaran Bandyopadhyay1 and Anirban Biswas2 and Narasimha Murty3 and Ramasuri Narayanam4 9 1 0 2 c e D 1 1 ] I S . s c [ 1 v 0 4 1 5 0 . 2 1 9 1 : v i X r a Abstract. Network representation learning has traditionally been used to find lower dimensional vector representations of the nodes in a network. However, there are very important edge driven mining tasks of interest to the classical network analysis community, which have mostly been unexplored in the network embedding space. For applications such as link prediction in homogeneous networks, vec- tor representation (i.e., embedding) of an edge is derived heuristically just by using simple aggregations of the embeddings of the end ver- tices of the edge. Clearly, this method of deriving edge embedding is suboptimal and there is a need for a dedicated unsupervised approach for embedding edges by leveraging edge properties of the network. Towards this end, we propose a novel concept of converting a net- work to its weighted line graph which is ideally suited to find the em- bedding of edges of the original network. We further derive a novel algorithm to embed the line graph, by introducing the concept of col- lective homophily. To the best of our knowledge, this is the first direct unsupervised approach for edge embedding in homogeneous infor- mation networks, without relying on the node embeddings. We val- idate the edge embeddings on three downstream edge mining tasks. Our proposed optimization framework for edge embedding also gen- erates a set of node embeddings, which are not just the aggregation of edges. Further experimental analysis shows the connection of our framework to the concept of node centrality. Introduction 1 Network representation learning (also known as network embedding) has gained significant interest over the last few years. Traditionally, network embedding [22, 12, 28] maps the nodes of a homogeneous network (where nodes denote entities of similar type) to lower di- mensional vectors, which can be used to represent the nodes. It has been shown that such continuous node representations outperform conventional graph algorithms [2] on several node based downstream mining tasks like node classification, community detection, etc. Edges are also important components of a network. From the point of downstream network mining analytics, there are plenty of network applications - such as computing edge betweenness centrality [20] and information diffusion [24] - which heavily depend on the infor- mation flow in the network. Compared to the conventional down- stream node embedding tasks (such as node classification), these tasks are more complex in nature. But similar to node based ana- lytics, there is a high chance to improve the performance of these tasks in a continuous lower dimensional vector space. Thus, it makes 1 IBM Research & IISc, Bangalore, email: [email protected] 2 Indian Institute of Science, Bangalore, email: [email protected] 3 Indian Institute of Science, Bangalore, email: [email protected] 4 IBM Research, Bangalore, email: [email protected] sense to address these problems in the context of network embed- ding via direct representation of the edges of a network. As a first step towards this direction, it is important to design dedicated edge embedding schemes and validate the quality of those embeddings on some basic edge-centric downstream tasks. (a) Synthetic Graph (b) node2vec (c) line2vec Figure 1: Edge Visualization: (a) We created a small synthetic net- work with two communities. So, there are three types of edges: Green (or red) edges with both the end points belonging to the green (or red respectively) community; Blue edges with end points belonging to two different communities. (b) node2vec embedding (8 dimensional) of the edges obtained by taking average of the embeddings of the end vertices and then used t-SNE for visualization. (c) Direct edge em- beddings (8 dimensional) obtained by line2vec and then used t-SNE for visualization. Clearly, line2vec is superior which visually sepa- rates the edge communities, compared to that with the conventional way of aggregating node embeddings to obtain edge representation. In the literature, there are indirect ways to compute embedding of an edge in an information network. For tasks like link predic- tion, where a classifier needs to be trained on both positive (existing) and negative (not existing) edge representations, a simple aggrega- tion function [12] such as vector average or Hadamard product has been used on the representations of the two end vertices to derive the vector representation of the corresponding edge. Typically node embedding algorithms use the homophily property [18] by respecting different orders of node proximities in a network. As the inherent ob- jective functions of these algorithms are focused on the nodes of the network, using an aggregation function on these node embeddings to get the edge embedding could be suboptimal. We demonstrate the shortcoming of this approach in Figure 1, where the visualization of the edge embeddings derived by aggregating node embeddings (tak- ing average of the two end nodes) from node2vec [12] on a small synthetic graph do not maintain the edge community structure of the network. Whereas, a direct edge embedding approach line2vec, to be proposed in this paper, completely adheres to the community struc- ture, as edges of different types are visually segregated in the t-SNE plot of the same shown in 1(c). So there is a need to develop algo- rithms for directly embedding edges (i.e., not via aggregating node embeddings) in information networks. We address this research gap in this paper in a natural way. Following are the contributions: • We propose a novel edge embedding framework line2vec, for ho- mogeneous social and information networks. To the best of our knowledge, this is the first work to propose a dedicated unsuper- vised edge embedding scheme which avoids aggregation of the end node embeddings. • We exploit the concept of line graph for edge representation by converting the given network to a weighted line graph. We fur- ther introduce the concept of collective homophily to embed the line graph and produce the embedding of the edges of the given network. • We conduct experiments on three edge-centric downstream tasks. Though our approach is proposed for embedding edges, we further analyze to show that, a set of robust node embeddings, which are not just the aggregation of edges, are also generated in the process. • We experimentally discover the non-trivial connection of the clas- sical concept of node centrality with the optimization framework of line2vec. The source code of line2vec is available at https: //bit.ly/2kfiS2l to ease the reproducibility of the results. Though edge centric network mining tasks such as edge central- ity, network diffusion and link prediction can be benefited from edge embeddings, applications of edge embeddings to tackle them is non- trivial and needs a separate body of work. For example, finding cen- tral edges in the network amounts to detecting a subset of points in the embedding space which are diverse between each other and rep- resent a majority of the other points. We leave them to be addressed in some future work. 2 Related Work and Research Gaps Node embedding in information network has received great interest from the research community. We refer the readers to the survey arti- cles [33] for a comprehensive survey on network embedding and cite only some of the more prominent works in this paragraph. DeepWalk [22] and node2vec [12] are two node embedding approaches which employ different types of random walks to capture the local neigh- borhood of a node and maximize the likelihood of the node context. Struc2vec [23] is another random walk based strategy which finds similar embeddings for nodes which are structurally similar. A deep autoencoder based node embedding technique (SDNE) that preserves structural proximity is proposed in [31]. Different types of node em- bedding approaches for attributed networks are also present in the literature [35, 3, 9]. A semi-supervised graph convolution network based node embedding approach is proposed in [14] and further ex- tended in GraphSAGE [13] which learns the node embeddings with different types of neighborhood aggregation methods on attributes. Recently, node embedding based on semi-supervised attention net- works [28], maximizing mutual information [29], and in the presence of outliers [4] are proposed. Compared to the above, representing edges in information net- works is significantly less matured. Some preliminary works ex- ist which use random walk on edges for community detection in networks [15] or to classify large-scale documents into large-scale hierarchically-structured categories [11]. [1] focuses on the asym- metric behavior of the edges in a directed graph for deriving node embeddings, but it represents a potential edge just by a scalar which determines its chance of existence. [25, 30] derive embeddings for different types of edges in a heterogeneous network, but their pro- posed method essentially uses an aggregation function inside the op- timization framework to generate edge embeddings from the node embeddings. For knowledge bases, embedding entities and relation types in a low dimensional continuous vector space [5, 7, 10] have been shown to be useful. But, several fundamental concepts of graph embedding, such as homophily, are not directly applicable to them. [19] proposes a dual-primal GCN based semi-supervised node em- bedding approach which first aggregates edge features by convolu- tion, and then learns the node embeddings by employing a graph attention on the incident edge features of a node. To the best of our knowledge, [36] is the only work which proposes a supervised approach based on adversarial training and an auto-encoder, purely for edge representation learning in homogeneous networks. But their framework needs a large amount of labelled edges to train the GAN, which makes it restrictive for real world applications. Hence in this paper, we propose a task-independent unsupervised dedicated edge embedding framework for homogeneous information networks to ad- dress the research gaps. 3 Problem Description An information network is typically represented by a graph G = (V, E, W ), where V = {v1, v2,··· , vn} is the set of nodes (a.k.a. vertices), each representing a data object. E ⊆ {(vi, vj)vi, vj ∈ V } is the set of edges. We assume, E = m. Each edge e ∈ E is associated with a weight wvi,vj > 0 (1 if G is unweighted), which indicates the strength of the relation. Degree of a node v is denoted as dv, which is the sum of weights of the incident edges. N (v) is the set of neighbors of the node v ∈ V . For the given network G, the edge representation learning is to learn a function f : e (cid:55)→ x ∈ RK, i.e., it maps every edge e ∈ E to a K dimensional vector called edge embedding, where K < m. These edge embeddings should preserve the underlying edge semantics of the network, as described below. Edge Importance: Not all the edges in a network are equally im- portant. For example, in a social network, millions of fans can be connected to a movie star. But any two fans of a movie star may not be similar to each other. So this type of connections are weaker com- pared to an edge which connects two friends who have much lesser number of connections individually [16]. Edge Proximity: The edges which are close to each other in terms of their topography or semantics should have similar embeddings. Similar to the concepts of node proximities [31], it is easy to define first and higher order edge proximities via incidence matrix. 4 Solution Approach: line2vec We propose an elegant solution (referred as line2vec) to embed each edge of the given network. First we map the network to a weighted line graph, where each edge of the original network is transformed into a node.Then we propose a novel approach for embedding the nodes of the line graph, which essentially provides the edge embed- dings of the original network. For simplicity of presentation, we as- sume that the given network is undirected. Nevertheless, it can triv- ially be generalized for directed graphs. 4.1 Line Graph Transformation Given an undirected graph G = (V, E), the line graph L(G) is the graph such that each node of L(G) is an edge in G and two nodes of L(G) are neighbors if and only if their correspond- ing edges in G share a common endpoint vertex [32]. Formally L(G) = (VL, EL) where VL = {(vi, vj) : (vi, vj) ∈ E} and EL = {(cid:0)(vi, vj), (vj, vk)(cid:1) : (vi, vj) ∈ E , (vj, vk) ∈ E}. Figure 2 shows how to convert a graph into the line graph [8]. Hence the line graph transformation induces a bijection from the set of edges of the given graph to the set of nodes of the line graph as l : e (cid:55)→ v where ∀e ∈ E, ∃ v ∈ VL and if two edges ei, ej ∈ E are adjacent there will be an corresponding edge e ∈ EL in the line graph. Figure 2: Transformation process of a graph into its line graph. (a) Represents an information network G. (b) Each edge in the original graph has a corresponding node in the line graph. Here the green edges represent the nodes in line graph. (c) For each adjacent pair of edges in G there exists an edge in L(G). The dotted lines here are the edges in the line graph. (d) The line graph L(G) of the graph G 4.2 Weighted Line Graph Formation We propose to construct a weighted line graph for our problem even if the original graph is unweighted. These weights would help the random walk in the later stage of line2vec to focus more on the rel- evant nodes in the line graph. It is evident from Section 4.1 that a node of degree k in the original graph G produces k(k − 1)/2 edges in the line graph L(G). Therefore high degree nodes in the origi- nal graph may get over-represented in the line graph. Often many of these incident edges are not that important to the concerned node in the given network, but they can potentially change the movement frequency of a random walk in the line graph. We follow a simple strategy to overcome this problem. The goal is to ensure that the line graph not only reflects the topology of the original graph G (which is guaranteed by Whitney graph isomorphism theorem [32] in almost all cases) but also the dynamics of the graph is not affected by the transformation process. The edge weights are defined to facilitate a random walk on L(G), as described in Section 4.3.1. Intuitively if we start a random walk from a node vij ≡ (vi, vj) ∈ L(G) and want to traverse to vjk ≡ (vj, vk) ∈ L(G), then it is equivalent to selecting the node vj ∈ G from (vi, vj) and move to vk ∈ G. If G is undirected, we define the probability of choosing vj to be propor- tional to . Here, dvi and dvj are the degrees of the end point nodes of the edge (vi, vj) and an edge in general is more important to the endpoint node having lower degree than the other endpoint with a higher degree [16]. Then selecting vk is proportional to edge weight of ejk ≡ (vj, vk) ∈ E. Hence, for any two adjacent edges eij ≡ (vi, vj) and ejk ≡ (vj, vk), we define the edge weight for the edge (eij, ejk) of the line graph L(G) as follows: dvi +dvj dvi w(eij ,ejk) = di di + dj × (1) wjk(cid:80) r∈N (vj ) wjr − wij This completes the formation of the weighted line graph from any given network. 4.3 Embedding the Line Graph Here we propose a novel approach to embed the nodes of the line graph. Line graph is a special type of graph which comes with some nice properties. Below is one important observation that we exploit in embedding the line graph. Lemma 1 Each (non-isolated) node in the graph G induces a clique in the corresponding line graph L(G). Proof 1 Let's assume that a (non-isolated) node v in the graph G has nv edges connected to it. So these nv edges are neighbors of each other. Hence in the corresponding line graph L(G), each of these edges would be mapped to a node and each of these nodes is connected to all the other nv − 1 nodes. Thus there is a clique of size nv induced in the line graph by node v. This can be visualized in Fig. 2, where the node 1 in (a) with de- gree 3 induces a clique of size 3, including the nodes (1,2), (1,3) and (1,4) into the corresponding line graph in (d). Lemma 1 is interesting because it tells that the nodes of the line graph exhibit some col- lective property, rather than just pairwise property. To clarify, in the given network, two nodes are pairwise connected by an edge, but in the line graph, a group of nodes form a clique. Pairwise homophily [18], which has been the backbone to many standard embedding al- gorithms [31], is not sufficient for embedding the line graph. Hence we propose a new concept 'collective homophily' applicable to the line graph. We explain it below. Figure 3: Collective Homophily ensures the embeddings of the edges which are connected via a common node in the network, stay within a sphere of small radius. 4.3.1 Collective Homophily and Cost Function Formulation We emphasize that all the nodes, which are part of a clique in a line graph, should be close to each other in the embedding space. One way to enforce collective homophily is to introduce a sphere (of small radius R ∈ R) in the embedding space and ensure that embedding of the nodes (in the line graph) which are part of a clique, remain within the sphere. Hence any two embeddings within a sphere are at a maxi- mum of 2R distance apart from each other. The concept is explained in Fig. 3. Smaller the radius R, embeddings of the neighbor edges would be closer to each other and hence the better the enforcement of collective homophily. Note that a sum of pairwise homophily loss in the embedding space may lead to some pairs being very close to each other and others may still be quite far. So, we formulate the objective function to embed the (weighted) line graph as follows. Let us introduce some notation. Bold face letters like u (or v) denote a node in the line graph L(G), which can also be denoted by uuv when the correspondence with the edge (u, v) ∈ E in the original graph G is required. Normal face letters like u, v denote nodes in the given graph. xv ∈ RK (equivalently xuv) denotes the embedding of the node vuv in line graph (or the edge (u, v) ∈ E). To map the nodes of the line graph to vectors, first we want to pre- serve different orders of node proximities in the line graph. For this, a truncated random walk based sampling strategy S is used to provide a set of nodes NS(v) as context to a node v in the network. Here we employ the random walk proposed by [12], which balances between the BFS and DFS search strategy in the graph. As the generated line graph is a weighted one, we consider the weights of the edges while computing the node transition probabilities. Let X denote the matrix with each row as the embedding xv of a node v of the line graph. As- suming conditional independence of the nodes, we seek to maximize (w.r.t. X) the log likelihood of the context of a node as: log P (NS(v)xv) = log P (v (cid:48)xv) (cid:88) (cid:88) v∈VL v(cid:48)∈NS (v) (cid:88) v∈VL Each of the above probabilities can be represented using standard softmax function parameterized by the dot product of xv(cid:48) and xv. As usual, we also approximate the computationally expensive denomi- nator of the softmax function using some negative sampling strategy ¯N (v) for any node v. The above equation, after simple algebraic manipulations, leads to maximizing the following: xv(cid:48) · xv − NS(v) log exp(x¯v · xv) (cid:16) (cid:88) (cid:17) ¯v∈ ¯N (v) (2) (cid:88) (cid:88) v∈VL v(cid:48)∈NS (v) Next, we implement the concept of collective homophily as pro- posed above. Each node u ∈ V (in the original network) induces a clique in the line graph (Lemma 1). An edge (u, v) ∈ E corresponds to the node vuv ∈ VL in the line graph. So we want all the nodes of the form vuv ∈ VL belong to a sphere centered at cu ∈ RK and of radius Ru, where v ∈ N (u) (neighbors of u). As collective ho- mophily suggests that embeddings of these nodes must be close to each other, we minimize the sum of all such radii. This with Eq. 2 gives the final cost function of line2vec as follows. (cid:17) exp(x¯v · xv) (cid:104)NS(v) log (cid:88) − (cid:88) v∈VL xv(cid:48) · xv (cid:16) (cid:88) (cid:105) + α ¯v∈ ¯N (v) (cid:88) u∈V v(cid:48)∈NS (v) xuv − cu2 Ru ≥ 0, ∀u ∈ V R2 u (3) 2 ≤ R2 u, ∀v ∈ N (u), ∀u ∈ V min X,R,C such that, 2 ≤ Here, α is a positive weight factor. The constraint xuv − cu2 u ensures that nodes of the form xuv belong to the sphere of radius R2 Ru and centered at cu. We use R and C to denote set of all such radii and centers respectively. 4.3.2 Solving the Optimization Equation 3 is a non-convex constrained optimization problem. We use penalty functions [6] technique to convert this to an uncon- strained optimization problem as follows: (cid:17) exp(x¯v · xv) min X,R,C (cid:88) − (cid:88) (cid:88) v(cid:48)∈NS (v) (cid:16) (cid:88) (cid:104)NS(v) log (cid:88) (cid:88) u∈V g(xuv − cu2 xv(cid:48) · xv v∈VL (cid:105) + α R2 u + λ ¯v∈ ¯N (v) u∈V v∈N (u) 2 − R2 u) + (cid:88) u∈V (4) γug(−Ru) Here the function g : R → R is defined as g(t) = max(t, 0). So it imposes a penalty to the cost function in Eq. 4 when the argument inside g is positive, i.e., when there is a violation of the constraints in Eq. 3. We use a linear penalty g(t) as the gradient does not van- ish even when t → 0+. To solve the unconstrained optimization in Eq. 4, we use stochastic gradient descent, computing gradients w.r.t. each of X, R and C. We take subgradient when t = 0 for g(t). All the penalty parameters λ and γu's corresponding to penalty func- tions are positive. When there is any violation of a constraint (or sum of constraints), the corresponding penalty parameter is increased to impose more penalty. We give more importance to the type of con- straints Ru ≥ 0, as violation of them may change the intuition of the solution. So we use different penalty parameters for each of them, so imposing a different penalty to each of such constraints is possible. One can show that under appropriate assumptions, any convergent subsequence of solutions to the unconstrained penalized problems must converge to a solution of the original constrained problem [6]. Very small values of the penalty parameters might lead to the vio- lation of constraints, and very large values would make the gradient descent algorithm oscillate. So, we start with smaller values of λ and γu's and keep increasing them until all the constraints are satisfied or the gradients become too large making abrupt function changes. Note that, theoretically some of the constraints in Eq. 3 may still be violated, but experimentally we found them satisfied up to a large extent (Section 5). In the final solution, xv gives the vector represen- tation of node v of the line graph, which is essentially the embedding of the corresponding edge in the original network. 4.4 Key Observations and Analysis Both the edge embedding properties mentioned in Section 3 are pre- served in the construction and embedding of the weighted line graph. Particularly, if two edges have a common incident node in the orig- inal network, the corresponding two nodes in the transformed line graph would be neighbors. Also two edges having similar neighbor- hood in the original network lead to two nodes having similar neigh- borhood in the transformed line graph. The random walk and collec- tive homophily preserve both pairwise and collective node proxim- ity of the line graph in the embedding space. Thus different orders of edge proximities of the original network is captured well in the edge embeddings. Also the construction of edge weights in line graph (Sec. 4.2) ensures that underlying importance of edges of the original network is preserved in the transformed line graph, and hence in the embeddings through truncated random walk. (cid:80) du(du−1) (cid:0)du (cid:1) = (cid:80) Time Complexity: Edge embedding is computationally difficult than node embedding, as the number of edges in a real life net- work is more than the number of nodes. From Lemma 1, each node u in the original network induces a clique of size du (degree of u in G). Hence total number of edges in the line graph is: mL = ≤ V d2, where d is the maximum de- u∈V gree of a node in the given network. So, the construction of line graph would take O(V d2) time. Next, we use alias table for fast computation of the corpus of node sequences in O(mL log(mL)) = O(V d2 log(V d)) by the random walks, assuming the number of random walks on the line graph, maximum length of a random walk, context window size and the number of negative samples for each node to be constant, as they are the hyper parameters of skip-gram model. Then, the first term (under the sum over the nodes in VL) of Eq. 4 can be computed in O(VL) = O(E) time. Next, the term weighted by α can be computed in O(V ) time. Then, for the term u∈V 2 2 weighted by λ, we need to visit each node in V and for each such node, its neighbors in the original graph, which can be computed in a total of O(E) time. The last term of Eq. 4 can be computed in O(V ) time. As we use penalty methods to solve it, the runtime of solving Eq. 4 is O(E + V ). Hence the total runtime complexity of line2vec is O(V d2 log(V d)). So in the worst case, (for e.g., a nearly complete graph), run time complexity is O(V 3logV ). But for most of the real life social networks, the maximum degree can be considered as a constant (i.e., does not grow with the number of nodes). Hence for them, the run time complexity is O(V logV ). 5 Experimental Evaluation We conduct detailed experiments on three downstream edge centric network mining tasks and thoroughly analyze the proposed optimiza- tion framework of line2vec. 5.1 Design of Baseline Algorithms Unsupervised direct edge embedding for information network itself is a novel problem. Existing approaches only aggregate the embed- dings of the two end nodes to find the embedding of an edge. So as baselines, we only consider the publicly available implementation of a set of popular unsupervised node embedding algorithms which can work only using the link structure of the graph: DeepWalk, node2vec, SDNE, struc2vec and GraphSage (official unsupervised implemen- tation for the un-attributed networks). We have considered differ- ent types of node aggregation methods such as taking the average, Hadamard product, vector norms of two end node embeddings [12] to generate the edge embeddings for the baseline algorithms. It turns out that average aggregation method performs the best among them. So we report the performance of the baseline methods with average node aggregation, where embedding of an edge (u, v) is computed by taking the average of the node embeddings of u and v. 5.2 Datasets Used and Setting Hyper-parameters We used five real world publicly available datasets for the ex- periments. A summary of the datasets is given in Table 1. For Zachary's karate club and Dolphin social network (http:// www-personal.umich.edu/mejn/netdata/), there are no ground truth community labels given for the nodes. So we use the modularity based community detection algorithm, and label the nodes based on the communities they belong to. For Cora, Pubmed (https://linqs.soe.ucsc.edu/data) and MSA [26], the ground truth node communities are available. The ground truth edge labels are derived as follows. If an edge connects two nodes of the same community (intra community edge), the label of that edge is the common community label. If an edge connects nodes of different communities (inter community edge), then that edge is not consid- ered for calculating the accuracy of downstream tasks. Note that, all the edges (both intra and inter community) are considered for learn- ing the edge embeddings. We also provide the size of the generated weighted line graphs in Table 1. Note that, line graphs are still ex- tremely sparse in nature, which enables the application of efficient data structures and computation on sparse graphs here. We set the parameter α in Eq. 3 to be 0.1 in the experiments. At that value, the two components in the cost function in Eq. 3 con- tribute roughly the same to the total cost in the first iteration of line2vec. The dimension (K) of the embedding space is set as 8 for Karate club and Dolphin social network as they are small in size, Table 1: Summary of the datasets used. Dataset Zachary's Karate club Dolphin social network Cora Pubmed MSA #Nodes 34 62 2708 19717 30101 #Edges 78 159 5278 44327 204926 #Edge-Labels #Nodes in L(G) #Edges in L(G) 3 4 7 3 3 78 159 5278 44327 204926 528 923 52301 699385 6149555 and it is set as 128 for the other three larger datasets (for all the algo- rithms). For the faster convergence of SGD, we set the initial learning rate higher and decrease it over the iterations. We vary the penalty pa- rameters in Eq. 4 over the iterations as discussed in Section 4.3.2 to ensure that the constraints are satisfied at large. (cid:80) ical error (cid:80) value very close to zero and negative error (cid:80) 5.3 Penalty Errors of line2vec Optimization We have shown the values of two different penalty errors (or con- straint violation error of the penalty method based optimization) over the iterations of line2vec in Figure 5. For all the datasets, total spher- u) converges to a small g(−Ru) remains to be zero. This means, almost all the constraints of line2vec formula- tion are satisfied in the final solution. g(xuv − cu2 2 − R2 u∈V u∈V v∈N (u) 5.4 Downstream Edge Mining Tasks Edge visualization: It is important to understand if the edge embed- dings are able to separate the communities visually. We use the em- bedding of the edges as input in RK, and use t-SNE [17] to plot the edge embedding in a 2 dimensional space. Fig. 4 shows the edge vi- sualizations by line2vec, along with the baselines algorithms on Cora datasets. Note that, line2vec is able to visually separate the commu- nities well compared to all the other baselines. The same trend was observed even in Fig. 1 for the small synthetic network. Line2vec, be- ing a direct approach for edge embedding via collective homophily, outperforms all the baselines which aggregate node embeddings to generate the embeddings for the edges. Edge Clustering: Like node clustering, edge clustering is also im- portant to understand the flow of information within and between the communities. For clustering the embeddings of the edges, we apply KMeans++ algorithm. To evaluate the quality of clustering, we use unsupervised clustering accuracy [34] which uses different permuta- tions of the labels and chooses the assignment which gives best possi- ble accuracy. Figure 6a shows that line2vec outperforms all the base- lines for edge clustering on all the datasets. DeepWalk and node2vec also perform well among the baselines. Multi-class Edge Classification: We use only 10% edges with ground truth label (as generated in Section 5.2) as the training set, because getting labels is expensive in networks. A logistic regression classifier is trained on the edge embeddings generated by different al- gorithms. The performance on the test set is reported using Micro F1 score. Figure 6b shows that line2vec is better or highly competitive with the state-of-the-art embedding algorithms. node2vec and Deep- Walk follows line2vec closely. On the Dolphin dataset, node2vec outperforms line2vec marginally. Performance of line2vec for edge classification again shows the superiority of a direct edge embedding scheme over the node aggregation approaches. 5.5 Ablation Study of line2vec The idea of line2vec is to embed the line graph for generating the edge embeddings of a given network. There are two main novel com- (a) DeepWalk (b) node2vec (c) SDNE (d) struc2vec (e) GraphSAGE (f) line2vec Figure 4: Edge visualization on Cora dataset. Different colors represent different edge communities. (a) Spherical Error Figure 5: Both spherical error (cid:80) and non-negative error (cid:80) 2 − R2 u) g(−Ru) in the penalty function based optimization of line2vec converge to zero very fast on all the datasets. (b) Non-negative Error g(xuv − cu2 (cid:80) u∈V v∈N (u) u∈V ponents in line2vec: first, the construction of weighted line graph; and second, more importantly, proposing the concept of collective homophily on the weighted line graph. In this subsection, we show the incremental benefit of each component through a small experi- ment of edge visualization on the Dolphin dataset, as shown in Fig. 7. We use node2vec (N2V) as the starting point because the skip- gram objective component of line2vec (L2V) is similar to node2vec. Though, visually there is not much difference between Sub-figures 7a and 7b, but there is some improvement when we apply node2vec on the weighted line graph (without using collective homophily) in Sub-fig. 7c. Finally, superiority of line2vec because of using collec- tive homophily on the weighted line graph is clear from Sub-fig. 7c. Thus, both the novel components of line2vev have their incremental benefits for the overall algorithm. 5.6 Parameter Sensitivity of line2vec Figure 8 shows the sensitivity of line2vec with respect to the hyper- parameter α (in Eq. 3 of the main paper) on Karate and Dolphin datasets. We have shown the variation of performance for node clas- sification (both micro and macro F1 scores) and node clustering (un- supervised accuracy). From the figure, one can observe that optimal performance in most of the cases is obtained when the value of α is from 0.05 to 0.1. Around these values, the loss from both the com- ponents of line2vec in Eq. 3 are close to each other. For our other experiments, we fix α=0.1 for all the datasets. Interpretation of cu as Node Embedding 5.7 line2vec is dedicated for direct edge embedding in information net- works. Lemma 1 suggests that each node in the given network G induces a clique in the line graph L(G). Based on the concept of col- lective homophily, corresponding to a node u in G, the clique in the line graph is enclosed by a sphere centered at cu ∈ RK (Eq. 3). In- tuitively, the center acts as a point which is close to the embeddings of all the nodes in the clique induced by u (or equivalently, all the edges incident on u in G). Hence the role of this center in the em- bedding space is similar to the role of the node to its adjacent edges in the graph. This motivates us to consider cu as the node embedding of u ∈ V in G. If (u, v) ∈ E, then the edge embedding of (u, v) should be close to both cu and cv, which in turn pulls cu and cv close to each other. Thus, node proximities are also captured in cu. We use clustering of the nodes (a.k.a. community detection) of the given network to validate the quality of node embedding obtained from the centers of the line2vec optimization. We use k-means++ clustering, as before, on the set of points cu, ∀u ∈ V and validate the clustering quality by using unsupervised accuracy [4]. Figure 6c shows that line2vec, though designed specifically for edge embed- ding, performs really good for a node based mining task. Specifically, for Karate and Dolphins networks, the gain is significantly more than best of the baselines. This result is interesting as we aimed to find edge embeddings, but also generate a set of efficient node embed- dings, which are not just the aggregation of the incident edges. 5.8 Connection of Node Centrality with Ru This subsection analyzes the interpretation of the radius Ru of the sphere enclosing the clique induced by node u ∈ V in the embed- ding space. When a node u has less number of incident edges, and the neighbors are very close to each other in the embedding space (for e.g., they are all from the same sub-community), a small radius Ru should be enough to enclose all the edges incident on u. But when the neighbors of the node u are diverse in nature, the corresponding edges would also be different in terms of strength and semantics. For example, an influential researcher may be directly connected to many other researchers in a research network, but only few of them can be direct collaborators. Hence, a larger sphere is needed to enclose the clique in the line graph induced by such a node. This intuition con- nects radius Ru of a sphere in the embedding space of line graph to the centrality [27] of the node u in the given network. A node which is loosely connected (i.e., less number or very similar neighbors) in the network is less central, and a node which is strongly connected (many or diverse set of neighbors) is considered as highly central. As real life networks are noisy [4], first we experiment with a small synthetic graph as shown in Figure 9 to show the connection between Ru and the centrality of the node u ∈ V . It has three communities and there is a central (red colored) node connecting all the commu- nities. Each community has three sub-communities which are con- nected via the green colored nodes. The degree of each node in this network is kept roughly the same. We use closeness centrality [21], which is used widely in the network analysis literature. The closeness centrality of the nodes are plotted in Fig. 9(b). The nodes in the y-axis are sorted based on their closeness centrality values and as expected, the red node top the list as it is well connected to all the communi- ties, followed by the green nodes, with yellow nodes placed at the bottom. We run line2vec on this synthetic graph and plot the Radius Ru for each node u in Fig. 9(c). Here also, the nodes are sorted in (a) Edge Clustering (b) Edge Classification (c) Node Clustering Figure 6: Performance Comparisons: (a) Micro F1 Score of Edge Classification. (b) Edge Clustering with KMeans++. (c) Node Clustering with KMeans++. Here we use cu as the embedding of the node u in the given network. (a) N2V (b) N2V+LG (c) N2V+WLG (d) L2V Figure 7: Edge visualization on Dolphin Dataset by t-SNE: In the following sub-figures, edge Embeddings are obtained (a) by using node2vec on the input graph and then taking average of end node embeddings for each edge, (b) by using node2vec on an unweighted (conventional) line graph, (c) by using node2vec on our proposed weighted line graph, (d) by line2vec. Clearly, there is an incremental improvement of the quality because of using weighted line graph and then collective homophily as reflected in (c) and (d) respectively. (a) Edge Classification (b) Edge Clustering Figure 8: Sensitivity of line2vec with respect to the hyper-parameter α (in Eq. 3 of the main paper) on Karate and Dolphin datasets: We have shown the variation of performance for edge classification (Mi- cro F1 score) and edge clustering (unsupervised accuracy). the same order as in sub-figure 9(b). As one can see, the red node has the highest value of the radius. As this node is connected to a diverse set of nodes in the network, it needs a larger sphere to enclose the induced clique in the line graph. We also observe that most of the green nodes have higher values of Ru than that of the yellow nodes. The correlation coefficient between the closeness centrality and the radius Ru is 0.56. A more prominent trend can be observed for be- tweenness centrality [27], where the correlation coefficient with the radius Ru is 0.86. On all the real-world datasets, we show the correlation of Ru with the two centrality metrics for all the nodes in Table 2. High positive correlation between them can conclude that radius Ru of a node is roughly proportional to the centrality of the node u in the network. However, a detailed analysis is required to see the scope of introduc- ing a new type of node centrality based on the values of Ru. (a) (b) (c) Figure 9: Relationship between radius Ru associated with each node and closeness centrality in a synthetic graph. (a) shows the structure of the synthetic network. (b) shows the closeness centrality of the nodes, where in Y axis, nodes are sorted based on their centrality values. (c) shows the Ru for all the nodes. Nodes in Y-axis of (c) are sorted in the same order as in (b). The colors of the lines in (b) and (c) correspond to three different types of nodes (colored accordingly) in (a). This figure also shows the high overlap between the top few nodes in both the lists. Table 2: Pearson Correlation-Coefficient(CC) values obtained be- tween the radius(Ru) and centrality values of nodes for different net- works. The centrality measures considered here are Betweenness and Closeness centrality. Dataset Betweenness CC Closeness CC Karate 0.81 0.68 Dolphins 0.66 0.78 Cora 0.29 0.79 Pubmed MSA 0.35 0.72 0.26 0.59 6 Discussion and Future Work We proposed a novel unsupervised dedicated edge embedding frame- work for homogeneous information and social networks. We convert the given network to a weighted line graph and introduce the con- cept of collective homophily to embed the weighted line graph. Our framework is quite generic. The skip-gram based component in the objective function of line2vec can easily be replaced with any other approach like graph convolution in weighted line graph. Beside, we also plan to extend this methodology for heterogeneous information networks and knowledge bases. There are several edge centric appli- cations in networks. This work, being the first one towards a direct edge embedding, can play a basis to solve some of them in the con- text of network embedding and help to move network representation learning beyond node embedding. REFERENCES [1] Sami Abu-El-Haija, Bryan Perozzi, and Rami Al-Rfou, 'Learning edge representations via low-rank asymmetric projections', in Proceedings of the 2017 ACM on Conference on Information and Knowledge Man- agement, pp. 1787 -- 1796. ACM, (2017). bedding learning by comprehensive transcription of heterogeneous in- formation networks', in Proceedings of the 24th ACM SIGKDD In- ternational Conference on Knowledge Discovery & Data Mining, pp. 2190 -- 2199. ACM, (2018). [26] Arnab Sinha, Zhihong Shen, Yang Song, Hao Ma, Darrin Eide, Bo- june Paul Hsu, and Kuansan Wang, 'An overview of microsoft aca- demic service (mas) and applications', in Proceedings of the 24th in- ternational conference on world wide web, pp. 243 -- 246. ACM, (2015). [27] Oskar Skibski, Talal Rahwan, Tomasz P Michalak, and Makoto Yokoo, 'Attachment centrality: An axiomatic approach to connectivity in net- works', in Proceedings of the 2016 International Conference on Au- tonomous Agents & Multiagent Systems, pp. 168 -- 176. International Foundation for Autonomous Agents and Multiagent Systems, (2016). [28] Petar Velickovi´c, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio, 'Graph attention networks', in International Conference on Learning Representations, (2018). [29] Petar Velickovi´c, William Fedus, William L Hamilton, Pietro Li`o, Yoshua Bengio, and R Devon Hjelm, 'Deep graph infomax', in Inter- national Conference on Learning Representations, (2019). Janu Verma, Srishti Gupta, Debdoot Mukherjee, and Tanmoy Chakraborty, 'Heterogeneous edge embedding for friend recommenda- tion', in European Conference on Information Retrieval, pp. 172 -- 179. Springer, (2019). [31] Daixin Wang, Peng Cui, and Wenwu Zhu, 'Structural deep network embedding', in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1225 -- 1234. ACM, (2016). [32] H. Whitney, 'Congruent graphs and the connectivity of graphs', Amer- [30] ican Journal of Mathematics, 54(1), 150 -- 168, (1932). [34] [33] Zonghan Wu, Shirui Pan, Fengwen Chen, Guodong Long, Chengqi Zhang, and Philip S Yu, 'A comprehensive survey on graph neural net- works', arXiv preprint arXiv:1901.00596, (2019). Junyuan Xie, Ross Girshick, and Ali Farhadi, 'Unsupervised deep em- bedding for clustering analysis', in International conference on ma- chine learning, pp. 478 -- 487, (2016). [35] Cheng Yang, Zhiyuan Liu, Deli Zhao, Maosong Sun, and Edward Y Chang, 'Network representation learning with rich text information.', in IJCAI, pp. 2111 -- 2117, (2015). [36] Yang Zhou, Sixing Wu, Chao Jiang, Zijie Zhang, Dejing Dou, Ruom- ing Jin, and Pengwei Wang, 'Density-adaptive local edge representa- tion learning with generative adversarial network multi-label edge clas- sification', in 2018 IEEE International Conference on Data Mining (ICDM), pp. 1464 -- 1469. IEEE, (2018). [2] Lada A Adamic and Eytan Adar, 'Friends and neighbors on the web', Social networks, 25(3), 211 -- 230, (2003). [3] Sambaran Bandyopadhyay, Harsh Kara, Aswin Kannan, and M Narasimha Murty, 'Fscnmf: Fusing structure and content via non-negative matrix factorization for embedding information net- works', arXiv preprint arXiv:1804.05313, (2018). [4] Sambaran Bandyopadhyay, N Lokesh, and M Narasimha Murty, 'Out- lier aware network embedding for attributed networks', in Proceedings of the AAAI Conference on Artificial Intelligence, volume 33, pp. 12 -- 19, (2019). [5] Antoine Bordes, Nicolas Usunier, Alberto Garcia-Duran, Jason Weston, and Oksana Yakhnenko, 'Translating embeddings for modeling multi- relational data', in Advances in neural information processing systems, pp. 2787 -- 2795, (2013). [6] Kurt Bryan and Yosi Shibberu, 'Penalty functions and constrained opti- mization', Dept. of Mathematics, Rose-Hulman Institute of Technology. http:// www. rosehulman. edu/ bryan/lottamath/penalty. pdf, (2005). [7] Muhao Chen and Chris Quirk, 'Embedding edge-attributed relational hierarchies'. SIGIR, (2019). [8] Tim S Evans and Renaud Lambiotte, 'Line graphs of weighted net- works for overlapping communities', The European Physical Journal B, 77(2), 265 -- 272, (2010). [9] Hongchang Gao and Heng Huang, 'Deep attributed network embed- ding.', in IJCAI, volume 18, pp. 3364 -- 3370, (2018). [10] Zheng Gao, Gang Fu, Chunping Ouyang, Satoshi Tsutsui, Xiaozhong Liu, Jeremy Yang, Christopher Gessner, Brian Foote, David Wild, Ying Ding, et al., 'edge2vec: Representation learning using edge semantics for biomedical knowledge discovery', BMC bioinformatics, 20(1), 306, (2019). [11] Mohammad Golam Sohrab, Toru Nakata, Makoto Miwa, and Yutaka Sasaki, 'Edge2vec: Edge representations for large-scale scalable hier- archical learning', Computaci´on y Sistemas, 21(4), 569 -- 579, (2017). [12] Aditya Grover and Jure Leskovec, 'node2vec: Scalable feature learn- ing for networks', in Proceedings of the 22nd ACM SIGKDD interna- tional conference on Knowledge discovery and data mining, pp. 855 -- 864. ACM, (2016). [13] Will Hamilton, Zhitao Ying, and Jure Leskovec, 'Inductive representa- tion learning on large graphs', in Advances in Neural Information Pro- cessing Systems, pp. 1025 -- 1035, (2017). [14] Thomas N Kipf and Max Welling, 'Semi-supervised classification with graph convolutional networks', arXiv preprint arXiv:1609.02907, (2016). [15] Suxue Li, Haixia Zhang, Dalei Wu, Chuanting Zhang, and Dongfeng Yuan, 'Edge representation learning for community detection in large scale information networks', in International Workshop on Mobility Analytics for Spatio-temporal and Social Data, pp. 54 -- 72. Springer, (2017). [16] David Liben-Nowell and Jon Kleinberg, 'The link-prediction problem for social networks', Journal of the American society for information science and technology, 58(7), 1019 -- 1031, (2007). [17] Laurens van der Maaten and Geoffrey Hinton, 'Visualizing data us- ing t-sne', Journal of machine learning research, 9(Nov), 2579 -- 2605, (2008). [18] Miller McPherson, Lynn Smith-Lovin, and James M Cook, 'Birds of a feather: Homophily in social networks', Annual review of sociology, 27(1), 415 -- 444, (2001). [19] Federico Monti, Oleksandr Shchur, Aleksandar Bojchevski, Or Litany, Stephan Gunnemann, and Michael M Bronstein, 'Dual-primal graph convolutional networks', arXiv preprint arXiv:1806.00770, (2018). [20] M.E.J. Newman, Networks: An Introduction, Oxford University Press, Oxford, UK, 2010. [21] Tore Opsahl, Filip Agneessens, and John Skvoretz, 'Node centrality in weighted networks: Generalizing degree and shortest paths', Social networks, 32(3), 245 -- 251, (2010). [22] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena, 'Deepwalk: Online learning of social representations', in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 701 -- 710. ACM, (2014). [23] Leonardo FR Ribeiro, Pedro HP Saverese, and Daniel R Figueiredo, 'struc2vec: Learning node representations from structural identity', in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 385 -- 394. ACM, (2017). [24] E. Rogers, Diffusion of Innovations, Free Press, New York, USA, 1995. [25] Yu Shi, Qi Zhu, Fang Guo, Chao Zhang, and Jiawei Han, 'Easing em-
1701.03051
1
1701
2017-01-11T16:39:04
Efficient Twitter Sentiment Classification using Subjective Distant Supervision
[ "cs.SI", "cs.CL", "cs.IR" ]
As microblogging services like Twitter are becoming more and more influential in today's globalised world, its facets like sentiment analysis are being extensively studied. We are no longer constrained by our own opinion. Others opinions and sentiments play a huge role in shaping our perspective. In this paper, we build on previous works on Twitter sentiment analysis using Distant Supervision. The existing approach requires huge computation resource for analysing large number of tweets. In this paper, we propose techniques to speed up the computation process for sentiment analysis. We use tweet subjectivity to select the right training samples. We also introduce the concept of EFWS (Effective Word Score) of a tweet that is derived from polarity scores of frequently used words, which is an additional heuristic that can be used to speed up the sentiment classification with standard machine learning algorithms. We performed our experiments using 1.6 million tweets. Experimental evaluations show that our proposed technique is more efficient and has higher accuracy compared to previously proposed methods. We achieve overall accuracies of around 80% (EFWS heuristic gives an accuracy around 85%) on a training dataset of 100K tweets, which is half the size of the dataset used for the baseline model. The accuracy of our proposed model is 2-3% higher than the baseline model, and the model effectively trains at twice the speed of the baseline model.
cs.SI
cs
Efficient Twitter Sentiment Classification using Subjective Distant Supervision Tapan Sahni∗, Chinmay Chandak∗, Naveen Reddy ∗, Manish Singh† Indian Institute of Technology, Hyderabad Email: {cs13b1030, cs13b1011, cs13b1010, msingh}@iith.ac.in 7 1 0 2 n a J 1 1 ] I S . s c [ 1 v 1 5 0 3 0 . 1 0 7 1 : v i X r a Abstract-As microblogging services like Twitter are becoming more and more influential in today's globalized world, its facets like sentiment analysis are being extensively studied. We are no longer constrained by our own opinion. Others' opinions and sentiments play a huge role in shaping our perspective. In this paper, we build on previous works on Twitter sentiment analysis using Distant Supervision. The existing approach requires huge computation resource for analyzing large number of tweets. In this paper, we propose techniques to speed up the computation process for sentiment analysis. We use tweet subjectivity to select the right training samples. We also introduce the concept of EFWS (Effective Word Score) of a tweet that is derived from polarity scores of frequently used words, which is an additional heuristic that can be used to speed up the sentiment classification with standard machine learning algorithms. We performed our experiments using 1.6 million tweets. Experimental evaluations show that our proposed technique is more efficient and has higher accuracy compared to previously proposed methods. We achieve overall accuracies of around 80% (EFWS heuristic gives an accuracy around 85%) on a training dataset of 100K tweets, which is half the size of the dataset used for the baseline model. The accuracy of our proposed model is 2-3% higher than the baseline model, and the model effectively trains at twice the speed of the baseline model. I. INTRODUCTION A lot of work has been done in the field of Twitter senti- ment analysis till date. Sentiment analysis has been handled as a Natural Language Processing task at many levels of granularity. Most of these techniques use Machine Learning algorithms with features such as unigrams, n-grams, Part-Of- Speech (POS) tags. However, the training datasets are often very large, and hence with such a large number of features, this process requires a lot of computation power and time. The fol- lowing question arises: What to do if we do not have resources that provide such a great amount of computation power? The existing solution to this problem is to use a smaller sample of the dataset. For sentiment analysis, if we train the model using a smaller randomly chosen sample, then we get low accuracy [16, 17]. In this paper, we propose a novel technique to sample tweets for building a sentiment classification model so that we get higher accuracy than the state-of-the-art baseline method, namely Distant Supervision, using a smaller set of tweets. Our model has lower computation time and higher accuracy compared to baseline model. Users often express sentiment using subjective expression. Although objective expressions can also have sentiment, it is much rare. Determining subjectivity is quite efficient compared to determining sentiment. Subjectivity can be determined for individual tweets. But to do sentiment classification, we need to build a classification model with positive and negative sentiment tweets. The time to train a sentiment classification model increases with the increase in the number of training tweets. In this paper, we use tweet subjectivity to select the best training tweets. This not only lowers the computation time but also increases the accuracy because we have training data with less noise. Even the created features will be more relevant to the classification task. The computation cost will reduce due to small training data size and better set of features. Thus if users do not have enough computational resources, they can filter the training dataset using a high value of subjectivf ity threshold. This ensures reliable prediction on a smaller training dataset, and eventually requires less computational time. The above approach, and some of the intricacies that invariably seep in, need to be considered, and are described in the later sections of the paper. In this paper we also integrate a lot of meticulous preprocessing steps. This makes our model more robust, and hence leads to higher accuracy. Along with the machine learning algorithms being used, we use a heuristic-based classification of tweets. This is based on the EFWS of a tweet, which is described in later sections. This heuristic basically takes into account the polarity scores of frequently used words in tweets, and is able to achieve around 85% accuracy on our dataset, hence boosting the overall accuracy by a considerable amount. Our training data consists of generic (not topic-specific) Twitter messages with emoticons, which are used as noisy labels. We show that the accuracy obtained on a training dataset comprising 100K tweets, and a test dataset of 5000 tweets gives an accuracy of around 80% on the following classifiers: Naive Bayes, RBF-kernel Support Vector Machine, and Logistic Regression. Our model takes roughly half the time to train and achieves higher accuracy (than the baseline model) on all the classifiers. Because the amount of training time is expected to increase exponentially as the training data increases, we expect our model to outperform (in terms of higher accuracy) the baseline model at a speed which is at least twofold the speed of the baseline model on larger datasets. II. RELATED WORK There has been a large amount of prior research in sentiment analysis of tweets. Read [10] shows that using emoticons as labels for positive and sentiment is effective for reducing dependencies in machine learning techniques. Alec Go [1] used Naive Bayes, SVM, and MaxEnt classifiers to train their model. This, as mentioned earlier, is our baseline model. Our model builds on this and achieves higher accuracy on a much smaller training dataset. Ayushi Dalmia [6] proposed a model with a more involved pre- processing stage, and used features like scores from Bing Lius Opinion Lexicon, and number of positive, negative POS tags. This model achieved considerably high accuracies considering the fact that their features were the not the conventional bag- of-words, or any n-grams. The thought of using the polarity scores of frequently used tweet words (as described in our EFWS heuristic) was inspired from this work. [14] created prior probabilities using the datasets for the average sentiment of tweets in different spatial, temporal and authorial contexts. They then used a Bayesian approach to combine these priors with standard bigram language models. Another significant effort in sentiment analysis on Twitter data is by Barbosa [16]. They use polarity predictions from three websites as noisy labels to train a model and use 1000 manually labelled tweets for tuning and another 1000 for testing. They propose the use of syntax features of tweets like punctuation, retweet, hashtags, link, and exclamation marks in addition with features like prior polarity of words and POS of words. Some works leveraged the use of existing hashtags in the Twitter data for building the training data. (Davidov, Tsur, and Rappoport 2010) also use hashtags for creating training data, but they limit their experiments to sentiment/non-sentiment classification, rather than 3-way polarity classification, as [15] does. Our model integrates some of the preprocessing techniques this work used. Hassan Saif [9] introduced a novel approach of adding semantics as additional features into the training set for sentiment analysis. This approach works well for topic specific data. Hence, we thought of taking a different approach for a generic tweet dataset like ours. III. SUBJECTIVITY Subjectivity refers to how someone's judgment is shaped by personal opinions and feelings instead of outside influences. An objective perspective is one that is not influenced by emotions, opinions, or personal feelings - it is a perspective based in fact, in things quantifiable and measurable. A subjective perspective is one open to greater interpretation based on personal feeling, emotion, aesthetics, etc. Subjectivity classification is another topic in the domain of text classification which is garnering more and more interest in the field of sentiment analysis. Since a single sentence may contain multiple opinions and subjective and factual clauses, this problem is not as straightforward as it seems. Below are some examples of subjective and objective sentences. the Earth Objective sentence with no sentiment: So, revolves around the Sun. Objective sentence with sentiment: The drug relieved my pain. Subjective sentence with no sentiment: I believe he went home yesterday. Subjective sentence with sentiment: I am so happy you got the scholarship. convey any sentiment, while most of the purely subjective sentences have a clear inclination towards either the positive or negative sentiment. Sentences which are not completely subjective or objective may or may not convey a sentiment. Libraries like TextBlob, and tools like Opinion Finder can be used to find the extent to which a sentence can be considered subjective. Since tweets are usually person-specific, or subjective, we use this intuition to reduce the size of the training set by filtering the sentences with a subjectivity level below a certain threshold (fairly objective tweets). IV. IMPLEMENTATION In this section, we explain the various preprocessing tech- niques used for feature reduction, and also the additional step of filtering the training dataset using the subjectivity score of tweets. We further describe our approach of using different machine learning classifiers and feature extractors. We also propose an additional heuristic for sentiment classification which can be used as a tag-along with the learning heuristics. A. Corpus Our training dataset1 has 1.6 million tweets, and 5000 tweets in the test dataset. Since the test dataset provided comprised only 500 tweets, we have taken part of the training data (exactly 5000 tweets, distinct from the training dataset) as the test dataset. We remove emoticons from our training and test data. The table below shows some sample tweets. Tweet @MrZeroo00 Yeah! tks man oh so bored...stuck at home pizza night and i feel too sick Sentiment Positive Negative Negative B. Subjectivity Filtering This is a new step we propose to achieve higher accuracy on a smaller training dataset. We use TextBlob to classify each tweet as subjective or objective. We then remove all tweets which have a subjectivity level/score (score lies between 0 and 1) below a specified threshold. The remaining tweets are used for training purposes. We observe that a considerable number of tweets are removed as the subjectivity threshold increases. We show the effect of doing this procedure on the overall accuracy in the evaluation section of the paper. C. Preprocessing The Twitter language model has many unique properties. We take advantage of the following properties to reduce the feature space. Most of the preprocessing steps are common to most of the previous works in the field. However, we have added some more steps to this stage of our model. Classifying a sentence as subjective or objective provides certain conclusions. Purely objective sentences do not usually 1The URL is http://twittersentiment.appspot.com/. This page has a link to our training data and test data. It is also a public tool that other researchers can use to build their own data sets. 1) Basic steps: We first strip off the emoticons from the data. Users often include twitter usernames in their tweets in order to direct their messages. We also strip off usernames (e.g. @Chinmay) and URLs present in tweets because they do not help us in sentiment classification. Apart from full stops, which are dealt in the next point, other punctuations and special symbols are also removed. Repeated whitespaces are replaced with a single space. We also perform stemming to reduce the size of the feature space. 2) Full Stops: In the previous works, full stops are just usually replaced by a space. However, we have observed that casual language in tweets is often seen in form of repeated punctuations. For example, "this is so cool...wow". We take into consideration this format, and replace two or more occurrences of "." and "-" with a space. Also, full stops are also quite different in usage. Sometimes, there isn't any space in between sentences. For example, "Its raining.Feeling awesome". We replace a single occurrence of a full stop with a space to ensure correct feature incorporation. 3) Parsing Hashtags: In the case of hashtags, most of the previous works just consider the case of hashtags followed by a single word; they just remove the hashtag and add the word to the feature vector. However, sometimes, there are multiple words after a hashtag, and more often than not, these words form an important, conclusive part of the Tweet. For example, #ThisSucks, or #BestMomentEver. These hashtags need to be dealt with in a proper fashion. We split the text after hashtags after before each capital letter, and add these as tokens to the feature vector. For hashtags followed by a single word, we just replace the pattern #word with the word, as conventional models do. The intuition behind this step is that quite often, the sentiment of a tweet is expressed in form of a hashtag. For example, #happy or #disappointed are frequently used hashtags, and we dont want to lose this information during sentiment classification. 4) Repeated letters: Tweets contain very casual language as mentioned earlier. For example, if we search "wow" with an arbitrary number of o's in the middle (e.g. wooow, woooow) on Twitter, there will most likely be a non-empty result set. We use preprocessing so that any letter occurring more than two times in a row is replaced with two occurrences. In the samples above, these words would be converted into the token "woow". After all the above modifications, tweets are converted into lowercase to avoid confusion between features having same content, but are different in capitalization. 5) Stopwords, Acronyms and Negations: We gather a list of 400 stopwords. These words, if present in the tweets, are not considered in the feature vector. We store an acronym dictionary which has over 5000, frequently-used acronyms and their abbreviations. We replace such acronyms in tweets with their abbreviation, since these can be of great use while sentiment classification. All negative words like 'cannot', 'can't', 'won't', 'don't' are replaced by 'not', which effectively keeps the sentiment stable. It is observed that doing this makes the training faster, since the model has to deal with a smaller feature vector. D. Baseline model The baseline model for our experiments is explained in the paper by Alec Go [1]. The model uses the Naive Bayes, SVM, and the Maximum Entropy classifiers for their experiment. Their feature vector is either composed of Unigrams, Bigrams, Unigrams + Bigrams, or Unigrams + POS tags. This work achieved the following maximum accuracies: a) 82.2 for the Unigram feature vector, using the SVM classifier, b) 83.0 for the Unigram + Bigram feature vector, using the MaxEnt classifier, and 82.7 using the Naive Bayes classifier. c) 81.9 for the Unigram + POS feature vector, using the SVM classifier. These baseline accuracies were on a training dataset of 1.6 million tweets, and a test dataset of 500 tweets. We are using the same training dataset for our experiments. We later present the baseline accuracies on a training set of 200K tweets, and a test dataset of 5000 tweets; we compare our model's accuracy with these baseline accuracy values on the same test data of 5000 tweets. E. Effective Word Score (EFWS) Heuristic We have described our baseline model above. So the feature vectors we collate results for, are Unigram, Unigram + Bigram, and Unigram + POS. We have already made two major changes before the training starts on our dataset as compared to our baseline model. Firstly, our training dataset will be filtered according to the subjectivity threshold. And secondly, our preprocessing is much more robust as compared to their work. Now let us look at an additional heuristic we use to obtain labels for our test data. Along with dictionaries for stop words and acronyms, we also maintain a dictionary of a list of frequently used words and their polarity scores. This dictionary has around 2500 words and their polarity score ranging from -5 to 5. At runtime, we also use all synonyms of a word (from WordNet) present in a tweet and also the dictionary, and assign them the same score as the dictionary word. There is a reasonable assumption here, that the synonyms aren't very extremal in nature, that is, a word with a polarity score of 2 cannot have a synonym which has a polarity score of 5. Now, we calculate the Effective Word Scores of a tweet. We define the Effective Word Score of score x as EFWS(x) = N(+x) - N(-x), where N(x) polarity score x. is the number of words in the tweet with For example, if a tweet has one word with score 5, three words with score 4, two with score 2, three with with score -2, one with score -3, and finally two with score -4, then the effective word scores are: EFWS(5) = N(5) - N(-5) = 1 - 0 = 1 EFWS(4) = N(4) - N(-4) = 3 - 2 = 1 EFWS(3) = N(3) - N(-3) = 0 - 1 = -1 EFWS(2) = N(2) - N(-2) = 2 - 3 = -1 EFWS(1) = N(1) - N(-1) = 2 - 0 = 2 We now define the heuristic for obtaining the label of a Tweet. if (EFWS(5) ≥ 1 or EFWS(4) ≥ 1) and (EFWS(2) ≥ 1) then Label = positive end if Similarly, if (EFWS(5) ≤ -1 or EFWS(4) ≤ -1) and (EFWS(2) ≤ -1) then Label = negative end if The basic intuition behind such a heuristic is that we found tweets having one strongly positive and one moderately pos- itive word more than the number of strongly negative and the moderately negative words respectively, usually conveyed a positive sentiment. Similar was the case for negative sen- timents. The tweets getting a label from this heuristic are not sent into the training phase. After considerable amount of experimenting, and analyzing the nature of our dataset, which is not domain specific, we have reached the conclusion that the heuristic mentioned above is optimal for obtaining labels. We found that the heuristic accuracy was around 85% for a training dataset of 100K and a test dataset of 5K, where the total number of test tweets labelled by the heuristic were around 500. This means that around 425 out of the 500 tweets received a correct prediction of sentiment using this heuristic. Thus, using this heuristic improves the overall accuracy, as well as saves time by reducing the number of tweets to be tested by the ML algorithms. F. Training Model We use the following classifiers for our model. 1) Naive Bayes: Naive Bayes is a simple model which works well on text categorization. We use a Naive Bayes model. Class c* is assigned to tweet d, where c* = argmax P(cd). PN B(cd) = P (c) ∗ m X i=1 P (f c)ni(d) And PN B(cd) is calculated using Bayes Rule. In this formula, f represents a feature and ni(d) represents the count of feature fi found in tweet d. There are a total of m features. Parameters P(c) and P (f c) are obtained through maximum likelihood estimates. 2) Support Vector Machines: Support vector machines are based on the Structural Risk Minimization principle from computational learning theory. SVM classification algorithms for binary classification is based on finding a separation between hyperplanes defined by classes of data. One remark- able property of SVMs is that their ability to learn can be independent of the dimensionality of the feature space. SVMs can generalize even in the presence of many features as in the case of text data classification. We use a non-linear Support Vector Machine with an RBF kernel. 3) Maximum Entropy Model: Maximum Entropy Model belongs to the family of discriminative classifiers also known as the exponential or log-linear classifiers.. In the naive Bayes classifier, Bayes rule is used to estimate this best y indirectly from the likelihood P (xy) (and the prior P (y)) but a discrim- inative model takes this direct approach, computing P (yx) by discriminating among the different possible values of the class y rather than first computing a likelihood. y = argmax P (yx) y Logistic regression estimates P (yx) by combining the feature set linearly (multiplying each feature by a weight and adding them up), and then applying a function to this combination. V. EVALUATION In this section, we present the collated results of our experiments. To show that our model achieves higher accuracy than the baseline model and on a smaller training dataset, we first fix the test dataset. Our test dataset, as mentioned before, consists of 5000 tweets. We conducted our experiments on an Intel Core i5 machine (4 cores), with 8 GB RAM. The following are the accuracies of the baseline model on a training set of 200K tweets: Naive Bayes 78.23% Unigram Unigram + Bigram 77.5% 76.7% Unigram + POS Logistic Regression SVM 74.10% 79.03% 71.3% 80.2% 71.8% 79.7% We filtered the training set with a subjectivity threshold of 0.5. By doing this, we saw that the number of tweets reduced to approximately 0.6 million tweets from an earlier total of 1.6 million. We then trained our model described in earlier sections on a 100K tweets randomly picked from this filtered training dataset, and observed the following accuracies: Naive Bayes 79.2% Unigram Unigram + Bigram 77.9% 77.5% Unigram + POS Logistic Regression SVM 77.8% 80.5% 71.7% 81.7% 73.6% 79.9% Note that all the accuracies in the tables above have been recorded as the average of 3 iterations of our experiment. We achieve higher accuracy for all feature vectors, on all classifiers, and that too from a training dataset half the size of the baseline one. We now see the intricacies of the subjectivity threshold parameter. It is clear that more and more tweets get filtered as the subjectivity threshold parameter increases. This can be seen in the Figure 1 shown below. We have plotted the number of tweets that remain after filtering from two sources: TextBlob, Opinion Finder Tool2. TextBlob has an inbuilt function that provides us the subjectivity level of a tweet. On the other hand, Opinion Finder only provides the information of which parts of the text are subjective, and which are objective. From that, we define the subjectivity level of that text as: Subjectivity level = P Length of subjective clauses Total length of the text ·106 ) s n o i l l i m n i ( s t e e w T 1.8 1.6 1.4 1.2 1 0.8 0.6 0.4 0.2 0 0 Textblob Opinion Finder 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Subjectivity Threshold Figure 1: Number of tweets with subjectivity greater than the subjectivity threshold ) 1 o t 0 m o r f ( y c a r u c c A 1 0.9 0.8 0.7 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Subjectivity Threshold Figure 2: Variation of accuracy (*Training data of 100K, Test data of 5K) with subjectivity threshold. *TextBlob is used to filter the tweets to form the training dataset. We now focus on the issue of choosing the optimum threshold value. As the subjectivity threshold parameter increases, our model trains on tweets with a higher subjectivity level, and the overall accuracy increases. We observed the following accuracies on subjectivity level 0.8 (Unigrams as features): Naive Bayes: 80.32% Non-linear SVM: 80.15 % Logistic Regression: 81.77% that a lot of useful tweets We should consider the fact are also lost in the process of gradually increasing the parameter, and this could cause a problem in cases when the test data is very large, because the model will not train on a generic dataset. Researchers may use a higher subjectivity threshold for their experiments if they are confident that most of the important information would be retained. This is most likely to happen in case of topic-specific or domain-specific data. Logistic Regression Naive Bayes SVM 35 30 25 20 15 10 baseline subjectivity=0.5 subjectivity=0.8 Figure 3: Comparison of training times for Unigrams Logistic Regression Naive Bayes SVM 30 20 10 ) s e t u n i m n i ( e m i t g n i n i a r T ) s e t u n i m n i ( e m i t g n i n i a r T baseline subjectivity=0.5 subjectivity=0.8 Figure 4: Comparison of training times for Unigrams + 2This tool can be found at: http://mpqa.cs.pitt.edu/opinionfinder/ Bigrams [8] Vishal A. Kharde, S.S. Sonawane. Sentiment Analysis of Twitter Data: A Survey of Techniques. International Journal of Computer Applications (0975 8887) Volume 139 No.11, April. 2016. [9] Hassan Saif, Yulan He and Harith Alani. Sentiment Analysis of Twitter Data: A Survey of Techniques. (EMNLP), pages 7986. 2002. [10] J. Read. Using emoticons to reduce dependency in machine learning techniques for sentiment classification. In Proceedings of ACL-05, 43nd Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, 2005. [11] Agarwal, A., Xie, B., Vovsha, I., Rambow, O., Passonneau, R. Sentiment analysis of twitter data. In Proc. ACL 2011 Workshop on Languages in Social Media, pp. 3038. 2011. [12] B. Pang, L. Lee and S. Vaithyanathan. Sentiment classification using machine learning techniques In Proceedings of the Conference on Em- pirical Methods in Natural Language Processing (EMNLP), pages 79-86. 2002. [13] Vidisha M. Pradhan, Jay Vala and Prem Balani. A survey on Senti- ment Analysis Algorithms for opinion mining. International Journal of Computer Applications, 2016. [14] Soroush Vosoughi, Helen Zhou, and Deb Roy. Enhanced twitter sen- timent classification using contextual information. In 6th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis (WASSA 2015), page 16. 2015. [15] Efthymios Kouloumpis*, Theresa Wilson*, Johanna Moore. Twitter Sentiment Analysis: The Good the Bad and the OMG! In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011. [16] Luciano Barbosa and Junlan Feng. Robust sentiment detection on twitter the 23rd International from biased and noisy data. Proceedings of Conference on Computational Linguistics: Posters, pages 3644. 2010. [17] Saif, Hassan; Fernndez, Miriam; He, Yulan and Alani, Harith. Evaluation datasets for Twitter sentiment analysis: a survey and a new dataset, the STS-Gold. In: 1st International Workshop on Emotion and Sentiment in Social and Expressive Media: Approaches and Perspectives from AI (ESSEM 2013), 3 December 2013, Turin, Italy. We use Logistic regression for classification and unigrams the feature vector with K-fold cross validation for as determining the accuracy. We choose an optimal threshold value of 0.5 for our experiment, considering the fact that the model should train on a more generic dataset. Figure 2 shows the variation of accuracy with the subjectivity threshold. The training size is fixed at 100K and the test dataset (5K tweets) is also same for all the experiments. We also measure the time taken to train our model, and compare it to the baseline model. Our observation was that our model took roughly half the amount of time in some cases and yet obtained a higher accuracy. Figures 3 and 4 show the difference in training time of the baseline model, our model on a 0.5 subjectivity-filtered dataset, and our model on a 0.8 subjectivity-filtered dataset on unigrams and unigrams + bigrams respectively. The times recorded are on a training dataset of 100K for our model and 200K for the baseline model, and a test dataset of 5K was fixed in all the recordings. The winning point, which can be seen from the plots, is that our model is considerably faster, and even has twofold speed in some cases. And alongside saving computation time, it achieves higher accuracy. This can be attributed to the fact that as the subjectivity threshold increases, only the tweets with highly polar words are retained in the training set and this makes the whole process faster. VI. CONCLUSION We show that a higher accuracy can be obtained in sentiment classification of Twitter messages training on a smaller dataset and with a much faster computation time, and hence the issue of constraint on computation power is resolved to a certain extent. This can be achieved using a subjectivity threshold to selectively filter the training data, incorporating a more complex preprocessing stage, and using an additional heuristic for sentiment classification, along with the conventional ma- chine learning techniques. As Twitter data is abundant, our subjectivity filtering process can achieve a better generalised model for sentiment classification. REFERENCES [1] Alec Go, Richa Bhayani, and Lei Huang. Twitter Sentiment Classification using Distant Supervision. CS224N Project Report, Stanford, pages 1-12. 2009. [2] N. Cristianini and J. Shawe-Taylor. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge Uni- versity Press, March 2000. [3] Bing Liu and Lei Zhang. A Survey of Opinion Mining and Sentiment Analysis. In Charu C. Aggarwal and ChengXiang Zhai, editors, Mining Text Data, pages 415463. Springer US. 2012. [4] Bing Liu. Sentiment Analysis and Subjectivity. In Handbook of Natural Language Processing, Second Edition. Taylor and Francis Group, Boc. 2010. [5] Saif M. Mohammad, Svetlana Kiritchenko, and Xiaodan Zhu. NRC- Canada: Building the State-of-the-Art in Sentiment Analysis of tweets. In Proceedings of the 7th International Workshop on Semantic Evaluation Exercises (SemEval-2013), Atlanta, Georgia, USA, 2013. [6] Ayushi Dalmia, Manish Gupta*, Vasudeva Varma. Twitter Sentiment Analysis The good, the bad and the neutral! IIIT-H at SemEval, 2015. [7] Alexander Pak and Patrick Paroubek. Twitter as a Corpus for Sentiment Analysis and Opinion Mining. In Proceedings of LREC, 2010.
1201.2277
1
1201
2012-01-11T10:45:39
A Time Decoupling Approach for Studying Forum Dynamics
[ "cs.SI", "physics.soc-ph" ]
Online forums are rich sources of information about user communication activity over time. Finding temporal patterns in online forum communication threads can advance our understanding of the dynamics of conversations. The main challenge of temporal analysis in this context is the complexity of forum data. There can be thousands of interacting users, who can be numerically described in many different ways. Moreover, user characteristics can evolve over time. We propose an approach that decouples temporal information about users into sequences of user events and inter-event times. We develop a new feature space to represent the event sequences as paths, and we model the distribution of the inter-event times. We study over 30,000 users across four Internet forums, and discover novel patterns in user communication. We find that users tend to exhibit consistency over time. Furthermore, in our feature space, we observe regions that represent unlikely user behaviors. Finally, we show how to derive a numerical representation for each forum, and we then use this representation to derive a novel clustering of multiple forums.
cs.SI
cs
World Wide Web Journal manuscript No. (will be inserted by the editor) A Time Decoupling Approach for Studying Forum Dynamics Andrey Kan · Jeffrey Chan · Conor Hayes · Bernie Hogan · James Bailey · Christopher Leckie 2 1 0 2 n a J 1 1 ] I S . s c [ 1 v 7 7 2 2 . 1 0 2 1 : v i X r a the date of receipt and acceptance should be inserted later Abstract Online forums are rich sources of information about user communication activity over time. Finding temporal patterns in online forum communication threads can advance our understanding of the dynamics of conversations. The main challenge of temporal analysis in this context is the complexity of forum data. There can be thousands of interacting users, who can be numerically described in many different ways. Moreover, user characteristics can evolve over time. We propose an approach that decouples temporal information about users into sequences of user events and inter-event times. We develop a new feature space to represent the event sequences as paths, and we model the distribution of the inter-event times. We study over 30, 000 users across four Internet forums, and discover novel patterns in user communication. We find that users tend to exhibit consistency over time. Furthermore, in our feature space, we observe regions that represent unlikely user behaviors. Finally, we show how to derive a numerical representation for each forum, and we then use this representation to derive a novel clustering of multiple forums. Keywords internet forums · conversation dynamics · temporal evolution · reciprocity · visualization A. Kan (corresponding), J. Bailey, C. Leckie NICTA Victoria Research Laboratory, Department of Computer Science and Software Engi- neering, The University of Melbourne, Australia Tel.: +614 20 768 752 E-mail: [email protected] J. Chan, C. Hayes Digital Enterprise Research Institute, National University of Ireland, Galway, Ireland J. Chan Department of Computer Science and Software Engineering, The University of Melbourne, Australia B. Hogan Oxford Internet Institute, University of Oxford, United Kingdom 2 1 Introduction Andrey Kan et al. Online forums are popular websites that allow users to communicate on diverse topics. These forums provide an extensive archive of conversation records over time. Finding temporal patterns in these records can advance our understanding of the dynamics of conversations. Furthermore, forum analysis can facilitate solving practical tasks, such as predicting the future behavior of users; identifying users whose behavior deviates from that of the majority in a given forum; and providing an automated forum categorization that can inform the structural design of forum websites. Accordingly, the temporal analysis of online forum data is of interest to different groups, including sociologists, businesses that run customer support forums, and web designers. The above-mentioned theoretical and practical advances can be advanced by ad- dressing the following research questions: 1. Are there any trends (e.g., consistency) in the temporal evolution of users in online forums? 2. Is it possible to characterize the normative temporal behavior for a given forum? 3. Can we quantify and categorize forums in terms of the temporal behavior of users? The main challenges for the analysis of temporal forum data arise from the complexity of the data. Communication records collected from a medium-sized forum website (e.g., www.boards.ie or forumbgz.ru) for one year may comprise information about thousands of users, with tens of thousands messages sent between different users. Furthermore, there are dozens of features that can be used to describe users and forums (e.g., number of initiated threads, number of connection ties, number of threads in a forum, percent- age of “answer people” users [9, 19, 25, 29]). It is not obvious which features to use, and how to define features that evolve over time (e.g., should one consider the number of users’ posts per week or per month?) Moreover, in order to have a computationally tractable online forum analysis, one may need to select discrete time points for processing. However, it is not obvious which time points to select. Finally, there is the challenge of natural language processing. Different forums can use different languages, and, for a given language, people may mistype words, use slang and non-dictionary words. Researchers have tried different approaches to forum data analysis, such as focusing on user roles, discussion diversity and growth dynamics. For example, both Viegas and Smith [25] and Welser et al. [29] use visualization to derive structural features of the roles of individual users, thus indicating clear differences between consistent “answer people” and those preferring discussions. Lui and Baldwin [17], and Chan et al. [9] extend this work by categorizing roles and exploring the composition of forums in terms of the diversity of roles. Kumar et al. [13] and Gonzalez-Bailon et al. [10] model growing trees of discussion threads. These studies tend to assume that users exhibit consistent behavior over time, and that the users can be described using features that are aggregated over the whole time span of the available data (e.g., total number of threads initiated by a user). Studies that look at temporal patterns over time, instead of assuming consistency, tend to be descriptive and difficult to scale. For example, AuthorLines [25] show the activity of individual users over time, but with AuthorLines it is hard to visualize the evolution of the whole forum. To the best of our knowledge there has been no forum representation that can be explicitly interpreted in terms of the temporal behavior of individual users. A Time Decoupling Approach for Studying Forum Dynamics 3 To address these limitations, we propose a novel method for studying forum dy- namics. By forum dynamics we mean a set of changes in the characteristics of the users participating in the forum over time. We propose to decouple temporal informa- tion about users into sequences of user events and inter-event times. Furthermore, we interpret a sequence of user events as a path in a feature space; we represent a forum with a set of paths; and we analyze forums from a geometrical perspective. In a given forum, we study user paths both individually and as a single interdepen- dent system. This makes our approach unique, because past work on time sequences analysis mostly focuses on pairwise correlation between parts of sequences (e.g., [20]). Moreover, our analysis reveals interesting findings that were not previously reported. This includes a roughly constant ability of users to attract responses (consistency), and existence of user states that are very unlikely to occur (“dead zones” in a feature space). Finally, we propose a forum visualization that allows us to obtain a succinct summary of the behavior of users in forums. In summary, the main contributions of our paper are as follows. – A time decoupling approach for finding temporal patterns in online forum data (Section 4.1). – A new feature space to represent users’ evolution (Section 4.2). A proposed visu- alization of our feature space allows us to observe users’ characteristics that were not apparent from previous studies (Section 4.3). – A novel feature representation of forums (Sections 6.1). This has enabled the dis- covery of a new clustering for one of the previously studied datasets (Section 6.2). – Discovery of consistent engagement and dead zone patterns (Sections 5.1 and 5.2) and the analysis of inter-event times (Section 5.3). Prior to giving a detailed description of our methods and results, in the next two sections we first introduce related work and then describe the datasets that we study. 2 Related Work In this section, we start with a review of approaches to study online forum data (Table 1). We then discuss work that studies dynamic processes in related online media, such as online social networks and weblogs. Chan et al. [9] employ reply graphs, as well as the structure of threads, to derive features for classifying users into different roles (e.g., “taciturn”, “elitist”). In the same work, they study the composition of forums in terms of user roles. Lui and Baldwin [17] classify users by utilizing content based features in addition to structural features. In both works, an implicit assumption is that user roles do not change during the period of observation. Welser et al. [29] derive features for individual users by means of different visual- ization techniques. The features are then used for automated identification of “answer people”, a specific type of user. The automated identification is validated by manually inspecting the contents of a selection of user posts. In their study, Welser et al. state that “in many well-defined circumstances, it is generally safe to assume that past be- havior will correlate with future behavior”. In our work, we present a framework for assessing this assumption quantitatively by studying the temporal evolution of users. Viegas and Smith [25] also analyze temporal evolution of users. They propose Au- thorLines for plotting the number of threads started by a user, as well as the number 4 Andrey Kan et al. Table 1 Summary of related work on forums. There have been different approaches to study forum data. Some studies focus on individual users, while other studies look at the discussion threads or forums. References Objects of Involved features Representing Lui and Baldwin [17], Welser et al. [29] Chan et al. [9] Viegas and Smith [25] Xiong and Donath [30] Kumar et al. [13], Wang et al. [27] Morzy [19] study users users, forums users, forums users, forums threads micro- communities, forums this work users, forums structural features of reply graph such as proportion of low degree neighbors, content-based features, etc. number of posts per thread, ratio of in degree to out degree in reply graph, etc. number of initiated threads, number of threads where user participated, etc. number of messages, time passed since posting, etc. degree distributions of discussion threads, content based features, etc. number of communities that sustain longer than certain amount of time, number of communities per user, etc. number of posts and number of replies over time user engagement over time not focused on changes over time not focused on changes over time real-time changes in statistics for a user as a sequence of events (but not quantitative) modeling the growths of conversation trees user engagement is not represented explicitly as a sequence of events of threads where the user has participated for a particular week. It is then easy to see, for example, how the number of these threads evolve over subsequent weeks. However, it can be hard to compare the engagement of many (e.g., 50) users at once. Further- more, Viegas and Smith do not quantify patterns of user evolution. There have been other proposed forum visualizations [25, 30], however these visualizations do not define numerical features for describing and comparing the forums automatically. Some authors study forums at the level of discussion threads or micro-communities [13, 19, 27]. Kumar et al. [13] present and evaluate a model of the dynamics of conver- sations, where adjusting model parameters can lead to the production of “bushy” or “skinny” thread trees. While this model can be adapted to infer the evolution of indi- vidual users, this adaptation is not straightforward and is not covered in their paper. Furthermore, this model describes conversations on the level of individual threads, whereas forums often consist of a number of threads. Threads are modeled as trees whereas a forum is generally a forest. Furthermore, there has been a large body of literature that studies processes in related media spaces such as Facebook, Twitter and weblogs. Many researchers look at the dynamic processes in online media from an information diffusion perspective. With this approach one models the propagation of information among users in a similar man- ner to modeling the propagation of infection in epidemiology [1, 14]. Other approaches to studying evolving online social media include the combined study of the diffusion and evolution of discussion topics [15], modeling user interactions with dynamic graphs [26], and looking at the properties of time series of social interactions [4]. Our work A Time Decoupling Approach for Studying Forum Dynamics 5 complements these earlier studies by approaching online forums from the perspective of individual users and the reciprocity of communication. More generally, time series mining is an established field of data mining [28]. Keogh et al. spell out an intuitive idea that “representation of the data is the key to efficient and effective solutions” [11]. One of the novel contributions of our work is the representation of the history of individual users as two decoupled series: sequence of events and event timings. In summary, forum data analysis is a field with growing research interest. Clearly participating users constitute the essence of the forums, and users’ behavior eventually determines all the numerical features of the forum data. However, there are several remaining open issues, such as the lack of scalable methods for the representation and analysis of the temporal evolution of individual users, and the lack of a numerical representation for forums in terms of the evolution of users. 3 Datasets In our study, we use data from four Internet forums: Boards.ie, SAP Community Net- work (SCN), TiddlyWiki, and Ancestry.com. In total, we analyze records for over 30, 000 users. We observe similar patterns in all datasets, and in the main text, we focus mainly on results for Boards.ie. We present results for the SCN, TiddlyWiki, and Ancestry.com forums in Supplementary Information 1. Boards.ie is a national Irish bulletin board that comprises a variety of forums on different topics, from concert announcements, to dedicated discussions about martial arts and politics. The records for Boards.ie were collected over a two year period (2006 and 2007). We select nine Boards.ie forums that represent a variety of topics (Table 2). In each forum, we select users that had registered in 2006. This selection allows us to observe the evolution of users for at least one year. From the users registered in 2006, in each forum, we randomly select 30% of users. Table 2 Selected forums from Boards.ie covering a variety of topics (#posts is the total number of posts made by all users from the sample; #replies is the total number of replies received by all users from the sample) Forum name #Users in #Posts in sample sample #Replies in sample Comments politics soccer poker martial arts personal accommodation gigs weather development 264 73 183 156 586 236 345 56 107 3,867 4,352 10,542 5,444 6,709 1,764 2,141 300 679 3,761 4,215 9,660 4,911 6,178 1,523 1,715 259 590 topical discussion topical discussion topical discussion topical discussion discussion of personal issues classifieds and discussion musical performance announcements and discussion forecasts and discussion tech. questions and discussion 6 Andrey Kan et al. Sampling was used in order to speed up the computations. Note that our sample is sufficiently large (there are around 2, 000 users in the Boards.ie sample) to draw conclusions. Furthermore, we have studied the effect of sampling on two forums from Ancestry.com (as these forums have the largest numbers of users), and found that taking a 30% sample of users results in observations similar to those made on the complete set of users. Details on our study of the sampling effect are presented in Supplementary Information 2. Note that the method presented in this paper operates at the level of forums. The method will be mainly affected by the sizes of individual forums rather than the size of a complete dataset. The size of the forum can be measured, for example, using the average number of posts per day. With respect to this measure, forums in our study appear to be on the same scale with many other forums reported in the literature [13, 19]. This indicates that our study is applicable to a large number of typical Internet forums. We note that there can exist exceptionally large forums (e.g., with more than 1000 posts per day). On the other hand, we speculate that there is a certain upper limit for the size of a forum. For example, a forum with more than 1000 posts per day may effectively become unreadable for users, as it would be updated much faster than the users can read. Such a forum might have a tendency to split into smaller forums or to lose its participants, which would bring the forum back to a smaller size and a more balanced state. Finally, it is worth mentioning that Boards.ie was previously studied by Chan et al. [9]. This enables us to compare our results. We introduce our methods and results in the next sections. 4 Research Methods We outline our research methodology in Figure 1. Our goals are (i) to discover tem- poral patterns in user behavior, and (ii) to use the obtained information to develop a numerical description of forums in terms of the evolution of users. In order to achieve the first goal, we seek a convenient representation of temporal data that allows us to observe and quantify temporal patterns. Previous work has shown that visualization is a powerful tool in forum data analysis [24, 25, 29]. Therefore, we develop our representation of users with a novel time decou- pling approach, and select features in a way that allows us to visualize user evolution. We start with a description of our time decoupling approach in the next section. 4.1 Time Decoupling Approach Consider forum data that spans over time window [T0, T1], for example from January 2006 till December 2008. Let U be the set of all users in the forum, and let user u ∈ U be registered in the forum at time T0(u) ≥ T0. A user feature is some quantity that characterizes the user over time, for example the number of posts the user u has made by the time t. Definition 1 A user feature f(u, t) is a function U × [T0(u), T1] → R. A Time Decoupling Approach for Studying Forum Dynamics 7 Fig. 1 Outline of our research methodology. The goal is to obtain novel knowledge about the temporal evolution of users (on the right). In order to achieve this goal we use a time decoupling approach and a feature construction to represent users with (i) paths in a feature space, and (ii) timing vectors. We then study the paths and vectors separately. Visualization of paths allows us to construct features that can describe forums. Note that we assume that the feature values are real valued. In practice, many widely used features (e.g., degree of a user in the reply graph, number of posts per thread) can be mapped to real values. At any time point t ∈ [T0(u), T1], the user can be numerically described with a set of features F (u, t) = {f1(u, t), . . . , fn(u, t)}. We note that it is generally safe to assume that every user feature fi ∈ F is a piecewise-constant function. This is the case with many features used in practice, e.g., the number of user posts only changes at certain time points, rather than continuously. Under this assumption, we can describe a user with two finite sets defined below. Definition 2 Given a set of piecewise-constant user features fi(u, t), i = 1, . . . , n, a timing vector of user u is the ordered set Tevent(u) = {T0(u), t1, . . . , tL : T0(u) ≤ t1 < . . . < tL ≤ T1}, where ti is a time point at which at least one of the features fi(u, t) changes its value. A user path of user u is the set P(u) = {F (u, t) : t ∈ Tevent(u)}. A path length is the number L(u) = Tevent(u) − 1. Note that the user path can be viewed as a sequence of events listed in chronological order, where an event is a change in feature values. We suggest to separate the study of the user paths and the timing vectors. We expect that prominent patterns in user evolution are preserved in user paths with the order of events. On the other hand, time stamps are more noisy, in the sense that they are likely to be influenced by various real world factors that are either not interesting for the study, or very hard to account for (e.g., sickness of a user, weather conditions). Therefore, combining the time stamps with the user paths might obfuscate important patterns. While this framework is general, in a sense that it can incorporate any number of features, it is particularly convenient to consider a two-feature representation, as it allows us to easily plot the user paths. We propose to represent users with two new features: f1(u, t) is the number of posts user u has made since registration to time t 8 Andrey Kan et al. inclusive, and f2(u, t) is the number of replies user u has received since registration to time t inclusive. Figure 2 shows two sample user paths and the corresponding timing vectors. Con- sider path P(u) in the figure. At the registration time, user u has no posts and no replies, and therefore the path starts from (0, 0). User u then posts twice, receives a reply, and posts again, thus P(u) goes to (1, 0), (2, 0), (2, 1), and (3, 1). There is no more recorded activity for user u, and so the path stops. We assume that at each point in time, there can be only one post or one reply. The two possible events in this case are incrementing the number of posts (p) and incrementing the number of replies (r). Note that users u and v do not necessarily reply to each other. We discuss our choice of user features in the next section. Fig. 2 Two sample user paths and the corresponding timing vectors. Two features are used to represent the users. The order of changes in feature values is captured by user paths. The timing of the events is recorded in timing vectors. 4.2 User Feature Space Recall that we aim to represent a user with an interpretable feature set that can be visualized. There are a large variety of previously proposed features to describe users [9, 25, 29], and there are a number of methods for automated feature selection. Broadly relevant feature selection methods can be divided in two groups: feature transformation (such as well known principal component analysis), and unsupervised feature selection (see for example [7, 23]). Unfortunately, both groups of methods were developed for a setup that differs from the one that we observe in our dataset. Specifically, previous work considers a finite set of objects, where each object is described by a set of numbers. Here, for a given object, a feature is a number. In our case, we are interested in the temporal evolution of users. We have a finite set of users, but each user is described by a set of functions of time. We have that for a given user, a feature is a function (see Definition 1). Furthermore, previously proposed features are defined as numbers. For example, the number of initiated threads [9] is counted over the whole time span of the dataset and does not vary with time. We therefore construct new time varying features, instead of selecting from previous features. A Time Decoupling Approach for Studying Forum Dynamics 9 As we stated in the previous section, we propose two new user features: the number of posts a user has made since the registration to time t (inclusive), and the number of replies the user has received since the registration to time t (inclusive). The two features comprise our feature space. In this space, a user path is constructed as follows. The path starts from point (0, 0). Whenever a user makes a post, the path goes one unit to the right. Whenever a user receives a reply the path goes up one unit. We count a self-reply only once as a post, and we assume that at one time point there can be only one post or one reply. Note that the path always starts with a post, as there cannot be replies when there are no posts. We would like to clarify that a post always belongs to exactly one thread. Within the thread, a post can be the starting post for the thread or it can be a reply to any previous post in the same thread (those posts, can in turn be replies to earlier posts). In some forum settings, one post can even be a reply to more than one previous post in the thread [12]. In all these cases, the post moves its author one unit to the right. We now discuss the advantages and limitations of the proposed feature space. Advantages of Our Feature Space First, our feature space can be visualized and interpreted in terms of persistence and reciprocity of communication (Figure 3). We believe that a user path represents a solid operationalization of generalized reciprocity at the ego level with something coming back to ego from many different sources [22]. Ego-level generalized reciprocity has two qualities that may be expressed as quantity and focus. Quantity, or how much feedback does one get for a given post (on average), can be measured by the replies to posts ratio of the user path. Focus is instead a measure of whether the community is being reciprocal to the individual or is focused on particular posts. If the individual path has a high level of deviation from the straight line, then we can consider the community to be more focused on the posts than the individual. If the deviation is low, that can indicate that the community is oriented towards the individual, that is, the community is interacting more with the individual than with specific posts. Second, these features are among the most straightforward measures of a user’s activity. Furthermore, these features are independent of the language of the forum. Third, we find that, in our datasets, the user paths in this feature space have strong relations with some widely used structural and temporal properties of users. A reply graph [29] is a popular structure, where vertices represent users, and directed edges represent replies made during the time span of the dataset. We find a strong correlation between the path lengths and the total degree of users in the reply graph. In all of our forums we observe Spearman’s ρ > 0.9 and p < 0.001. We use Spearman’s ρ because the distribution of path lengths is skewed. Furthermore, let a user’s up-time be the time lapsed between the first and last recorded posts made by a user. We find a strong correlation between the path lengths and the up-times. In every forum we observe Spearman’s ρ > 0.7 and p < 0.001. The observed correlations match the intuition, e.g., one can expect users with a large number of posts to have a large number of correspondents. Bird et al. have made a similar observation for an email dataset [5]. Finally, we note that the chosen features – numbers of posts and replies – have meaningful counterparts in other domains. Examples include numbers of sent and re- ceived emails, outgoing and incoming calls or text messages, or even, more generally, numbers of stimuli and actions. 10 Andrey Kan et al. Fig. 3 Sample user paths are shown in a 2D space that comprises two features: the number of user posts and the number of replies received by the user. In this feature space, the path length represents persistence and the slope represents reciprocity of communication. For example, a path closer to the x-axis contains longer consecutive posting sequences. Such a path can be categorized as a “monologue”. In contrast, a “dialogue” is a more balanced path where posts tend to be followed by replies. Limitations of Our Feature Space We do not take into account the variation among alters who respond to ego. Indeed, ego might get a large quantity of reciprocity from many different alters (or responders), or ego might have one single fan that will consistently reply to ego’s posts. Once one begins to consider the variation among alters in this structure, the outcome is more complex. This approach has already been taken by Welser et al. [29], as they looked at whether individuals received replies from alters of low or high degree. We do not dismiss this approach. Rather, we are looking for an efficient metric that can summarize many of these more complex features in simpler terms. The defined features rely on the availability of reply relations between messages. In some forums this information is recorded explicitly (e.g., this information was available in our datasets). In the case when the reply relations are not available, one can use previously proposed algorithms to reconstruct the reply relationships [2, 21]. Visualization is a powerful tool, but it tends to limit the number of dimensions that can be shown. In this paper, we do not consider a large number of features. However, we have demonstrated that even a small number of carefully constructed features can provide useful insights into forum behavior. Moreover, recall that the user paths can also be represented as sequences. Sequence pattern mining is a well developed field (see for example [16] and the references therein). Therefore, in order to identify patterns, one can use a sequence mining technique as an alternative to the visualization. In this case, a larger number of features can be used. We leave this investigation for future work. Despite the potential limitations listed above, our feature space allows us to discover novel patterns (e.g., consistency in user behavior) that were not apparent from the previous user representations. Furthermore, our feature space has inspired us to develop a new numerical description of forums. We first summarize our visualization technique, and then present our results in subsequent sections. A Time Decoupling Approach for Studying Forum Dynamics 11 4.3 Visualization We propose to visualize forums with superimposed user paths (Figure 4). The paths can cross each other and overlap, and at each point in the plot, color encodes the number of user paths going through that point. The user paths are aligned with respect to the beginning of the users’ activity, not in real time. For each path, segment (0, 0) – (1, 0) corresponds to the first post made by a user since registration, but this first post is made at different times for different users. Such an alignment allows us to compare users as they evolve in the forum. 70 60 50 40 30 20 10 s e i l p e r f o . m u n s r e s u f o . m u n 500 100 25 5 1 0 0 10 20 30 40 num. of posts 50 60 70 Fig. 4 “Personal” forum from Boards.ie is visualized with a set of superimposed user paths. At each point, color encodes the number of user paths going through that point. Together the user paths show the trends in conversations specific to the forum. The dashed red line is the baseline that shows the replies to posts ratio. In this forum many paths significantly deviate from the baseline and the mean slope of the forum (solid red line) goes below the baseline. The overall slope of a forum reflects the reciprocity of communication in the forum. As a reference, we also draw the baseline degree line, which represents the replies to posts ratio in the forum. The mean length of paths represents the persistence of user engagement in a forum, and the spread of paths in space represents the variety of users. Superimposing paths allows us to reveal the trends in conversations common to users in the given forum. An advantage of our visualization technique is the scalability in terms of the number of users that can be shown. In principle, this number is not limited. The analogy here is plotting histograms or scatter plots that are capable of showing prominent patterns of populations of arbitrary sizes. At the same time, we emphasize that visualization is not essential for our numerical analysis methods that we present in the next few sections. 12 Andrey Kan et al. 5 Patterns in Forum Data Recall our first and second research questions stated in the introduction. 1. Are there any trends (e.g., consistency) in the temporal evolution of users? 2. Is there a normative temporal behavior for a given forum? In this section, we address these questions by studying the user paths and timing vectors. 5.1 Pattern 1. Consistent Behavior We plot all forums using our visualization method. The main trend that we observe in the plots is that user paths can be approximated with straight lines at different angles to the x-axis. We quantify this linear dependency by computing Pearson’s correlation coefficient r between the x and y coordinates of points for individual user paths. That is, for each path we compute the correlation coefficient r separately. For the Boards.ie, SCN, TiddlyWiki, and Ancestry.com 1 datasets the average r across all users in the corresponding dataset is 0.959, 0.943, 0.937 and 0.921 respectively. The computed correlations are statistically significant (p < 0.01). Here we only compute correlation for users whose path contains sufficiently many points. We consider users with path lengths of at least 10. The selection leaves us with 4070 paths across all forums. We conclude that users tend to exhibit consistency in communication over time. We further investigate this consistency by modeling the user paths. Modeling User Paths We note that the user paths can be represented with strings comprising posts (symbol ’p’) and replies (symbol ’r’). Therefore, as a null model for the user paths we use the well-known coin toss model (also known as a Bernoulli process). In this model, symbols ’p’ and ’r’ are generated sequentially. Our model always starts by producing the symbol ’p’, because the real paths always start with a post. Then at each step, the symbol ’p’ is chosen with a fixed probability Ppost that describes the ability of a user to elicit replies. Larger values for Ppost result in a larger proportion of posts in the path, and this corresponds to a weaker ability to elicit replies. For each user we empirically estimate Ppost as Ppost ≈ #posts/(#posts + #replies). We evaluate this null model by looking at the distribution of post runs in the data. By analogy with runs in binary strings, we define a post run as follows. Definition 3 Consider a user path P represented with a string of posts (symbol ’p’) and replies (symbol ’r’). Let the corresponding extended path be the string P′ = rPr. In the path P, a post run is a substring in a form rp+r taken from the corresponding extended path P′. Here p+ denotes an arbitrary positive number of posts. A post run length is the number of posts in the post run. Where unambiguous, we refer to the post run length as a post run. 1 In Section 5.1, for Ancestry.com dataset all statistics were obtained from the entire set of users, not a sample. A Time Decoupling Approach for Studying Forum Dynamics 13 We now look at the distribution of post runs in individual user paths. We select users with a path length of at least 20, to ensure that there are several post runs in each path. Figure 5 shows the empirical distributions of post runs aggregated over all tested users in different datasets. We find that post runs and their standard deviations tend to be small compared to the lengths of paths (over 20). This can be a consequence of consistency in user behavior. We are interested in whether the coin toss model is able to reproduce the empirical distribution of post runs for individual users that is present in the data. Boards.ie SCN TiddlyWiki Ancestry.com st.dev = 2.05 median = 1 99−th perc. = 10 15000 st.dev = 0.95 median = 1 10000 99−th perc. = 5 y c n e u q e r f 5000 7000 6000 5000 4000 3000 2000 1000 7000 6000 5000 4000 3000 2000 1000 st.dev = 1.95 median = 2 99−th perc. = 10 8000 7000 6000 5000 4000 3000 2000 1000 st.dev = 2 median = 2 99−th perc. = 10 0 0 20 40 0 0 20 40 post run lengths 0 0 20 40 0 0 20 40 Fig. 5 Empirical distributions of post runs aggregated over all tested users in different datasets. Post runs and their standard deviations tend to be short compared to the lengths of paths (over 20). This can be a consequence of consistency in user behavior. For each tested user, we estimate Ppost and record the path length. We then gen- erate a path of this length using the coin toss model with the estimated parameter Ppost. For each user, we then compare the empirical distribution of post runs and the generated distribution using the Kolmogorov-Smirnov (KS) test at a 5% significance level. A user passes the test if the KS test fails to reject the null hypothesis that the distributions are different. The number of users that pass the test is shown in Table 3. We conclude that in general, the coin toss model adequately renders the user paths. Table 3 Results of models evaluation. “Users Tested” shows the number of users with a path length of at least 20 for each of the datasets. Both models are capable of recovering the distributions of post runs for the majority of users. However, in the Boards.ie dataset about 27% of users fail the test. Dataset Users Tested Boards.ie SCN TiddlyWiki Ancestry.com 186 112 115 136 Users Passed (Coin) 135 101 97 120 Users Passed (Stick- ing) 178 109 93 134 Pharsh 0.8 0.8 0.6 0.7 14 Andrey Kan et al. At the same time, we find that in the Boards.ie dataset about 27% of users fail the test. We hypothesize that in this dataset, users tend to be more consistent (i.e., follow a straight line more closely, as explained below) than the random users generated by the coin toss model. We therefore propose another model for the generation of user paths. We call this model the sticking model, because in this model users are stuck to a straight line by penalizing deviations. The slope of the straight line is determined by the parameter Ppost that is estimated for each user as Ppost ≈ #posts/(#posts + #replies). The model is summarized in Algorithm 1. In the model, as soon as the generated path deviates from the straight line, a harsh probability Pharsh (e.g., Pharsh = 0.8) forces the model to generate the next symbol in a way such that the balance is restored. Note that the sticking model can only be reduced to the coin toss model in the case when Pharsh = 0.5, which corresponds to the coin toss model with Ppost = 0.5. Algorithm 1 Sticking model Input: path length L, user characteristic Ppost, dataset characteristic Pharsh; Output: string S; ′ p′; // real paths always start with posts 1: S ⇐ 2: currP rop ⇐ 1; // proportion of posts in the string 3: for each symbol currLength = 2...L Pcurr = Pharsh, Ppost > currP rop 1 − Pharsh, Ppost < currP rop 0.5, Ppost = currP rop ;   4: 5: 6: 7: 8: end 9: return S; currSymb = random(Pcurr,′ p′,′ r′); // select ′p′ with probability Pcurr; S ⇐ S + currSymb; // append the string currP rop ⇐ #(posts in S)/currLength; // update the proportion We evaluate the sticking model on each user individually, similar to our evaluation of the coin toss model. To simplify and speed-up the calculations, we use the same Pharsh for all users in the same dataset. For each dataset, we find the value that maximizes the number of users that pass the test, using grid search. The results are presented in Table 3. We find that in general the sticking model explains the empirical data better than the coin toss model. The difference in models is especially prominent in the Boards.ie dataset. Note that this dataset also has the strongest mean correlation coefficient (Section 5.1), which indicates that users in this dataset have the strongest tendency to adhere to straight lines. From our modeling experience, we conclude that the consistency of a user can generally be explained by an inherent user property. We expressed this property with a constant parameter Ppost. At the same time, small deviations from the parameter are possible, and the amount of this deviation varies in different forums. We can express this freedom to vary by using the parameter Pharsh. For example, in Boards.ie users exhibit a stronger consistency than one would expect for a random user modeled with the coin toss model. A Time Decoupling Approach for Studying Forum Dynamics 15 5.2 Pattern 2. Dead Zones Another prominent pattern that we observe in our visualizations is that the user paths are not equally distributed in the feature space. We formalize this pattern with the concept of a dead zone. Definition 4 A dead zone is the set of points (x, y) with integer coordinates, such that the probability of observing a user in each point (x, y) is less than some threshold value Pdz. In order to calculate the empirical probability of user locations, we treat points from all paths in a forum as a single set. We then use a kernel density estimation method by Botev et al. [6]. This method performs an automated selection of kernel bandwidth. However, with the automatically selected bandwidth, the empirical density has a grid patterning, as all our points have integer coordinates. Therefore, we smooth the kernel by increasing the bandwidth in both dimensions to 2. We limit the region for the density estimation to the square that has its lower left corner at point (0, 0), and its side equals to the largest coordinate observed among forum points along either the x or y axis. Finally, we set the threshold Pdz to the 5-th percentile of the probabilities of all observed user locations in the forum. The dead zones for the politics forum from Boards.ie are shown in Figure 6. In general, the probability of observing a user in the upper-left or lower-right corners of the plot is low. We observe similar dead zones in all our forums. The dead zones can be considered as a formal definition of a normative user behavior for a given forum, and user posts found in the dead zones can indicate an ’abnormal’ user behavior (see Figure 6). For example, we would expect to find spammers in the zone along the x-axis, and we would expect a user with highly provocative behavior (attracting many replies) along the y-axis. 5.3 Patterns in Timing Vectors We now study the second part of our user data model, the timing vectors. We start with plotting events of random users along the time line (Figure 7). In the plot, the x-axis shows the number of days lapsed since the user has made the first post. A cross mark indicates an event (a post or a reply). Although users can have very different time intervals (note the different scales on the x-axes), we note that in general users exhibit bursty behavior: events tend to group together in time. We confirm this grouping pattern by looking at the distribution of inter-event times. We hypothesize that such a distribution is heavy tailed, with high probability values for a small range of short times and low values for all other times, as short times correspond to times between events in a burst, and long times correspond to times between bursts. This supposition is confirmed when we look at empirical distributions of the inter-event times collected for individual users in our forums. For each user (with at least 10 events) we collect a set of inter-event times and divide the numbers by the mean value. This results in normalization of the inter-event times across users. We then combine the sets of the normalized inter-event times for all users in a forum and fit a power-law curve. A representative result of such a fit is shown in Figure 8. We observe a similar distribution in every forum that we study with the fitted characteristic exponents of about −1.7. 16 Andrey Kan et al. 70 outliers 60 dead zone 50 40 30 20 10 0 0 dead zone 10 20 30 40 50 60 70 Fig. 6 Dead zones (shown in yellow) for the politics forum from Boards.ie. The blue dots between the two dead zones show empirically observed user locations. Red dots show the outlier locations that can indicate an ’abnormal’ user behavior. We observe similar dead zones in all our forums. 0 0 0 0 0 50 100 150 200 250 300 350 400 450 5 10 15 20 25 30 35 40 45 50 100 150 200 250 2 4 6 8 10 12 0.002 0.008 days lapsed since user has made the first post 0.004 0.006 0.01 Fig. 7 Timing of events of five randomly selected users. The x-axis shows the number of days lapsed since the corresponding user has made the first post. Note the different scales on the x-axes. This bursty behavior is a well-studied phenomenon in domains such as email com- munications [3], and there have been effective models defined for this behavior [18]. The model of Malmgren et al. [18] for inter-event times complements the models that we introduce in Section 5.1 for user paths. Together these models summarize a user’s behavior over time. There can be cases when studying user paths together with event timings is impor- tant. However, we note that combining the two parts can obfuscate otherwise promi- A Time Decoupling Approach for Studying Forum Dynamics 17 104 103 102 101 100 s e c n e r r u c c o f o r e b m u n 10−1 10−1 100 101 102 103 normalized inter−event times Fig. 8 The distribution of normalized inter-event times of users in politics forum. The plot shows about 7, 000 points in a log-log scale. nent patterns (see Figure 9). This is consistent with our motivation for using a time decoupling approach. 6 Describing Forums In this section, we address our third research question: “Can we quantify and categorize forums in terms of the temporal behavior of users?” We start with the development of a concise numerical description of forum visualizations such as that shown in Figure 10 (see also Supplementary Information 3). Definition 5 Let a forum archive A denote a set of user paths A = {P(u)} observed in a forum within the time span of the dataset. A forum feature is a function defined on the forum archives f : A∗ → R, where A∗ is the set of all possible forum archives. 6.1 Deriving Forum Features One possible way of deriving the forum features is to fit each path independently with a straight line and then use the mean length and slope of the paths. However, using the mean slope is not straightforward. Paths with different lengths have different influence on the overall shape of the forum. Further, different paths have different RMSE when fit with a line. It is not obvious how to weight the paths appropriately. Therefore, we take a different approach. We treat points from all paths as a single set, and define forum features using this set. Forum Slope and Spread Our first feature is called the slope feature β. This feature is derived as follows. We fit a straight line to all points in the forum, and compute the angle between the fitted line and the x-axis. Recall that in a forum, for each user u ∈ U , the path with length 18 Andrey Kan et al. t s o p t s r i f e h t i e c n s s y a d 700 600 500 400 300 200 100 0 0 20 40 60 num. of posts 80 100 0 20 60 40 num. of replies 100 80 Fig. 9 Plotting user paths in 3D with the numbers of posts and replies and timings of events. The consistency in user behavior is not apparent anymore. There is a staircase pattern in the temporal dimension, but this is a consequence of the bursty behavior that we discussed in this section. L is the set of points P(u) = {(0, 0), (xu1, yu1), . . . , (xuL, yuL), }. Let Q be the union of points from all paths Q = ∪u∈U P(u). The RMSE of fitting a line to the forum is defined as ERR(β) =sP(x,y)∈Q(y − β · x)2 Q . (1) Here β is the parameter of the line that is estimated by the fitting process. Note that we force the fitted line to pass through the point (0, 0). This allows us to reduce the number of fitting parameters to one (β). Also note that points from different paths are considered as different elements, e.g., Q may contain several points (1, 1) from different users. This introduces an implicit weighting of user paths, because paths that have more points have more influence on the statistic. In every forum that we study, the majority of users have short paths (one or two posts). Without the weighting these short paths will suppress the slope in each forum, leaving almost no room for variation across forums. The slope feature β is then defined as β = arg minβ∈(0,∞) ERR(β). This feature can be estimated with least squares fitting. The slope feature β is essentially a tangent of the angle between the fitted line and the x-axis. Note that this is not the same as taking the mean of the slopes of individual path fits. A Time Decoupling Approach for Studying Forum Dynamics 19 martial poker soccer 70 60 50 40 30 20 10 0 0 70 60 50 40 30 20 10 0 0 70 60 50 40 30 20 10 0 0 20 40 60 20 40 60 20 40 60 gigs personal politics 70 60 50 40 30 20 10 0 0 70 60 50 40 30 20 10 0 0 70 60 50 40 30 20 10 0 0 20 40 60 20 40 60 20 40 60 accomm. develop. weather 70 60 50 40 30 20 10 0 0 70 60 50 40 30 20 10 0 0 70 60 50 40 30 20 10 0 0 s e i l p e r f o . m u n 20 40 60 20 40 60 20 40 num. of posts 60 s r e s u f o . m u n 500 100 25 5 1 Fig. 10 Visualization of forums from Boards.ie. Each line is a user path. At each point, the color encodes the number of paths going through the point. The dashed red line is the baseline that reflects replies to posts ratio, the solid red line shows the average slope of the forum. The blue dot shows the average length of user paths for the forum measured along the slope line (for the soccer and poker forums the average length is above 50). Differences in forum appearance (different mean length or slope) indicate differences in the nature of communication in the corresponding forums. Our slope feature β can be interpreted in terms of the reciprocity of communication. For example, the soccer forum has a slope that is closer to one than the slope of the weather forum (Figure 10). This indicates that users in the soccer forum tend to be involved in balanced conversations, and receive replies to almost all posts, whereas in the weather forum, users tend to post more than they receive replies. Our second feature characterizes the spread or variation in user paths. This feature is called the spread feature and it is defined as the fitting error ERR( β) by Equation 1. For example, the poker forum has a larger fitting error ERR( β) than the soccer forum, and this indicates that there is greater diversity of user paths in the poker forum. This can be visually confirmed in Figure 10. 20 Andrey Kan et al. Slope, Baseline and Offset The slope feature reflects the averaged reciprocity of communication in a forum, whereas on the individual level, the slope reflects “one-to-many” reciprocity where a user con- tributes to a public domain, but can expect some reward from the public domain.2 On the level of the forum, the slope feature can give an overall impression of the type of communication in forums, and we plot the forum slope in our visualizations. However, the slope can be split down further in two components. The first component is the overall ratio of the number of replies to the number of posts in the forum during the period of observation. We call this ratio a baseline feature β0 = #replies/#posts. Recall that a post can also be a thread starter, in which case, it is not a reply to any other post. Therefore, our baseline feature effectively reflects the average number of threads per forum compared to the average thread length. The baseline feature is an aggregated statistic over the whole period of observation, and it is not sensitive to the shapes of the user paths as they evolve over time. On the other hand, the slope feature itself is sensitive to the ordering of events in paths. Therefore, our second component of the slope is the offset feature, which is a signed difference d = β − β0. The offset feature shows the variance in conversation structure that cannot be captured by the baseline feature. Consider two fragments of user paths, one with five posts and five replies and another one with five replies and five posts. The baseline for both paths is the same, whereas the slopes and hence the offsets differ. The offset is negative for the first path and positive for the second. This reflects the fact that the second user has always been in a position of a “response-attractor”: at each point of his career he has more or the same number of replies as posts, whereas the first user has never been in that position. Number of Users and Length of Paths Other important properties of a forum are the number of participating users N = U (this is called the size feature) and the average length of user paths Lavg = 1 N Pu∈U L(u) (called the length feature). N can reflect the popularity or the generality of a forum topic, and Lavg can reflect the relative persistence of users in the forum. For example, within the same period of observation, the martial arts forum has a much larger Lavg than the accommodation forum, which indicates that users in the martial arts forum are more persistent (tend to post more) whereas users in the accommodation forum tend to leave after making a small number of posts. We note that in Section 5.1 we studied the patterns in individual user paths and we omitted short paths. However, in the calculation of our forum features, we used all paths. We summarize our forum features for nine Boards.ie forums in Table 4. We compute the four features as we described above, with the exception of one user from the gigs forum (see Supplementary Information 3). Note that the baseline accounts for a large part, but not all of the variation in the forum slopes. The Pearson correlation between the slope and baseline features is 0.67. 2 There is also a hidden reward, because even without receiving replies, reading the forum can be a rewarding experience. However, the reading counts are usually difficult to account for numerically. We do not have these counts for our datasets. A Time Decoupling Approach for Studying Forum Dynamics 21 Table 4 Summary of forum features for nine forums from Boards.ie Name politics soccer poker martial personal accomm. gigs weather develop. Size 881 243 610 520 1952 787 1151 186 355 Length 28.89 117.36 110.39 66.38 21.99 13.93 7.32 9.98 11.86 Slope Base Offset +0.01 0.98 0.95 -0.01 -0.03 0.89 +0.01 0.91 -0.13 0.79 -0.05 0.81 +0.04 0.84 0.78 -0.08 -0.01 0.86 0.97 0.97 0.92 0.90 0.92 0.86 0.80 0.86 0.87 Spread 11.55 13.56 38.59 21.57 9.86 7.85 2.03 1.87 3.93 6.2 Automated Categorization of Forums We next use our forum features as the basis for performing a hierarchical clustering of forums. We then show how this clustering allows us (i) to validate the proposed forum features, and (ii) to demonstrate the utility of the features. Prior to the clustering, we normalize each feature by its variance, because otherwise some feature values are orders of magnitude larger than others, and hence have a much higher impact on the clustering. The slope feature was not used in the clustering, because it is included as the baseline and offset features. The baseline and offset features were normalized by the variance of the baseline feature, because these two features are on the same scale with dominating baseline values. There is no need to align the features to zero mean, because we use Euclidean distance for the similarity between points, and hence only the difference between values matters. We do not have a predefined number of clusters, and therefore we use hierarchical clustering. We use agglomerative hierarchical clustering with Ward’s linkage method and the Euclidean distance. We also tried other approaches such as single linkage or average linkage, but observed similar groupings. We report the clustering where the grouping is most prominent. We use Euclidean distance because it is widely used and it is compatible with different linkage strategies. We do not use cosine similarity, since this measure is not sensitive to the magnitude of feature vectors. We discuss our clustering results below. Hierarchical Clustering The resulting hierarchical clustering is shown in Figure 11. A prominent feature of the clustering is the presence of two distinct groups that we have labeled with the terms monologue and dialogue. The forums in the monologue branch tend to have slopes closer to the x-axis than the forums from the dialogue branch. That is, the users in monologue forums tend to post more than they receive replies, whereas the users in dialogue forums tend to have more balanced conversations in terms of the numbers of posts and replies. This justifies the choice of labels for the two branches. Alternatively, monologue forums can be viewed as announcement or classified forums, whereas dialogue forums can be viewed as discussion forums. The personal forum stands apart, mostly because it has the largest offset between the baseline and slope. In the visualization, this fact is reflected with the presence of user paths that deviate significantly from the baseline. Furthermore, in each branch, 22 Andrey Kan et al. dialogue monologue politics soccer poker martial personal gigs weather develop. accomm. Fig. 11 Hierarchical clustering of forums. A prominent feature of the clustering is the presence of two distinct groups that we labeled with the terms monologue and dialogue. The users in monologue forums tend to post more than they receive replies, whereas the users in dialogue forums tend to have more balanced conversations in terms of the numbers of posts and replies. the politics and gigs forum stand apart because they have the largest number of users in the corresponding group. The automated categorization of forums demonstrates the utility of our forum features. The categorization can be used by forum administrators to select different management policies for different categories of forums. Further, the categorization of forums can inform the structural design of forum websites. It is hard to define the ground truth clustering for forums, and researchers often have to appeal to intuitive categorizations of forum names [9, 19]. Therefore, we validate our clustering, and hence our forum features, indirectly. We note that the hierarchical clustering aligns with a possible manual clustering of visualizations (Figure 10), as well as with a possible intuitive grouping of forums (e.g., the soccer and martial arts forums group together). Furthermore, the interpretable clustering of forums that we were able to produce demonstrates potential value of our forum features. Moreover, given the explanatory nature of unsupervised clustering, a misalignment with respect to a hypothetical ground truth or with respect to the intuition is not necessarily a negative result. We note that our clustering reveals new information. For example, it might not be obvious beforehand that the personal forum should be put in the monologue category, or that the accommodation and development forums comprise the most similar pair of forums. We further highlight the novelty of our clustering by comparing it to a result from previous work. A Time Decoupling Approach for Studying Forum Dynamics 23 Comparison with Previous Work As mentioned in Section 1, we depart from past work on roles by exploring the stability of user patterns over time, rather than assuming a stable behavioral role within an ecology of participatory roles. Moreover, we provide simplified statistics for assessing roles compared to factor analytic approaches [9, 10] or multi-metric assessments [29]. Using this technique we also gained new insights on old data: The categorization of Boards.ie by Chan et al. [9] produced an interesting if unexpected series of similarities across boards. For example, ‘Politics’ and ‘Accommodation’ appeared very similar in role composition. Given the unexpected nature of these findings, it made theorization difficult. Also, past work on thread structure has shown that discussion structure tends to map on to expected notions of discussion intensity [10]. To this end, the hierarchical clustering we have shown in this paper has face validity, despite requiring no knowl- edge of the content of the forums. This is not to undermine earlier work, but to point towards techniques that reinforce existing expected similarities and draw upon behav- iors that we consider to be especially salient. We assert that persistence in the board and tendency to reciprocate are salient features. The politics forum consists of highly persistent users and reciprocal communication, whereas and the accommodation fo- rum exhibits less reciprocal communication and ephemeral users. Additionally, looking at the role composition of the personal forum, one can suggest that most people are quiet, whereas our study reveals that there are a notable minority of users who are able to consistently generate a lot of attention, probably as a means of garnering social support. Rather than stating that only one of the methods is correct, we conclude that our approach is complementary to previous work, as it provides an alternative view on the forums. However, three of the advantages of our method are its computational simplicity, its focus on metrics known to be of relevance to forum participants, and its capacity to provide both micro-level statistics about users and global statistics on interactions over time. Alternative Clustering: Baseline Only Recall that the baseline feature accounts for a large part of variation of the slope feature. In this section, we study the effect of replacing the slope feature with the baseline feature. We produce a hierarchical clustering as described above but without the offset feature (Figure 12). We observe that, despite the baseline and slope features being correlated, the clustering results differ. A prominent effect from ignoring the difference between the baseline and slope fea- tures, is that the personal and politics forums appear to be relatively similar and form a cluster. However, as can be seen in Figure 10 (see also Section 3 in Supplementary Information) a certain portion of paths in the personal forum asymmetrically diverges from the baseline, whereas the paths in the politics forum tend to follow the baseline more closely. The baseline feature alone was not able to capture this specific trend, and we suggest using both the baseline and the offset features as they encompass more information about the user behavior. 24 Andrey Kan et al. soccer poker martial politics personal gigs accomm. weather develop. 1 2 3 4 5 Fig. 12 Alternative hierarchical clustering that ignores the difference between the baseline and slope features. This clustering differs from the main clustering. For example, the alternative clustering is less balanced. 6.3 Influential Users in the Personal Forum We note that the personal forum has the highest offset compared to other Boards.ie forums. Therefore we test whether this is an effect of a few particular users that have a high influence on the slope feature or a pattern that is supported by the majority of the users in the forum. We define the slope influence of a user as a signed difference between the slope estimated with the user path included and the slope estimated without the path. Interestingly, we find that there are no exceptionally influential users: 99% of the individual slope influences fall in the interval [−0.002; 0.001]. Although visualizations of the personal forum (Figure 10 and Section 3 in Supple- mentary Information) show that some users deviate from the slope, excluding individual users does not have a strong effect on the estimation of the slope. We conclude that the difference between the baseline and the slope is not a result of outliers, but the pattern that arises from the behavior of the majority of users. This difference is captured by our features, which provides an additional justification for our methodology. A Time Decoupling Approach for Studying Forum Dynamics 25 7 Conclusions Forum data provide numerous potential avenues for analysis and visualization, many of which we have mentioned above. Our contribution to this area has been to focus on mechanisms that past work have considered salient (reciprocity and persistence) and that can be employed in a time decoupling approach. In our approach, we decoupled timing information into user paths and timing vectors, and studied these parts sepa- rately. We constructed user paths using two new features: the number of a user’s posts and the number of replies to the user over time. We studied the paths of over 30, 000 users from four forum websites, and found that users tend to exhibit consistency in communication over time. We proposed to model the user paths with coin toss and stickiness models and found that in certain forums, users tended to be more consistent than one would expect for a random user modeled with the coin toss model. We also found zones in the feature space where users were unlikely to be located. Furthermore, we studied the timing vectors for these users and observed bursty behavior, a well-known phenomenon in other domains (see for example [3] and references therein). We used our results to represent forums in terms of the temporal behavior of users, and validated our forum features with a hierarchical clustering of forums. We proposed a number of applications for our results, such as predicting whether a user is likely to be involved in conversations in the future based on past observations, and identifying the normative behavior for a given forum. In addition to our main results, we wish to emphasize the flexibility and generality of our approach, since it can be applied to other domains, such as email or phone communications. This leads to potential future work in expanding this technique. One expansion would be to consider different media, such as a call graph, where posts and replies are replaced with patterns of initiation between calling partners. In this case, it is known that initiation patterns vary by media [8], but exact values and a role analysis is yet to be done. Another extension would consider alternate feature spaces, such as posts that are weighted (such as Amazon’s ‘useful’ score or Reddit and more recently YouTube’s upvotes/downvotes scores). The latter case might provide many interesting revelations about trolling and flaming given that a user’s score may fall below zero. By contrast, in the current case, all replies increase the value of the user’s score. Finally, we believe our technique provides a powerful way to look not just at the differences between users, but at the collective evolution of communities. Trending slopes over time may provide an indicator for moderators about the success of their community, or be employed as real-time statistics for site owners about the health of their site and the intensity of discussion therein. Acknowledgments We would like to thank Václav Belák from Digital Enterprise Research Institute for preparing the TiddlyWiki dataset, and Lee Jensen from Ancestry.com Inc. for help in obtaining the Ancestry.com dataset. This work is partially supported by the Science Foundation Ireland (SFI) under CLIQUE Strategic Cluster, grant number 08/SRC/I1407. This work is partially sup- ported by National ICT Australia (NICTA). NICTA is founded by the Australian 26 Andrey Kan et al. Government’s Backing Australia’s Ability initiative, in part through the Australian Research Council. References 1. Adar, E., Adamic, L.: Tracking Information Epidemics in Blogspace. In: The 2005 IEEE/WIC/ACM International Conference on Web Intelligence, pp. 207–214 (2005) 2. Aumayr, E., Chan, J., Hayes, C.: Reconstruction of Threaded Conversations in Online Discussion Forums. In: The 5th International AAAI Conference on Weblogs and Social Media (2011) 3. Barabasi, A.: The origin of bursts and heavy tails in human dynamics. Nat. 435(7039), 4. Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing User Behavior in In: The 9th ACM Conference on Internet Measurement, pp. 207–211 (2005) Online Social Networks. 49–62 (2009) 5. Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: The 2006 ACM International Workshop on Mining Software Repositories, pp. 137–143 (2006) 6. Botev, Z., Grotowski, J., Kroese, D.: Kernel density estimation via diffusion. The Ann. of Stat. 38(5), 2916–2957 (2010) 7. Boutsidis, C., Mahoney, M., Drineas, P.: Unsupervised feature selection for the k-means clustering problem. In: Y. Bengio, D. Schuurmans, J. Lafferty, C.K.I. Williams, A. Culotta (eds.) Advances in Neural Information Processing Systems 22, pp. 153–161 (2009) 8. Carrasco, J.A., Hogan, B., Wellman, B., Miller, E.: Agency in Social Activity Interactions: The Role of Social Networks in Time and Space. Tijdschr. voor Econ. en Soc. Geogr. (J. of Econ. & Soc. Geogr.) 99(5), 562–583 (2008) 9. Chan, J., Daly, E., Hayes, C.: Decomposing discussion forums and boards using user roles. In: The 4th International AAAI Conference on Weblogs and Social Media, pp. 215–218 (2010) 10. Gonzalez-Bailon, S., Kaltenbrunner, A., Banchs, R.: The structure of political discussion networks: a model for the analysis of online deliberation. J. of Inf. Technol. 25(2), 230–243 (2010) 11. Keogh, E., Chu, S., Hart, D., Pazzani, M.: Segmenting time series: A survey and novel approach. In: M. Last, A. Kandel, H. Bunke (eds.) Data mining in time series databases, pp. 1–21. World Scientific Publishing (2003) 12. Kim, S.N., Wang, L., Baldwin, T.: Tagging and linking web forum posts. In: The 14th Conference on Computational Natural Language Learning, pp. 192–202. Springer (2010) 13. Kumar, R., Mahdian, M., McGlohon, M.: Dynamics of conversations. In: The 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 553– 562. ACM (2010) 14. Liao, Y., Moshtaghi, M., Han, B., Karunasekera, S., Kotagiri, R., Baldwin, T., Harwood, A., Pattison, P.: Mining Micro-Blogs: Opportunities and Challenges. In: A. Abraham, A.E. Hassanien (eds.) Social Networks: Computational Aspects and Mining. Springer (2011) 15. Lin, C., Mei, Q., Jiang, Y., Han, J., Qi, S.: Inferring the Diffusion and Evolution of Topics in Social Communities. Soc. Netw. Min. and Anal. 3 (2011) 16. Loekito, E., Bailey, J., Pei, J.: A Binary Decision Diagram Based Approach for Mining Frequent Subsequences. Knowl. and Inf. Syst. 24(2), 235–268 (2010) 17. Lui, M., Baldwin, T.: Classifying User Forum Participants: Separating the Gurus from the Hacks, and Other Tales of the Internet. In: The 2010 Australasian Language Technology Workshop, vol. 49, p. 57 (2010) 18. Malmgren, R., Stouffer, D., Motter, A., Amaral, L.: A Poissonian explanation for heavy tails in e-mail communication. Proc. Natl. Acad. Sci. U.S.A. 105(47), 18,153–18,158 (2008) 19. Morzy, M.: An Analysis of Communities in Different Types of Online Forums. In: The 2010 International Conference on Advances in Social Networks Analysis and Mining, pp. 341–345. IEEE (2010) 20. Mueen, A., Keogh, E., Zhu, Q., Cash, S., Westover, B.: Exact discovery of time series motifs. In: 2009 SIAM International Conference on Data Mining, pp. 1–12 (2009) 21. Petrovčič, A., Vehovar, V., Žiberna, A.: Posting, quoting, and replying: a comparison of methodological approaches to measure communication ties in web forums. Qual. & Quant. pp. 1–26 (2011) A Time Decoupling Approach for Studying Forum Dynamics 27 22. Plickert, G., Côté, R., Wellman, B.: It’s not who you know, it’s how you know them: Who exchanges what with whom? Soc. Netw. 29(3), 405–429 (2007) 23. Somol, P., Novovicová, J., Pudil, P.: Efficient feature subset selection and subset size optimization. In: A. Herout (ed.) Pattern Recognition Recent Advances. InTech (2010) 24. Turner, T., Smith, M., Fisher, D., Welser, H.: Picturing Usenet: Mapping computer- mediated collective action. J. of Comput.-Mediat. Commun. 10(4), 7 (2005) 25. Viégas, F., Smith, M.: Newsgroup crowds and authorlines: Visualizing the activity of individuals in conversational cyberspaces. In: The 37th Annual Hawaii International Con- ference on System Sciences, p. 10 (2004) 26. Viswanath, B., Mislove, A., Cha, M., Gummadi, K.: On the Evolution of User Interaction in Facebook. In: The 2nd ACM Workshop on Online Social Networks, pp. 37–42 (2009) 27. Wang, L., S.N., K., Baldwin, T.: Thread-level Analysis over Technical User Forum Data. In: The 2010 Australasian Language Technology Workshop, vol. 49, p. 27 (2010) 28. Warren Liao, T.: Clustering of time series data – a survey. Pattern Recognit. 38(11), 1857–1874 (2005) 29. Welser, H., Gleave, E., Fisher, D., Smith, M.: Visualizing the signatures of social roles in online discussion groups. J. of Soc. Struct. 8(2) (2007) 30. Xiong, R., Donath, J.: PeopleGarden: creating data portraits for users. In: The 12th Annual ACM Symposium on User Interface Software and Technology, pp. 37–44 (1999)
1804.05525
1
1804
2018-04-16T07:24:02
An Integrated Framework for Competitive Multi-channel Marketing of Multi-featured Products
[ "cs.SI" ]
For any company, multiple channels are available for reaching a population in order to market its products. Some of the most well-known channels are (a) mass media advertisement, (b) recommendations using social advertisement, and (c) viral marketing using social networks. The company would want to maximize its reach while also accounting for simultaneous marketing of competing products, where the product marketings may not be independent. In this direction, we propose and analyze a multi-featured generalization of the classical linear threshold model. We hence develop a framework for integrating the considered marketing channels into the social network, and an approach for allocating budget among these channels.
cs.SI
cs
An Integrated Framework for Competitive Multi-channel Marketing of Multi-featured Products Swapnil Dhamal INRIA Sophia Antipolis M´editerran´ee, France Email: [email protected] 8 1 0 2 r p A 6 1 ] I S . s c [ 1 v 5 2 5 5 0 . 4 0 8 1 : v i X r a Abstract-For any company, multiple channels are available for reaching a population in order to market its products. Some of the most well-known channels are (a) mass media advertisement, (b) recommendations using social advertisement, and (c) viral marketing using social networks. The company would want to maximize its reach while also accounting for simultaneous marketing of competing products, where the product marketings may not be independent. In this direction, we propose and analyze a multi-featured generalization of the classical linear threshold model. We hence develop a framework for integrating the considered marketing channels into the social network, and an approach for allocating budget among these channels. Index Terms-Social networks, viral marketing, product fea- tures, mass media, social advertisement, budget allocation I. INTRODUCTION Companies can market their respective products through several possible channels, the most prominent being mass media advertising (television, radio, newspapers, etc.), fixed Internet banner ads, banner ads based on browsing history, recommendations based on attributes (location, age group, field of work, etc.), recommendations based on friends' pur- chases, sponsored search ads, social media, sponsored Internet reviews, and so on. Potential customers or nodes also get indirectly influenced through their friends owing to word- of-mouth marketing. In order to make optimal use of these channels, a company would want to make the decision of how to invest in each channel, based on the investment strategy of competitors who also market their products simultaneously. This paper aims to present a framework for competitive influence maximization in the presence of several marketing channels. We focus on modeling three channels, namely, viral marketing, mass media advertisement, and recommendations based on friends' purchases using social advertisement. 1) Viral Marketing: In our context, a social network can be represented as a weighted, directed graph, consisting of nodes which are potential customers. The model we propose for influence diffusion in social network is a generalization of the well-studied linear threshold (LT) model [1]. Given such a model, a company would want to select a certain number of seed nodes to trigger viral marketing so that maximum number of nodes get influenced (buy the product) [2]. 2) Mass media advertisement: This is one of the most traditional way of marketing where a company advertises its product to the masses using well-accessible media such as television, radio, and newspaper. The timing of when to show the ads is critical to ensure optimal visibility and throughput. 3) Social advertisement based on friends' purchases: While making purchasing decisions, nodes rely not only on their own preferences but also on their friends', owing to social correlation due to homophily (bias in friendships towards similar individuals) [3]. This, in effect, can be harnessed to suggest products to a node based on its friends' purchasing behaviors. If a node has high influence on its friend (which is accounted for in diffusion models like LT), it is likely that the two nodes are similar. However, if the influence is low, it is not conclusive whether the nodes are dissimilar. So in addition to the influence parameter considered in LT-like models, marketing in practice requires another parameter that quantifies similarity between nodes. Note that since diffusion models do not consider this similarity, they alone cannot justify why two nodes having negligible influence on each other, display similar behaviors. It has also been observed in Twitter that almost 30% of information is attributed to factors other than network diffusion [4]. The effect of such factors could hence be captured using the similarity parameter. A. Related Work The problem of influence maximization is well-studied in literature on social network analysis. It is known that computing the exact value of the objective function for a given seed set (the expected number of influenced nodes at the end of diffusion that was triggered at that set), is #P-hard under the LT model [5]. However, the value can be well approximated using sufficiently large number of Monte-Carlo simulations. Though the influence maximization problem under LT model is NP-hard, the objective function is non-negative, monotone, and submodular; so greedy hill-climbing algorithm provides an approximation guarantee for its maximization [2]. There exist generalizations of LT model, e.g., general threshold model [2], extensions to account for time [6], and extensions to account for competition [7], [8]. State-of-the-art heuristics such as LDAG [5] and Simpath [9] perform close to greedy algorithm while running several orders of magnitude faster. There also exist algorithms that provide good performance irrespective of the objective function being submodular [10]. The problem of competitive influence maximization wherein multiple companies market competing products using viral marketing has also been studied [11], [12]. Also, more realistic models have been developed, where influences not only diffuse simultaneously but also interact with each other [13], [14]. The impact of recommendations and word-of-mouth mar- keting on product sales revenue is well studied in marketing TABLE I NOTATION buv N (v) huv χv γp kp βp t αp Av Pv B(t) influence weight of node u on node v set of influencing neighbors of v similarity between nodes u and v threshold of node v total budget for the marketing of product p budget for seed nodes for viral marketing of product p mass media advertising weight of product p in time step t social advertising weight of product p final aggregate preference of node v product bought by node v set of nodes influenced by time t literature [15], [16], [17]. Biases in product valuation and usage decisions when agents consider a product that offers new features of uncertain value, have been investigated [18]. It has also been discussed how marketers can apply latent similarities of customers for segmentation and targeting [19]. II. THE PROPOSED FRAMEWORK We propose a framework to facilitate study of different mar- keting aspects using a single model, capturing several factors: 1) Companies market their products using multiple channels; 2) Diffusions of different products are mutually dependent; 3) Each node aggregates the mass media advertisements, buv are such that (cid:80) recommendations, and neighbors' purchasing decisions. We first describe LT model, followed by our competitive multi-feature generalization, and then integration of other channels into this generalized model. Table I presents notation. In LT model, every directed edge (u, v) has weight buv ≥ 0, which is the degree of influence that node u has on node v, and every node v has an influence threshold χv. The weights u buv ≤ 1. Owing to thresholds being private information to nodes, they are assumed to be chosen uniformly at random from [0, 1]. The diffusion process starts at time step 0 with the initially activated set of seed nodes, and proceeds in discrete time steps. In each time step, a node gets influenced if and only if the sum of influence degrees of the edges incoming from its already influenced neighbors crosses u buv ≥ χv. The process stops when no further nodes can be influenced. Formally, let u ∈ N (v) if and only if buv (cid:54)= 0. Let B(t) be the set of nodes influenced by time t. Then its influence threshold, that is, (cid:80) v ∈ B(t)\B(t − 1) iff (cid:88) buv < χv and (cid:88) buv ≥ χv (1) u∈N (v) u∈B(t−2) u∈N (v) u∈B(t−1) A. Competitive Multi-feature Generalization of LT Model Products these days, be they toothpastes or mobile phones, come with several features with different emphases on dif- ferent features. Let such an emphasis be quantified by a real number between 0 and 1. That is, a product can be represented by a vector of mutually independent features p = (p1,··· , pf ), where pi ∈ [0, 1]. Let the features of each product be suitably scaled such that p = 1. Note that such scaling may not be feasible when there is a product p which offers strictly better features than product q (∀i : pi > qi); so let the products be such that one of the features corresponds to Fig. 1. Geometric interpretation of the proposed model 'null'. So p would have a lower null component as compared to q, thus making the scaling feasible (a higher null component would imply that the product has a poorer feature set). Our model for a node getting influenced is analogous to that used in classical mechanics to study the initial motion of a body placed on a rough horizontal surface, as a result of several forces acting on it. In our context, a node is analogous to the body, and its threshold is analogous to static frictional force stopping it from moving. Such a force is equal to µsmg, where m is mass of the body, g is acceleration due to gravity, and µs is the coefficient of static friction between the body and surface. For µsg = 1 unit for all nodes, the frictional force and analogously, the threshold equals mass, which is chosen uniformly at random from [0, 1] (as assumed in the LT model). A node v gets influenced in time step t when the net force on it crosses its threshold value χv; let the net force correspond to aggregate vector (say Av). Let d(Av, p) be the angular distance between Av and the product vector p. Since p = 1, d(Av, p) = arccos (cid:19) (cid:18)Av · p Av A node buys a product whose angular distance from its aggregate vector is the least (it can be easily shown that such a product would have the least Euclidean distance as well). If there exist multiple such products, one of them is chosen uniformly at random. Hence the competitive multi-feature version of (1) is v ∈ B(t)\B(t−1) , Av = buvPu , Pv = arg min d(Av, p) (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) (cid:88) p buvPu u∈N (v) u∈B(t−1) (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) ≥ χv (cid:88) u∈N (v) (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) < χv (cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13)(cid:13) (cid:88) u∈N (v) u∈B(t−2) iff buvPu and A geometric interpretation of the proposed model is pre- sented in Figure 1. Consider 2 competing products having 2 features, say p = (p1, p2), q = (q1, q2). In time step 0, Sp and Sq are selected for seeding by products p and q, respectively. In time step 1, node v aggregates the purchasing decisions of its neighbors Sp and Sq, hence obtaining the aggregate vector 0.4p+0.2q. Say(cid:112)(0.4p1 + 0.2q1)2 + (0.4p2 + 0.2q2)2 < χv, Av = (cid:112)(0.5p1 + 0.4q1)2 + (0.5p2 + 0.4q2)2 ≥ χv, so v so v is not influenced yet. However, u and w purchase products p and q respectively (since the influence weights from Sp to u and Sq to w are 1). Hence in time step 2, node v aggregates the purchasing decisions of u and w, hence obtaining the aggregate vector Av = (0.4p + 0.2q) + (0.1p + 0.2q). Say is now influenced and it purchases product p if d(Av, p) < d(Av, q), q if d(Av, p) > d(Av, q), else it chooses randomly. B. Properties of the Generalized LT Model i let (cid:80) The standard LT model is a special case of the proposed model, where there is a single product with one feature, i.e., p = (1). As the problem of influence maximization in the standard LT model is NP-hard, we have that the problem of influence maximization in the proposed model is also NP-hard. We now explain the multi-feature (vector-based) model with an illustrative example, which will also throw light on the properties of the objective function under the proposed model. Recollect that the threshold for any node is chosen uniformly at random from [0, 1]. Let Pp v(Sp, Sq) be the probability that node v gets influenced by product p when Sp and Sq are selected for seeding by p and q respectively. In Figure the two products be p = (1, 0) and q = (0, 1). 2, Let σp(Sp, Sq) be the expected number of nodes influenced by p when Sp and Sq are selected for seeding by p and q respectively. That is, σp(Sp, Sq) = Pp i (Sp, Sq). With diffusion starting from Sp and Sq simultaneously, we have Pp a(Sp, Sq) = 0 and Pq a(Sp, Sq) = 0.60. Note that if a is influenced by q, then it influences v with probability 0.70 even before the influence of p reaches it, starting from Sp; now even if influence of p reaches it, it is impossible for its aggregate preference to be closer to p than to q. So node v can get influenced by p only if a is not influenced by q. So v(Sp, Sq) = 0.3(1 − Pq Pp a(Sp, Sq)) = 0.12. So all 30 nodes which have v as sure influencer get influenced by p with prob- ability 0.12. Hence σp(Sp, Sq) = 1 + 2 + 0.12(1 + 30) = 6.72. a(T p, Sq) = 0 due to an incoming edge of 0.6 from Sq (it is impossible for √ the aggregate preference of node a to be closer to p than to q). 0.62 + 0.42 ≈ 0.72. From the argu- However, Pq v(T p, Sq) = 0.3(1 − Pq ment similar as above, Pp a(T p, Sq)) < 0.084. So the 30 nodes get influenced by p with probability less than 0.084. Hence σp(T p, Sq) < 2 + 2 + 0.084(1 + 30) < 6.61. That is, σp(T p, Sq) < σp(Sp, Sq). Now if the seed set for p is T p = Sp ∪ u, Pp a(T p, Sq) = Fig. 2. Example Thus while the objective function in the standard LT model follows monotone increasing property, adding a node to a set in the generalized model could decrease its value; this proves non-monotonicity. It can also be shown using counterexamples that σp(·) is neither submodular nor supermodular. Fig. 3. Integration of mass media and social advertisements into the network Let βp t=1 βp product p in time step t and βp be the total over time T , that is, βp = (cid:80)T C. Integrating Mass Media & Social Advertising into Network t be the investment for mass media advertising of investment t . For social advertising, we consider that a company would recommend or advertise product p to a node when any of its friends u has bought the product. Let αp be the effort invested in social advertising. Let huv (or hvu) be the parameter that quantifies the similarity between nodes u and v. So αphvu could be viewed as the influence of such a recommendation on v owing to the purchase of product p by u. Since the total influence weight u∈N (v) buv, the total u∈N (v) buv. t=1 and αp) t=1 allotted by node v for viral marketing is(cid:80) weight that it can allot for other channels is 1−(cid:80) Hence the weights allotted for other channels ((βp would be scaled accordingly to obtain the values of ( βp and αp specific to node v. A simple scaling rule is: t )T t )T βp t βp t = αp αp = 1 −(cid:80) (cid:16)(cid:80) u∈N (v) αphuv +(cid:80)T u∈N (v) buv (cid:80) p (cid:17) t=1 βp t In order to integrate mass media and social advertisements into the network, we add pseudonodes and pseudoedges cor- responding to them, as illustrated in Figure 3. Pseudonode p corresponds to the product company itself (the figure shows two separate copies of pseudonode p for the two channels for better visualization; they are the same pseudonode). Pseudon- ode p and all seed nodes selected for viral marketing, are influenced in time step 0. For integrating mass media advertisement, we create a set of pseudonodes {p(t)}T t=1 (where p(1) corresponds to pseudonode p), and pseudoedges {(p(t−1), p(t))}T t=2 of weight 1. Hence p(t) gets influenced with probability 1 in time step t − 1 (see Figure 3). We further create pseudoedges {(p(t), v)}T t=1 for node v such that bp(t)v = βp t . Since p(t) gets influenced in time t − 1, node v receives influence of βp t from pseudonode p(t) in time step t; this is equivalent to mass media advertisement. For integrating social advertisement, corresponding to edge (u, v), we create an intermediary pseudonode w with a fixed threshold χw > 0, and pseudoedges such that buw =  ∈ (0, χw), bpw = χw − , bwv = αphuv (see Figure 3). Now if the reference friend u is influenced by some product q, where the angle between products p and q be θ, the intermediary pseudonode w gets influenced if and only if (χw−)p+q ≥ χw. Since p = q = 1, this is equivalent to (χw − )2 + 2 + 2(χw − ) cos θ ≥ χ2 w ⇐⇒ 2(χw − )(cos θ − 1) ≥ 0 ⇐⇒ θ = 0 (∵  < χw) ⇐⇒ q = p (∵ p = q) So w gets influenced if and only if u buys product p, after which v is recommended to buy p with influence weight αphuv. Also note the time lapse of one step between the reference friend u buying the product and the target node v receiving the recommendation. Hence the latency in recom- mendation using social advertising is implicitly accounted for. III. THE UNDERLYING PROBLEM The fundamental problem here is to distribute the total available budget among the three marketing channels under study. Let kp be the number of free samples of product p that the company would be willing to distribute. Let Sp be the corresponding set of nodes in the social network to whom free samples would be provided (Sp = kp). Let cp(·) be the cost function for allotting effort of activating set Sp to trigger viral marketing, αp for social advertising, and (βq t=1 correspond- ing to each step of mass media advertising. In general, cp(·) would be a weighted sum of these parameters since the costs for adjusting parameters corresponding to different channels would be different. Let γp be the total budget for marketing of product p. Let νp(·) be the expected number of nodes (excluding pseudonodes) influenced by product p, accounting for the marketing strategies of p and its competitors. Hence the optimization problem for the marketing of product p is t )T νp(Sp, αp, (βp t )T Find Sp, αp, (βp t=1 to maximize t )T t=1, (Sq, αq, (βq t=1)q(cid:54)=p) t=1) ≤ γp such that cp(Sp, αp, (βp t )T t )T (2) t )T t=1 βp t=1 such that (cid:80)T In the above optimization problem, we not only need to determine the optimal allocation among channels (kp, βp, αp), but the best kp nodes to trigger viral marketing Sp such that Sp = kp, and the optimal allocation over time for mass media advertising (βp t = βp. The problem hence demands a method for multi-parametric optimization. Methods such as Fully Adaptive Cross Entropy (FACE) provide a simple, efficient, and general approach for simultane- ous optimization over several parameters [20]. In our context, the FACE method involves an iterative procedure where each iteration consists of two steps, namely, (a) generating data samples according to a specified distribution and (b) updating the distribution based on the sampled data to produce better samples in the next iteration. Here, our sample is a vector consisting of whether a node should be included in Sp, budget allotted for each time step of mass media advertising (βp t=1, and budget allotted for social advertising αp; each data sample t=1) ≤ γp. Initially, satisfies the cost constraint cp(Sp, αp, (βp t )T the data samples could be generated based on a random distri- bution. The value of the objective function νp(·) is computed for each data sample as per the proposed model using a sufficiently large number of Monte Carlo simulations. The distribution is then updated by considering data samples which provide value of the objective function better than a certain t )T percentile. This iterative updating continues until convergence or for a fixed number of iterations. The obtained terminal data sample acts as the best response allocation strategy for product p, in response to the strategies of competitors. A Note for Practical Implementation In order to implement the proposed framework in practice, a company would need to map its customers to the corre- sponding nodes in social network. To create such a mapping, it would be useful to get the online social networking identity (say Facebook ID) of a customer as soon as it buys the product. This can be done using a product registration website (say for activating warranty) where a customer, when it buys the product, needs to login using a popular social networking website (such as Facebook), or needs to provide its email address which could be used to discover its online social networking identity. Thus the time step when the node has bought the product, can also be obtained. REFERENCES [1] D. Easley and J. Kleinberg, Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge University Press, 2010. [2] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing spread of influence through a social network," in SIGKDD. ACM, 2003, pp. 137–146. [3] F. Chua, H. Lauw, and E.-P. Lim, "Generative models for item adoptions using social correlation," IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 9, pp. 2036–2048, 2013. [4] S. Myers, C. Zhu, and J. Leskovec, "Information diffusion and external influence in networks," in SIGKDD. ACM, 2012, pp. 33–41. [5] W. Chen, Y. Yuan, and L. Zhang, "Scalable influence maximization in IEEE, social networks under the linear threshold model," in ICDM. 2010, pp. 88–97. [6] W. Chen, W. Lu, and N. Zhang, "Time-critical influence maximization in social networks with time-delayed diffusion process." in AAAI. AAAI, 2012, pp. 592–598. [7] A. Borodin, Y. Filmus, and J. Oren, "Threshold models for competitive influence in social networks," in WINE. Springer, 2010, pp. 539–550. [8] N. Pathak, A. Banerjee, and J. Srivastava, "A generalized linear threshold model for multiple cascades," in ICDM. IEEE, 2010, pp. 965–970. [9] A. Goyal, W. Lu, and L. V. S. Lakshmanan, "SIMPATH: An efficient algorithm for influence maximization under the linear threshold model," in ICDM. IEEE, 2011, pp. 211–220. [10] R. Narayanam and Y. Narahari, "A Shapley value-based approach to discover influential nodes in social networks," IEEE Transactions on Automation Science and Engineering, vol. 8, no. 1, pp. 130–147, 2011. [11] S. Bharathi, D. Kempe, and M. Salek, "Competitive influence maxi- mization in social networks," in WINE. Springer, 2007, pp. 306–311. [12] S. Goyal and M. Kearns, "Competitive contagion in networks," in STOC. ACM, 2012, pp. 759–774. [13] S. Myers and J. Leskovec, "Clash of contagions: Cooperation & com- IEEE, 2012, pp. 539–548. [14] A.Zarezade, A.Khodadadi, M.Farajtabar, H.Rabiee, and H.Zha, "Corre- petition in information diffusion," in ICDM. lated cascades: Compete or cooperate." in AAAI, 2017, pp. 238–244. [15] D. Godes, "The strategic impact of references in business markets," Marketing Science, vol. 31, no. 2, pp. 257–276, 2012. [16] R. Van der Lans, G. Van Bruggen, J. Eliashberg, and B. Wierenga, "A viral branching model for predicting the spread of electronic word of mouth," Marketing Science, vol. 29, no. 2, pp. 348–365, 2010. [17] S. Aral and D. Walker, "Creating social contagion through viral product design: A randomized trial of peer influence in networks," Management Science, vol. 57, no. 9, pp. 1623–1639, 2011. [18] R. Meyer, S. Zhao, and J. Han, "Biases in valuation vs. usage of innovative product features," Marketing Science, vol. 27, no. 6, pp. 1083–1096, 2008. [19] M. Braun and A. Bonfrer, "Scalable inference of customer similarities from interactions data using dirichlet processes," Marketing Science, vol. 30, no. 3, pp. 513–531, 2011. [20] P.-T. De Boer, D. P. Kroese, S. Mannor, and R. Y. Rubinstein, "A tutorial on the cross-entropy method," Annals of operations research, vol. 134, no. 1, pp. 19–67, 2005.
1910.10472
1
1910
2019-10-13T00:47:09
Universal Boolean Logic in Cascading Networks
[ "cs.SI", "physics.bio-ph", "physics.data-an", "physics.soc-ph" ]
Computational properties of networks that can undergo cascades are examined. It is shown that universal Boolean logic circuits can be computed by a global cascade having antagonistic interactions. Determinism and cascade frequency of this antagonistic model are explored,as well as its ability to perform classification. Universality of cascade logic may have far-reaching consequences, in that it can allow unification of the theory of computation with the theory of percolation.
cs.SI
cs
Universal Boolean Logic in Cascading Networks Galen Wilkerson and Sotiris Moschoyiannis University of Surrey, Guildford, Surrey, GU2 7JP, UK [email protected], [email protected] Abstract. Computational properties of networks that can undergo cascades are examined. It is shown that universal Boolean logic circuits can be computed by a global cascade having antag- nistic interactions. Determinism and cascade frequency of this antagonistic model are explored, as well as its ability to perform classification. Universality of cascade logic may have far- reaching consequences, in that it can allow unification of the theory of computation with the theory of percolation. Keywords: Functional completeness, Boolean logic, complex networks, perco- lation, cascades, social networks, self-organized criticality, deep learning 1 Introduction Cascades are ubiquitous phenomena, found in social decision making, information diffusion, disease spreading, neuronal firing, and many other biological, social, chem- ical, and physical systems [5]. A classic example is a sand-pile, gradually built up grain by grain, until its sides reach a critical slope, undergoing a phase transition, where it tends to experience large avalanches (cascades) [3]. Another example is a neuron. When firing at a certain rate, the neuron may act alone, but when it fires at a critical rate, it may trigger a large cascade, causing many other neurons to fire [4], possibly optimizing information processing [12]. These models are also related to percolation theory 1. The ubiquity of cascades in many naturally-occurring systems is compelling, both for scientific understanding and as an important mechanism to advance computing. As Moore's law is challenged by physical limitations, alternative avenues to speed up computing are being investigated. Organic computing has been studied due to its great efficiency and adaptability [8]. In fact, when we look at the ability of the brain to learn quickly and perform many highly complex functions in parallel, we see that there is a huge efficiency gap between this and the fastest modern computer [10]. Thus, learning in naturally-occurring networks can be compared to 'deep learning' by artificial neural networks [10], or studied as a problem of control of complex sys- tems [9]. The McCulloch-Pitts Linear Threshold Unit and early neural networks were moti- vated by an interest in mimicking brain function. However, it seems that in our mod- ern era of deep-learning, the focus has been to use stochastic gradient descent and 1 Percolation is a classic model in physics and graph theory describing the sudden appearance of a giant component as a function of connection probability in Erdos-Renyi graphs. It can also be related to flow of liquid through a porous medium. 2 back-propagation because they are good engineering that works, but perhaps digress from the initial inspiration of the brain [10]. Meanwhile, machine learning is pre-dated by and based upon formal theories of computation, having a long history, starting with logic and computing with Boole and Babbage and famously advanced with computability and circuit complexity by Tur- ing, Shannon, and others, describing how simple systems can be combined to power- ful effect [11]. Thus, the simplicity of the GCM, a networked form of the Linear Threshold Model [6], and its Boolean construction (edges and node states), along with its possibility to encode logic circuits (shown here), and its critical cascade behavior, make it a com- pelling framework to explore the relationships between theories of computation and theories of criticality and cascades. Both in computer science and physics it is clear that powerful and significant large-scale behaviour can emerge from the simplest of models. The remainder of this paper is organized as follows: In section 2 we examine some characteristics of the simple Global Cascade Model (GCM) [13], and show that it can compute Boolean circuits. In section 3, we introduce a small modification to create an Antagonistic Global Cascade Model (AGCM) having negative interactions, and in section 4 show that it can compute functionally-complete (universal) Boolean logic circuits. In section 5, we also show that the GCM can reach deterministic final states, but the AGCM's final state is not always deterministic. In section 6 the AGCM and GCM are also shown to have a complementary cascade frequency distribution. Fi- nally, in section 7 there is a discussion of a few issues and future directions. 2 The Global Cascade Model (GCM) First, let's briefly review the GCM (on a finite graph) [13]: The GCM runs as follows:  Create an Erdos-Renyi random network, G(N,p), with a fixed number of nodes N and edge probability p.  Assign a random threshold value ϕ ~ U[0,1) to each node.  All nodes are marked as unlabeled.  Randomly choose a small fraction (Ф0 << 1) of the graph's nodes to be seeds, mark them labeled.  Run the simulation by asynchronously checking each unlabeled node, apply- ing the threshold function (1) 3 for node u and ν = that are labeled N L (u) N L(u) deg(u) , the fraction: number of node u's neighbors , over its degree deg(u) . Stop after all unlabeled nodes have been examined without any change in la- beling. The cascade size is the fraction of nodes (Ф) that are labeled. A global cascade is said to occur if the cascade size exceeds a predetermined fixed fraction of the network (e.g. Ф ≥ ½).  Figure 1: A graph focusing on node C's behavior from neighbors (inputs) A and B under the original labeling rule (Eq. 1). Top: Truth table for OR and correspond- ϕ ≤ ½. Bottom: Truth table for AND ing cascade network when node C's threshold and cascade network when C's ϕ > ½. Networks drawn as directed to show flow of information. Nodes in the GCM behave like logic gates. Taking a look at one unlabeled node (node C, Fig. 1) in a graph with two neighbors, we observe that when C's threshold ϕ ≤ ½, considering nodes A and B as inputs, and using the labeling rule (Eq. 1), node C behaves like a logical OR. Similarly, when ϕ > ½, node C behaves like logical AND. Generally, for k inputs, a node behaves like multi-input OR for any ϕ ≤ 1/k, and multi-input AND for any ϕ > (k-1)/k. For 1/k < ϕ ≤ (k-1)/k, a node behaves like a threshold logic unit [10]. 4 As we see in the truth tables (Fig. 1), this model can only carry out monotonically increasing logical functions such as the identity, AND, or OR [10]. That is, given two n-dimensional points x=(x1,..., xn) , a function f is monotonically increasing if when the number of 1s in x is at least the number of 1s in y. and y=( y1,..., yn) f ( x)≥ f ( y) 3 The Antagonistic Global Cascade Model (AGCM) Figure 2: An example of a cascade using the antagonistic model's complement rule (Eq.2), start- ing at seed node A (step I) and proceeding to nodes C (step II) and D (step III). We now introduce the Antagonistic Global Cascade Model (AGCM) having antago- nistic interactions, by making a single modification to the GCM. We construct a new complement labeling rule by simply reversing the inequalities of Eq. 1: (2) again for node u and ν the fraction of neighbors labeled, as above. Other than this rule, the operation of the AGCM is the same as the GCM. The new model's cascade action can be observed in Figure 2. Figure. 3. Node C's behavior under the complement labeling rule (Eq. 2). Top: Truth table for NOR and corresponding cascade network whenever node C's ϕ ≤ ½. Bottom: Truth table for NAND and cascade network whenever C's ϕ > ½. 5 The new labeling rule takes the logical complement of the original Boolean cir- cuits, computing NOR in the place of OR, and NAND in the place of AND (Fig. 3), for identical ϕ values. The multi-way logic mentioned above is also complemented in the same way. NAND and NOR, are monotonically decreasing Boolean functions (Increasing true values input decreases true values output), as can be seen in the truth tables in Fig. 3. 4 Boolean Circuits and Functional Completeness Figure. 4.: Trivially, we can construct NOT for a node with a single neighbor and any ϕ >0 value. This can be appended to a NAND or NOR circuit to give AND or OR. After a cascade is run (in either model), when all unlabeled nodes have been exam- ined without any change, the resulting logic circuits have no memory or time compo- nent, so are called combinational logic circuits that compute straight-line programs [11]. On a practical level, it is fairly straightforward to wire together Boolean networks. Logical NOT can be trivially constructed for any ϕ > 0, (Fig. 4) to build up the equiv- alence of Boolean circuits and Boolean algebra, including NAND and NOR, and their complement, AND and OR, and any algebraic combination [10]. Recall that functionally complete logic circuits can be created by composition of solely NAND or solely NOR operations, either of which form a universal basis [11]. This means that any Boolean circuit can be created using a network using this com- plement labeling rule. For example, in Fig. 5, we have shown how one particular random AGCM is able to carry out the logic of a half-adder 2 if the unlabeled nodes are examined in one of several orders, but not necessarily all possible orders (discussion below). A network composed of nodes using the GCM labeling rule (Eq. 1) could not have performed this calculation in a cascade. We note now that the computational power of such networks is in their scaling of universal Boolean logic. That is, functional completeness in a large network allows us to build any logical operation needed, including adding, subtracting, multiplying, dividing, and much more complex operations, including certain kinds of computer programs and deciding classes of formal languages [11]. 2 A half-adder is a Boolean circuit that adds two bits and outputs a sum and carry bit, much like standard base 10 addition. 6 Fig. 5. A half-adder implemented by a cascade network having the complement labelingrule. Here all nodes have been assigned ϕ values equivalent to NAND. This is a very small example of the power of the functionally-complete Boolean logic that can becomputed by these networks. Determinism 5 As we have seen, the GCM's labeling rule is monotonically increasing. Therefore, the original labeling rule leads to convergence to the final state of the network as unla- beled nodes are examined, and this final state is deterministic (unique). The proof is as follows. First we show that no labeling can exclude another labeling in the original GCM: Theorem 1. Labeling a particular node in the GCM cannot exclude labeling another node. Proof. Suppose, at a particular time-step, that examining some node u in the network leads to labeling u, and this labeling excludes the future labeling of some node v in the 7 network. This contradicts the labeling rule (Eq. 1), which is monotonically increasing in its inputs. □ After a node has become labeled, it is sufficient to examine all unlabeled nodes U ≤ N only once to determine whether the cascade has completed: Lemma 1. After a change in labeling of the GCM, it is sufficient to examine each un- labeled node once to determine whether the cascade has completed. Proof. Suppose that at a particular time step t, node u1 becomes labeled. Now sup- pose that after u1 has become labeled we have to examine some unlabeled node u2 more than once to determine whether u2 has become labeled. Letting t1 be the first time we examine u2 and t2 be the second time we examine u2, this means we have la- beling rule , for the same inputs. This contradicts the labeling rule f (Eq. 1). □ f t1(u2,η,ϕ )≠ f t2(u2,η ,ϕ) Also, a cascade cannot remain blocked if there is an unlabeled vulnerable node, simply because this node has not been examined: Theorem 2. A cascade cannot be blocked indefinitely due to not examining a partic- ular unlabeled node. Proof. Suppose node v is the only node that will allow a cascade to continue. At a particular time step t, the probability of not examining node v is , for U the number of unlabeled nodes to be examined (by Lemma 1). As each unlabeled node is examined at random, Therefore eventually node v will be examined and the cascade will continue. □ As a result, all cascades in the original GCM must eventually converge to the same final state: Theorem 3: The final state of the GCM is unique. , ϕ f) , the random graph G having N nodes, edge Proof. Suppose that for G(N, p, s, probability p, seed node(s) , phi values ϕ, and labeling rule f, the GCM cascade opera- tion is run separately from start to finish two times, and converges to two different fi- nal states. This means that for one of the two runs, either A. labeling one node excluded label- ing another node, or B. the cascade was blocked because a particular unlabeled node was never examined. Case A contradicts Theorem 1, and B contradicts Theorem 2. □ 8 ϕ Fig. 6: The complement labeling rule creates order-dependence. In a small fixed network, nodes B and C have equivalent to NAND. I. Start with seed node A labeled. The final state of the network depends on whether we examine II. B first or III. C first. This leads us to an interesting characteristic that arises when we use the AGCM's complementary labeling rule -- the final state of the cascade becomes dependent on the order in which we examine the unlabeled nodes, and therefore unlike the GCM, is non-deterministic (non-unique). Observe the triangular graph in Fig. 6, where nodes B and C have ϕ threshold values equivalent to NAND. Starting with seed-node A, if we first examine node B (top-right), we reach a final state with node B labeled and node C unlabeled. However, B's and C's rules are identical, so we have broken sym- metry. A similar behavior can be observed in graphs without a cycle. 6 Cascade Frequency It appears that the modality of the AGCM's cascade frequency as a function of the av- erage degree z is complementary to the cascade frequency of the original GCM (See [13], Fig. 2b). An intuition is that in the AGCM network cascade, an increase in the number of labels tends to have an antagonistic effect on the number of subsequent la- bels. Here we have used a uniform ϕ* = 0.18 for all nodes, as in the original work [13], for graphs having 100,000 nodes over 100 realizations, for the integer-valued ∈ [1,10], to calculate the frequency that the cascade size exceeds me- mean degree z dian cascade size (Fig. 7). While in the GCM, the largest cascade frequency occurred in (2 ≤ z ≤ 6), here we see the smallest cascade frequency in that region. Thus, it seems that following AGCM's complement rule means that cascades occur almost exactly when they do not in the original GCM. While in the original model, a very sparse or disconnected network can easily block or cut off a cascade, in the com- plement label case a sparsely connected network will tend to create more labeling, as we see by the left-hand mode, for z ≤ 2 (Fig. 7). In the region around z = 5, we see low cascade frequency (Fig. 7). In this region, the graph may still be tree-like [13], with low clustering coefficient , so that seeds largely reach nodes from only one neighbor, but since we have chosen ϕ* = 0.18, nodes are not vulnerable, since ν = 1/5 > 0.18 = ϕ*. 9 Fig. 7. Bi-modality in the global cascade frequency using the complement labeling rule,here on a network with 10000 nodes over 100 realizations per average degree z, and auniform ϕ∗ = 0.18. In the original GCM model, as z increases, densely connected unlabeled nodes tend to dilute the effects of incoming labeled nodes, which are often unable to overcome thresholds ϕ, driving down the cascade frequency. In the right-hand side (z ≥ 8) of the AGCM complement case (Fig. 7), unlabeled dense networks tend to be easily influ- enced by incoming labels, increasing labeling until negative feedback (antagonism) discourages further labeling, as seems indicated by the lower peak in the right-hand mode. 7 Discussion Here we address a few points that may have occurred to the reader. One might rightly ask how networks with solely negative threshold rules could come about, where examples of them could be found, and whether it is reasonable to study them. Antagonistic interactions have been investigated in the area of social bal- ance [7], consensus [1], and multi-edge graphs [14]. Above, we have discussed cascading networks as Boolean circuits. However, we can also think of them as performing a classification as in machine- or deep-learning. The AGCM labeling rule (as well as the original GCM rule) for node u can be written in the form of a threshold logic unit used in neural networks [10]: 10 where x is the L1-norm (number of ones) of the Boolean input vector x and w = [1,1,1,…,1]T. Fig. 8: A thought experiment showing why the original monotonically increasing GCM rule cannot distinguish between only pixel B being black, or both pixels being black. The construction of a network (nodes C and D) attached to A cannot detect when A is unlabeled (white). Further on classification, at first impression it may seem that the original GCM may compute a NOT simply by the absence of a cascade (and thereby classify 'cat' or 'not cat', for example). However, this is not the case. For example, as in (Fig. 8) we may construct a simple GCM taking an image as its possible seed nodes, and attempt to detect when only the right-hand pixel (B) is black. (Here, black = 'labeled', white = 'unlabeled' as elsewhere.) However, since the GCM rule is monotonically increasing, it is impossible to detect when the left-hand pixel (A) input is unlabeled, thereby pos- sibly obtaining many false positive results. However, the AGCM, having NOT, can resolve this situation. Similarly, the classic XOR problem [10] cannot be resolved by the GCM (since the composition of monotonically increasing functions is monotonically increasing) but can be resolved by the AGCM, as we see in the sum column of the half-adder truth ta- ble (Fig. 5). Finally, we note now that the computational power of such networks is in their scaling. That is, functional completeness in a large network allows us to build any logical operation, including adding, subtracting, multiplying, dividing, and very com- plex operations, including certain kinds of computer programs and classes of formal languages [2]. If we consider a very large network (the brain has ~ 1011 neurons and ~ 1014 synapses), it is hard to imagine the capabilities. A large number of topics remain to be investigated, unfortunately relegated to 'fu- ture work'. These are so many it is only possible to list them briefly: Some of these topics are theoretical: Investigating the existence of a critical thresh- old in the AGCM model, and finding a closed-form expression for it; How to train or control the network toward criticality for certain inputs; Analysing both the GCM and AGCM as dynamical systems, understanding their correlation length and time, stabil- ity and fixed points, as well as convergence and accuracy evolution of the logic cir- cuit; understanding how input size, cascade size and criticality relate to circuit size and depth and information-theoretic measures; understanding how to extract outputs from the network, using either cascade size or individual nodes; studying how a mix 11 of nodes having one or the other labeling rule can be functionally complete; the rela- tionship between tree-like topology and logic that can be computed; how criticality in these simple models relates to optimal functionality in neuronal networks of the brain [12]; the formal language (called AC for Boolean circuits) that can be computed by these cascades, and the probabilistic relationship to criticality; and whether these Boolean cascades can be considered in quantum computing using qubits. Other topics are more applied: How to build such networks in hardware; considera- tion of real-world network topologies (rarely Erdos-Renyi); observing and measuring such cascades 'in the wild' in social, neuronal, or other systems. 8 Conclusion We have shown that a simple cascading network model can compute Boolean circuits, and that a cascading network having antagonistic interactions can compute universal, functionally-complete Boolean logic. We have also shown that, although cascades over positive interactions can reach deterministic final states, antagonistic interactions may not. The antagonistic model has a complementary cascade frequency distribution to the original GCM, and may perform classification, as in machine learning. This research lets us begin to understand relationships between theories of ubiqui- tous cascades in nature and Boolean circuits that are fundamental to computing. References 1. Altafini, C.: Consensus problems on networks with antagonistic interactions. IEEE Transactions on Automatic Control 58(4), 935 -- 946 (2012) 2. Arora, S., Barak, B.: Computational complexity: a modern approach. Cambridge Uni versity Press (2009) 3. Bak, P., Tang, C., Wiesenfeld, K.: Self-organized criticality: An explanation of the 1/f noise. Physical review letters 59(4), 381 (1987) 5. 7. 4. Beggs, J.M., Plenz, D.: Neuronal avalanches in neocortical circuits. Journal of neuro- science 23(35), 11167 -- 11177 (2003) Easley, D., Kleinberg, J., et al.: Networks, crowds, and markets, vol. 8. Cambridge university press Cambridge (2010) 6. Granovetter, M.: Threshold models of collective behavior. American journal of soci- ology 83(6), 1420 -- 1443 (1978) Leskovec, J., Huttenlocher, D., Kleinberg, J.: Signed networks in social media. In: Proceedings of the SIGCHI conference on human factors in computing systems. pp. 1361 -- 1370. ACM (2010) 8. Müller-Schloer, C., Schmeck, H., Ungerer, T.: Organic computing -- A paradigm shift for complex systems. Springer Science & Business Media (2011) Prokopenko, M.: Guided self-organization (2009) 9. 10. Rojas, R.: Neural networks: a systematic introduction. Springer Science & Business Media (2013) 11. Savage, J.E.: Models of computation, vol. 136. Addison-Wesley Reading, MA (1998) 12. Shew, W.L., Plenz, D.: The functional benefits of criticality in the cortex. The neuro- scientist 19(1), 88 -- 100 (2013) 12 13. Watts, D.J.: A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences 99(9), 5766 -- 5771 (2002) 14. Zhao, K., Bianconi, G.: Percolation on interacting, antagonistic networks. Journal of Statistical Mechanics: Theory and Experiment 2013(05), P05005 (2013)
1508.07313
3
1508
2016-02-26T20:22:49
Consensus Convergence with Stochastic Effects
[ "cs.SI", "nlin.AO", "physics.soc-ph" ]
We consider a stochastic, continuous state and time opinion model where each agent's opinion locally interacts with other agents' opinions in the system, and there is also exogenous randomness. The interaction tends to create clusters of common opinion. By using linear stability analysis of the associated nonlinear Fokker-Planck equation that governs the empirical density of opinions in the limit of infinitely many agents, we can estimate the number of clusters, the time to cluster formation and the critical strength of randomness so as to have cluster formation. We also discuss the cluster dynamics after their formation, the width and the effective diffusivity of the clusters. Finally, the long term behavior of clusters is explored numerically. Extensive numerical simulations confirm our analytical findings.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) Consensus Convergence with Stochastic Effects Josselin Garnier · George Papanicolaou · Tzu-Wei Yang Dedication to Willi Jager's 75th Birthday 6 1 0 2 b e F 6 2 ] I S . s c [ 3 v 3 1 3 7 0 . 8 0 5 1 : v i X r a Abstract We consider a stochastic, continuous state and time opinion model where each agent's opinion locally interacts with other agents' opinions in the system, and there is also exogenous randomness. The interaction tends to create clusters of common opinion. By using linear stability analysis of the associated nonlinear Fokker-Planck equation that governs the empirical density of opinions in the limit of infinitely many agents, we can estimate the number of clusters, the time to cluster formation and the critical strength of randomness so as to have cluster formation. We also discuss the cluster dynamics after their formation, the width and the effective diffusivity of the clusters. Finally, the long term behavior of clusters is explored numerically. Extensive numerical simulations confirm our analytical findings. Keywords flocking · opinion dynamics · mean field · interacting random processes Mathematics Subject Classification (2000) 92D25, 35Q84, 60K35 1 Introduction Opinion dynamics models have attracted a lot of attention and there are many analytical and numerical studies that consider different models arising from many different fields. In much of the literature, an opinion dynamics model is a system with a large number of opinion variables, xi(t), i = 1, . . . , N , taking values in Rn. The time evolution of the opinion variables is governed by an attractive interaction Josselin Garnier Laboratoire de Probabilit´es et Mod`eles Al´eatoires & Laboratoire Jacques-Louis Lions, Univer- sit´e Paris Diderot, 75205 Paris Cedex 13, France E-mail: [email protected] George Papanicolaou Department of Mathematics, Stanford University, Stanford, CA 94305, USA E-mail: [email protected] Tzu-Wei Yang School of Mathematics, University of Minnesota, Minneapolis, MN 55455, USA E-mail: [email protected] 2 Josselin Garnier et al. between any two opinion variables, often taken to be a nonnegative function of the Euclidean distance of the two opinion variables and may also be time depen- dent. The most interesting feature of such a model is that opinions only interact locally and the influence function is compactly supported, interpreted as bounded confidence. In this case, it is of interest to know whether the system will exhibit consensus convergence, which means that all the opinion variables converge to the same point as time tends to infinity. Except for some specific consensus models, a broad sufficient condition to have consensus convergence for a general class of models is not known. However, several studies have shown that for a variety of different types of consensus building interactions, and without external forces or randomness, the opinions will converge to possibly several clusters. In this case, the distance between distinct clusters should be larger than the support of the influence region. But it is not known, in general, how to determine the number of clusters. A more realistic way to model opinion dynamics is to add external randomness to the system. In this case, the model becomes a system of N stochastic processes and usually the randomness in the model is independent from one opinion holder or agent to another. Many deterministic techniques can also be used in the stochastic case, but some methods, such as the use of master equations, are particularly useful in stochastic models. When the external noise is large in the stochastic models then the tendency to cluster is effectively eliminated as the system is dominated by the noise. This is a phenomenon seen elsewhere in statistical physics as well. The strength of the noise or randomness must be below a critical value in order for cluster formation to emerge and evolve. The literature in opinion dynamics is very extensive so we mention only a few papers that have guided our own work. Hegselmann and Krause [13] consider a discrete-time evolution model, in which the opinions in the next step are the aver- age of the current opinions within a specified range of the influence region. Pineda et al. [25] add noise to the Hegselmann-Krause model and determine the critical strength of the noise so as to have cluster formation, using a master equation ap- proach and linear stability analysis. The same method is also used in [23][24] on the Deffuant-Weisbuch model [8]. In [4], the authors take the limit as the number of opinions goes to infinity and consider the distribution of the opinions (the Eule- rian approach), instead of tracking every single opinion in the Hegselmann-Krause model (the Lagrangian approach), and [21] further discuss the case with external forces. The long time behavior and a sufficient condition for consensus convergence of the Hegselmann-Krause model are considered in [2][3][26]. The long time behav- ior of the Hegselmann-Krause model with a general influence function is discussed in [16][22]. The Hegselmann-Krause model involving different types of agents is considered in [14]. Some recent development of the study of opinion dynamics are in [19][22]. Other, related relevant works are [12][9][20][6][11][5][15][18][1]. Our contributions in this paper are the following. We consider a stochastic opinion model where every opinion is influenced by an independent Brownian motion. By the mean field limit theory, the empirical probability measure of the opinions converges, as the size of the population goes to infinity, to a solution of a nonlinear Fokker-Planck equation. Using a linear stability analysis, we estimate the number of clusters, the time to cluster formation and the critical strength of the Brownian motions to have cluster formation. The linear stability analysis can be applied to both deterministic and stochastic models. We also discuss the Consensus Convergence with Stochastic Effects 3 behavior of the system after the initial cluster formation but before further clus- ter consolidation, where the centers of the clusters are expected to behave like independent Brownian motions. Finally, we consider the long time behavior of the system. Once clusters are formed, their centers behave like Brownian motions until further merging. After consensus convergence, where there is only one clus- ter, there is a small probability that all the opinions inside the limit cluster will spread out and the system will become an independent agent evolution. Extensive numerical simulations are carried out to support our analysis and remarks about cluster formation and evolution. The paper is organized as follows. The interacting agent model is presented in section 2. The mean field limit is presented briefly in section 3. The linearized stability analysis of the governing nonlinear Fokker-Planck equation is presented in section 4 when there is no external noise. The results of numerical simulations are also presented in this section. In section 5 we extend the analysis of the previous section to the stochastic case when there are external noise influences. We also present the results of numerical simulations in the stochastic case. In section 6 we comment briefly about the long time behavior in the stochastic case when there is clustering. We end with a brief summary and conclusions in section 7. 2 The interacting agent model The opinion model we consider in this paper is (see [22, Eq. (1.2a)]): N(cid:88) j=1 dxi = − 1 N aij(xi − xj)dt + σdW i(t), (1) where xi(t) is the agent i's opinion modeled as real valued process, where t is time and i = 1, . . . , N . The coefficients aij denote the strength of the interaction between xi and xj and they are a function of the distance between xi and xj: aij = φ(xi − xj). (2) The interesting case is when the influence function φ is non-negative and com- pactly supported. In other words, the interactions are attractive and the agent i affects only the other agents that have similar opinions. Here we assume that φ is compactly supported in [0, R0] (cid:18) r (cid:19) φ(r) = φ0 R0 (3) where supp(φ0) = [0, 1]. The W i(t), i = 1, . . . , N are independent standard Brownian motions that model the uncertainties of the agents' opinions, and σ is a non-negative constant quantifying the strength of the uncertainties. If σ = 0, then there is no randomness in this model and (1) is a deterministic system, while if σ > 0, the system becomes stochastic. For the purposes of the analysis below, we consider the model (1) on the torus [0, L] instead of the real line R. i.e. we consider the model in the bounded space [0, L] with periodic boundary conditions. The assumption of periodic boundary 4 Josselin Garnier et al. conditions is mostly for simplifying the analysis. Although this assumption may not be appropriate in some applications, we found that the results obtained using it are numerically consistent with the same model in full space or in a finite interval with reflecting boundary conditions. The later two are in general more realistic for many applications. We note that the same periodicity assumption for the analysis of the opinion dynamics is also used in [23][24][25]. 3 The mean field limit At time t, we consider the empirical probability measure ρN (t, dx) of the opinions of all the agents: ρN (t, dx) = 1 N δxj (t)(dx). (4) N(cid:88) j=1 Here δx(dx) is the Dirac measure with the point mass at x. The empirical proba- bility measure ρN (t, dx) is a measure valued stochastic process. We assume that as N → ∞, ρN (0, dx) converges weakly, in probability to ρ0(dx) which is a determin- istic measure with density ρ0(x). By using the well known mean field asymptotic theory (see, for example, [7][10][17]), it can be shown that as N → ∞, ρN (t, dx) converges weakly, in probability to ρ(t, dx), for 0 ≤ t ≤ T < ∞, a deterministic probability measure. Under suitable conditions the limit measure has a density ρ(t, x) which satisfies (in a weak sense) the nonlinear Fokker-Plank equation: (cid:26)(cid:20)(cid:90) (cid:21) (cid:27) ∂ρ ∂t (t, x) = ∂ ∂x ρ(t, x − y)yφ(y)dy ρ(t, x) + σ2 2 ∂2ρ ∂x2 (t, x), (5) with given initial density ρ0(x). In particular, if x1(0), . . . , xN (0) are sampled in- dependently and identically according to the uniform measure over [0, L], then the result holds true and the initial measure has constant density ρ0(x) = 1/L. In this paper, we assume that N is large and view the mean field limit as the defining problem. Therefore, we will analyze the overall behavior of the opin- ion dynamics, x1(t), . . . , xN (t), by analyzing instead the nonlinear Fokker-Planck equation (5). 4 Deterministic consensus convergence: σ = 0 We will follow a modulational instability approach to study the mean field limit when (σ = 0), also analyzed in [22][16]. We look for conditions so as to have consensus convergence where all the opinions converge to a cluster as t → ∞. We also analyze the number of clusters if there is no consensus convergence and the time to cluster formation, that is, the onset of cluster formation. 4.1 Linear stability analysis We first linearize the Fokker-Planck equation (5) with σ = 0 by assuming that ρ(t, x) = ρ0 + ρ1(t, x) = 1/L + ρ1(t, x). Substituting ρ(t, x) = ρ0 + ρ1(t, x) into Consensus Convergence with Stochastic Effects 5 (cid:20)(cid:90) (cid:90) ∂ρ1 (cid:21) (cid:20)(cid:90) (cid:21) (5) and assuming that ρ1 is a small perturbation of ρ so that the O(ρ2 negligible, we find that ρ1(t, x) satisfies: 1) term is ∂ρ1 ∂t (t, x) = ∂ ∂x ρ0yφ(y)dyρ1(t, x) + ∂ ∂x ρ1(t, x − y)yφ(y)dyρ0 (6) = ρ0 (t, x − y)yφ(y)dy. ∂x (cid:82) yφ(y)dy = 0. By taking the Fourier transform in x, ρ1(t, k) = (cid:82) L The last equality in (6) holds because φ(y) is an even function and therefore 0 ρ1(t, x)e−ikxdx, with the discrete set of frequencies k in we find from (6) that ∂ ρ1 ∂t (t, k) = K = {2πn/L, n ∈ Z}, (cid:90) (cid:20) iρ0k (cid:21) ρ1(t, k), −ikyyφ(y)dy e which gives the growth rates of the modes: γk = Re iρ0k −ikyyφ(y)dy e (cid:20) (cid:90) (cid:21) (cid:90) = ρ0k sin(ky)yφ(y)dy. (7) (8) (9) We can see that for each k, ρ1(t, k) = ρ1(0, k) exp(γkt). By replacing φ with φ0 (see (3)), we can rewrite γk as (cid:90) 1 0 (cid:20) (cid:90) 1 q>0 0 γk = ρ0R0ψ(kR0), ψ(q) = 2q φ0(s)s sin(qs)ds. (10) The growth rate γk is maximal for k = ±kmax with kmax := qmax/R0, more exactly, for k equal to plus or minus the discrete frequency kmax in the set K that maximizes ψ(kR0), which is close to qmax/R0. Here (cid:21) qmax = arg max [ψ(q)] = arg max 2q φ0(s)s sin(qs)ds (11) q>0 ditions since ψ(q) (cid:39) 2q2(cid:82) 1 The optimal (continuous) frequency qmax is positive and finite under general con- 0 s2φ0(s)ds for 0 ≤ q (cid:28) 1 and ψ(q) is bounded or decays to zero at infinity depending on the regularity of φ0. 4.2 Fluctuation theory By the central limit theorem, if we assume that the initial opinions x1(0), . . . , xN (0) are sampled identically according to the uniform distribution over the domain [0, L], then ρN 1 (t = 0, dx) := √ N ρN (t = 0, dx) − ρ0(dx) (cid:16) (cid:32) (cid:17) √ N = N(cid:88) i=1 1 N δxi(0)(dx) − dx L (cid:33) 6 Josselin Garnier et al. converges in distribution as N → ∞ to the measure ρ1(t = 0, dx), whose frequency components, for k ∈ K\{0}, (cid:90) L 0 √ N √ N √ N e  1  1 N N −ikx N(cid:88) N(cid:88) j=1 j=1  1 N N(cid:88) j=1 δxj (0)(dx) − dx L (cid:90) L 0 −ikxj (0) − e −ikxdx e 1 L   −ikxj (0) e ρ1(t = 0, k) = lim N→∞ = lim N→∞ = lim N→∞ are independent and identically distributed with complex circular Gaussian ran- dom variables with mean zero and variance 1: E [ρ1(t = 0, k)] = 0, E(cid:104) ρ1(t = 0, k)ρ1(t = 0, k(cid:48)) = δkk(cid:48) , (cid:48) ∈ K\{0}, k, k ρ1(t = 0,−k) = ρ1(t = 0, k), while ρ1(t = 0, k = 0) = 0. For any T , the measure-valued process (cid:16) ρN 1 (t, dx) := √ N ρN (t, dx) − ρ0(dx) t ∈ [0, T ] , (12) converges in distribution as N → ∞ to a measure-valued process ρ1(t, dx) whose density ρ1(t, x) satisfies the deterministic PDE ∂ρ1 ∂t (t, x) = ρ0 (t, x − y)yφ(y)dy (13) with the random initial condition described above. Consequently, combining with (8) and (9), at any time t, the frequency com- ponents ρ1(t, k), k ∈ K\{0}, are independent complex circular Gaussian random variables, with mean zero and variance exp(2γkt): ρ1(t, k)ρ1(t, k(cid:48)) = δkk(cid:48) exp(2γkt), (cid:48) ∈ K\{0}, k, k (14) E(cid:104) ρ1(t,−k) = ρ1(t, k), while ρ1(t, k = 0) = 0. Therefore, )(cid:3) = E (cid:48) E(cid:2)ρ1(t, x)ρ1(t, x (cid:34) (cid:88) E = ρ1(t, k) k k eikx L ρ1(t,−k) ρ1(t, k) ρ1(t, k) (cid:88) (cid:35) k = eikx L e−ikx(cid:48) L (cid:88) k(cid:54)=0 1 L2 (cid:35) eikx(cid:48) L e2γkteik(x−x(cid:48) ).  (cid:105) (cid:17) (cid:90) ∂ρ1 ∂x (cid:105) (cid:34)(cid:88) For large times, the spectrum of ρ1(t, x) becomes concentrated around the max(k − kmax)2 for k optimal wavenumber kmax. We can expand γk = γmax + 1 2 γ(cid:48)(cid:48) around kmax and use a continuum approximation for the discrete sum: Consensus Convergence with Stochastic Effects (cid:88) (cid:48) E(cid:2)ρ1(t, x)ρ1(t, x (cid:90) ∞ (cid:18) −∞ 2πL = 1 )(cid:3) = (cid:90) ∞ Re e2γmaxt e2γkteik(x−x(cid:48) 1 L2 e2γkteik(x−x(cid:48) k(cid:54)=0 )dk (cid:39) 1 πL Re ) (cid:39) 1 L2 (cid:18)(cid:90) ∞ 0 eγ(cid:48)(cid:48) max(k−kmax)2teik(x−x(cid:48) )dk (cid:90) ∞ −∞ (cid:19) = = 1 πL (cid:18) 1 L 0 e2γmaxt cos(kmax(x − x (cid:48) )) (cid:19)(cid:32) 1(cid:112)πγ(cid:48)(cid:48) maxt − (x−x(cid:48) )2 maxt e 4γ(cid:48)(cid:48) (cid:33) . e2γkteik(x−x(cid:48) ) L 2π dk e2(γmax+ 1 2 γ(cid:48)(cid:48) max(k−kmax)2)teik(x−x(cid:48) 7 (cid:19) )dk (15) A typical realization of ρ1(t, x) is a modulation with the carrier spatial fre- quency kmax and a slowly varying envelope with stationary Gaussian statistics, mean zero, and Gaussian covariance function. This is valid provided L2 (cid:29) 4γ(cid:48)(cid:48) maxt. If L2 (cid:28) 4γ(cid:48)(cid:48) maxt, then the continuum approximation is not valid and we have E(cid:2)ρ1(t, x)ρ1(t, x (cid:48) )(cid:3) = 1 L2 e2γkteik(x−x(cid:48) (cid:88) L2 e2γmaxt cos(cid:0)kmax(x − x k(cid:54)=0 ) = 2 L2 (cid:48) (cid:88) )(cid:1) . k>0 (cid:39) 2 e2γkt cos(k(x − x (cid:48) )) (16) A typical realization of ρ1(t, x) is a modulation with the carrier spatial frequency kmax. Because γmax > 0, the linear system (13) is unstable and therefore the central √ limit theorem cannot be extended to arbitrarily large times. In fact the theorem is limited to times t such that ρ1(t, x)/ N is smaller than ρ0 = 1/L so that the linearization around ρ0 is valid. Therefore the time up to the onset of clustering is when the perturbation ρ1 becomes of the same order as N ρ0, that is to say when E(cid:2)ρ1(tclu, x)2(cid:3) (cid:39) N L−2, which is approximately (up to terms smaller than √ ln N ): when N (cid:29) 1. tclu (cid:39) 1 2γmax ln N (cid:39) 1 2ρ0R0ψ(qmax) ln N We note that the fact that a random initial distribution gives rise to a quasi- deterministic subsequent evolution by spectral gain selection occurs in many fields, for instance in fluid mechanics (hydrodynamic instabilities) or in nonlinear optics (beam filamentation). 4.3 Consensus convergence The linear stability analysis shows that the opinion dynamics, starting from a uniform distribution of agents, gives clustering with a mean distance between clusters equal to 2π/kmax (see (15) and (16)). Once clustering has occurred, two types of dynamical evolutions are possible: 1. If 2π/kmax > R0, then the clusters do not interact with each other because they are beyond the range of the influence function. Therefore, the situation is frozen and there is no consensus convergence. 8 Josselin Garnier et al. 2. If 2π/kmax < R0, then the clusters interact with each other. There may be consensus convergence. However, consensus convergence is not guaranteed as clusters may merge by packets, and the centers of the new clusters may be sepa- rated by a distance larger than 2π/kmax, and then global consensus convergence does not happen. The number of mega-clusters formed by this dynamic is not easy to predict. If we neglect the rounding and consider kmax = qmax/R0, which is possible if qmaxL/R0 (cid:29) 1, then the criterion 2π/kmax > or < R0 does not depend on R0, as it reads 2π/qmax > or < 1, which depends only on the normalized influence function φ0 by (10) and (11). These two dynamics can be observed in the examples of Figure 1.1 in [22]: 1. If φ(r) = 1[0,1](r), then qmax (cid:39) 2.75 and the mean distance between clusters is about 2.3, that is beyond the range 1 of the influence function, and there is no consensus convergence. 2,1](r), then qmax (cid:39) 9.1 and the mean distance between clusters is about 0.7, that is within the range of the influence function, and there is consensus convergence. 2. If φ(r) = 0.1×1[0,1/ 2](r)+1[1/ √ √ These predictions are quantitatively in very good agreement with the numerical simulations (distance between clusters and so on). To summarize, the main result in the noiseless case σ = 0 is as follows. In the regime N → ∞, there is no consensus convergence if qmax < 2π. There may be consensus convergence if qmax > 2π. Of course this stability analysis and the result that follow can be extended easily to the multi-dimensional case, and to other types of opinions or flocking dynamics. 4.4 Numerical simulations We use the explicit Euler scheme to simulate the deterministic opinion dynamic (1) when σ = 0: N(cid:88) j=1 xn+1 i = xn i − 1 N φ(xn i − xn j )(xn i − xn j )∆t, φ(s) = φ0(s/R0). (17) Although our analysis is on the torus [0, L], we still simulate (17) on the full space. The simulation results indicate, however, that the analysis under periodic conditions is still consistent with the numerics with different boundary condi- tions. As it is shown in [22][16], if x1(0), . . . , xN (0) are in the interval [0, L], then x1(t), . . . , xN (t) ∈ [0, L] for any t ≥ 0. We test for the influence functions studied in [22][16]: √ 2](s) + 0.1 × 1(1/ φ1 0(s) = 1[0,1/ φ2 0(s) = 1[0,1](s) 0(s) = 0.5 × 1[0,1/ √ φ3 0(s) = 0.1 × 1[0,1/ √ φ4 0(s) = (1 − s)3 × 1[0,1](s) φ5 0(s) = (1 − s)6 × 1[0,1](s), φ6 2](s) + 1(1/ 2](s) + 1(1/ √ √ √ 2,1](s) 2,1](s) 2,1](s) Consensus Convergence with Stochastic Effects 9 Fig. 1 The plots of the influence functions φ0(s). and their plots are shown in Figure 1. We compute the key quantity qmax by exploring all possible q in [0, 100]: (cid:20) (cid:90) 1 0 (cid:21) qmax = arg max R0q∈K,0<q≤100 2q φ0(s)s sin(qs)ds . We find that for the cases of φ3 0, qmax are not unique and the non-uniqueness of qmax will greatly affect the results of the consensus convergence. The parameters we use for the simulation are ∆t = 0.1, L = 10, R0 = 1 and N = 500. For each φ0, 0 and φ4 s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=1×1[0,1/√2](s)+0.1×1(1/√2,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=1×1[0,1/√2](s)+1×1(1/√2,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=0.5×1[0,1/√2](s)+1×1(1/√2,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=0.1×1[0,1/√2](s)+1×1(1/√2,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=(1−s)3×1[0,1](s)s00.10.20.30.40.50.60.70.80.91φ0(s)00.511.5φ0(s)=(1−s)6×1[0,1](s) 10 Josselin Garnier et al. Fig. 2 Simulation for φ0(s) = φ1 (17). The vertical dashed line is at t = tclu. 0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of 0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of Fig. 3 Simulation for φ0(s) = φ2 (17). The vertical dashed line is at t = tclu. we also plot the function ψ(s) = 2q(cid:82) 1 the values of ψ(s) at R0q ∈ K and the lines are the continuum approximation. 0 φ0(s)s sin(qs)ds; the stars in the plots are From Figure 2, we can see that there is a unique qmax = 3.7699. From our anal- ysis, we do not expect to have consensus convergence because qmax = 3.7699 < 2π. The distance between clusters is 2πR0/qmax = 1.67, and therefore we should have roughly L/1.67 = 5.99 clusters, and indeed we have 6 clusters in our simulation. In addition, tclu = ln N/(2ρ0R0ψ(qmax)) = 21 (the vertical blue dashed line) also correctly predicts the time to cluster formation. In Figure 3, if φ0(s) = 1[0,1](s), then ψ(q) has a unique qmax = 2.51 but it also has many suboptimal q where ψ(q) is very close to ψ(qmax). Note that qmax < 2π means that there is no consensus convergence. The inter-cluster distance is 2.5, which is correct for the top and the bottom clusters. However, the central clusters are affected by the suboptimal q and therefore their inter-cluster distances are different. We also note that tclu = ln N/(2ρ0R0ψ(qmax)) = 14.9 (the vertical blue 0102030405060708090100−1.5−1−0.500.511.5q,qmax=3.7699ψ(q)φ0(s)=1×1[0,1/√2](s)+0.1×1(1/√2,1](s)050100150012345678910Time,tclu=21Opinions,xi(t)φ0(s)=1×1[0,1/√2](s)+0.1×1(1/√2,1](s)N=500,R0=1,qmax=3.77Inter-ClusterDistance=1.670102030405060708090100−2.5−2−1.5−1−0.500.511.522.5q,qmax=2.5133ψ(q)φ0(s)=1×1[0,1/√2](s)+1×1(1/√2,1](s)050100150012345678910Time,tclu=14.9Opinions,xi(t)φ0(s)=1×1[0,1/√2](s)+1×1(1/√2,1](s)N=500,R0=1,qmax=2.51Inter-ClusterDistance=2.5 Consensus Convergence with Stochastic Effects 11 Fig. 4 Simulation for φ0(s) = φ3 (17). The vertical dashed line is at t = tclu. 0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of Fig. 5 Simulation for φ0(s) = φ4 (17) for t ≤ 150. The vertical dashed line is at t = tclu. 0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of √ 2](s)+1(1/ √ dashed line) correctly estimates the time to the formation of the top and bottom clusters. We see an interesting result in Figure 4 for φ0(s) = 0.5×1[0,1/ 2,1](s). From the plot of ψ(q), we can see that qmax might not be unique and the first few local maximizers are q = 2.5133, 9.4248, 15.7080, . . ., and the corresponding inter- cluster distances are 2.5, 0.6667, 0.4000, . . .. We can see from the simulation that there are two noticeable inter-cluster distances: 2.5 and 0.6667. For R0q ∈ K, 0 ≤ q ≤ 100, qmax = 53.4071 so that the necessary condition to have the consensus convergence qmax > 2π is satisfied. However, we do not have consensus conver- gence in this case because qmax > 2π is not a sufficient condition. We notice that although qmax might not be unique, tclu = 11.5 still predicts the time to cluster formation because it is related to ψ(qmax) not qmax and thus the non-uniqueness of qmax does not affect tclu. In Figure 5 and 6, we see consensus convergence. From the plot of ψ(q), we can see that qmax might not be unique and the first few local maximizers are q = 2.5133, 0102030405060708090100−3−2−10123q,qmax=53.4071ψ(q)φ0(s)=0.5×1[0,1/√2](s)+1×1(1/√2,1](s)050100150012345678910Time,tclu=11.5Opinions,xi(t)φ0(s)=0.5×1[0,1/√2](s)+1×1(1/√2,1](s)N=500,R0=1,qmax=53.4Inter-ClusterDistance=0.1180102030405060708090100−4−3−2−101234q,qmax=53.4071ψ(q)φ0(s)=0.1×1[0,1/√2](s)+1×1(1/√2,1](s)050100150012345678910Time,tclu=9.51Opinions,xi(t)φ0(s)=0.1×1[0,1/√2](s)+1×1(1/√2,1](s)N=500,R0=1,qmax=53.4Inter-ClusterDistance=0.118 12 Josselin Garnier et al. Fig. 6 Simulation for φ0(s) = φ4 0(s). Simulations of (17) for t ≤ 1000. Fig. 7 Simulation for φ0(s) = φ5 (17). The vertical dashed line is at t = tclu. 0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of 9.4248, 16.3363, . . ., and the corresponding inter-cluster distances are 2.5, 0.6667, 0.3846, . . .. In this case, the only noticeable inter-cluster distance is 0.6667 and we do not observe the inter-cluster distance of 2.5, because ψ(2.5133) (cid:28) ψ(9.4248). For R0q ∈ K, 0 ≤ q ≤ 100, qmax = 53.4071 so that the necessary condition to have the consensus convergence qmax > 2π is satisfied and indeed we see form Figure 6 that we have consensus convergence in this case. In Figure 7, we choose φ0(s) so that ψ(s) has a unique local maximum and qmax = 5.0265. In this case, qmax < 2π and therefore there is no consensus conver- gence. The inter-distance is 1.25 and L/1.25 = 8 which is exactly the number of clusters in this case. Again, tclu predicts the time to cluster formation very well. Finally, Figure 8 considers φ0(s) so that ψ(s) has a unique local maximum, but with a larger exponent, qmax = 8.1681 > 2π. The inter-cluster distance corre- sponding to qmax = 8.1681 is 0.769, which is consistent with the actual inter-cluster distance. The quantity L/0.769 = 13 gives a good approximation for the actual number of clusters, which is 11. As in all the previous cases, tclu = 185 predicts 01002003004005006007008009001000012345678910Time,tclu=9.51Opinions,xi(t)φ0(s)=0.1×1[0,1/√2](s)+1×1(1/√2,1](s)N=500,R0=1,qmax=53.4Inter-ClusterDistance=0.118010203040506070809010000.050.10.150.20.250.30.35q,qmax=5.0265ψ(q)φ0(s)=(1−s)3×1[0,1](s)050100150200250300350400450500012345678910Time,tclu=93.3Opinions,xi(t)φ0(s)=(1−s)3×1[0,1](s)N=500,R0=1,qmax=5.03Inter-ClusterDistance=1.25 Consensus Convergence with Stochastic Effects 13 Fig. 8 Simulation for φ0(s) = φ6 (17). The vertical dashed line is at t = tclu. 0(s). Left: ψ(q) evaluated at R0q ∈ K. Right: Simulations of the time to cluster formation well. Here, qmax > 2π, so we could expect to ob- serve consensus convergence. However the inter-cluster distance 0.769 is such that φ(0.769) ∼ 10−4, so we cannot see cluster evolution for the time horizon of the simulation. 5 Stochastic consensus convergence: σ > 0 In this section, we consider the case that σ > 0 in (1). In other words, the system is stochastic and we are dealing with a nonlinear Fokker-Planck equation. 5.1 Linear stability analysis As in the deterministic case, we linearize the Fokker-Planck equation (5) with σ > 0 by assuming that ρ(t, x) = ρ0 + ρ1(t, x) = 1/L + ρ1(t, x). Substituting ρ(t, x) = ρ0 + ρ1(t, x) into (5) and assuming that ρ1 is a small perturbation of ρ so that the O(ρ2 1) term is negligible, we find that ρ1(t, x) satisfies: ∂ρ1 ∂t (t, x) = ρ0 In the Fourier domain: ∂ ρ1 ∂t (t, k) = (t, x − y)yφ(y)dy + σ2 2 −ikyyφ(y)dy − σ2k2 e 2 (cid:21) (cid:90) ∂ρ1 (cid:20) (cid:90) ∂x iρ0k ∂2ρ1 ∂x2 (t, x). (18) ρ1(t, k), (19) (cid:20) (cid:90) which gives the growth rates of the modes: γk = Re iρ0k −ikyyφ(y)dy − σ2k2 e 2 = ρ0k (cid:21) (cid:90) sin(ky)yφ(y)dy − σ2k2 2 . (20) 010203040506070809010000.020.040.060.080.10.120.140.160.18q,qmax=8.1681ψ(q)φ0(s)=(1−s)6×1[0,1](s)050010001500012345678910Time,tclu=185Opinions,xi(t)φ0(s)=(1−s)6×1[0,1](s)N=500,R0=1,qmax=8.17Inter-ClusterDistance=0.769 14 Josselin Garnier et al. (cid:90) 1 0 We can rewrite the growth rate γk = ρ0R0ψσ(kR0), where ψσ(q) = 2q φ0(s)s sin(qs)ds − σ2q2 2ρ0R3 0 . (21) The optimal positive frequency is kmax that is the element of K = {2πn/L, n ∈ N} that maximizes ψσ(kR0), that is close to qmax/R0, where qmax = arg max q>0 [ψσ(q)] . (22) There is a critical value σc of σ such that the system has a completely different overall behavior for σ < σc and for σ > σc. We can view σ as the magnitude of the noise energy or temperature of the system. There are two types of forces in the system (1): the attractive interaction −aij(xi − xj) and the random force σdW i(t). If σ < σc, then the attractive interaction dominates the random force and thus the system is a perturbation of the deterministic system. If σ > σc, then the random force dominates, the attractive interaction is negligible, and therefore the overall system behaves like a system of N independent random processes. The above observations can be articulated mathematically. Let (cid:20) 4ρ0R3 (cid:20) q 0 4ρ0R3 0 (cid:90) 1 (cid:90) 1 0 0 σ2 c = max q>0 = max q>0 (cid:21) (cid:21) φ0(s)s sin(qs)ds φ0(s)s2 sin(qs) ds qs (cid:90) 1 0 = 4ρ0R3 0 s2φ0(s)ds. If σ < σc, then from (21) we find that max q>0 ψσ(q) > 0, (23) and ρ(t, kmax) has positive growth rate γmax = ρ0R0ψσ(kmaxR0). The linear system (19) is unstable, which is analogous to the deterministic case. If σ > σc, then all of ρ(t, k) have negative growth rates. In other words, the constant density is linearly stable and therefore the overall system is stable, since this is what linear stability implies in this case. We note that the same technique for computing σc, with linear stability analysis for different noisy opinion models, is also used in [23][24][25]. 5.2 Fluctuation theory Since our goal is to analyze the behavior of clusters, we suppose from now on that σ < σc. The fluctuation analysis of the stochastic model is similar to that of the de- terministic case. If x1(0), . . . , xN (0) are independent, uniform random variables in [0, L], then ρN 1 (t = 0, dx) := √ N ρN (t = 0, dx) − ρ0(dx) (cid:16) (cid:17) √ N =  1 N N(cid:88) j=1  δxj (0)(dx) − dx L Consensus Convergence with Stochastic Effects 15 converges in distribution as N → ∞ to the measure ρ1(t = 0, dx), whose frequency components  1 N N(cid:88) j=1 √ N  −ikxj (0) e ρ1(t = 0, k) = lim N→∞ are independent complex circular Gaussian random variables, with mean zero and variance 1 for k ∈ K\{0}: E [ρ1(t = 0, k)] = 0, E(cid:104) ρ1(t = 0, k)ρ1(t = 0, k(cid:48)) = δkk(cid:48) , (cid:48) ∈ K\{0}, k, k ρ1(t = 0,−k) = ρ1(t = 0, k), while ρ1(t = 0, k = 0) = 0. For any T < ∞, the measure-valued process (cid:105) (cid:17) ρN 1 (t, dx) := (24) converges in distribution as N → ∞ to a measure-valued process ρ1(t, dx) whose density ρ1(t, x) satisfies a stochastic PDE (see [7]): N , ρN (t, dx) − ρ0(dx) t ∈ [0, T ] dρ1(t, x) = ρ0 (t, x − y)yφ(y)dy + σ2 2 ∂2ρ1 ∂x2 (t, x) dt + σdW (t, x) (25) (cid:20) (cid:90) ∂ρ1 ∂x (cid:21) with the random initial condition described above. Here W (t, x) is a space-time Gaussian random noise with mean zero and covariance (cid:33) (cid:90) L 0 min{s, t} L (cid:48) 1(x)f(cid:48) 2(x)dx f (cid:32)(cid:90) L 0 (cid:16) √ (cid:90) L 0 Cov W (s, x)f1(x)dx, W (t, x)f2(x)dx = (cid:82) L (26) for any test functions f1(x) and f2(x). The Fourier transform of W (t, x) is W (t, k) = 0 W (t, x)e−ikxdx for k ∈ K. From (26), we see that { W (t, k), k ∈ K, k ≥ 0} are independent, complex-valued Brownian motions with the variance: (cid:16) W (t, k), W (t, k) (cid:17) Cov (cid:90) L 0 = t L (−ik)e −ikx(−ik)e−ikxdx = tk2, (27) ρ1(t, k) = (cid:82) L and W (t,−k) = W (t, k). Taking the Fourier transform on (25), for each k ∈ K, 0 ρ1(t, x)e−ikxdx is a complex-valued Ornstein-Uhlenbeck (OU) pro- (cid:34) (cid:35) cess: dρ1(t, k) = iρ0k −ikyyφ(y)dy − σ2k2 e 2 ρ1(t, k)dt + d(W (k)(t) + i W (k)(t)). σk√ 2 (cid:90) L 0 (28) Here {W (k)(t), k ∈ K, k > 0} and { W (k)(t), k ∈ K, k > 0} are independent real Brownian motions, W (0)(t) = W (0)(t) = 0, W (−k)(t) = −W (k)(t), and W (−k)(t) = W (k)(t). The equation (28) is solvable and we have, for any k ∈ K\{0}, ρ1(t, k) = eαkt ρ1(0, k) + eαk(t−s)d(W (k)(s) + i W (k)(s)), (29) (cid:90) t 0 σk√ 2 (cid:90) L 0 αk = iρ0k −ikyyφ(y)dy − σ2k2 2 e . 16 Josselin Garnier et al. (cid:90) t 0 (cid:20) (cid:21) E(cid:104) (cid:105) In particular, ρ1(t, k = 0) = 0. Because {ρ1(0, k), W (k)(t), W (k)(t), k ∈ K, k > 0} are independent, {ρ1(t, k), k ∈ K, k > 0} are independent OU processes with mean zero and variance ρ1(t, k)ρ1(t, k) = e2γkt + σ2k2 e2γk(t−s)ds = e2γkt 1 + σ2k2 2γk , (30) for k ∈ K, k > 0, where γk is the real part of αk. In addition, because α−k = αk and W (−k)(t) = −W (k)(t), we have ρ1(t,−k) = ρ1(t, k) for k ∈ K\{0}. Finally, ρ1(t, 0) = 0. Therefore, (cid:34)(cid:88) )(cid:3) = E (cid:48) E(cid:2)ρ1(t, x)ρ1(t, x (cid:34) (cid:88) E = ρ1(t, k) k ρ1(t, k) ρ1(t, k) (cid:88) (cid:35) k = eikx L e−ikx(cid:48) L (cid:88) k(cid:54)=0 1 L2 k eikx L ρ1(t,−k) (cid:35) eikx(cid:48) L e2γkteik(x−x(cid:48) ) (cid:20) 1 + (cid:21) . σ2k2 2γk As t increases, the spectrum of ρ1(t, x) becomes concentrated around the opti- mal wavenumber kmax. In addition, we note that k2/γk is bounded and the term σ2k2/γk is negligible if σ is sufficiently small. We can assume σ is small because we need σ < σc for cluster formation. If σ2k2/γk is negligible and L2 (cid:29) 4γ(cid:48)(cid:48) maxt, we max(k− kmax)2 for k around kmax, and use a continuum can expand γk = γmax + 1 approximation for the discrete sum as we do in the deterministic case: 2 γ(cid:48)(cid:48) (cid:18) 1 L (cid:48) E(cid:2)ρ1(t, x)ρ1(t, x )(cid:3) (cid:39) E(cid:2)ρ1(t, x)ρ1(t, x (cid:48) e2γmaxt cos(kmax(x − x )) L2 e2γmaxt cos(cid:0)kmax(x − x )(cid:3) (cid:39) 2 (cid:48) (cid:48) (cid:19)(cid:32) 1(cid:112)πγ(cid:48)(cid:48) )(cid:1)(cid:20) 1 + (cid:33) − (x−x(cid:48) )2 maxt e 4γ(cid:48)(cid:48) . maxt (cid:21) . σ2k2 max 2γmax If L2 (cid:28) 4γ(cid:48)(cid:48) maxt, then the continuum approximation is not valid and in this case √ Because σ < σc we have that γmax > 0 and then the linear system (25) is unstable and therefore the central limit theorem breaks down when ρ1(t, x)/ N is no longer smaller than ρ0 = 1/L. More precisely, the time tclu for the onset of clustering is when E(cid:2)ρ1(tclu, x)2(cid:3) (cid:39) N L−2, which is approximately tclu (cid:39) 1 2γmax ln N (cid:39) 1 2ρ0R0ψσ(qmax) ln N when N (cid:29) 1. 5.3 Consensus convergence We assume σ < σc so that there are unstable modes for the linearized evolution, which means that there is clustering. The number of and the distance between clusters can be estimated with qmax. We find that the first term of the right side of (21) is bounded while the second term of (21) is quadratic with negative leading coefficient. Therefore, increasing σ tends to reduce qmax, that is to say, to increase the mean distance between clusters. Consensus Convergence with Stochastic Effects 17 Let us consider the case that qmax < 2π. From the analysis of the deterministic case, the system initially has no consensus convergence and there are several clus- ters. After clustering, the clusters do not interact with each other, but their centers move like independent Brownian motions. When two clusters come close to each other, within a distance R0, they interact and merge. Therefore, we will eventually have consensus convergence, because two Brownian motions always collide in R. This can be extended to the multi-dimensional case, but then the conclusion can be different: in high dimension two Brownian motions may not collide. However, with periodic boundary conditions, two Brownian motions will always come close to each other, within a distance R0. When qmax < 2π and σ is small then there are several clusters, after the cluster formation time. The fraction of agents in a cluster is the agent density times the inter-distance of the clusters: mc = ρ0 2πR0 qmax = ρ0 2π kmax . Then the j-th cluster consists of about N mc agents. We assume that σ is small enough so that σ2kmax (cid:28) 2πρ0φ0(0)R2 0. By using the fact that the agents in a cluster stay close to each other, we can replace φ(xi − xj) by φ(0), and the agents in the j-th cluster have the approximate dynamics: dx(j) N mc(cid:88) i = − φ0(0) (cid:80)N mc l=1 N i=1 x(j) i i − x(j) (x(j) l )dt + σdW (j,i)(t). σ√ N mc (cid:80)N mc (cid:19) dx, The center X (j)(t) = 1 N mc (t) satisfies: X (j)(t) = X (j)(0) + W (j)(t), (31) where {W (j)(t)} are independent standard Brownian motions. When N is large, the empirical density 1 N mc i=1 δ (dx) is approximately x(j) i a Gaussian density ρ(j)(t, dx) = 1(cid:112)π(σ(j))2 exp − (x − X (j)(t))2 (σ(j))2 σ(cid:112)mcφ0(0) σ(j) = . (32) (cid:18) For this argument to be valid, we must have that σ(j), the width of ρ(j), is much smaller than R0, which is equivalent to our assumption σ2kmax (cid:28) 2πρ0φ0(0)R2 0. This cluster dynamics is valid as long as the centers {X (j)(t)} stay away from each other by a distance larger than R0. The clusters move, according to indepen- dent Brownian motions with quadratic variation σ2t . When two clusters come N mc close to each other within a distance R0, they merge. Indeed, once the two centers are within distance R0, they obey the following differential equations to leading order in N : dX (k)(t) dt dX (l)(t) dt = −mc(X (k)(t) − X (l)(t))φ(X (k)(t) − X (l)(t)), = −mc(X (l)(t) − X (k)(t))φ(X (k)(t) − X (l)(t)), 18 Josselin Garnier et al. which shows that the inter-cluster distance converges exponentially fast to zero and the center converges to the average of the centers just before collision. The number of agents or mass of the new cluster is the sum of the masses of the two clusters, the inverse square width of its empirical density is the sum of the inverse squares of the two widths, its center is at the weighted average (weighted by the masses) of the two centers just before collision and it moves as a Brownian motion whose diffusion constant is defined in terms of its new mass. Then the cluster centers move according to Brownian motions until two of them get within the distance R0 from each other and a new merge event occurs. This eventually forms a Markovian dynamics described in the next section. 5.4 Markovian dynamics of the clusters After the initial clusters are formed, we can use an iterative argument to mathe- matically describe how all the opinions converge eventually. In the initial configu- ration, at time τ0, there are M (τ0) = Lkmax/2π clusters with centers X (j)(τ0) = j2π/kmax (up to a global shift), widths σ(j)(τ0) = σ/(cid:112)mcφ0(0), and masses m(j)(τ0) = mc for j = 1, . . . , M (τ0). For t ≥ τn−1, there are M (τn−1) clusters moving as X (j)(t) = X (j)(τn−1) + σ(j)(τn−1) W (j)(t) − W (j)(τn−1) until the stopping time (cid:110) τn = inf t > τn−1 : X (k)(t) − X (l)(t) = R0, for some k (cid:54)= l (cid:112)φ0(0)√ N (cid:16) (cid:17) (cid:111) . Then the two colliding clusters (with indices k and l) merge with the new center X(τ + n ) = m(k)(τn−1)X (k)(τ− n ) + m(l)(τn−1)X (l)(τ− n ) m(k)(τn−1) + m(l)(τn−1) , the new mass and the new width m(τn) = m(k)(τn−1) + m(l)(τn−1) σ(cid:112) m(τn)φ0(0) σ(τn) = The clusters are relabeled to take into account this merging so that there are M (τn) = M (τn−1)−1 clusters. The above process is repeated until n = (Lkmax/2π)− 1, when we have only one cluster, and hence consensus convergence. Note that the time scale at which collisions and merges occur is of the order √ of N , as the Brownian motions are scaled by 1/ N . Consensus Convergence with Stochastic Effects 19 Fig. 9 Simulations for σ = 0.1. Left: ψσ(q) evaluated at R0q ∈ K. Right: Simulations of (33). The vertical dashed line is at t = tclu. 5.5 Numerical simulations We use the explicit Euler scheme to simulate the stochastic opinion dynamics (1) when σ > 0: xn+1 i = xn i − 1 N φ(xn i − xn j )(xn i − xn j )∆t + σ∆W n+1 i , φ(s) = φ0(s/R0), (33) where {W n+1 variance ∆t. i } are independent Gaussian random variables with mean zero and Our analysis is on the torus [0, L], but we simulate (33) on [0, L] with reflecting boundary conditions. As we will see, the simulation results agree with the analysis under periodic assumption. Because here we focus on the effects of the randomness, for simplicity we will work only on the case that φ0(s) = 1[0,1](s). We compute the key quantity qmax by exploring all possible q in [0, 100]: N(cid:88) j=1 qmax = arg max R0q∈K,0<q≤100 2q φ0(s)s sin(qs)ds − σ2q2 2ρ0R3 0 (cid:20) (cid:90) 1 0 (cid:21) . We see form the plots of ψσ(s) that the randomness reduces the possibility of the non-uniqueness of qmax because it adds a negative quadratic term in ψσ(s). With randomness, all of our test cases have a clear, unique qmax. The parameters we use for the simulation are ∆t = 0.1, L = 10, R0 = 1 and N = 500. For each σ, we also plot the function ψσ(s) in (21); the stars in the plots are the values of ψ(s) evaluated at R0q ∈ K and the lines are the continuum approximation. We first to test for the effect of σc, the critical value for σ, which makes the 0 s2φ0(s)ds = 0.365 and we system stable or unstable. In our setting, σc = 4ρ0R3 0 simulate (33) for σ = 0.1, 0.2, 0.365, 0.5 that are values below, equal to and above σc, respectively. From Figure 9, we see that ψσ(q) decreases quadratically and has the unique maximum at q = 2.5133. However, maxR0q∈K ψσ(q) is still positive so the linearized (cid:82) 1 051015202530−45−40−35−30−25−20−15−10−505q,qmax=2.5133ψσ(q)φ0(s)=1[0,1](s),σ=0.1050100150012345678910Time,tclu=17.6Opinions,xi(t)φ0(s)=1[0,1](s),σc=0.36515,σ=0.1N=500,R0=1,qmax=2.51Inter-ClusterDistance=2.5 20 Josselin Garnier et al. Fig. 10 Simulations for σ = 0.2. Left: ψσ(q) evaluated at R0q ∈ K. Right: Simulations of (33). Fig. 11 Simulations for σ = σc. Left: ψσ(q) evaluated at R0q ∈ K. Right: Simulations of (33). system (19) is still unstable. Therefore, the overall system behavior is similar to the deterministic case and can be viewed as a perturbed non-random opinion dynamics. We increase σ by setting σ = 0.2 and the result is in Figure 10. We see that as σ increases, the random noise starts to affect the overall system, and the width and the inter-cluster distances become larger so we observe fewer clusters. Since maxR0q∈K ψσ(q) is positive, we still observe cluster formation. We note that in Figure 11 and 12, if σ ≥ σc, ψσ(q) < 0 for all q > 0 and ψσ(0) = 0. In other words, the linearized system is stable and thus the full system is stable. In this case, we do not see cluster formation and the system behaves like an N -independent agent system. We see from the simulations that to model opinion dynamic with consensus convergence it is appropriate to assume that σ < σc. Therefore we will assume that σ = 0.1 in our simulations of the stochastic system. We revisit Figure 9 to check our analysis. First of all, qmax = 2.5133 is clearly a unique maximizer and the corresponding inter-cluster distance is 2.51, which 051015202530−180−160−140−120−100−80−60−40−20020q,qmax=1.885ψσ(q)φ0(s)=1[0,1](s),σ=0.2050100150012345678910Time,tclu=33.9Opinions,xi(t)φ0(s)=1[0,1](s),σc=0.36515,σ=0.2N=500,R0=1,qmax=1.88Inter-ClusterDistance=3.33051015202530−600−500−400−300−200−1000q,qmax=0ψσ(q)φ0(s)=1[0,1](s),σ=0.365050100150012345678910TimeOpinions,xi(t)φ0(s)=1[0,1](s),σc=0.36515,σ=0.36515N=500,R0=1,qmax=0 Consensus Convergence with Stochastic Effects 21 Fig. 12 Simulations for σ = 0.5. Left: ψσ(q) evaluated at R0q ∈ K. Right: Simulations of (33). agrees with the numerical inter-cluster distance we see in Figure 9. In addition, L/2.51 = 3.9841 also predicts well the actual number of the clusters, 4. Finally, the blue dashed line t = tclu indicates the time to the cluster formation, even though Figure 9 is just one realization. We test tclu and the width of clusters in a more statistical way by examining 1000 realizations. If φ0(s) = 1[0,1](s) and σ = 0.1, then we can expect that we will have 4 clusters at T = 150 in most of the realizations. For each realization, we numerically compute the widths of the clusters, σ(j)(t), j = 1, . . . , 4 by using the empirical standard deviations of {x(j) (t)}4 j=1 (see (32)): i (σ(j)(t))2 = 2 N (j) − 1 (t) − ¯x(j)(t) x(j) i , ¯x(j)(t) = 1 N (j) where for each j = 1, . . . , 4, {x(j) (t)} belong to the j-th cluster and N (j) is the number of agents in the j-th clusters. Of course, σ(j)(t) in (34) is just one realization and so we compute σ(j)(t) for 1000 realizations and consider the average. i The averages σ(j)(t) are shown in the left part of Figure 13, in different colors. First, we can see that tclu, as expected, is the halfway from the time to maximum with to the time to the minimum width. Second, from (32), the width of each 0.25 × 1 = 0.2, which agrees cluster is analytically σ(j) = σ/(cid:112)mcφ0(0) = 0.1/ √ with the numerical values σ(j)(t) when t is large. We also analyze the behavior of the centers of the clusters. The centers {X (j)(t)}4 √ of the clusters in Figure 9 are plotted in Figure 14. From the previous analysis (31), the centers of the clusters are independent Brownian motions σW (j)(t)/ N mc. For one realization, the opinions {xi(t)}N i=1 will not be evenly distributed in the clus- ters. For example, the actual numbers {N (j)}N j=1 of agents of the clusters in Figure √ 9 are plotted in Figure 13. So for one realization, X (j)(t) is a Brownian motion √ σW (j)(t)/ N (j). On the right part of Figure 14, we compare the quadratic varia- N (j) for 75 ≤ t ≤ 150 (after the time to the cluster tions of X (j)(t) and σW (j)(t)/ formation.) Indeed, from the figure, we can see that their quadratic variations are very similar and that means X (j)(t) are very close to Brownian motions. j=1 N (j)(cid:88) (cid:16) i=1 (cid:17)2 N (j)(cid:88) i=1 x(j) i (t) (34) 051015202530−1200−1000−800−600−400−2000q,qmax=0ψσ(q)φ0(s)=1[0,1](s),σ=0.5050100150012345678910TimeOpinions,xi(t)φ0(s)=1[0,1](s),σc=0.36515,σ=0.5N=500,R0=1,qmax=0 22 Josselin Garnier et al. Fig. 13 Left: Average of 1000 realizations of σ(j)(t), j = 1, . . . , 4 for σ = 0.1. The vertical dashed line is at t = tclu. Right: N (j), the number of agents in the j-th clusters in Figure 9. Fig. 14 Left: Centers of the clusters, X (j)(t), in Figure 9, in different colors. Right: Quadratic variations of the cluster centers from t = 75 to t = 150. Solid lines: Numerical quadratic varia- tions of X (j)(t). Dashed lines: Quadratic variations of σW (j)(t)/ are independent standard Brownian motions and {N (j)}4 clusters. j=1 j=1 are the numbers of agents in the √ N (j), where {W (j)(t)}4 6 Long time behavior of simulations We have also simulated numerically the long time behavior of the system defined on the full real line R, especially the behavior after the onset of consensus convergence. √ As we discuss in the previous section, when there is randomness the center of the unique cluster behaves like a diffusion process σW (t)/ N , where W (t) is a standard Brownian motion. In Figure 15 and 16, we observe that the centers indeed behave like Brownian motions. The dashed lines are the parabolas with equation 05010015000.20.40.60.811.21.4Time,tclu=17.5559Averageσ(j)(t)φ0(s)=1[0,1](s),σ=0.11234050100150ClustersMassofClustersφ0(s)=1[0,1](s),σ=0.1N=500,R0=1050100150012345678910TimeCentersofClustersφ0(s)=1[0,1](s),σ=0.1N=500,R0=1708090100110120130140150012345678x 10−3TimeQuadraticVariationsφ0(s)=1[0,1](s),σ=0.1N=500,R0=1 Numerical QVAnalytical QV Consensus Convergence with Stochastic Effects 23 dashed curve is the equation x = ±2σ(cid:112)t/N . σ is small and the overall behavior is like a single Fig. 15 Long time behavior of the opinions for σ = 0.1 and for N = 100, 200. The blue Brownian motion. Brownian motion. Fig. 16 Long time behavior of the opinions for σ = 0.2 and for N = 100, 200. The blue dashed curve is the equation x = ±2σ(cid:112)t/N . σ is small and the overall behavior is like a single x = ±2σ(cid:112)t/N so that for any fixed t, the centers are within the parabolas with 95% probability. However, when σ is sufficiently large, the long time behavior is different. On the right part of Figure 17, when σ = 0.4 > σc, the system behaves like N -independent diffusions. A more interesting case is when σ = 0.3 < σc on the left part of Figure 17. In this case, for 0 ≤ t ≤ 5.5 × 105 there is still consensus convergence, but for t > 5.5 × 105, all xi(t) spread out from the unique cluster and the system becomes an independent agent evolution. A detailed mathematical analysis using large deviations theory for such a phenomenon is being considered at present. 012345678910x 105−20−15−10−505101520TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.1N=100,R0=1012345678910x 105−15−10−5051015TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.1N=200,R0=1012345678910x 105−40−30−20−10010203040TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.2N=100,R0=1012345678910x 105−30−20−100102030TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.2N=200,R0=1 24 Josselin Garnier et al. Fig. 17 Long time behavior of the opinions for σ = 0.3, 0.4 and for N = 100. The blue dashed curve is the equation x = ±2σ t. For σ = 0.3, there is a single cluster for t ≤ 5.5 × 105. However, for t > 5.5 × 105, xi(t) disintegrate and the system behaves like an N -independent Brownian motions. For σ = 0.4, the random perturbations are large enough so that the system is an N -independent Brownian motions at the beginning. √ 7 Conclusion We have analyzed a stochastic, continuous time opinion dynamics model and we have carried out extensive numerical simulations. We use the mean-field theory and obtain a nonlinear Fokker-Planck equation as the number of opinions tends to infinity. Then we use a linear stability analysis to estimate the critical value of the noise strength so as to have cluster formation, estimate the number of clusters and the time to cluster formation. These quantities are closely related to the frequency that maximizes the growth rate of the linearized modes (20). After the initial cluster formation we expect, and numerically confirm, that the centers of the clusters behave like Brownian motions before further consolidation. Finally, the long time behavior of the system is explored numerically and we observe that after a unique cluster is formed, there is a small probability that the opinions will spread out from the unique cluster and the system will become an independent agent evolution. References 1. F. Baccelli, A. Chatterjee, and S. Vishwanath. Stochastic bounded confidence opinion In Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on, dynamics. pages 3408 -- 3413, December 2014. 2. V.D. Blondel, J.M. Hendrickx, A. Olshevsky, and J.N. Tsitsiklis. Convergence in mul- tiagent coordination, consensus, and flocking. In Decision and Control, 2005 and 2005 European Control Conference. CDC-ECC '05. 44th IEEE Conference on, pages 2996 -- 3000, December 2005. 3. V.D. Blondel, J.M. Hendrickx, and J.N. Tsitsiklis. On the 2R conjecture for multi-agent systems. In Control Conference (ECC), 2007 European, pages 874 -- 881, July 2007. 4. C. Canuto, F. Fagnani, and P. Tilli. An Eulerian approach to the analysis of krause's consensus models. SIAM Journal on Control and Optimization, 50(1):243 -- 265, 2012. 012345678910x 105−600−400−2000200400600TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.3N=100,R0=1012345678910x 105−1500−1000−500050010001500TimeOpinions,xi(t)φ0(s)=1[0,1](s),σ=0.4N=100,R0=1 Consensus Convergence with Stochastic Effects 25 5. A. Carro, R. Toral, and M. San Miguel. The Role of Noise and Initial Conditions in the Asymptotic Solution of a Bounded Confidence, Continuous-Opinion Model. Journal of Statistical Physics, 151(1-2):131 -- 149, 2013. 6. G. Como and F. Fagnani. Scaling limits for continuous opinion dynamics systems. Ann. Appl. Probab., 21(4):1537 -- 1567, August 2011. 7. D. A. Dawson. Critical dynamics and fluctuations for a mean-field model of cooperative behavior. J. Statist. Phys., 31(1):29 -- 85, 1983. 8. G. Deffuant, D. Neau, F. Amblard, and G. Weisbuch. Mixing beliefs among interacting agents. Advances in Complex Systems, 03(01n04):87 -- 98, 2000. 9. B. During, P. Markowich, J.-F Pietschmann, and M.-T. Wolfram. Boltzmann and Fokker -- Planck equations modelling opinion formation in the presence of strong leaders. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 465(2112):3687 -- 3708, 2009. 10. J. Gartner. On the McKean-Vlasov limit for interacting diffusions. Math. Nachr., 137:197 -- 248, 1988. 11. J. G´omez-Serrano, C. Graham, and J.-Y. Le Boudec. The bounded confidence model of opinion dynamics. Mathematical Models and Methods in Applied Sciences, 22(02):1150007, 2012. 12. S.-Y Ha and E. Tadmor. From particle to kinetic and hydrodynamic descriptions of flocking. Kinetic and Related Methods, pages 415 -- 435, 2008. 13. R. Hegselmann and U. Krause. Opinion dynamics and bounded confidence models, anal- ysis, and simulation. Journal of Artificial Societies and Social Simulation, 5(3), 2002. 14. R. Hegselmann and U. Krause. Opinion dynamics under the influence of radical groups, charismatic leaders, and other constant signals: A simple unifying model. Networks and Heterogeneous Media, 10(3):477 -- 509, 2015. 15. M. Huang and J.H. Manton. Opinion dynamics with noisy information. In Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, pages 3445 -- 3450, December 2013. 16. P.-E. Jabin and S. Motsch. Clustering and asymptotic behavior in opinion formation. Journal of Differential Equations, 257(11):4165 -- 4187, 2014. 17. T. G. Kurtz and J. Xiong. Particle representations for a class of nonlinear SPDEs. Stochas- tic Processes and their Applications, 83(1):103 -- 126, 1999. 18. N. Lanchier and J. Neufer. Stochastic dynamics on hypergraphs and the spatial majority rule model. Journal of Statistical Physics, 151(1-2):21 -- 45, 2013. 19. J. Lorenz. Continuous opinion dynamics under bounded confidence: a survey. International Journal of Modern Physics C, 18(12):1819 -- 1838, 2007. 20. M. Mas, A. Flache, and D. Helbing. Individualization as driving force of clustering phe- nomena in humans. PLoS Comput Biol, 6(10):e1000959, 10 2010. 21. A. Mirtabatabaei, P. Jia, and F. Bullo. Eulerian Opinion Dynamics with Bounded Confi- dence and Exogenous Inputs. SIAM Journal on Applied Dynamical Systems, 13(1):425 -- 446, 2014. 22. S. Motsch and E. Tadmor. Heterophilious dynamics enhances consensus. SIAM Review, 56(4):577 -- 621, 2014. 23. M. Pineda, R. Toral, and E. Hernandez-Garcia. Noisy continuous-opinion dynamics. Jour- nal of Statistical Mechanics: Theory and Experiment, 2009(08):P08001, 2009. 24. M. Pineda, R. Toral, and E. Hernandez-Garcia. Diffusing opinions in bounded confidence processes. The European Physical Journal D, 62(1):109 -- 117, 2011. 25. M. Pineda, R. Toral, and E. Hernandez-Garcia. The noisy Hegselmann-Krause model for opinion dynamics. The European Physical Journal B, 86(12), 2013. 26. Y. Yang, D.V. Dimarogonas, and X. Hu. Opinion consensus of modified hegselmann-krause models. In Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, pages 100 -- 105, December 2012.
1801.07783
2
1801
2018-10-14T16:49:14
A General Definition of Network Communities and the Corresponding Detection Algorithm
[ "cs.SI", "physics.soc-ph" ]
Network structures, consisting of nodes and edges, have applications in almost all subjects. A set of nodes is called a community if the nodes have strong interrelations. Industries (including cell phone carriers and online social media companies) need community structures to allocate network resources and provide proper and accurate services. However, all the current detection algorithms are motivated by the practical problems, whose applicabilities in other fields are open to question. Thence, for a new community problem, researchers need to derive algorithms ad hoc, which is arduous and even unnecessary. In this paper, we represent a general procedure to find community structures in practice. We mainly focus on two typical types of networks: transmission networks and similarity networks. We reduce them to a unified graph model, based on which we propose a general method to define and detect communities. Readers can specialize our general algorithm to accommodate their problems. In the end, we also give a demonstration to show how the algorithm works.
cs.SI
cs
A General Definition of Network Communities and the Corresponding Detection Algorithm Haoye Lu, Member, IEEE, Amiya Nayak, Senior Member, IEEE 1 8 1 0 2 t c O 4 1 ] I S . s c [ 2 v 3 8 7 7 0 . 1 0 8 1 : v i X r a Abstract -- Network structures, consisting of nodes and edges, have applications in almost all subjects. A set of nodes is called a community if the nodes have strong interrelations. Industries (including cell phone carriers and online social media companies) need community structures to allocate network resources and provide proper and accurate services. However, all the current detection algorithms are motivated by the practical problems, whose applicabilities in other fields are open to question. Thence, for a new community problem, researchers need to derive algorithms ad hoc, which is arduous and even unnecessary. In this paper, we represent a general procedure to find community structures in practice. We mainly focus on two typical types of networks: transmission networks and similarity networks. We reduce them to a unified graph model, based on which we propose a general method to define and detect communities. Readers can specialize our general algorithm to accommodate their problems. In the end, we also give a demonstration to show how the algorithm works. Index Terms -- Social network, Network modelling, General community definition, Community detection, Network clustering I. INTRODUCTION Our real world consists of elements associated by relations. We call the entity network made by elements with the relations among them. Most real world networks are not random as they reveal big inhomogeneity, high level of order and organization [1]. For example, people working in a company may have much closer relations than the ones outside the company. The observation inspires people to partition the elements into groups (communities) such that the relations are strong and dense within the groups but sparse and weak among them [2 -- 4]. Community detections have widespread applications. Ama- zon groups customers buying similar products together for better commodities recommendations. Facebook clusters the users by relationships, hobbies, etc. to accurately suggest users with new friends and circles. Carriers group the locations among which customers have high transportation demands for a proper assignment of vehicles. Because of the omnipresent community structures in prac- tice, researchers try to find proper algorithms to detect them. There are mainly four traditional methods [1]: graph parti- tioning [5], hierarchical clustering [6], partitional clustering [7, 8] and spectral clustering [9 -- 12]. These methods are designed for different purposes and reveal many fundamental properties of networks. After that, many related algorithms Haoye Lu and Amiya Nayak are with School of Electrical Engineering and Computer Science, University of Ottawa, Ontario, K1N 6N5 Canada e-mail: ([email protected]; [email protected]). are proposed (for instances, modularity-based methods [13 -- 15], dynamic algorithms [16], methods based on statistical inference [17, 18], maximum likelihood [19, 20] and network motifs [21 -- 23]). Recent research shows that modularity opti- mization and maximum likelihood algorithms are equivalent [24]. Most algorithms work well in the areas from which they are derived. But the reliabilities outside their zones are con- troversial. The poor adaptabilities of the algorithms reveal the demand for general community detection methods as well as the general community definitions. Besides, most algorithms start from graphs directly, while the procedure of the math model abstraction is rarely formalized. In this paper, we try to tackle these problems. In particular, 1) Is there a general way to abstract a concrete problem into a unified math model? 2) Based on the unified math model, are there some com- mon properties shared by most community definitions? 3) Is there a common method to detect community struc- tures? The rest of the paper is organized as follows. In Section II, we have a review on the popular community detection algorithms. And we also discuss their pros and cons. In Section III, we introduce how to reduce a concrete problem into a graph model. Based on this, we define the community structure in Section IV. In Section V, we propose and prove some propositions regarding our community definition. Then we provide a corresponding detection algorithm. A demonstration is given in Section VI and finally, we talk about the limitations of our model as well as the future work in Section VIII. II. RELATED WORK The research of community detection starts from solving some concrete problems. For instance, Kernighan-Lin algo- rithm [5] is designed for clustering digital components into equal or nearly equal size communities such that mutual connections among the sets are minimized (due to the cost and stability consideration, electronic engineers need to minimize the number of connections among boards). The researches always reduce the real-world network struc- tures to the nodes connected by edges, where the edges rep- resent the relations among the nodes. Although the meanings of relations vary in different papers, there are two main types: two nodes is related if 1) there are material transmission between them, AND/OR 2) they share some identical or similar properties. The material means concrete objects (like goods) or infor- mation (like data packages). One of the most typical examples is the transportation among cities. The cities easily communi- cating with each other are grouped into one community [25]. There are also many network structures constructed by the similarity of the properties of the nodes. In protein-protein interaction networks, biologists would cluster proteins with equivalent or similar functions into one group [26]. Then, the relations are the function similarities of the proteins. In social networks, the people active in the similar locations and/or the time slots could be considered as a community. Then the relations represent the location and schedule similarity. In World Wide Web, the communities may correspond to the groups of pages concerned with the related topics or events [27, 28]. Then the relations become the content similarity. Based on the graph model, lots of community detection algorithms have been proposed. Graph partitioning method groups the vertices into a pre- defined number of communities and minimize the number of edges among the groups. Most of the algorithms belonging to this method can perfectly solve particular problems in prac- tice. However, the algorithms are not adapted to community detections due to the necessity of the pre-specified number of groups, which is in general unknown in community detection problems [1]. More seriously, the graph partitioning method is not derived from an explicit definition of communities. So there is no guarantee that the vertex groups found by the method are communities following our intuitions. Real-world networks commonly have hierarchical struc- tures from which the abstracted graph models usually inherit. The corresponding detection algorithms fall into two types: agglomerative (bottom-up) approach and divisive (top-down) approach [6]. Briefly, agglomerative approach starts from con- sidering each node as a community and merges the community pairs as moving up the hierarchy. The divisible algorithm works in the opposite way. It starts by grouping all the nodes in one cluster and performs splitting recursively as moving down the hierarchy. Partitional clustering also plays an important role in the graph clustering family. In order to apply the algorithm, the user must specify the number of clusters, which causes the same disadvantages as the ones belonging to graph partitioning [1]. The method puts all nodes in a metric space, and thus the distance between each pair of the nodes in the space is defined. The distance used in the algorithm can be considered as a measure of dissimilarity between the nodes. The algorithm needs to cluster the nodes into a pre-specified number of groups which minimize a given cost function. All community detection methods and techniques related to matrix eigenvectors belong to spectral clustering. The clustering method requires a distance function to measure the similarity among the objects. The fundamental idea behind the algorithm is to utilize the eigenvectors to cluster objects by connectedness rather than the distance. Although there are many successful applications in image segmentation and machine learning, researchers have already found several fun- damental limitations. For instance, spectral clustering would fail if it uses the first k eigenvectors to find k clusters when 2 confronting with clusters of various scales regarding a multi- scale landscape potential [29]. Besides, the algorithm needs the assistance of partitional clustering, whose drawbacks are also inherited to spectral clustering. Most of the aforementioned algorithms have remarkable performances in the problems they derived from. And their complexities are optimized for the dynamic network commu- nity detection [16, 30, 31]. However, researchers hardly focus on the general definition of communities and the correspond- ing general community detection algorithms. A few prelim- inary works have been done. In particular, the comparisons have been made among the different community definitions as well as the corresponding detection algorithms [32]. Besides, some researcher believes that the definition often depends on the specific system at hand and/or application one has in mind [1]. III. CONCRETE PROBLEM REDUCTION Most people believe that, a community is some set of objects where the interrelations are strong. However, there are lots of arguments on the definitions of relations as well as the ways to measure them. Generally, we derive the relations in two ways. One is based on the materials transmission. The materials here can represent both material substance (like goods) or just information (like data). Intuitively, the objects that can easily communicate with each other should have strong relations among them. Then those objects can somehow be considered as a community. The other one is based on the similarity (for example, people buy the similar kind of books might be considered as a community). In usual cases, we believe that the objects in the same community should share some other similar properties. Then we can make some reasonable predictions on the community level (for example, Amazon uses this trick to recommend commodities). Although two community derivations come from different motivations, we show that they can be reduced to the same graph model. A. Transmission network 1) Transmission relation characteristics: In order to make the problem easier to discuss, only one material will be considered. Moreover, we need the following definitions and assumptions. Assumption 1. For any material, there is a minimal unit can be transferred. And we call the minimal unit a point. Definition 1 (Node). The objects that receives and sends points is nodes. Definition 2 (Medium). The object that propagates points is medium. Assumption 2. The transmission relations are constructed in nodes, media and points, which also determine the properties of the relations. Because of Assumption 2, the entity under the consider- ation consists of nodes, points and media. And we name it transmission network. Two most important characteristics in a transmission net- work are the number of points transferred and the time consumed in a transmission process. Their ratio is termed speed. Definition 3 (Speed). Speed is the number of points trans- ferred in a unit time interval. The transmission capability can be described by the speed function of time. For simplicity, only the node pairs connected by media directly are considered. By Assumption 2, the behaviour of the speed function f depends on the properties of the nodes, media and points. This means a specific analytic expression of the speed function cannot be given unless all the properties have been designated. However, some common characteristics can be expected. Suppose there is a pair of nodes (u, v) connected by media directly. Then (see Figure 1) the value of the speed function f(u,v)(t) remains zero until some point because of the latency caused by the sending, propagation and reception of the points. Fig. 1: A typical speed function function of time associated to node pair (u, v). that We call the moment the function value becomes nonzero the shortest transmission time (STT) (theoretically, ST T = sending time + transmission time + receiving time.). Besides, there is always an upper bound of the point propa- gation speed. And we call the least upper bound theoretically transmission speed (TTS). However, in the real world, TTS may never be reached, which leads to the meaninglessness of it. So instead, we can choose some proper threshold δ ∈ R∗, the lowest acceptable speed. Correspondingly, we call the time to reach the threshold the critical moment (CM). Remark 1. Suppose there are two towns A and B near a river. A is upstream of B. Consider the goods transportation on the river. Because of the water stream, f(A,B)(t) ≥ f(B,A)(t). Thus, in general, f(u,v)(t) (cid:54)= f(v,u)(t). 2) Special relation strength measurement for transmission network: The speed functions of time can describe almost all the important properties of the relations in a transmission net- work. So, the special relation strength measurement (SRSM) can be derived from the function according to the problem confronting us. Here are several examples. 3 1) The shorter STT is, the stronger the corresponding 2) The shorter CM is, the stronger the corresponding rela- relation is. tion is. 3) The shorter the time to transfer a certain number of points is, the stronger the corresponding relation is. Although a reasonable SRSM cannot be constructed until a concrete problem is given, several key properties should be shared by all SRSMs. Specifically, in a transmission network, relations should not cancel out each other. So the SRSM is non-negative. Besides, the strongest relation in a transmission network should be the one that the node relates to itself as the transmission speed can be considered as infinity. Intuitively, all SRSMs should have the same value in this case, which is assigned zero. Moreover, the relation strength will get weaker if the function value increases. Therefore, we have the following definition. Definition 4 (SRSM). Given some network, let N be the set of nodes in it and P ⊆ N × N the set of node pairs connected by media directly. Then a function s : P → R∗ is a special relation strength measurement (SRSM) if it satisfies 1) s(u, v) ≥ 0. 2) s(u, v) = 0 if and only if u = v. Remark 2. Since transmission functions have various values if we change the order of the parameters in general, so do SRSMs. Namely, s(u, v) (cid:54)= s(v, u) in general. With the help of SRSM, the transmission network can be reduced to a graph model. In the graph, the nodes are represented by the vertices and connected by a weighted edge if they are connected by media directly. Moreover, the weights of the edges are assigned by a specific SRSM depending on the practical problem. In general, the graph should be directed. If s(u, v) = s(v, u) for all applicable pairs of nodes (u, v) in a network, the graph can also be considered as an undirected one. In Section III-A3, the graph model will be used to define more general relation strength measurement. Besides, node and vertex are used alternatively without considering the difference. So are relation and edge. 3) Relation strength measurement for transmission net- work: In this part, the discussion is based on the graph model. Firstly, some notations of graphs need to be introduced. Let G := (VG, EG) be a weighted graph where VG and EG are the sets of vertices and edges of graph G respectively. For any edge e ∈ EG, its weight is denoted by e. If there is no ambiguity about the choice of the graph, VG and EG are abbreviated to V and E. In the previous section, SRSM measures the direct relations between any pair of nodes. That is, the retransmission function of nodes is not taken into account. Neither is the parallel transmission on various paths. However, in the real world, the retransmission and parallel transmission of points happen frequently (like express service and data transmission on the internet). So we have to derive a more general relation strength hδCMtf(u,v)(t)STTTTS measurement function, which is named relation strength measurement for transmission network (RSMFTN). For the same reason in the derivation of SRSM, an analytic expression of RSMFTN cannot be given until a concrete problem is designated. But a reasonable RSMFTN must hold several key properties. First of all, all the relations between any pair of nodes should be measurable. That is, the domain of RSMFTN is V × V . The properties of SRSM should be inherited. Then RSMFTN is also non-negative and RSM F T N (u, v) = 0 if and only if u = v. Besides, there is no relation between the nodes belonging to two disconnected components. In contrast to the coincidence of two nodes, this is the other extreme. So it is reasonable to set the value of RSM F T N to be infinity (∞), an element greater than any real number. The relation of some vertices u and v gets stronger if the function value RSM F T N (u, v) approaches to zero. Consider a linear graph (Figure 2a). The points sent by u and received by v must be retransmitted by w. So the difficulty to transfer points from u to v is not less than the one from u to v visiting w. Notice that the difficulty of nodes to receive and send points has been included by SRSM and so indicated by the weights of the edges. Hence, the equality should hold. In other words, RSM F T N (u, v) = RSM F T N (u, w) + RSM F T N (w, v) if w is a cutting node on the path from u to v. To add on, the transmission dif- ficulty does not increase if we add some other retransmis- sion node s (see Figure 2b). Thence, in general, we have RSM F T N (u, v) ≤ RSM F T N (u, w) + RSM F T N (w, v). (a) (b) Fig. 2 Moreover, the ratio of the relation strengths (the relative relation strength) of two pairs of nodes should be fully determined by the relative magnitude of the weights. Also, for an indirect graph, the directions of edges are not taken into account; therefore, ∀(u, v) ∈ V ×V. RSM F T N (u, v) = RSM F T N (v, u). To sum up, we can define the RSMFTN as follows, Definition 5 (Relation strength measurement for transmis- sion network). Suppose G is some directed graph and g : V × V → R ∪ {∞} a function. Then g is a relation strength measurement for transmission network (RSMFTN) if and only if for u, v, w ∈ V , 1. g(u, v) ≥ 0. (non-negativity) 2. g(u, v) = 0 if and only if u and v coincide. (coincidence 3. g(u, v) = ∞ if and only if there is no path between u 4. g(u, v) ≤ g(u, w)+g(w, v). Moreover, the equality holds if the two components that contain u and v are connected by the cutting node w. axiom) and v. 4 5. Suppose G(cid:48) is a graph which is same as G except that the edges' weights in G(cid:48) are all α times greater than the ones in G. Then for the corresponding vertices u(cid:48) and v(cid:48) in G(cid:48), g(u(cid:48), v(cid:48)) = αg(u, v) Besides, if G is undirected, 6. g(u, v) = g(v, u) (symmetry) Example 1. Actually, many measurements derived by other researchers are RSMFTNs. A well-known one should be the shortest distance function (SDF), which evaluates the shortest distance between some pair of nodes in a graph. Here is the proof. Proof. Suppose u, v and w are arbitrary vertices in some directed graph G. Let g denote the SDF. We prove the proposition when G is weighted. The proof for the unweighted graph follows by setting the weights of the edges to one. Since g(u, v) returns the sum of weights on the shortest path from u to v, g(u, v) ≥ 0. The property 1 holds. The properties 2 and 3 hold by the definition of SDF. For property 4, assume g(u, v) > g(u, w) + g(w, v). Consider the path p consisting of the shortest path from u to w and the one from w to v. It is easy to see that the length of the path l(p) is g(u, w) + g(w, v), which is shorter than g(u, v). So g(u, v) cannot be the length of the shortest path. We get a contradiction. Moreover, if there exists a cutting node w connecting the components containing u and v respectively, the shortest path between u and v can be split into the one from u to w and the one from w to v. So g(u, v) = g(u, w) + g(w, v). Therefore, the property 4 holds. For property 5, suppose path p is some shortest path from u to v in graph G. Then l(u, v) = g(u, v). Let p(cid:48) denote its counterpart in G(cid:48). Since the weights in G(cid:48) are α times the ones in G, so is the length of path p(cid:48). That is, l(p(cid:48)) = αl(p). Since path p(cid:48) connects u(cid:48) and v(cid:48) in G(cid:48), we have g(u(cid:48), v(cid:48)) ≤ l(p(cid:48)). In other words, g(u(cid:48), v(cid:48)) ≤ αl(u, v). Similarly, consider the reverse transformation from G(cid:48) to G. That is, all the weights of edges in G(cid:48) is 1 α times in the ones α l(u(cid:48), v(cid:48)) ≥ g(u, v), which is equivalent to in G. So we have 1 l(u(cid:48), v(cid:48)) ≥ αg(u, v). Combining with g(u(cid:48), v(cid:48)) ≤ αl(u, v), we conclude that g(u(cid:48), v(cid:48)) = αl(u, v) = αg(u, v). So property 5 holds. Suppose G is an undirected graph, then by the commutativ- ity and associativity of the addition operator, g(u, v) = g(v, u). In other words, the order to add the weights of the edges compounding the shortest path does not change the final result. To sum up, SDF is an RSMFTN. B. Similarity Network 1) Similarity function: In order to make the problem easier to discuss, we need to give some fundamental definitions at first. We name the objects that have similarity relations nodes. Each node may have various properties. Moreover, there are some possible options for each property (for example, red, blue, yellow are possible options for property colour), and we name these options cases. The similarity network concerns the property similarity of nodes. We assume that, for a certain problem, the set uwvuwvs of properties is fixed and for each property, there exists a similarity function that maps the case pairs to real numbers. Intuitively, the a measure of similarity should not be negative. Thus, we assume that the similarity function is non-negative. Besides, to keep the consistency with the definition of SRSM given in Section III-A2, the function value increases while the similarity decreases. Moreover, for some objects A and B, if A is similar to B, then B is also similar to A. Then we formalize the preliminary idea: Definition 6. Let P be some property of the nodes and CP the set of possible cases of P , then we say s is a similarity function s : P × P → R if for (γ1, γ2) ∈ CP × CP 1) s(γ1, γ2) ≥ 0 (non-negativity) 2) s(γ1, γ2) = 0 if and only if p1 = p2 (coincidence axiom) 3) s(γ1, γ2) = s(γ2, γ1) (symmetry) Since more than one properties P1, P2,··· might be consid- ered in general, we need to define a list of similarity functions sP1 , sP2,··· . For convenience, we write them in matrix forms. That is, [P1 P2 ··· ] and [sP1 sP2 ··· ]. Two lists of similarities are not measurable. And the properties may not be of the identical importance. Thence, we need a function to translate a list of parameters to an index. Traditionally, we call the function manipulating the importances of a list factors weight function. So we have the following definition: Definition 7 (Weight function). Suppose N is the set of nodes under the consideration in some problem. Let P1, P2 ··· denote the properties. Besides, [sP1 sP2 ··· ] is the list of the corresponding similarity functions. A function of functions w mapping [sP1 sP2 ··· ] to a non-negative function f is called a weight function. Remark 3. The choice of the weight function depends on the practical problem we try to solve. A trivial weight function is just a list of weights. In more details, suppose [sP1 sP2 ··· sPn ] is a list of similarity functions. Let α1, α2 ··· , αn be the weights indicating the importances. Then w = [α1 α2 ··· αn] can be a potential weight function. And f is n(cid:88) [α1 α2 ··· αn] × [sP1 sP2 ··· sPn ]T = αi · sPi, i=1 which is a non-negative function. Example 2. Suppose we take two properties P1 and P2 into account. Besides, we have the possible cases γ1, γ2, γ3 for P1 and ζ1, ζ2 for P2. For two nodes u and v, assume u has properties γ1 and ζ2, and v has properties γ3 and ζ1. Let sP1 and sP2 be the similarity function we created for P1 and P2. If we use the way in remark 3 to define w, we have w = [α1 α2]. So we have f (s, t) = α1sP1(s's P1, t's P1) + α2sP2(s's P2, t's P2). In particular, for nodes u and v, we have f (u, v) = α1 · sP1(γ1, γ3) + α2 · sP2(ζ2, ζ1). 2) Relation strength measurement for similarity network: The weight function can generate a function f to measure the similarity of a pair of nodes. However, the weight function here has no guarantee that f always gives the measurement 5 following our intuition. In particular, we require f satisfies the following properties: Suppose N is the set of nodes under the consideration and P the set of properties. Then for u, v and w in N, we have, 1) f (u, v) ≥ 0 2) f (u, v) = 0 if and only if u and v have the exactly same cases for all properties in P 3) f (u, v) ≤ f (u, w) + f (w, v) 4) f (u, v) = f (v, u) The first two properties are inherited from the similarity function. Since the similarity relation should be symmetric (that is, if A is similar to B, then B is also similar to A), so we have property 4. Besides, property 3 shows that the direct measurement of any pair of nodes is at least not greater than the sum of the ones with an intermediate point. Since this function is defined for similarity measurement, we name it the relation strength measurement for similarity network (RSMFSN). Remark 4. In other words, f is a distance function. In fact, the example we give in remark 3 is an RSMFSN. C. Relations between similarity network and transmission network In many cases, there are very strong relations between simi- larity networks and transmission networks. A typical example is the pathogen infection among some species. If we consider the DNA similarity among organisms. It is easier for some certain pathogen to infect organisms that have similar DNAs. Or in other words, the easiness of pathogen transmission has a positive relationship with the DNA similarity. Therefore, the relative relation strength among the organisms should be similar whichever relation type we consider here. Since both RSMFTN and RSMFSN are used to measure the relations among the nodes in networks, and the follow-up propositions are based on their shared properties, we call both two relation measurements relation strength measurement (RSM) in the sequel. IV. COMMUNITIES After defining RSM, the definition of communities can be derived. Ahead of giving a formal definition, an important problem needs to be discussed. That is, the community rela- tion's transitivity. In other words, if A and B are contained in one community and so are B and C, can we also say A and C are in one community? In general, this implication is not true. A typical counterexample is "your friend's friends may not be your friends". So all relation strength between any pair of nodes should be considered when we define a community. Moreover, since only the groups of nodes having mutually strong enough relations are considered as communities, a relation strength threshold (community parameter) needs to be designated. Definition 8 (Community). Suppose W G ⊆ VG for some directed graph G,  ∈ R∗, and g is some RSM. Then W G is a community with respect to RSM g and constant  if and only if for all (u, v) ∈ W G × W G. g(u, v) ≤ . Moreover, we say  is the community parameter (CP) of W G with respect to g. If there is no ambiguity of the choice of RSM and CP, we will briefly say W G is a community. Since CP gives a threshold of the relation strength, whichever pair of nodes we choose in a community, the relation strength of the pair cannot be weaker than the ones the CP represents. So for those problems considering the worst cases, the CP can be designated according to some CM with some certain threshold (in Section III-A1). Then the inner structure of the community can be ignored since the poorest performance of the community satisfies the requirement. In other words, a community can be considered as a relatively independent entity, and the CP is a global property of it. Remark 5. Notice that the definition is based on the set of vertices instead of the subgraph used in many other papers. Besides, it is worthy to emphasize that the choice of com- munities usually consider the whole graph's topology rather than the local one (this shows that the community is some higher level structure based on the original graph). Since the results might be different for various choices of graph topology, the superscripts are used to make the description clear (for example, W G means W is a vertex set and graph G is the working topology). V. PROPOSITIONS AND DETECTION ALGORITHM FOR COMMUNITIES Based on the definition of RSM, an adjoint complete graph can be derived for recording all the relation strengths. More accurately, the weights of edges in the adjoint graph is determined by the corresponding RSM. Definition 9 (Adjoint complete digraph). Suppose G is some directed graph and g is some RSM. Let E = VG × VG be a new set of edges whose weights are assigned by g. Then the adjoint complete digraph adj(G, g) := {VG, E}. The definition of communities uses CP to give a threshold of the relation strength. That means, if the relation strength is not strong enough, the relation is ignored during the community detection. Moreover, for any pair of nodes, the definition of communities requires the enough strengths of the relations in both two directions. Hence, we can remove the relations unsatisfying the requirement to simplify our graph without changing the result of community detection. With this trick in mind, we have the following transformation. Definition 10 (Refinement transformation). Suppose G is a directed weighted graph, DG ⊆ EG, and  ∈ R∗ is some CP. The refinement transformation is defined like this. R(DG) := {(u, v) ∈ DG : (u, v) ≤  ∧ (v, u) ≤ } Besides, all the edges' weights are set to 1 after applying the transformation. Remark 6. For convenience, the relations (u, v) and (v, u) are together denoted u ↔ v. In this case the weight is not applicable. 6 In fact, the refinement The definition of refinement transformation shows that if some edges (u, v) is in R(DG), then so is (v, u). Moreover, the weights become unnecessary since they all equal one. Therefore, in R(DG), there is no need for us to consider the directions and weights of the edges anymore. So, for now on, R(DG) is thought of a set of undirected unweighted edges. Moreover, if (u, v) ∈ R(DG), then we say the relation between u and v is reserved. Or briefly, u ↔ v is reserved. transformation is a higher order function that applies a Boolean function to each relation in the set of edges. The Boolean function here determines whether the given relation is strong enough to be considered in the community detection. So for a certain refinement transforma- tion, the reservation of the relation depends on the strength of the relation itself rather than the topology in which the relation is. Lemma 1. Suppose G is some directed graph. If F1 ⊆ F2 ⊆ EG, then R(F1) ⊆ R(F2). Proof. Pick (u, v) ∈ R(F1) arbitrary. So u ↔ v is in F1 and reserved after applying the refinement transformation. Since F1 ⊆ F2, then u ↔ v ∈ F2. So (u, v) ∈ R(F2). Then the adjoint complete digraph can derive a simplified undirected unweighted graph whose edges represent the two- direction relations strong enough to construct communities. Definition 11 (Effective edge graph). Suppose G is some directed graph. g is some RSM.  is some CP. Then the effective edge graph is (VG, R(Eadj(G,g))) and denoted by eeg(g,)(G). Moreover, suppose the vertices set AG is a subset of VG. The full subgraphs of eeg(g,)(G) over AG is denoted by eeg(g,)(G)[AG]. Lemma 2. Let g be some RSM,  ∈ R∗ some CP and G some directed weighted graph. Assume W G ⊆ VG. Then the vertices set W G is a community if and only if for all u, v ∈ W G, u ↔ v is reserved after applying the refinement transformation. transformation will remove all Proof. The refinement the relations that cannot be used in a community structure. In other words, if all relations are reserved after applying refinement transformation, the relation in any pair of nodes is strong enough. This is exactly what the definition of communities requires. So, W G is a community. On the other hand, if W G is a community, the relation (in both directions) in any pair of nodes should be strong enough. Thus, all of them are reserved after applying the refinement transformation. Lemma 3. Any full subgraph of a complete graph is again complete. Proof. Suppose S is a full subgraph of Cn for some n. Then for arbitrary vertices u and v in S, edge (u, v) ∈ ECn. So by the definition of full subgraphs, (u, v) ∈ ES. That is, there is an edge in an arbitrary pair of nodes in S. So S is a complete graph. Theorem 1. Suppose G is some directed graph, g some RSM and  some CP. AG ⊆ VG is a community if and only if eeg(g,)(G)[AG] is complete. 7 Fig. 3: The Concept Graph of The Algorithm Proof. (⇒) Suppose AG is a community. Pick vertices u and v in AG arbitrary. Since AG is a community, then all the relations will be reserved after applying the refinement transformation. Moreover, since adj(G, g)[AG] is complete, then u ↔ v ∈ Eadj(G,g)[AG]. Thus, (u, v) ∈ R(Eadj(G,g)[AG]). Since we pick u and v arbitrary in AG, there is an edge between any pair of nodes in eeg(g,)(G)[AG]. Hence, eeg(g,)(G)[AG] is complete. (⇐) Suppose eeg(g,)(G)[AG] is complete. Then ∀(u, v) ∈ AG × AG, (u, v) ∈ R(Eadj(G,g)[AG]). Since eeg(G, g)[AG] is complete, all the relations in Eadj(G,g)[AG] are reserved after applying the refinement function. Therefore, AG is a community. It is easy to find that all single nodes can be considered as a community because they relate to themselves trivially, and RSM is zero. However, this kind of result does not follow our intuition since the community should be some set of nodes. The definition of the maximal community tackles this problem. For a better understanding of the definition, a theorem needs to be introduced first. Theorem 2. Suppose G is a directed graph,  a CP and g an RSM. Besides, AG ⊆ BG ⊆ VG. If BG is a community, then so is AG Proof. Since BG is a community, eeg(g,)(G)[BG] then by Lemma 1, eeg(g,)(G)[AG] eeg(g,)(G)[BG]. then by Theorem 1, is complete. Besides, since AG ⊆ BG, is a subgraph of Moreover, pick u, v ∈ AG arbitrary. Then u, v ∈ BG as well. Notice that eeg(g,)(G)[BG] is complete. So the relation u ↔ v ∈ Eadj(G,g)[BG] is reserved, which implies (u, v) ∈ Eeeg(g,)(G)[AG]. Thus, eeg(g,)(G)[AG] is complete. So AG is a community as well. Theorem 2 shows that, if BG can be considered as a community with respect then all the subsets of BG can be considered as a community. This observation leads to the definition of maximal community. to some RSM and CP, Definition 12 (Maximal community). Suppose G is a directed graph. RSM and CP are given. Moreover, AG is a subset of VG. Then AG is a maximal community if and only if 1. AG is a community, and 2. There is no BG ⊆ VG such that BG is a community and AG (cid:40) BG. With the maximal community definition in mind, we intro- duce an algorithm to detect them if RSM and CP are specified. For easier explanation, we define problem A as this: Definition 13 (Problem A). Given some adjoint graph adj(G, g) and CP , find all the maximal communities in G (the set of the maximal communities is denoted Ψ). Definition 14 (Problem B). Given the effective edge graph eeg(g,)(G), find the all the maximal cliques in eeg(g,)(G) (the set of the maximal cliques is denoted by Φ). The following theorem shows the equivalence of problem then eef(g,)(G)[AG] is a clique. Assume eef(g,)(G)[AG] A and problem B. Theorem 3. Suppose G is a directed graph,  some CP, g an RSM and AG a subset of VG. Then AG is a maximal community if and only if eef(g,)(G)[AG] is a maximal clique in graph eef(g,)(G). Therefore, Ψ = Φ. Proof. (⇒) Suppose AG is a maximal community. Then since AG is a community, is complete. So it is not max- imal. Then there exists some vertices set BG such that eef(g,)(G)[AG] (cid:40) eef(g,)(G)[BG] and eef(g,)(G)[BG] is complete. So AG ⊆ BG. Moreover, since both two graphs are complete, the equality cannot hold. Otherwise, eef(g,)(G)[AG] = eef(g,)(G)[BG]. So we have AG (cid:40) BG. Besides, since eef(g,)(G)[BG] is complete, BG is a commu- nity. Hence, AG cannot be a maximal community, which is a contradiction. (⇐) Suppose eef(g,)(G)[AG] is a maximal clique. Since eef(g,)(G)[AG] is complete, then AG is a community. As- sume AG is not maximal, then there exists some community BG such that AG (cid:40) BG. Then eef(g,)(G)[BG] is complete. Moreover, we have eef(g,)(G)[AG] (cid:40) eef(g,)(G)[AG] by MaximalCommunitiesΨAdjointGraphadj(G,g)OriginalGraphGABRSMgCPEfficientedgegrapheeg(g,)(G)MaximalCliquesΦBron-KerboschalgorithmThm.3Ψ=Φ Lemma 1. Therefore, eef(g,)(G)[AG] cannot be maximal, which is a contradiction. Remark 7. Bron-Kerbosch algorithm [33] is a well-known algorithm to find maximal cliques. Thence, by Theorem 3, we can reduce problem A to problem B and apply Bron-Kerbosch algorithm to find Φ, which equals Ψ. Figure 3 shows the relationships among the important con- cepts and transformations introduced. In more details, suppose G is some graph, g some RSM and  some CP. Moreover, all the vertices in G have been indexed from 1 to VG. Then we have the following algorithm, EEG[i, j] = 1 1: procedure FINDMAXIAMLCOMMUNITIES for (i, j) ∈ VG × VG where i ≤ j do 2: if g(i, j) ≤  & g(j, i) ≤  then 3: 4: 5: 6: 7: 8: 9: 10: 11: end procedure end for SetOfMaximalCommunities Φ ← EEG[i, j] = 0 Bron-Kerbosch algorithm(EEG) else end if VI. DEMONSTRATION In this section, we demonstrate how our new algorithm works by applying it on Zachary's karate club network [34]. We choose resistance distance [35] as our RSM. A. The current model The definition of communities indicates that some certain RSM is required. We have shown that SDF is RSMFTN in Example 1, so that SDF is RSM. Although many community detection algorithms work on SDF, it may not always give a reasonable result. Intuitively, the relation of a pair nodes will get stronger if there are more paths between them. However, SDF does not consider this case (see Figure 4). More specifically, in SDF view, the relation will not get stronger unless a path shorter than the previous shortest path is added. 8 In order to avoid this problem, we try to use the Klein and Randic's effective resistance function (ERF) [35] to measure the relation strength instead of SDF. B. Klein and Randic's effective resistance Suppose G is an indirectly connected graph. Then G can be considered as an electrical network that all the edges are resistances with the corresponding weight values (if G is an unweighted graph, then the resistances of all edges are one). Let u and v be two vertices in the graph. Then the effective resistance of these two vertices can be defined like this: Definition 15. Let the voltage of u be U and the one of v be 0. We can measure the current I from u to v. Then the I . Briefly, efficient resistance R(u, v) between u and v is U I . R(u, v) = U 1) Algorithm to get efficient resistance distance: Klein and Randic [35] also provide an algorithm to compute the resistance distance for a connected indirect weighted graph. Suppose graph G is connected. Let A be the adjacent matrix and D the diagonal degree matrix of G. It is worthy to note that, in a weighted indirected graph, the degree of a vertex is the sum of the weights of all its adjacent edges. Then the Laplacian matrix L can be computed using formula L = D − A. Let L† be the generalized inverse [36] of L. Then the efficient resistance distance Ri,j of any pair of vertices (i, j) in graph G can be obtained by † Ri,j = L i,i + L † † j,j − 2L i,j And we usually call the corresponding matrix R resistance matrix. 2) ERF is an RSMFTN: Since the definition of community is based on RSM, we have to prove ERF is an RSM first. Essentially, in this case, the relations among the nodes are derived from the electron flow in the wires among the vertices. So we need to consider the criteria of RSMFSN. Lemma 4. Resistance is distance. That satisfies the following properties: the resistance is, 1) Ra,b ≥ 0 2) Ra,b = 0 ⇔ a = b 3) Ra,b = Rb,a 4) Ra,c + Rc,b ≥ Ra,b Lemma 5. Let x be a cut-point of a connected graph, and let a and b be points occurring in different components which arise upon deletion of x. Then, Ra,b = Ra,x + Rx,b (a) (b) Fig. 4: Both in (a) and (b), the shortest distance between Node1 and Node3 is 2. So in SDF view, the relation strengths between Node1 and Node3 in these two cases are identical. However, there is one more path between Node1 and Node3 in (a). So, intuitively, the relation between Node1 and Node3 in (a) should be stronger than the one in (b). Remark 8. The proofs of Lemma 4 and Lemma 5 have been given by Klein and Randic [35]. Lemma 6. RDF satisfies the property 5 of RSM. Proof. Suppose G is some graph and G(cid:48) is same as G but the edges weights in G(cid:48) are all α times greater than the ones in G. Let A and A(cid:48) be the adjacent matrixes of G and G(cid:48) respectively. Then we have A(cid:48) = αA. So for the corresponding 15432123 degree matrixes D and D(cid:48), we also have D(cid:48) = αD. Therefore, we have L(cid:48) = D(cid:48) − A(cid:48) = αD − αA = α(D − A) = αL Let L† and L(cid:48)† be the generalized inverse of L and L(cid:48) respectively. Then by the definition of the generalized inverse, we have (1) (2) (⇔) (⇔) LL†L = L L(cid:48)L(cid:48)†L(cid:48) = L(cid:48) Since L(cid:48) = αL, we can simplify equation 2 L(cid:48)L(cid:48)†L(cid:48) = L(cid:48) (αL)L(cid:48)†(αL(cid:48)) = (αL(cid:48)) L(αL(cid:48)†)L = L Comparing with equation 1, αL(cid:48)† has the same function as L†. Since the final result does not rely on the choice of the generalized inverse matrix, we can let L† be the one satisfying the equation αL† = L(cid:48)† (3) Hence, we have (cid:48)† R(cid:48) i,j = L i,i + L (cid:48)† (cid:48)† j,j − 2L i,j = αL† + αL† − 2αL† † † † j,j − 2L = α(L i,i + L i,j) = αRi,j Proposition 1. ERF is an RSMFSN. Proof. We can define that the resistance distance of a pair of vertices is infinite if there is no path between them. Then the proposition is immediate from Lemmas 4-6. Therefore, ERF is RSM. C. Community detection in Zachary's karate club Fig. 5: Zachary's karate club The graph we use for demonstration is Zachary's karate club (Figure 5) [34], which is a popular test case in community detection research. At first, we need to choose some proper CP, which is the lower bound of the relation strength within the communities. Here, we let CP = 1.5. 9 Then, we use Klein-Randic method to compute the resis- tance distance for each pair of nodes in the network and get the corresponding resistance matrix R. After that, we get the corresponding adjoint graph (adj) from R and remove all the edges whose weights are greater than CP. So we get the efficient edges graph (eeg). Then we apply Bron-Kerbosch algorithm on eeg and get a list of maximal communities. In Figure 6, we plot those maximal communities in the original graph. Here, we have three maximal communities represented by red, blue and yellow respectively. Some nodes are multi-colour, which means they belong to various maximal communities simultaneously. VII. CONCLUSION In this paper, we discussed two most common types of networks: transmission networks and similarity networks. Two corresponding relation strength measurements (RSMFTN and RSMFSN) are defined. And we reduce them into a unified graph model. Based on this, we provide a general definition of communities and derive a corresponding detection algorithm. At last, we give a demonstration to show how the algorithm works. Our paper gives a general procedure to detect community structures in practical networks. Readers can specialize our al- gorithm to derive theirs according to the problems confronting them. VIII. LIMITATIONS AND FUTURE WORK Generally, RSMs consider the whole network topology. So does the algorithm to find the maximal community structures. While the algorithm gives the accurate results, it is NP hard. So our algorithm may not suit the community detections in dynamic networks. Besides, the definition we give in this paper is based on the absolute strengths among the nodes. So the users should always give a proper community parameter , which is hard to find sometimes. Although we proved that SDF and ERF are RSMFTN, many other RSMFTNs still wait to be discovered. Besides, the definition based on the absolute relation strength should derive a corresponding definition based on the relative relation strength. The key point is how to give a general definition of the neighbour nodes when applying different RSMs. REFERENCES [1] S. Fortunato, "Community detection in graphs," Physics Reports, vol. 486, pp. 75 -- 174, 2 2010. [2] M. Porter, J. Onnela, and P. Mucha, "Communities in networks," Notices of the American Mathematical Soci- ety, vol. 56, no. 9, pp. 1082 -- 1097, 10 2009. [3] S. Fortunato, "Community detection in graphs," Physics Reports, vol. 486, no. 3-5, pp. 75 -- 174, 2010. [4] M. E. J. Newman, "Communities, modules and large- scale structure in networks," 2012. [5] B. W. Kernighan and S. Lin, "An efficient heuristic procedure for partitioning graphs," Bell System Technical Journal, vol. 49, pp. 291 -- 307, 1970. 12345678910111213141516171819202122232425262728293031323334 10 Fig. 6: Maximal Communities (CP = 1.5) nity structures in complex networks with a potts model," Phys. Rev. Lett., vol. 93, p. 218701, Nov 2004. [17] C. Wan, S. Peng, C. Wang, and Y. Yuan, "Communities detection algorithm based on general stochastic block model in mobile social networks," in 2016 International Conference on Advanced Cloud and Big Data (CBD), Aug 2016, pp. 178 -- 185. [18] P. J. Bickel and A. Chen, "A nonparametric view of network models and newman-girvan and other modular- ities," Proceedings of the National Academy of Sciences, vol. 106, no. 50, pp. 21 068 -- 21 073, 2009. [19] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P. Xing, "Mixed membership stochastic blockmodels," J. Mach. Learn. Res., vol. 9, pp. 1981 -- 2014, Jun. 2008. [20] J. Wahlstrom, [6] T. Hastie, R. Tibshirani, and J. Friedman, "The elements Springer New York, pp. 520 -- of statistical learning." 523. [7] A. Hlaoui and S. Wang, "A direct approach to graph clustering," Neural Networks and Computational Intelli- gence, no. 158-163, 2004. [8] M. J. Rattigan, M. Maier, and D. Jensen, "Graph clus- tering with network structure indices," in Proceedings of the 24th International Conference on Machine Learning, ser. ICML '07. New York, NY, USA: ACM, 2007, pp. 783 -- 790. [9] E. R. Barnes, "An algorithm for partitioning the nodes of a graph," SIAM Journal on Algebraic Discrete Methods, vol. 3, no. 4, pp. 541 -- 550, 1982. [10] U. Luxburg, "A tutorial on spectral clustering," Statistics and Computing, vol. 17, no. 4, pp. 395 -- 416, Dec. 2007. [11] Y. Li, K. He, K. Kloster, D. Bindel, and J. Hopcroft, "Local Spectral Clustering for Overlapping Community Detection," ACM Trans. Knowl. Discov. Data, vol. 12, no. 2, pp. 17:1 -- -17:27, 2018. [12] Z. Lu, J. Wahlstrom, and A. Nehorai, "Community De- tection in Complex Networks via Clique Conductance," Sci. Rep., vol. 8, no. 1, p. 5982, 2018. [13] M. E. Newman, "Fast algorithm for detecting community structure in networks," Phys. Rev. E, vol. 69, p. 066133, Jun 2004. [14] M. Chen, K. Kuzmin, and B. K. Szymanski, "Commu- nity detection via maximization of modularity and its variants," IEEE Transactions on Computational Social Systems, vol. 1, no. 1, pp. 46 -- 65, March 2014. [15] M. Kaur and A. Mahajan, Community Detection in Complex Networks: A Novel Approach Based on Ant Lion Optimizer. Singapore: Springer Singapore, 2017, pp. 22 -- 34. [16] J. Reichardt and S. Bornholdt, "Detecting fuzzy commu- [21] R. Milo, S. Shen-Orr, S. I. Skog, P. S. L. Rosa, P. Handel, and A. Nehorai, "The β-model -- maximum likelihood, cramer -- rao bounds, and hypothesis testing," IEEE Trans- actions on Signal Processing, vol. 65, no. 12, pp. 3234 -- 3246, June 2017. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon, "Network motifs: Simple building blocks of complex networks," Science, vol. 298, no. 5594, pp. 824 -- 827, 2002. O. N. Yaveroglu, N. Malod-Dognin, D. Davis, Z. Lev- najic, V. Janjic, R. Karapandza, A. Stojmirovic, and N. Przulj, "Revealing the hidden language of complex networks," Scientific Reports, vol. 4, pp. 4547 EP -- , 04 2014. [22] [23] A. R. Benson, D. F. Gleich, and J. Leskovec, "Higher- order organization of complex networks," Science, vol. 353, no. 6295, pp. 163 -- 166, 2016. [24] M. E. J. Newman, "Equivalence between modularity optimization and maximum likelihood methods for com- munity detection," Phys. Rev. E, vol. 94, p. 052315, Nov 2016. 12345678910111213141516171819202122232425262728293031323334:MaximalCommunity1:MaximalCommunity2:MaximalCommunity3 11 Amiya Nayak received his B.Math. degree in Com- puter Science and Combinatorics and Optimization from University of Waterloo, Canada, in 1981, and Ph.D. in Systems and Computer Engineering from Carleton University, Canada, in 1991. He has over 17 years of industrial experience in software engineer- ing, avionics and navigation systems, simulation and system level performance analysis. He has served in the Editorial Board of several journals, including IEEE Transactions on Parallel & Distributed Sys- tems, International Journal of Parallel, Emergent and Distributed Systems, Journal of Sensor and Actuator Networks, and EURASIP Journal of Wireless Communications and Networking. Currently, he is a Full Professor at the School of Electrical Engineering and Computer Science at the University of Ottawa. His research interests include software-defined networking, mobile computing, wireless sensor networks, and vehicular ad hoc networks. [25] R. Guimera, S. Mossa, A. Turtschi, and L. A. N. Amaral, "The worldwide air transportation network: Anomalous centrality, community structure, and cities' global roles," Proceedings of the National Academy of Sciences, vol. 102, no. 22, pp. 7794 -- 7799, 2005. [26] J. Chen and B. Yuan, "Detecting functional modules in the yeast protein -- protein interaction network," Bioinfor- matics, vol. 22, no. 18, pp. 2283 -- 2290, Sep. 2006. [27] Y. Dourisboure, F. Geraci, and M. Pellegrini, "Extraction and classification of dense communities in the web," Proceedings of the 16th International Conference on World Wide Web, pp. 461 -- 470, 2007. [28] Y. Chaabani and J. Akaichi, "Meaningful communities detection in medias network," Social Network Analysis and Mining, vol. 7, no. 1, p. 11, Apr 2017. [29] B. Scholkopf, J. Platt, and T. Hofmann, "Fundamental limitations of spectral clustering," Advances in Neural Information Processing Systems 19:Proceedings of the 2006 Conference, pp. 1017 -- 1024, 2007. [30] A. Arenas, A. D´ıaz-Guilera, and C. J. P´erez-Vicente, "Synchronization reveals topological scales in complex networks," Phys. Rev. Lett., vol. 96, p. 114102, Mar 2006. [31] D. Li, I. Leyva, J. A. Almendral, I. Sendina Nadal, J. M. Buld´u, S. Havlin, and S. Boccaletti, "Synchronization interfaces and overlapping communities in complex net- works," Phys. Rev. Lett., vol. 101, p. 168701, Oct 2008. [32] L. Danon, A. Daz-Guilera, J. Duch, and A. Arenas, "Comparing community structure identification," Journal of Statistical Mechanics: Theory and Experiment, vol. 2005, no. 09, p. P09008, 2005. [33] C. Bron and J. Kerboscht, "Finding all cliques of an undirected graph," Communications of the ACM, vol. 16, pp. 575 -- 577, 1973. [34] W. Zachary, "An information flow model for conflict and fission in small groups," Journal of Anthropological Research, vol. 33, pp. 452 -- 473, 1977. [35] D.J.Klein and M.Randic, "Resistance distance," Journal of Mathematical Chemistry, vol. 12, pp. 81 -- 95, 1993. [36] E. T. Wong, "Generalised inverses as linear transforma- tions," The Mathematical Gazette, vol. 63, no. 425, pp. 176 -- 181, October 1979. Haoye Lu received his Bachelor of Science Joint de- gree Honours in Computer Science and Mathematics from University of Ottawa, Canada, in 2017. He was the recipient of the University Silver Medal for his second highest academic achievement in Faculty of Science. Haoye joined the School of Electrical Engineering and Computer Science (EECS), University of Ottawa in 2017 and is currently a master student pursuing Master of Science degree in Computer Science. He was also the recipient of the Full International Scholarship. He is a reviewer of 2017 IEEE Global Communications Con- ference and has published papers in quantum communication and artificial intelligence fields. His research interests include quantum communication, artificial intelligence and networks structures.
1610.01655
2
1610
2016-11-03T11:46:48
Trump vs. Hillary Analyzing Viral Tweets during US Presidential Elections 2016
[ "cs.SI" ]
In this paper, we provide a quantitative and qualitative analyses of the viral tweets related to the US presidential election. In our study, we focus on analyzing the most retweeted 50 tweets for everyday during September and October 2016. The resulting set is composed 3,050 viral tweets, and they were retweeted over 20.5 million times. We manually annotated the tweets as favorable of Trump, Clinton, or neither. Our quantitative study shows that tweets favoring Trump were usually retweeted more than pro-Clinton tweets, with the exception of a few days in September and two days in October, especially the day following the first presidential debate and following the release of the Access Hollywood tape. On two days in October 2016, pro-Trump tweet volume accounted for than 90\% of the total tweet volume.
cs.SI
cs
Analyzing Viral Tweets during US Presidential Elections 2016 Trump vs. Hillary Walid Magdy1 and Kareem Darwish2 1School of Informatics, The University of Edinburgh, UK 2Qatar Computing Research Institute, HBKU, Doha, Qatar Email: [email protected], [email protected] Twitter: @walid magdy, kareem2darwish 6 1 0 2 v o N 3 ] I S . s c [ 2 v 5 5 6 1 0 . 0 1 6 1 : v i X r a Abstract In this paper, we provide a quantitative and qual- itative analyses of the viral tweets related to the US presidential election. In our study, we focus on analyzing the most retweeted 50 tweets for everyday during September and October 2016. The resulting set is composed 3,050 viral tweets, and they were retweeted over 20.5 million times. We manually annotated the tweets as favorable of Trump, Clinton, or neither. Our quantitative study shows that tweets favoring Trump were usu- ally retweeted more than pro-Clinton tweets, with the exception of a few days in September and two days in October, especially the day following the first presidential debate and following the release of the Access Hollywood tape. On two days in Oc- tober 2016, pro-Trump tweet volume accounted for than 90% of the total tweet volume. Introduction Social media is an important platform for political discourse and political campaigns (Shirky 2011; West 2013). Political candidates have been increasingly us- ing social media platforms to promote themselves and their policies and to attack their opponents and their policies. Consequently, some political campaigns have their own social media advisers and strategists, whose success can be pivotal to the success of the campaign as a whole. In the context of this paper, we are interested in measuring the volume and diversity of support for the two main candidates for the 2016 US presidential elec- tions, Donald Trump and Hillary Clinton, on Twitter during the two months preceding the elections, namely September and October 2016. The work is based on the data being collected via TweetElect.com, which is an online website that tracks tweets and Twitter trends pertaining to the US presidential elections. For our analysis, we use the top 50 retweeted tweets, aka viral tweets, for everyday in September and Oc- tober 2016 pertaining to the US presidential election. The total number of unique tweets that we analyze is 3,050, whose retweet volume of 20.5 million retweets ac- counts for more than 50% of the total retweet volume Copyright c(cid:13) 2016, All rights reserved. during these two months on TweetElect. After manu- ally tagging all the tweets in our collection for support for either candidate, we looked at: which candidate has more traction on Twitter and a more diverse support base; when a shift in the volume of supporting tweets happens; and which tweets were the most viral. We observed that retweet volume of pro-Trump tweets dominated the retweet volume of pro-Clinton tweets on most days during September 2016, and al- most all the days during October. A notable exception was the day after the first presidential debate and the day after the leak of the Access Hollywood tape in which Trump used lewd language. Data Collection In this section, we describe the collection of viral tweets. We initially give an introduction to TweetElect website, which is the source we used to identify the daily viral tweets. Later, we explain the data annotation process and give some statistics on the data collected. TweetElect TweetElect.com1 is a free website that aggregates and shows the most retweeted tweets related to the 2016 US presidential election. The website shows tweets about the elections in general, with the option of dis- playing tweets about each of the two main candidates separately. It offers search functionality with filters on media type (text, image, video, or links), while en- abling the display of search results related to each can- didate separately. TweetElect shows the most retweeted tweets, images, videos, and links in the last hour, 12 hours, 1 day, or 2 days. During September and October, the number of ag- gregated tweets per day (including retweets) related to the US presidential elections typically ranged between 300k and 600k. This number increased dramatically af- ter specific events or revelations, such as after the pres- idential debates, where the number of tweets exceeded 4 million tweets. 1http://www.tweetelect.com/ is a special edition TweetElect of Tweet- Mogaz2 (Magdy 2013), which is an Arabic news portal that automatically generates news from tweets. It uses state-of-the-art adaptive filtering methods for detecting relevant tweets on broad and dynamic topics, such as politics and elections (Magdy and Elsayed 2016). TweetElect used an initial set of 38 keywords related to the US elections for streaming relevant tweets. Consequently, adaptive filtering continuously enriches the set of keywords with additional terms that emerge by time (Magdy and Elsayed 2016). Tweet Collection We were interested in analyzing the most "viral" tweets pertain to the US presidential elections. Therefore, we constructed a set of the most retweeted 50 topically relevant (as provided by TweetElect.com) tweets for everyday in September and October 2016. Thus, our collection contained 3,050 unique tweets that were retweeted 20.5 million times. By month, September had 1,500 unique tweets with a retweet count of 6.67 million, and October had 1,550 tweets with a retweet count of 13.89 million. This volume of retweets represents more than 50% of the total tweet volume collected by Tweet- Elect related to the US elections during September and October 2016. In our analysis, we show statistics based on three types of viral tweets: • Top50: The top 50 viral tweets per day. • Top10: The top 10 viral tweets per day. Checking only the top 10 rather than 50 can give a better in- dicator of the direction of the trends on Twitter on that day, and the top few retweeted tweets usually dominate the retweet volume. • Top10F: The top 10 viral tweets per day for the candidates' supporters ("Fans") only and excluding tweets from the official accounts of the candidates. Since many of the top tweets are usually coming from the presidential candidates, this gives a depth on the support of the candidates by what their fans say. The total number of retweets for the TOP 50, TOP 10, and TOP 10 Fa n tweets per day are 6.67 million, 3.49 million, and 1.75 million retweets respectively. Fig- ures 1 and 2 show the virality of the top tweets day-by- day during September and October 2016 respectively. As shown, the days with the largest number of retweets for the top N tweets were September 27 and October 10, which are the days following the first and second debate between the candidates 3. Tweet Labeling We labeled the tweets on two stages, as we labeled the viral tweets of each month directly after the end of this 2http://www.tweetmogaz.com/ 3Tweets time stamp is based on GMT Figure 1: Total number of retweets of the Top50, Top10, and Top10F daily viral tweets relating to the US elec- tions during September 2016 . . Figure 2: Total number of retweets of the Top50, Top10, and Top10F daily viral tweets relating to the US elec- tions during October 2016 month. Tweets were labeled as pro-Trump, pro-Clinton, or neither. Out of the 1,500 tweets collected during September, 636 were tweeted by either of the candidates' official accounts. This number was 612 out of 1,550 for October. These tweets were automatically annotated to be in the favor of the candidate who posted them. The remaining tweets were then posted to a crowd-sourcing platform4 to be manually annotated. Each tweet was annotated by at least 3 annotators, and the majority voting is taken for selecting the final label. A golden control set of 17 tweets was provided to control the annotators work quality. We asked annotators to label each of the tweet with one of three labels: 1) In favor of Trump, 2) In favor of Clinton, 3) Neither of them. Instruction were given to annotators as follows: • Tweets in favor of a candidate can be: 1. Clearly showing support to the candidate 2. Giving positive facts about the candidate or his/her campaign (for example showing that he/she leads in polls) 3. Attacking the other candidate 4https://www.crowdflower.com/ 0100,000200,000300,000400,000500,000600,000700,000800,000900,0009/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Number of retweets of the top Nviral tweets on the US electionsTop50Top10Top10F0200,000400,000600,000800,0001,000,0001,200,0001,400,00010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/1610/31/16Number of retweets of the top Nviral tweets on the US elections (October 2016)Top50Top10Top10F 4. Making fun (or sarcasm) of the other candidate or his/her supporters. • "Neither of them" tweets is selected if: 1. The tweet is reporting news about the elections or a presidential candidate with no clear bias to be in favor or against. 2. The tweet is attacking both candidates. Annotators were instructed to check the tweet con- tent carefully including any images, videos, or external links to have an accurate annotation. In addition, we advised them to check the profile of tweet authors to better understand their position towards the candidates if needed. The annotators inter-agreement was 90%, which is considerably high among three annotators for an an- notation task with three choices. This gives high confi- dence in the quality of annotation. Results and Analysis Figures 7 and 8 show the direction of support of the Top50, Top10, and Top10F viral tweets per day for September and October respectively. As it is shown, the number of daily viral tweets in favor of Trump is usu- ally larger than that for Clinton. This observation does not change when considering the Top 50 or 10 tweets. Furthermore, when considering the top viral tweets by their fans (excluding the official accounts of the candi- dates), the gap between Trump and Clinton was even larger, where 57% and 65% of the Top10F tweets in September and October respectively were in favor of Trump, whereas it was only 27% and 19% in favor of Clinton respectively. Looking at the daily viral tweets, it is evident that for most days, Trump had more viral tweets supporting him than Clinton. For September 2016, Trump led Clinton in the vol- ume of viral tweets everyday during the month save 6 days, with the day following the debate (9/27) showing the highest percentage and volume of tweets supporting Clinton. We inspected the other 6 days and they cor- responded to: (September 12-13) Trump complaining about how the debates would be moderated and ques- tions about Clinton's health; (September 15-16) Trump saying that women are bad for business (Oppenheim 2016) and disavowing the "birther" claims that Presi- dent Obama was not born in the US; and (September 23-24) nothing noteworthy. Trump also led Clinton in the number of unique viral tweets everyday except for 5 days, namely the 2 days following the debate, and on September 12, 13, and 16. Also in September, Pro-Trump tweets surged to more than 70% of the volume of retweets on 3 days, namely September 4, 6, and 9. On September 4, news broke that Clinton mishandled classified material and Trump's top tweet receiving 19.5k retweets which stated: "Lyin Hillary Clinton told the FBI that she did not know the C markings on documents stood for CLASSIFIED. How can this be happening?" . On the 6th, hacked Clinton emails were made public with with Trump's top tweet on the topic receiving more than 14k retweets. On the 9th, Clinton stated that half of Trump supporters are a "basket of deplorables". For the month of October, pro-Clinton tweet volume exceeded pro-Trump tweet volume on only two days namely Oct. 7 and Oct. 26. October 7 coincides with the release of the Access Hollywood video of Trump making lewd comments, and coincides with the day when pro-Clinton tweets received the largest portion of retweet volume (58%). The top retweeted tweets favor- ing Clinton were not as much pro-Clinton as they were anti-Trump. The most retweeted tweet belonged to Jeb Bush, the former hopeful in the Republican presidential primaries, in which he condemned Trump's comments. Though the tapes were described by some as an "Octo- ber surprise", pro-Trump tweets constituted 35% of the tweet volume. On October 26, the user "Bailey Disler" was praising the person who destroyed Trump's star on the Walk of Fame. His tweet was retweeted more than 124k times, which accounts for 6% of the volume for that day. Also in October, Pro-Trump retweet volume out- paced pro-Clinton volume for all other days. In fact, pro-Trump retweet volume accounted for more than 75% of the volume on 13 day during the month. Aside from Oct. 29 when the Federal Bureau of Investigation (FBI) announced that they are investigating Hillary Clinton over misuse of email and Oct. 11 when he at- tacked the leaders of the Republican Party, nothing out of the ordinary was happening any of the other days. The two most prominent sources of pro-Trump viral tweets were the official accounts of Trump and Wik- iLeaks. Results in Figures 7 and 8 are based on the top N unique tweets. When we take into consideration the real volume these tweets represents, i.e. counting each tweet in the top 50 with its number of retweets, the results can be seen in Figures 3 and 4 for the Top50 for September and October respectively. The graphs still show that Trump had a larger number of supporting viral tweets for most of the days. However, when Clinton gets more viral tweets, some of the tweets may receive an enor- mous number of retweets, as is clear on September 15 and 27 when there were large spikes in the favor of Clin- ton. The overall share of retweets volume during the month continues to be in favor of Trump. Even with the spikes in pro-Clinton retweets, 54% and 67% of the retweet volume for September and October respectively was for tweets supporting Trump, 39% and 25% were pro-Clinton, and the remaining 7% and 8% were unbi- ased news or against both candidates. We also looked at the diversity of tweet authors, and found that there was not only more retweets in sup- port of Trump, but also they were authored by more people. The viral tweets in support of Trump were au- thored by 196 and 198 users for September and Oc- Figure 3: Total number of retweets of the Top50 daily viral tweets for each candidate during September 2016 . . Figure 5: Total number of retweets per users whose tweets showed in the Top50 during September 2016 . . Figure 4: Total number of retweets of the Top50 daily viral tweets for each candidate during October 2016 tober respectively compared to 135 and 110 users re- spectively for Clinton. Furthermore, for September, in terms of the number of unique viral tweets the per- centage of viral tweets supporting Trump that were au- thored by his official account was 31% compared to 66% of pro-Clinton tweets that were authored by her official account. The percentages for October were consistent with 35% for Trump and 63% for Hillary. Figures 5 and 6 show the volume of retweets per author in our set of viral tweets and suggests that there is greater diversity of pro-Trump tweet authors. Conversely, we looked at the 50 tweets with the most retweets over the entire two months of September and October that are supporting either candidate. For September, 45 were authored by the official Trump account (making up 92% of the vol- ume of the top 50 tweets) compared to 39 that were au- thored by the official Clinton account (making up 68% of the volume of the top 50 tweets). For October, 32 were authored by the official Trump account (making up 57% of the volume of the top 50 tweets) compared to 23 that were authored by the official Clinton account (making up 39% of the volume of the top 50 tweets). The drop in percentages of top retweeted tweets being authored by the candidates from September to Octo- ber is notable and warrants more investigation. Table 1 and 2 show the top 10 most retweeted Twitter ac- counts along with the number of tweets in our set and Figure 6: Total number of retweets per users whose tweets showed in the Top50 during October 2016 retweet volume 5. One interesting observation is that accounts with some of the most retweeted pro-Clinton tweets had only one tweet in our set and there was no correlation between tweet counts and retweet volume. For accounts with pro-Trump tweets, there is correla- tion between tweet count and retweet volume and 4 out of the top 10 accounts are affiliated with the Trump campaign in both months. By volume, tweets from Trump's official account ac- counted for 62% and 54% of pro-Trump retweets com- pared to 68% and 52% for Clinton in September and October respectively. In fact, Trump was more likely to be retweeted than Clinton. In September, the average retweet count for Trump was 8,434 compared to 5,140 for Clinton. Similarly in October, Trump was retweeted 13,471 time on average compared to 8,080 for Clinton. Figures 5 and 2 show the volume of retweets per au- thor for September and October respectively. Tables 3 and 4 list the most retweeted tweets over the months of September and October respectively in support of both 5The number of retweets in Tables 1-4 are taken at the time of the study. This number is expected to change over time 0100,000200,000300,000400,000500,000600,0009/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Total number of retweets of the Top50 viral tweets for each candidateTrumpNeitherClinton0100,000200,000300,000400,000500,000600,00010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/1610/31/16Total number of retweets of the Top 50 viral tweets for each candidate (October 2016)TrumpNeitherClinton11010010001000010000010000001000000011223344556677889100111122133144155166177188Tweet volume per author (log scale)AuthorsTrumpClinton110100100010000100000100000010000000110192837465564738291100109118127136145154163172181190Unique tweets per user (log scale)AuthorsTrumpClinton candidates. Again, tweets by the official accounts of the candidates dominate the top spots. Also, aside from Trump's tweet stating "Mexico will pay for the wall!", none of the top tweets discuss policy, but are rather at- tacks against the other candidate or their supporters or self promotion. Limitations To better understand the results presented here, there are a few limitations that need to be considered: 1. The top 50 viral tweets do not have to be represen- tative of the whole collection. Nonetheless, they still represents over 50% of the tweets volume on the US elections during the period of the study. 2. Results are based on tweets collected from Tweet- Elect. Although it is highly robust, the site uses au- tomatic filtering methods that are not perfect. There- fore, there might be other relevant viral tweets that were not captured by the filtering method. 3. Measuring support for a candidate using viral tweets does not have to represent actual support on the ground for many reasons. Some of these reasons in- clude the fact that demographics of Twitter users may not match the general public, more popular ac- counts have a better chance of having their tweets go viral, or either campaign may engage in astroturfing, in which dedicated groups may methodically tweet or retweet pro-candidate messages. Conclusion and Future Work In this paper, we presented the top retweeted tweets (viral tweets) from September and October 2016 sup- porting the two main candidates for the 2016 US pres- idential elections. We provided quantitative and qual- itative analysis of these top tweets. Our results show that pro-Trump tweets were retweeted more often than pro-Clinton tweets, and he had more support on most days, especially in October, few days before the election day. Further analysis is required to determine the leanings of the authors of negative/positive tweets and the topics of interest that they discussed. In addition, it is very interesting to study if these trends for both candidates are natural, or if campaign are engaged in astroturfing, in which dedicated groups of people methodically tweet or retweet pro-candidate messages. References [Magdy and Elsayed 2016] Magdy, W., and Elsayed, T. 2016. Unsupervised adaptive microblog filtering for broad dynamic topics. Information Processing & Man- agement 52(4):513–528. [Magdy 2013] Magdy, W. 2013. Tweetmogaz: a news portal of tweets. In Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval, 1095–1096. ACM. [Oppenheim 2016] Oppenheim, M. 2016. Ivanka trump cuts interview short after questions over father's 'preg- nancy is inconvenient for business' quote. Indepen- dent.co.uk. [Shirky 2011] Shirky, C. 2011. The political power of so- cial media: Technology, the public sphere, and political change. Foreign affairs 28–41. [West 2013] West, D. M. 2013. Air wars: Television ad- vertising and social media in election campaigns, 1952- 2012. Sage. Figure 7: The direction of support of the top viral tweets during September on the US presidential election 2016 Figure 8: The direction of support of the top viral tweets during October on the US presidential election 2016 051015202530354045509/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Top50Viral TweetsTrumpNeitherClinton0123456789109/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Top10Viral TweetsTrumpNeitherClinton02468109/1/169/2/169/3/169/4/169/5/169/6/169/7/169/8/169/9/169/10/169/11/169/12/169/13/169/14/169/15/169/16/169/17/169/18/169/19/169/20/169/21/169/22/169/23/169/24/169/25/169/26/169/27/169/28/169/29/169/30/16Top10FViral TweetsTrumpNeitherClinton54%7%39%Top50Viral Tweets (Overall)TrumpNeitherClinton62%5%33%Top10Viral Tweets (Overall)TrumpNeitherClinton57%16%27%Top10FViral Tweets (Overall)TrumpNeitherClinton0510152025303540455010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/16Top50Viral TweetsTrumpNeitherClinton01234567891010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/16Top10Viral TweetsTrumpNeitherClinton024681010/1/1610/2/1610/3/1610/4/1610/5/1610/6/1610/7/1610/8/1610/9/1610/10/1610/11/1610/12/1610/13/1610/14/1610/15/1610/16/1610/17/1610/18/1610/19/1610/20/1610/21/1610/22/1610/23/1610/24/1610/25/1610/26/1610/27/1610/28/1610/29/1610/30/16Top10FViral TweetsTrumpNeitherClinton67%8%25%Top50Viral Tweets (Overall)TrumpNeitherClinton75%5%20%Top10Viral Tweets (Overall)TrumpNeitherClinton65%16%19%Top10FViral Tweets (Overall)TrumpNeitherClinton Table 1: Most retweeted accounts supporting the two candidates for September Account Hillary Clinton Ozzyonc Jerry Springer Senator Tim Kaine Daniel Dale David Fahrenthold Little Miss Flint Bernie Sanders Joe Biden I'm 5'13 Account Donald J. Trump Kellyanne Conway WikiLeaks Donald Trump Jr. Paul Joseph Watson Daniel Scavino Jr. Mike Cernovich DEPLORABLE TRUMPCAT Fox News Lou Dobbs pro-Clinton Number of Tweets Retweet volume description 386 1 1 8 5 4 1 5 4 1 1,984,078 Official account 152,756 Twitter user 150,872 Tabloid TV show presenter 31,769 Running mate official account 29,885 Canadian journalist 29,557 Washington Post reporter 28,863 Civic activist 28,513 Democratic presidential candidate 25,300 Vice president 22,306 Twitter user pro-Trump Number of Tweets Retweet volume description 251 48 22 22 29 15 25 14 14 9 2,117,249 Official account 106,796 Campaign strategist 102,242 Site that released Clinton emails 63,611 Trump's son 60,460 Right-leaning journalist 46,300 Campaign strategist 37,317 29,381 Twitter user 28,706 Right-leaning media 22,752 Lawyer and author Fox News anchor Table 2: Most retweeted accounts supporting the two candidates for October Account Hillary Clinton Stephen King Bailey Disler Kat Combs Es un racista Erin Ruberry Senator Tim Kaine Richard Hine billy eichner Jeb Bush Account Donald J. Trump WikiLeaks Kellyanne Conway Official Team Trump Mike Pence Dan Scavino Jr. Paul Joseph Watson Jared Wyand Rob Fee Donald Trump Jr. Number of Tweets Retweet volume description pro-Clinton 246 2 1 1 1 1 12 1 2 1 1987701 Official account Famous author 135744 124322 Twitter user 105118 Twitter user 102063 Twitter user 72167 Twitter user 68898 Running mate official account 66817 Marketing executive 66761 Comedian and actor 64545 Republican politician Number of Tweets Retweet volume description pro-Trump 366 66 60 30 36 45 40 20 1 18 4930413 Official account Site that released Clinton emails 758814 271857 Campaign strategist 233680 Trump campaing 216982 Running mate official account 200315 Campaign strategist 189277 Right leaning journalist 110943 Self proclaimed nationalist 99401 Comedian 77036 Trump's son Table 3: Top retweeted tweets supporting each candidate for September 2016. Most retweeted pro-Clinton Tweets Author Ozzyonc Date Tweet 9/15 Donald Trump said pregnancy is very inconvenient for businesses like his mother's Count 152,756 Jerry Springer Hillary Clinton pregnancy hasn't been inconvenient for the whole world. 9/27 Hillary Clinton belongs in the White House. Donald Trump belongs on my show. 9/27 RT this if you re proud to be standing with Hillary tonight. #debatenight Hillary Clinton Hillary Clinton 9/27 9/10 never said https://t.co/91tBmKxVMs I https://t.co/6T8qV2HCbL Except for African Americans Muslims Latinos immigrants women veterans – and any so-called losers or dummies. https://t.co/rbBg2rXZdm – Donald Trump who that. #debatenight that. said Most retweeted pro-Trump Tweets Author Donald J. Trump Donald J. Trump Donald J. Trump Donald J. Trump Donald J. Trump Date Tweet 9/24 If dopey Mark Cuban of failed Benefactor fame wants to sit in the front row perhaps I will put Gennifer Flowers right alongside of him ! 9/20 Hillary Clinton is taking the day off again she needs the rest. Sleep well Hillary - see you at the debate! 9/01 Mexico will pay for the wall! 9/27 Nothing on emails. Nothing on the corrupt Clinton Foundation. And nothing on #Benghazi. #Debates2016 #debatenight 9/10 While Hillary said horrible things about my supporters and while many of her supporters will never vote for me I still respect them all! 150,872 72,443 72,111 50,913 Count 30,950 30,900 30,464 27,177 25,882 Table 4: Top retweeted tweets supporting each candidate for October 2016. Most retweeted pro-Clinton Tweets Author Bailey Disler Date 10/26 Good morning everyone especially the person who destroyed Donald Trump's walk Tweet Count 124,322 of fame star https://t.co/IcBthxMPd9 Stephen King 10/21 My newest horror story: Once upon a time there was a man named Donald Trump 121,635 Kat Combs Es un racista and he ran for president. Some people wanted him to win. 10/10 Trump writing a term paper: Sources Cited: 1. You Know It 2. I know It 3. Every- body Knows It 10/08 Anna for you to sit here call Trump a racist is outrageous Anna: OH?! Well lemme 105,118 102,063 Rob Fee 10/08 How are so many people JUST NOW offended by Trump? It s like getting to the 99,401 do it again in 2 languages! https://t.co/nq4DO7bN7J 7th Harry Potter book realizing Voldemort might be a bad guy. Most retweeted pro-Trump Tweets Author Donald J. Trump WikiLeaks Tweet Date 10/08 Here is my statement. https://t.co/WAZiGoQqMQ 10/14 Democrats prepared fake Trump grope under the meeting table Craigslist employ- Count 52,887 45,348 WikiLeaks 10/03 Hillary Clinton on Assange Can't we ment advertisement in May 2016 https://t.co/JM9JMeLYet just drone https://t.co/S7tPrl2QCZ https://t.co/qy2EQBa48y this guy – report 45,233 Mike Pence 10/10 Congrats to my running mate @realDonaldTrump on a big debate win! Proud to 42,178 Donald J. Trump stand with you as we #MAGA. 10/08 The media and establishment want me out of the race so badly - I WILL NEVER DROP OUT OF THE RACE WILL NEVER LET MY SUPPORTERS DOWN! #MAGA 41,386
1410.7143
2
1410
2016-11-07T17:42:52
Prediction of "Forwarding Whom" Behavior in Information Diffusion
[ "cs.SI", "physics.soc-ph" ]
Follow-ship network among users underlies the diffusion dynamics of messages on online social networks. Generally, the structure of underlying social network determines the visibility of messages and the diffusion process. In this paper, we study forwarding behavior of individuals, taking Sina Weibo as an example. We investigate multiple exposures in information diffusion and the "forwarding whom" problem associated with multiple exposures. Finally, we model and predict the "forwarding whom" behavior of individuals, combining structural, temporal, historical, and content features. Experimental results demonstrate that our method achieves a high accuracy 91.3%.
cs.SI
cs
ISSN 1673-9418 CODEN JKYTA8 Journal of Frontiers of Computer Science and Technology 1673-9418/2016/10(11)-1524-08 doi: 10.3778/j.issn.1673-9418.1509083 E-mail: [email protected] http://www.ceaj.org Tel: +86-10-89056056 * 鲍 鹏 1,2,沈华伟 1+,程学旗 1 1. 中国科学院 计算技术研究所,北京 100190 2. 北京交通大学 软件学院,北京 100044 Prediction of Forwarding Whom Behavior in Information Diffusion 􀆽 BAO Peng1,2, SHEN Huawei1+, CHENG Xueqi1 1. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China 2. School of Software Engineering, Beijing Jiaotong University, Beijing 100044, China + Corresponding author: E-mail: [email protected] BAO Peng, SHEN Huawei, CHENG Xueqi. Prediction of sion. Journal of Frontiers of Computer Science and Technology, 2016, 10(11) 1524-1531. forwarding whom behavior in information diffu- Abstract: On online social networks, follow- ship network among users underlies the diffusion dynamics of messages; meanwhile, the structure of underlying social network determines the visibility of messages and forwarding activities in the diffusion process. Taking SinaWeibo as an example, this paper focuses on multiple exposure phenomena in information diffusion, and investigates the patterns and regularities of users forwarding behavior among multiple exposures combined with the structure of follow-ship network. This paper analyzes the"forwarding whom"prob- lem of users among multiple exposures in information diffusion, aiming to model and predict the forwarding behav- ior of individuals, combining content features, network structure, temporal and historical information. The experi- mental results demonstrate that the new method achieves a high accuracy of 91.3%. Key words: online social network; information diffusion; multiple exposures; forwarding whom 􀆳 在线社会关系网络中,用户之间的关注关系网络承载着上层的信息传播,关注关系网络的结构影响着 * The National Natural Science Foundation of China under Grant Nos. 61472400, 61232010, 61174152 (国家自然科学基金); the National Basic Research Program of China under Grant Nos. 2014CB340401, 2013CB329606 (国家重点基础研究发展计划(973 计 划)); the Fundamental Research Funds for the Central Universities of China under Grant No. 2015RC031 (中央高校基本科研业务费 专项资金). Received 2015-09, Accepted 2015-12. CNKI 网络优先出版: 2015-12-14, http://www.cnki.net/kcms/detail/11.5602.TP.20151214.1644.002.html 鲍 鹏 等:信息传播中的用户转发选择预测 1525 消息的可见度,并影响着信息传播过程的转发选择。以新浪微博为例,围绕信息传播中的多次暴露现象展开 研究,结合用户关注关系网络的结构,探索信息传播过程中多次暴露情形下用户转发选择行为的模式和规 律。针对信息传播中用户在多个暴露源下的转发选择预测问题,融合消息内容、网络结构、时序和交互历史等 多方面因素,建模和预测用户转发选择。实验结果表明,新方法的预测准确率高达 91.3%。 在线社会关系网络;信息传播;多次暴露;转发选择 A TP391 1 随着信息技术的高速发展,当今人们正逐步迈 进一个全新的网络化、数字化、虚拟化的工作和生活 环境。越来越多的网民通过网络获取信息,并参与 到信息的生成过程中,进而不断地促进网络的社会 化。在用户群体规模飞速增长的同时,人们的信息 需求和参与网络的方式也不断发生着变化。近年 来,社交网站和社会媒体等在线社会关系网络逐渐 成为互联网服务和应用的主流,典型代表包括 Face- book、Twitter、微博等。这些在线社会关系网络中,人 的互联和信息互联高度融合,人人参与到信息的产 生与传播过程,人们信息传播和信息共享的诉求得 到了极大程度的满足,并获得了前所未有的信息自 主权。同时,大量的用户信息也带来了诸如信息过 载、内容碎片化等问题,给学术研究和产业应用带来 了新的挑战。因此,深入分析在线社会关系网络,建 模和预测个体的行为具有重要意义。 在很长的一段历史时期内,由于难以获得大规 模数据以提供稳定统计,信息传播和人类行为预测 的研究主要局限于统计物理、社会学、认知学、心理 学、行为学等学科的小规模样本分析。然而,对于小 样本的研究分析结果的稳定性和代表性的质疑从未 间断过。作为衔接人类社会与网络空间的纽带,在 线社会关系网络汇聚了大量可感知、可计算的网络 数据。这类网络数据详细记录了用户之间的网络结 构以及用户产生信息的传播轨迹,这些人类活动的 真实记录为研究在线社会关系网络上的信息传播以 及个体行为提供了宝贵的数据资源和难得的机遇。 在国内外学术界和产业界,利用在线社会关系上的在 线行为数据研究人类行为逐渐成为关注的热点[1-2]。 在信息传播过程中,个人行为存在很强的随机 性和自发性,不同的个体具有各异的行为模式,个体 在参与信息传播时会采取不同的决策模式,使得个 体传播行为呈现出差异性和不确定性。Barabási[3]发 表在 Nature 的论文分析了人类行为的时间间隔,指出 人类行为具有阵发性(burst),并给出了一种基于优 先级的排队模型来解释该现象,从此拉开了人类动 力学研究的序幕。Song 等人[4]基于大量手机用户的 通话记录,挖掘了单个用户的移动行为模式,其研究 结果表明,用户的位置移动具有高达 93%的可预测 性。Katz[5]在社会学中提出了"两级传播"理论,强调 了具有高影响力的"意见领袖"在行为传播中起着重 要的作用。Wu 等人[6]对 Twitter 全网数据进行了实证 研究,并发现不同类型用户在行为周期上具有多样 性。Liben-Nowell 等人[7]利用大量互联网连环信的轨 迹,发现连环信的传播树展现出窄而深的树状结 构。Leskovec 等人[8]发现,在社交网络上商品的口口 相传推荐中,人与人之间的影响力会对推荐结果起 到影响。Yang 等人[9]分析了消息传播过程中的时序 性特征,将消息传播过程聚类成 6 种常见类型,为理 解社交网络上的用户行为提供了一些启发。Suh 等 人[10]在大规模社交网络数据上分析了影响个体转发 行为的因素,发现消息自身的 URL 和 Hashtag 对于预 测个体的转发行为具有重要指示作用。Romero等人[11] 提出了粘着力(stickness)和持久力(persistence)两个 重要概念,分析不同领域内的 Hashtag 在 Twitter 上的 传播过程。Myers 等人[12]发现社交网络外部因素是 造成信息扩散不可预测性的一个重要因素,融合了 外部因素后的个体行为建模可以显著地提高信息扩 散的预测准确性。Macskassy 等人[13]从另外一个角度 研究了 Twitter 上用户的转发行为,他们发现反同质 性在个体转发行为上起到重要作用。Aral 等人[14]认 1526 Journal of Frontiers of Computer Science and Technology 计算机科学与探索 2016, 10(11) 为用户自身属性中不仅具有影响力,还有易受影响 程度,进而从接受和影响两个角度对用户行为进行 建模和预测。Bao 等人[15-17]研究了微观结构和时序信 息对个体转发行为的影响,从而更好地预测消息未 来的流行度。Ugander 等人[18]对信息传播的微观机制 做了更深入的研究,发现个体受感染的概率不是由 该个体的接触邻居个数决定的,而是由其接触邻居 的连通分支个数决定的。 综上所述,在线社会关系网络中信息传播的基 本规律目前尚未得到深刻理解和充分掌握,关于个 体行为建模和预测的工作主要针对用户面对一条消 息仅一次暴露的简单传播场景。本文将以新浪微博 (http://weibo.com)为例,研究信息传播过程中的多次 暴露现象(即消息在传播过程中暴露于一个用户多 次),并建模和预测用户的转发选择行为。 2 2.1 微博是一种基于用户关系的信息分享、传播以 及获取平台,用户可以通过 Web、WAP 等各种客户端 组建个人社区,以不超过 140 字的文字更新信息,并 实现即时分享。根据 CNNIC 关于中国社交类应用用 户行为研究报告的统计(http://www.cnnic.net.cn/hlw- fzyj/hlwxzbg/201408/P020140822379356612744.pdf), 在 2014 年上半年中,43.6%的网民使用过微博,其中 使用过新浪微博的网民比例最高。80.3%的新浪微 博用户通过新浪微博关注新闻/热点话题,新浪微博 已经成为人们了解热点信息的主要渠道之一,也是 在线社会关系网络中信息传播研究的代表性场景。 本文使用的数据集是第 13 届在线信息系统工程 会议(Web information system engineering,WISE)所 发布的新浪微博数据集(http://www.wise2012.cs.ucy. ac.cy/challenge.html)。该数据集不仅包含 5 800 多万 的用户和他们之间所形成的 2 亿 7 000 多万条关注关 系,而且包括从 2009 年 8 月至 2012 年 1 月期间这些 用户发布的消息及其完整的传播轨迹,其中还包括 消息的主要内容属性(如是否包含嵌入式 URL、相关 热点事件关键词等)。 2.2 在新浪微博中,用户与用户之间存在着"关注" 和"被关注"的关系,形成了一个关注关系网络(rela- tionship network)。用户发出的消息(文中用户发出 的消息均包括原发和转发两种消息类型)正是沿着 该网络的结构被其关注者看到并传播开的。因此, 关注关系网络的结构是其上信息传播的基础,不仅 影响着消息的传播,同时也会受其作用而动态演 化。随着网络中的连边越来越稠密,信息传播过程 也会产生一些复杂的现象。 本文首先定义并探索了信息传播过程中消息的 "暴露"(exposure)现象。当一条消息被用户发出后, 该用户的所有关注者都会看到这条消息,则称消息 暴露于该用户的关注者一次。如图 1 所示,一条消息 在传播过程中,先后于 t1 时刻被用户 Bob 转发,t2 时 刻被用户 Jim 转发。在关注关系网络中,由于用户 Allen 同时关注了 Bob 和 Jim 两人,该消息将会两次暴 露给 Allen。这就是本文所研究的信息传播中的多次 暴露现象。为了探索真实信息传播过程中,消息多 次暴露现象是否存在,本文利用消息的传播轨迹,结 合关注关系网络,统计信息传播过程中消息暴露于 用户的次数分布,如图 2 所示。 Fig.1 Multiple exposure in information diffusion 1 3 本文首先提出信息传播中的用户转发选择预测 问题,并对其进行形式化。然后从内容、结构、时序、 鲍 鹏 等:信息传播中的用户转发选择预测 1527 外,消息当前的流行度也会对用户转发选择行为起 一定的指示作用。例如对于那些被人们大量转发的 热门消息,用户更愿意转发消息源或者较为权威的 暴露源。 3.2.2 首先考察两个暴露源之间的结构特征。在图 3 中,Allen 所面临的一个暴露源为 Bob,另一个暴露源 为 Jim。在有向关注关系网络中,Bob 与 Jim 之间存 在着 3 种可能的关注关系:(1)Bob 与 Jim 之间互不关 注;(2)Bob 与 Jim 之间为单向关注关系,即 Bob 关注 Jim 或 者 Jim 关 注 Bob;(3)Bob 与 Jim 之 间 互 相 关 注。根据 Bao 等人[15]对信息传播中结构基序的研究, 可以知道两个暴露源之间的关注关系是影响用户转 发行为的一个重要因素。其次,入度是衡量用户影 响力和可信度的一个重要因素,因此用户往往更愿 意转发一个高入度的暴露源。信息传播过程中,消 息的源头往往更容易受到人们的关注,因此暴露源 是否为消息的原发者,是一个重要的特征。此外,由 于互惠边对于信息传播也有着重要的作用[19],暴露源 是否也关注了当前用户 Allen 也是一个重要因素。 3.2.3 除了结构特征外,用户的转发选择行为还会受 到时序信息的影响[10]。例如如果两次转发行为时间 间隔过大,用户很有可能并未看到第一次暴露源,因 此转发时间间隔是影响用户转发选择行为的一个因 素。此外,如果一个消息是在系统不活跃时间段 (如深夜)发出的,当用户第二天登录系统时,之前 进行过转发的暴露源很有可能不会被用户看到,因 此消息的原发时间也是一个重要因素。本文主要考 察三方面因素:(1)两个暴露源之间的转发时间间 隔;(2)消息传播过程中的平均转发时间间隔;(3)消 息的原发时间。 3.2.4 用户之间的交互历史体现了用户之间的亲密程 度以及用户一段时间内的关注兴趣,因此也会对用 户的转发选择行为起到一定的影响[6,20]。本文利用当 前用户是否转发过暴露源来表示用户之间的交互历史。 根据上述影响因素的分析,本文主要从消息内 容、消息暴露源的结构、时序以及交互历史四方面提 Fig.2 Statistics of multiple exposure 2 交互历史四方面挖掘影响因素。最后建模和预测了用 户的转发选择行为,并设计实验对其进行验证和分析。 3.1 本文针对消息两次暴露于用户并被其转发的情形, 将用户转发选择预测问题形式化成一个二分类问题。 图 3 为用户转发选择预测问题示例,具体阐述如下。 Fig.3 An example of forwarding whom problem 3 3.2 3.2.1 消息内容信息对于信息传播具有重要的影响。 一个直观的认识是:一条富含信息量的消息,更容易 引起人们的关注和转发,而且每个人也有不同话题 粒度的影响力和易受影响程度[11]。结合微博短文本 内容自身的特点,已有研究结论表明,消息内容中是 否包含嵌入式 URL,消息是否与热点事件相关最能 表达消息的内容属性,并影响用户的传播行为[15]。此 1528 Journal of Frontiers of Computer Science and Technology 计算机科学与探索 2016, 10(11) 取特征,用于模型的训练与预测。详细的特征选择 及其描述如表 1 所示。 4 4.1 本文在数据集中选取 2011 年 7 月和 8 月的数据 分别作为训练集和测试集,抽取出所有用户两次暴 露于消息并最终转发的例子。最终,训练集包含 10 390 个例子,测试集包含 11 041 个例子。依据表 1 进行特征提取后,选择机器学习中经典的二分类模 型--逻辑回归(logistic regression)模型来预测用户 的转发选择行为。 文中二分类因变量 y 的取值有两种可能(0 和 =1 表示 Allen 会转发暴露源 Jim, =0 1)。以图 3 为例,y =1 , ,…, 表示 Allen 不会转发暴露源 Jim。设结果 y x1 p 。假设 x1 概率为 p ,y 的概率则为 1- =0 的 y x m 表示结果为 y 的 m 个影响因素。本文实验中 m 对应 =1 的概率为: 表1的特征编号,用逻辑回归公式表示 y = p 1 β1x1+ β0+ , …, 1+e-( , , β2 β1 式中,β0 β2x2+…+ ) β x m m β m 是模型的参数,即回归系数。 本文采用极大似然法进行回归系数的估计。假 ,其对数 y , …, , 设有 n 个观测样本,其观测值为 y1 y2 似然函数如下所示: +…+ ]} =∑ = + n { 1 ln[1+e β0+ β1x1 β1x1+ β2x2+…+ β2x2 ln + β0 ( L β y i i )- x m m n β x m m 实验中使用准确率(Precision)、召回率(Recall) 及 F 值为指标对模型预测结果做出评价,其计算方 法如下所示: Precision 预测 且预测正确的样本总数 将转发 Jim Allen Jim 将转发 的样本总数 Recall 预测 Jim 将转发 Allen Jim 且预测正确的样本总数 实际 转发 的样本总数 = Allen = Allen 预测 Table 1 Features list 1 特征描述 消息是否包含嵌入式 URL 消息是否与热点事件相关 消息当前流行度 (用消息被转发的次数来度量) Bob 是否关注了 Jim Jim 是否关注了 Bob Bob 是否关注了 Allen Jim 是否关注了 Allen Jim 的入度是否大于 Bob Jim 的入度是否大于 Allen Bob 的入度是否大于 Allen Bob 是否为消息的原发者 Bob 和 Jim 转发时间间隔(小时) 之前连续转发的平均时间差(小时) 取值 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 0 表示流行度介于 0~10 1 表示流行度介于 10~100 2 表示流行度介于 100~1 000 3 表示流行度介于 1 000~10 000 4 表示流行度大于 10 000 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 实数 实数 消息原发时间是否在活跃时间段(10 am-10 pm) Allen 是否曾转发过 Bob 发出的消息 Allen 是否曾转发过 Jim 发出的消息 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 1 表示"是",0 表示"否" 特征类型 编号 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 内容特征 结构特征 时序特征 交互历史 鲍 鹏 等:信息传播中的用户转发选择预测 1529 = 2 F值 4.2 + × Precision × Recall Precision Recall 本节重点考察模型的预测性能以及各类特征对 于模型预测能力的重要性,实验结果如表 2 所示。可 以发现在融合本文所提取的四方面特征后,模型的 预测准确率高达 91.3%,远远高于随机猜测的 50%, 从而很好地预测了用户的转发选择行为。 Table 2 Experimental results 2 方法 Our method Without content features Without structural features Without temporal features Without history features Precision 0.913 0.814 0.618 0.901 0.887 Recall 0.772 0.631 0.576 0.769 0.782 F 值 0.837 0.711 0.596 0.830 0.831 为了研究各类特征对于模型预测能力的重要 性,本文通过移除相应类别特征的方法,来考察其对 模型预测性能的影响。实验结果表明,移除内容特 征后,F 值从 83.7%下降到 71.1%。因此,内容特征对 于用户转发选择预测具有指示作用。在移除结构特 征后,F 值更是下降到 59.6%。由此可见用户之间的 结构特征,对于用户转发选择行为具有重要的指示 作用。而在分别移除简单时序特征和交互历史特征 后,模型预测性能并没有显著的下降,由此判断,这 两类信息对于用户的转发选择行为的影响较小。 本文将模型训练所得参数列于表 3 中,从而可以 更为清晰地看出各个特征所起的作用。例如特征 11 (表示 Bob 是否为消息的原发者)与 Allen 转发暴露源 Jim 的概率呈负相关,即当 Bob 为消息的原发者时, Allen 更倾向于转发暴露源 Bob 而不是 Jim。再比如 特征 8(表示 Jim 的入度是否大于 Bob)与 Allen 转发 暴露源 Jim 的概率呈正相关,即当 Jim 的入度大于 Bob 时,Allen 更倾向于转发入度大的暴露源 Jim 而不 是 Bob。 Table 3 Feature coefficients 3 特征编号 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 模型参数 β1 β2 β3 β4 β5 β6 β7 β8 β9 β10 β11 β12 β13 β14 β15 β16 系数- - - 0.142 0.014 0.086 0.042 0.014 0.004 0.012 0.213 0.135 0.106 0.246 0.068 0.003 0.017 0.014 0.057 - - - - 露情形下用户转发选择行为的基本规律。针对用户 在多个消息暴露源下的转发选择预测问题,融合了 消息内容、暴露源的结构、时序以及交互历史等多方 面因素,建模和预测了个体的转发选择行为。实验 结果表明,在融合上述特征后,模型的预测准确率高 达 91.3%,其中结构特征和内容特征对于用户转发选 择行为具有重要的指示作用。 本文后续研究方向包括量化用户之间话题层面 的影响力和易受影响程度,探索和建模系统外部事 件对用户转发行为的影响,并结合多次暴露对于用 户转发行为所带来的累积效应,提出了一个用户转 发行为预测的概率模型框架。此外,本文后续还将 研究个体的转发选择行为与消息流行度及其动态过 程之间的关联关系,利用消息早期的扩散信息,通过 对微观个体行为的建模,来预测消息的未来流行 度。为了进一步验证本文的泛化能力和适用场景, 未来还将在多个语料集上进行方法的验证和扩展。 5 本文以新浪微博为场景,围绕信息传播中的多 次暴露现象展开研究,探索信息传播过程中多次暴 References: [1] Lazer D, Pentland A, Adamic L, et al. Computation social science[J]. Science, 2009, 323(5915): 721-724. 1530 Journal of Frontiers of Computer Science and Technology 计算机科学与探索 2016, 10(11) [2] Li Deyi, Zhang Tianlei, Huang Liwei. A down-to-earth cloud the 18th ACM SIGKDD Conference on Knowledge Discov- computing: location- based service[J]. Chinese Journal of ery and Data Mining, Beijing, Aug 12-16, 2012. New York: Electronics, 2014, 42(4): 786-790. ACM, 2012: 33-41. [3] Barabási A-L. The origin of bursts and heavy tails in human [13] Macskassy S A, Michelson M. Why do people Retweet? anti- dynamics[J]. Nature, 2005, 435: 207-211. homophily wins the day![C]//Proceedings of the 5th Inter- [4] Song Chaoming, Qu Zehui, Blumm N, et al. Limits of pre- national Conference on Weblogs and Social Media, Barce- dictability in human mobility[J]. Science, 2010, 327(5968): lona, Spain, Jul 17-21, 2011. Palo Alto, USA: AAAI, 2011: 1018-1021. 209-216. [5] Katz E. The two-step flow of communication: an up-to-date [14] Aral S, Walker D. Identifying influential and susceptible report on a hypothesis[J]. Public Opinion Quarterly, 1957, members of social networks[J]. Science, 2012, 337(6092): 21(1): 61-78. 337-341. [6] Wu Shaomei, Hofman J M, Mason W A, et al. Who says what to whom on Twitter[C]//Proceedings of the 20th Inter- national Conference on World Wide Web, Hyderabad, In- dia, Mar 28-Apr 1, 2011. New York: ACM, 2011: 705-714. [7] Liben-Nowell D, Kleinberg J. Tracing information flow on a global scale using Internet chain-letter data[J]. Proceedings of the National Academy of Sciences of the United States of America, 2008, 105(12): 4633-4638. [8] Leskovec J, Adamic L, Huberman B. The dynamics of viral marketing[J]. ACM Transactions on the We b, 2007, 1(1): 1-28. [9] Yang J, Leskovec J. Patterns of temporal variation in online media[C]//Proceedings of the 4th ACM International Con- ference on Web Search and Data Mining, Hong Kong, China, Feb 9-12, 2011. New York: ACM, 2011: 177-186. [10] Suh B, Hong Lichan, Pirolli P, et al. Want to be retweeted? Large scale analytics on factors impacting retweet in Twitter network[C]//Proceedings of the 2010 IEEE 2nd International Conference on Social Computing, Minneapolis, USA, Aug 20- 22, 2010. Piscataway, USA: IEEE, 2010: 177-184. [11] Romero D M, Meeder B, Kleinberg J. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on Twitter[C]// Proceedings of the 20th International Conference on World Wide Web, Hyderabad, India, Mar 28-Apr 1, 2011. New York: ACM, 2011: 695-704. [15] Bao Peng, Shen Huawei, Chen Wei, et al. Cumulative effect in information diffusion: empirical study on a microblogging network[J]. PLoS ONE, 2013, 8(10): e76027. [16] Bao Peng, Shen Huawei, Huang Junming, et al. Popularity prediction in microblogging network: a cxase study on Sina- weibo[C]//Proceedings of the 22nd International Confer- ence on World Wide Web, Rio de Janeiro, Brazil, Apr 7-11, 2013. New York: ACM, 2013: 177-178. [17] Bao Peng, Shen Huawei, Jin Xiaolong, et al. Modeling and predicting popularity dynamics of microblogs using self- excited Hawkes processes[C]//Proceedings of the 24th Inter- national Conference on World Wide Web, Florence, Italy, Mar 18-22, 2015. New York: ACM, 2015: 9-10. [18] Ugander J, Backstrom L, Marlow C, et al. Structural diversity in social contagion[J]. Proceedings of the National Acade- my of Sciences of the United States of America, 2012, 109 (16): 5962-5966. [19] Zhu Yuxiao, Zhang Xiaoguang, Sun Guiquan, et al. Influ- ence of reciprocal links in social networks[J]. PLoS ONE, 2014, 9(7): e103007. [20] Huang Junming, Li Chao, Wang Wenqiang, et al. Temporal scaling in information propagation[J]. Scientific Reports, 2014, 4: 5334. [12] Myers S A, Zhu Chenguang, Leskovec J. Information diffu- [2] 李德毅, 张天雷, 黄立威. 位置服务: 接地气的云计算[J]. sion and external influence in networks[C]//Proceedings of 电子学报, 2014, 42(4): 786-790. 鲍 鹏 等:信息传播中的用户转发选择预测 1531 BAO Peng was born in 1987. He received the Ph.D. degree in computer science from Institute of Computing Tech- nology, Chinese Academy of Sciences in 2015. Now he is an assistant professor and M.S. supervisor at Beijing Jiao- tong University. His research interests include social media analytics, information propagation and network science. 鲍鹏(1987-),男,安徽六安人,2015 年于中国科学院计算技术研究所获得博士学位,现为北京交通大学讲 师、硕士生导师,主要研究领域为社会媒体分析,信息传播,网络科学。作为科研骨干参与了 863 课题、973 课 题和国家自然科学基金等重要科研任务。 SHEN Huawei was born in 1982. He received the Ph.D. degree in computer science from Institute of Computing Technology, Chinese Academy of Sciences in 2010. Now he is an associate professor and M.S. supervisor at Insti- tute of Computing Technology, Chinese Academy of Sciences. His research interests include social media analytics, information propagation and network science. 沈华伟(1982-),男,河南太康人,2010 年于中国科学院计算技术研究所获得博士学位,现为中国科学院计算 技术研究所副研究员、硕士生导师,主要研究领域为社会媒体分析,信息传播,网络科学。发表学术论文 60 余 篇,主持国家自然科学基金项目 3 项,并承担 863 课题和 973 课题等重要科研任务。 CHENG Xueqi was born in 1971. He received the Ph.D. degree in computer science from Institute of Computing Technology, Chinese Academy of Sciences in 2006. Now he is a professor and Ph.D. supervisor at Institute of Com- puting Technology, Chinese Academy of Sciences. His research interests include Web information retrieval, social media analytics and network data science. 程学旗(1971-),男,安徽安庆人,2006 年于中国科学院计算技术研究所获得博士学位,现为中国科学院计算 技术研究所研究员、博士生导师,中国科学院网络数据科学与技术重点实验室主任,主要研究领域为网络信息 检索,社会媒体分析,网络数据科学。发表学术论文 100 余篇,主持 10 余项国家自然科学基金、973 课题、863 课题等重要科研项目,2014 年获国家杰出青年科学基金资助。
1704.01660
1
1704
2017-04-05T22:25:13
The impact of random actions on opinion dynamics
[ "cs.SI", "math.PR" ]
Opinion dynamics have fascinated researchers for centuries. The ability of societies to learn as well as the emergence of irrational {\it herding} are equally evident. The simplest example is that of agents that have to determine a binary action, under peer pressure coming from the decisions observed. By modifying several popular models for opinion dynamics so that agents internalize actions rather than smooth estimates of what other people think, we are able to prove that almost surely the actions final outcome remains random, even though actions can be consensual or polarized depending on the model. This is a theoretical confirmation that the mechanism that leads to the emergence of irrational herding behavior lies in the loss of nuanced information regarding the privately held beliefs behind the individuals decisions.
cs.SI
cs
The impact of random actions on opinion dynamics Amir Leshem∗and Anna Scaglione† April 7, 2017 Abstract Opinion dynamics have fascinated researchers for centuries. The ability of societies to learn as well as the emergence of irrational herd- ing are equally evident. The simplest example is that of agents that have to determine a binary action, under peer pressure coming from the decisions observed. By modifying several popular models for opin- ion dynamics so that agents internalize actions rather than smooth estimates of what other people think, we are able to prove that almost surely the actions final outcome remains random, even though actions can be consensual or polarized depending on the model. This is a the- oretical confirmation that the mechanism that leads to the emergence of irrational herding behavior lies in the loss of nuanced information regarding the privately held beliefs behind the individuals decisions. Mathematical models of herding phenomena prove the old saying that actions speak louder than words. A classical result shows that sequential Bayesian learners give rise to dysfunctional information cascades because of the overwhelming effect of the actions that are observed. In this work we demonstrate that a variety of popular opinion dynamics models, modified so that the agents internalize the effect of random actions rather than smooth estimates their peers beliefs, create herding, polarized groups or do not converge to a fixed belief. Because of the generality of our analysis, our work cements the notion that actions are poor representations of private information and lead to unpredictable social herding phenomena. There is a vast literature on the subject of opinion dynamics, aimed at modeling how beliefs propagate across a social fabric. In the late 1700s [1] ∗Corresponding Author: Amir Leshem, Faculty of Engineering, Bar-Ilan University, Ramat-Gan, 52900, Israel. Phone: +972-35317409. email: leshema@ biu.ac.il. †Dept. of EE Arizona State University. 1 first noted that averaging individuals' beliefs would, by the law of large num- bers, lead to a noise free average opinion and precise estimate in the limit [1], a concept later popularized broadly in the early 1900's [2]. The models used to derive these insights are very similar to the Bayesian multi-agent models that are pervasive in signal processing [3, 4, 5]. While in signal processing decision criteria are often based on minimizing the expected Bayesian risk, in economics, the decision model of rational agents has been long modeled as maximizing the expected utility in the Bayesian sense. Furthermore, a substantial body of the economics literature assumes that agents reveal im- perfectly their private beliefs through their utility maximizing action. The seminal paper by Bikhchandani, Hirshleifer and Welch (BHW) [6] (see also [7]) highlighted how pathologies, called informational cascades, seem to de- velop when agents make a zero-one decisions (for example, zero is "bad" and one is "good"), instead of averaging continuous values as in [2]. The BHW paper highlights the significant impact of processing discrete actions, as opposed to continuous belief values, on the final behavior of the group. This impact leads to what is often referred to as herding behavior [8]. Other opinion diffusions models and interactions of agents in social networks are reviewed in e.g. [9, 10, 11, 12, 13, 14]. In the last forty years, a flurry of models for opinion dynamics has emerged in the statistical physics literature [12], inspired by ideas aimed at predicting macroscopic behavior that emerges from simple random par- ticles interactions. Among them the voter model, introduced in [15], is one of the simplest non-ergodic opinion diffusion models that leads to herding. This more closely resemble the zero-one interactions in [6] since the agents have two discrete opinions and copy at random one of their neighbors. This model was later mapped onto that of random walkers that coalesce upon encounter by Liggett [16, 17] which made it analytically tractable. An in- teresting variant is the one introduced by Mobilia in [18] where, using a mean-field approach, the author studied the effect of having stubborn agents in the network that, by not changing their opinion, attempt to influence the final equilibrium point. In recent work [19, 20, 21] re-examined this question and analytically characterized its behavior by generalizing the approach in- troduced by Liggett and providing a solution for the strategic placement of stubborn agents in the voter model. Stubborn agents were also considered by Jia et al. [22] Sznajd and coauthors in [23] considered a different discrete opinion dy- namic in which it takes two agents to convince their neighbors of the cor- rectness of their opinion. By contrast, Galam in [24], proposed a variant in which the opinions of the agents switched to the prevalent opinion (a ma- 2 jority rule) in their neighborhood. Since Sznajd dynamics are a special case of the general sequential probabilistic model (GPM) in [25], only two differ- ent phases are possible: either consensus, or coexistence of the two opinions in equal proportions. Interestingly, in the presence of stubborn agents with asynchronous updates, opinion fluctuations exist and convergence is not cer- tain [26]. Continuous belief models and updates, even in the presence of non- linearities (e.g. bounded confidence) are also a popular way to model so- cial dynamics of opinions. A popular form is the Hegselmann-Krause (HK) model (or the bounded confidence (BC) model) [27, 28], where opinions are represented by a real number and are updated synchronously, by averaging all the agents' opinions that differ by less than a confidence level  (set to 1 in [28]). As long as the network is connected, the agents reach a consensus [29] with the average belief in the network. A randomized variant of the HK was introduced by DeGroot in [30] and studied in e.g. [31, 32, 33, 34] in which two randomly chosen neighbors meet and adjust their opinions only when their opinion distance is below a threshold. These models lead either to consensus or polarization, but opinions do converge. Note that in the economics literature, due to the Bayesian update rule, the agents have a continuous belief even if their action and decision variables are discrete (the probability mass function of the decision variable given the private information and history of the actions that were observed). Gener- alizing the analysis in [6] to arbitrary social graphs is both intractable and perhaps futile, given the ample evidence that social agents are not rational [35]. In statistical physics the acronym CODA (continuous opinions discrete actions) was coined much later in [36, 37]. This class of models follows the general idea from economics of assuming that the agents internalize an es- timate of the beliefs of the others obtained by observing their actions. But contrary to the BHW model, CODA models postulate simple mechanisms of opinion contagion, without offering significant detail on the interpretation of the models and providing mostly numerical characterization of their asymp- totic behavior. The strong guarantees and mathematical characterizations of the limiting behavior is completely known only for the simple chain of sequential interactions treated in [6]. Our main results is to offer strong theoretical guarantees that the same emergent behavior of random herding in the BHW model holds more broadly. Our work supports the argument that it is the discrete and random nature of what the agents internalize about the beliefs held by their neighbors that produces the formation of random herds, i.e. herds whose final decision out- 3 come that cannot be predicted with certainty and is, potentially, nefariously wrong. 1 Consensus under the social pressure of actions We assume each agent has only two options to chose from, and we label them choice 0 and choice 1. Assume these choices are made by flipping a coin that is biased by a belief variable xn(t), generating an action an(t) ∈ {0, 1}. For each n, an(t) is a Bernoulli random variable with probability xn(t). To capture the agents' tendency to conform to social norms, we assume that the agents perturb their belief xn(t) by moving towards the weighted mean of their neighbors actions. The agents update their belief as a convex combination of the frequency of action 1 over their neighborhood and their prior belief, i.e.: xn(t + 1) = (1 − α)xn(t) + α(cid:80)N k=1 wnkak(t) (1) We also require that(cid:80) where wnk is a weight function corresponding to the relative weight that agent n gives to the action of agent k if (n, k) is and edge and zero otherwise. k wn,k = 1. We require that the matrix W defined by: will be the transition matrix of an irreducible Markov chain but we do not require wn,n = 0 since it might be that agent n is influenced by its own action (even though it is random and determined by its internal belief xn(t). Basic results from spectral graph theory show that this condition is equivalent to having a network that has a single component, where we have weighted edges between agents n, k whenever wn,k (cid:54)= 0. Note that xn(t) is always an number in [0, 1] and assuming that not all xn(0) are identically 0 or identically 1, we may assume without loss of generality that they are strictly between 0 and 1 (since this will happen with probability 1 in finite time by the averaging property). Introducing the vectors x(t) = (x1(t), . . . , xN (t))T and a(t) = (a1(t), . . . , aN (t)) we note that: E{a(t)x(t)} = x(t), (2) and Cov{a(t)x(t)} = diag{v1(t), ..., vn(t)} (3) where vj(t) = xj(t)(1 − xj(t)) is the variance of agent j at time t. Further- more, P r (a(t) = ax(t)) = n (t)(1 − xn(t))(1−an). xan (4) N(cid:89) n=1 4 The value of α determines the influence of the actions on the belief of each agent1. Let us define also the matrix W which has elements wm,n and define Wα = (1 − α)I + αW. (5) We note that for all 0 ≤ α ≤ 1 both W and Wα are stochastic matrices with the same right and left eigenvectors, and spectral radius 1. Let π be the left eigenvector of W corresponding to the largest eigenvalue 1 (nor- malized such that 1T π = 1) and remember that the corresponding right eigenvector is 1. By the Perron-Frobenius theorem we have π >> 0, i.e. all its components are strictly positive. Denoting by J (cid:44) 1πT , (6) By standard theory of stochastic matrices for all α the spectral radius of Wα − J 0 < ρ(Wα − J) < 1 and WαJ = J. Introducing the vectors x(t) = (x1(t), . . . , xN (t))T and a(t) = (a1(t), . . . , aN (t)), we can also note that (1) can be written in vector form as follows: x(t + 1) = (1 − α)x(t) + αWa(t) (7) From (7) it is straightforward to prove the following: Lemma 1 In general E{x(t + 1)x(t)} = Wαx(t) and E{Jx(t + 1)x(t)} = Jx(t). The proof of the lemma is provided in the supplementary material. This lemma clarifies the connection with the classic opinion dynamics model in- troduced by DeGroot [30], which is identical to our model in expectation. The weights in the matrix Wα in the DeGroot model typically areinterpreted as being the trust individuals place on each other. The average dynamics are also a classic example of the so called Average Consensus Gossiping (AGC) algorithms [38]. For a connected network is well known that these dynamics lead to consensus on the state. Note however (7) is not deterministic and the fact that actions are discrete leads to very different dynamics than AGC as the following lemma shows: Lemma 2 The network has only two stationary states: x(t) = 1 and x(t) = 0. 1We assume that α is independent of n for notational simplicity, but all arguments go through even when αn depends on the player. 5 Proof: It is clear that in both cases, x(t) = 0 or x(t) = 1, if we evaluate (4) for x(t) = 0 P r (a(t) = 00) = 1 and x(t) = 1 P r (a(t) = 11) = 1. This implies (7) leads to a fixed point x(t + 1) = x(t). Any other belief level will place a non-zero probability in all a(t + 1) ∈ {0, 1}N therefore making it possible to deviate from the previous belief for every α > 0. Interestingly, the fact that there are stationary states, does not suffice to prove that the beliefs indeed converge to the stationary states. This convergence is the main result. Denote the expected value of x(t) by µx(t): µx(t) = E{x(t)}. (8) Let the network weighted sample average of the beliefs according to the stationary distribution π at time t be: q(t) = πT x(t). The next lemma leverages results in the AGC literature [38]: Lemma 3 The expected value in (8) is such that t→+∞ µx(t) = E{q(0)}1. lim (9) (10) The simple proof of this lemma is relegated to the supplementary material for brevity. While this property is not surprising, what is interesting is the following result: Theorem 1 The mechanism in (1) leads to herding, i.e. (cid:16) ∀n, P r t→∞ xn(t) ∈ {0, 1}(cid:17) lim = 1. Moreover, the limit is identical to all agents, i.e., either all agents end up with belief 0 or all of them end up with belief 1. The first part of the proof of this lemma is similar to that used in [39] albeit for a different opinion diffusion model to show that the process converges to a random variable with probability 1. However, in contrast to [39], our model leads to herding while their model leads almost surely to consensus on the true value of the parameter. The second part resorts to the Lesbegue dominated convergence theorem to prove that the limiting random variable must be equal to either 0 or 1: Proof: We know that the only stationary belief levels are x = 0 or x = 1, since for every other vector there is a positive probability that the average 6 action will cause a deviation up to α, however, in contrast to the voter's model this is insufficient, since when the initial state has all beliefs strictly between 0 and 1, at any given stage the beliefs will be in the open interval (0, 1) since they are convex combinations of the current belief with a num- ber in [0, 1] and convergence is not achieved in finite time. Since W is a stochastic matrix. Let q(t) = πT x(t) be the average belief level in the net- work according to the stationary distribution of Wα. We will show that q(t) is a martingale process with respect to the beliefs. To that end we observe that: q(t + 1) = πT x(t + 1) = πT [(1 − α)x(t) + (αW)a(t)] . (11) where a(t) is the action vector at times t. Computing the expectation of both sides conditioned on x(t) we observe that: E{q(t + 1)x(t)} = πT Wαx(t) = πT x(t) = q(t), (12) since π is a left eigenvector of Wα with an eigenvalue equal to 1 and by the Perron-Frobenius theorem all its elements are strictly positive, since the network is connected (which is equivalent to the Markov chain defined by W is irreducible. This implies that q(t) is a martingale with respect to the sigma-algebra determined by the sequence of beliefs x(t). By definition q(t) is a bounded sequence, as the weighted mean of a vector with elements between 0 and 1. By the martingale convergence theorem the sequence q(t) must converge to a random variable q∞ with probability 1. We need to show that q∞ is almost surely either 0 or 1, Consider now for t > 1 the sequence ∆q(t) = q(t) − q(t − 1), i.e. the martingale difference sequence. For each t by the martingale property, E {∆q(t)} = 0. (13) Since π is a probability vector and for all n, t 0 ≤ xn(t) ≤ 1 we have that for all n, t q(t) < 1 as well as ∆q(t) < 1. Therefore, by the almost sure convergence of q(t) which implies that also lim t→∞ var(∆q(t)) = 0, a.s. t→∞ var(∆q(t)q(t − 1)) = 0, a.s. lim (14) (15) Similarly ∆q(t) < 1 and converges almost surely to 0. Hence by the Lesbegue dominated convergence theorem ∆q(t) converges to 0 in the mean square 7 sense. If we express explicitly the conditional variance of ∆q(t) var(∆q(t)q(t − 1)) = E(cid:8)∆q2(t)q(t − 1)(cid:9) = α2(cid:80)N = α2(cid:80)N n=1 π2 n=1 π2 nvar(an(t)) nxn(t)(1 − xn(t)). Since for all n, πn > 0 the MS convergence implies that ∀ n. t→∞ xn(t)(1 − xn(t)) = 0 lim Simple probabilistic computation shows that either for all n lim t→∞ xn(t) = 0 or lim t→∞ xn(t) = 1. (16) (17) (18) ends the proof of the main theorem. In fact, if for some j, n which are connected, xn(t) converges to 1 while xj(t) converges to 0, since the actions are independent, there will be with probability 1 infinitely many deviations of at least min{Wn,k : wn,k (cid:54)= 0} of both xn(t) and xj(t), contradicting the convergence of both xn(t) and xj(t). This implies that herding must be achieved with probability 1, which It should be noted that while the limit variables xn(∞) have values 0, 1, each initial condition has a different probability of converging to 0 or 1, which implies that what outcomes prevails, wrong or right, is random and therefore social pressure can lead to umpredictable collective behavior, in spite of the initial information the agents have available to forge their opinion. We would like to determine its distribution given an initial value or a distribution of initial values. The next corollary will show that xn(∞) is a binomial random variable with mean q(0). This implies that the variance of xn(∞) is q(0) (1 − q(0)). In fact, the combination of the lemma above and the main theorem leads to the following corollary: Corollary 1 Let x(0) be the agents' initial belief level vector. The prob- ability that the agents herd to action an(t) = 1 is q(0) = 1T x(0), i.e. limt→+∞ P r(xn(t) = 1) = q(0). Proof: Since, as t → +∞, the network can only be in one of the two fixed points x(t) = 1 or x(t) = 0, the probability that it will endup on one of these two states is, as indicated in Lemma 3, equal to the average initial belief. Interestingly, no matter what the initial state is, we cannot predict the outcome of the herding for sure. No matter how close the population belief 8 is to 0 or 1 initially, it is always possible that they will herd towards the op- posite action. If it is indeed true that the social pressure mechanism is based on internalizing the actions of one's peers, we cannot predict accurately the outcome of the social dynamics. Applying this to market behavior, where people favor one product over the other, this indicates a quality brand that has high probability of capturing a large percentage of the market if indi- viduals were to choose in isolation, may actually fail and other firms with worse products have a fighting chance to capture it. Furthermore, we can see that even in large markets driven only by the consumers repeated actions, a winner takes all cascade eventually happens, and one product wins the majority of the market share irrespective of the initial individual evidence to the quality of the product. This may not always be the case however. In the next section we generalize our analysis first to random interactions and show the same type of herding phenomenon happens as well in that context. We also show that when social pressure is mitigated by mistrust for what deviates excessively from ones prior belief, then the society may split in multiple herds. 1.1 Randomized interactions A simple variation of our model is one that captures random interactions among the agents. In this case (1) becomes xn(t + 1) = (1 − α)xn(t) + α(cid:80)N k=1 wnk(t)ak(t) (19) where the weights wnk(t) are non zero only for those individuals who ob- serve and are affected by their peers actions in that particular epoch. We assume wnk(t) are random processes independent from the actions the nodes performed, which continue to be modeled as in the previous section. Cor- respondingly, we can define the random matrices W(t) and Wα(t) as be- fore. Interestingly this variation of the model hardly changes the result and random herding ensues also in this case almost surely. Let us now assume that these random matrices are ergodic processes and denote by W = E{W(t)}. If all nodes will speak infinitely often with peers and the average W = E{W(t)} is a stochastic matrix with eigenvalue 1 with multi- plicity 1, then we can easily generalize the proof of our main theorem, using the same definition of π as before: Corollary 2 The statement of Theorem 1 holds unchanged if the interac- tions are random and W = E{W(t)}. 9 Proof: In this case we define: q(t) = πT x(t) In this case, like before: E{q(t + 1)x(t)} = πT Wαx(t) = πT x(t) = q(t), (20) (21) but now the average is also with respect to the process W(t). Nonetheless everything else from this point on follows the steps of the proof of Theorem 1. 2 Bounded confidence models 2.1 Bounded confidence under the influence of actions An interesting generalization of our model is the update with bounded- confidence, where the n'th agent updates happen only where the obser- vations are sufficiently close to the agent own disposition. A natural option is to analyze a model similar to the HK model proposed in [27] for continu- ous opinion dynamics. In the HK model, agents mix their belief only with agents whose belief sufficiently close to their own. In our case, agents update their belief only if the empirical distribution of the actions of its neighbors is sufficiently close to xn(t). We introduce the function: ρ(x) = αxu(x ≤ τ ) (22) in which the confidence threshold τ < 1 and u(x) is the Heaviside (i.e. the unit step) function. The agent's update with bounded confidence in its neighbors is modeled as: xn(t + 1) = xn(t) + ρ wnkak(t) − xn(t) . (23) We note right away that ρ(0−0) = ρ(1−1) = 0, which implies that x(t) = 1 or x(t) = 0 are, once again fixed points. Let us denote by: (cid:32) N(cid:88) k=1 (cid:33) (cid:12)(cid:12)(cid:12) > τ (cid:33) (cid:12)(cid:12)(cid:12)x(t) (cid:32)(cid:12)(cid:12)(cid:12) N(cid:88) k=1 Pn(x(t)) = P wnkak(t) − xn(t) Let: αn(x(t)) = α(1 − Pn(x(t))). 10 (24) (25) We can define a matrix W(x(t)) in the same way as (5), except that we replace α with a diagonal matrix with diagonal elements αn(x(t)). It is straightforward to see that E{x(t + 1)x(t)} = W(x(t))x(t) which are smooth non-linear dynamics equivalent to the HK model. In the action-based HK dynamics a range of stationary beliefs are possible and, also the beliefs may never converge even in distribution. In fact, next we provide an example where the action-based HK model exhibits much more complex behavior than the polarization phenomenon observed in the classical HK model. Let us illustrate this fact with an example. Consider a network with four nodes, with an initial beliefs vector x = (0, 0.45, 0.55, 1)T , a confidence threshold τ = 0.25 and a mixing matrix:  0 W = 1 0 0.5 0.25 0.25 0 0 0 0 0.25 0.25 0.5 0 0 1  . (26) (27) (28) In this case the dynamics of the four nodes are as follows. For the first node: (cid:26)x1(t)+αu(1−x1(t) ≤ τ )(1−x1(t)) a2(t) = 1 (cid:26)x1(t) = 0 x1(t)−αu(x1(t) ≤ τ )x1(t) a2(t) = 1 (1−α)x1(t) = 0 a2(t) = 0 a2(t) = 0 x1(t + 1) = = and the reason why x1(t) = 0 is that we assumed that x1(0) = 0 and all later values remain unchanged. Similarly, without giving a proof we can show that x4(t) = 1 (just by symmetry 1 − x4(t) behaves like x1(t)). For node number two, when update is activated, the node has a new state that is a convex combination of x2(t) with either 0.25 or 0.5. Therefore: (1 − α)x2(t) + α 0.25 ≤ x2(t + 1) ≤ (1 − α)x2(t) + α 0.5 (29) and, since the node starts at x2(0) = 0.45, the subsequent values will have to remain confined in the interval (0.25, 0.5). For similar reasons x3(t) will remain in the interval (0.5, 0.75). However, they both will change randomly. In fact, x2(t) will change due to a3(t) and viceversa x3(t) will change based on a2(t). Therefore no convergence in distribution is attained and the opin- ions will continue to fluctuate indefinitely in the intervals discussed above. This is shown numerically in the next section in Fig. 4. 11 2.2 Reinforcement model with random pairwise interactions We propose an alternative model for the update. We assume that if agents n observe at random one of its neighbors, say the kth neighbor, make the same decision, agent n will adjust the belief as follows: xn(t + 1) = xn(t) + αδ[an(t) − ak(t)](an(t) − xn(t)), (30) where δ[x] is the Kronecker delta function. We view this model as a mechanism that reinforces behavior, because it tends to decrease or increase the belief based on the frequency with which ones action is repeated in the neighborhood. In this case the only fixed points for the dynamics x have integer entries, but unlike either (12) or (21), in this case the network may never coalesce in taking a single action, but opposite decisions may persist as well. The expectation of these dynamics given a random pair (n, k) is: E{xn(t + 1)x(t), (n, k)} = xn(t)[1 − α(1 − xn(t))(1 − xk(t))] ≤ xn(t). (31) Since this holds for each random choice of (n, k) we observe that from the previous equations, taking the expectation also over the random choices of (n, k) it is clear that the state is a sub-martingale: E{xn(t + 1)x(t)} ≤ xn(t) (32) Next we prove the following lemma: Theorem 2 The mechanism in (30) leads to (cid:16) ∀n, P r t→∞ xn(t) ∈ {0, 1}(cid:17) lim = 1. but not necessarily herding, which in turn means society will be polarized in general. Proof: The argument follows a similar line of reasoning as our previous theorem. Because of the dominated convergence theorem the state xn(t) must converge in the mean square sense. We can see then that the sequence ynk(t) = αδ[an(t)− ak(t)](an(t)− xn(t)) must go to zero in the mean square sense, because each pair is selected at random infinitely often. This can happen in only two cases, either the conditional variance of an(t) − xn(t) goes to zero or δ[an(t) − ak(t)] = 0 with probability one. If we assume the 12 first is not true, then the second implies that the independent actions of the random pair of agents are the same, which can only be if they have equal probability xn(t) = xk(t) ∈ {0, 1}; while this cannot happen in finite time If this does not happen then the variance of it can happen at the limit. an(t) in the limit must be zero which again implies that in the limit the probability converges to either 1 or 0. Both lead to the same conclusion, which proves the theorem. 3 Simulated experiments 3.1 Consensus under the social pressure of actions To demonstrate the herding and clustering phenomenon we proved to be true in Section 1, we performed several Monte-Carlo trials. In the first experiments we randomly picked a random sample graph shown in Figure 1. Figure 1: The random graph used for simulations. Then we picked randomly 5000 initial vectors x(0) whose entries are independent and drawn to have a mean ∀ n E{xn(0)} = p0 varying from 0.2 to 0.8 and chose uniform weights wkn = 1/deg(k), where deg(k) denotes the degree of node k (the graph is undirected). Figure 2 shows the histogram of the limit for various random realizations 13 -2-1.5-1-0.500.511.52-2.5-2-1.5-1-0.500.511.522.512345678910 Figure 2: Histograms of the final belief for p0 = 0.2 and p0 = 0.6. of the process for initial belief levels of p0 = 0.2, 0.6. Figure 3 shows clearly that the actions are Bernoulli random variables whose parameter is correctly predicted by the theorem. 3.2 Action-based HK model In Figure 4 we simulated the dynamics discussed in Section 2 pertaining four nodes with W in (26). Note that there is no agreement but also no convergence of belief, in contrast to the classical HK model and the claims made in Section 2 are corroborated by the simulation results. Furthermore the random process of the opinions of the agents is very complex, as one can notice from the complex non linear dynamics of the mean. This shows that it is much harder to predict a form of polarization because the random pro- cesses x2(t), x3(t) are governed by non-linear stochastic dynamics that are Markovian but non homogeneous, whose trends are difficult to manipulate mathematically to obtain optimum forecasts. Either than resorting to the bounds we mentioned, accurate predictions become intractable, even when the initial conditions are known. 3.3 Reinforcement model In Section 2 we introduced a new model in which nodes move their belief when their action is identical to one of their neighbors, selected at random. In this case we showed that the network in Figure 1, with uniform initial belief equal to 0.5, converges to possibly multiple herds. This is illustrated in our three numerical simulation of the dynamics of the beliefs in Figure 5 where we can clearly observe the emergence of herding towards belief 1 and 14 00.20.40.60.8100.10.20.30.40.50.60.70.80.91p0=0.200.20.40.60.8100.10.20.30.40.50.60.70.80.91p0=0.6 Figure 3: Mean and variance of the limit point as a function of p0. belief 0 by all nodes in the top and bottom figures respectively, as well as the emergence of polarized groups, whose belief is 1 or 0, in the middle plot. This corroborate the statement in Theorem 2. 4 Conclusions In this paper we examined an opinion diffusion model in which agents update their belief based on their neighbors' empirical distribution of the actions. The use of the observed actions leads to herding unlike continuous state updates when neither bounded confidence nor stubborn agents are present in the system showing that the trend observed in the BHW model extends to other settings. 5 Appendix Proof of Lemma 3 We now prove prove Lemma 3 Taking the expectation on both sides of 7, we obtain: µx(t + 1) = (1 − α)E{x(t)} + αWE{E{a(t)x(t)}} = Wαµx(t) = Wα 15 tµx(0) (33) 0.10.20.30.40.50.60.70.80.900.51E{xn(0)}=p0E{xn(∞)} simulationtheoretical0.10.20.30.40.50.60.70.80.90.050.10.150.20.25E{xn(0)}=p0Var(xn(∞)) simulationtheoretical Figure 4: The state of the four node network with W in (26). which is the AGC update that converges to consensus in the limit. In fact t→+∞ Wt = J lim (34) and (35) which proves the claim, since E{q(0)} = πT µx(0). In addition to the lemmas and theorems in the main paper, the following result holds Jµx(0) = 1πT µx(0) Lemma 4 In general and Proof: E{x(t + 1)x(t)} = Wαx(t) E{Jx(t + 1)x(t)} = Jx(t). E{x(t + 1)x(t)} = (1 − α)x(t) + αWE{a(t + 1)x(t)} = (1 − α)x(t) + αWx(t) = Wαx(t). (36) (37) (38) 16 012345678910x 10400.10.20.30.40.50.60.70.80.91 x1(t)x2(t)x3(t)x4(t) Figure 5: Three experiments of the dynamics of the agents beliefs with same initial beliefs that converge to herding (top 0 and bottom 1) and polarization (middle). The second claim follows easily since JWα = J. This shows that in expec- tation the belief follows the same dynamics as the DeGroot model [30]. Simulations of herding under random pairwise interactions We also tested the dynamics where each time two random nodes average their actions, discussed in the Randomized interactions section, and use the averaged action to update their mutual beliefs. Figure 6 describes the random graph used. In this case we describe the course of two dynamics of the population, both where all nodes had an initial belief of 0.9, i.e. all nodes were very inclined to take action 1. The top Figure 7 presents a dynamics converging to 1. We present the lowest belief, the highest belief and the mean belief. As can be seen when the dynamics converge to 1 this happens quite rapidly, because of the initial state of all nodes. The bottom of Figure 7 presents another instance of the dynamics, where initial beliefs were identical to the previous case, but the limiting value of the herding was 0. With the initial conditions defined in the simulation, this occurs only 10% of the simulations. Still this is surprising, as it would be expected that the 17 initial belief will have significant impact on the results of the herding. As predicted by the main theorem, the direction of the herding is unexpected, and governed by the random actions of the agents. Figure 6: 10 nodes networks used for the asynchronous dynamics. 18 References [1] de Caritat (marquis de Condorcet) JAN (1785) Essai sur l'application de l'analyse `a la probabilit´e des d´ecisions rendues `a la pluralit´ee des voix. (De l'Imprimerie royale). [2] Galton F (1907) Vox populi. Nature 75:450–451. [3] Vikram Krishnamurthy ONG, Hamdi M (2014) Interactive sensing and decision making in social networks. Foundations and Trends in Signal Processing 7(1-2):1–196. [4] Krishnamurthy V, Poor HV (2014) A tutorial on interactive sensing in social networks. [5] Sayed AH (2014) Adaptation, learning, and optimization over networks. Foundations and Trends in Machine Learning 7(4-5):311–801. [6] Bikhchandani S, Hirshleifer D, Welch I (1992) A theory of fads, fashion, custom, and cultural change as informational cascades in Journal of Political Economy. Vol. 100, pp. 992–1026. [7] Lohmann S (1994) Dynamics of informational cascades: The monday demonstrations in leipzig, east germany, 1989-1991 in World Politics. Vol. 47, pp. 42–101. [8] Chamley C (2004) Rational herds: Economic models of social learning. (Cambridge University Press). [9] Jackson M (2008) Social and Economic Networks. (Princeton University Press). [10] Easley D, Kleinberg J (2010) Networks, Crowds, and Markets: Reason- ing About a Highly Connected World. (Cambridge University Press). [11] Acemoglu D, Dahleh M, Lobel I, Ozdaglar A (2010) Bayesian learning in social networks in Review of Economic Studies. Vol. 78, pp. 1201– 1236. [12] Castellano C, Fortunato S, Loreto V (2009) Statistical physics of social dynamics. Reviews of modern physics 81(2):591. [13] Krishnamurthy V, Poor HV (2013) Social learning and bayesian games in multiagent signal processing: How do local and global decision mak- ers interact? IEEE Signal Processing Magazine 30(3):43–57. 19 [14] Friedkin NE (2006) A structural theory of social influence. (Cambridge University Press) Vol. 13. [15] Clifford P, Sudbury A (1973) A model for spatial conflict. Biometrika 60(3):581–588. [16] Liggett TM (1985) Particle systems. [17] Holley RA, Liggett TM (1975) Ergodic theorems for weakly interacting infinite systems and the voter model. The annals of probability pp. 643–663. [18] Mobilia M (2003) Does a single zealot affect an infinite group of voters? Physical review letters 91(2):028701. [19] Yildiz E, Ozdaglar A, Acemoglu D, Scaglione A (2010) The voter model with stubborn agents extended abstract in Communication, Control, and Computing (Allerton), 2010 48th Annual Allerton Conference on. (IEEE), pp. 1179–1181. [20] Yildiz E, Acemoglu D, Ozdaglar A, Saberi A, Scaglione A (2011) Dis- crete opinion dynamics with stubborn agents. SSRN eLibrary. [21] Yildiz E, Ozdaglar A, Acemoglu D, Saberi A, Scaglione A (2013) Bi- nary opinion dynamics with stubborn agents. ACM Transactions on Economics and Computation 1(4):19. [22] Jia P, MirTabatabaei A, Friedkin NE, Bullo F (2015) Opinion dynamics and the evolution of social power in influence networks. SIAM review 57(3):367–397. [23] Sznajd-Weron K, Sznajd J (2000) Opinion evolution in closed commu- nity. International Journal of Modern Physics C 11(06):1157–1165. [24] Galam S (2002) Minority opinion spreading in random geometry. The European Physical Journal B-Condensed Matter and Complex Systems 25(4):403–406. [25] Galam S (2005) Local dynamics vs. social mechanisms: A unifying framework. EPL (Europhysics Letters) 70(6):705. [26] Acemoglu D, Como G, Fagnani F, Ozdaglar A (2013) Opinion fluctua- tions and disagreement in social networks. Mathematics of Operations Research 38(1):1–27. 20 [27] Hegselmann R, Krause U (2002) Opinion dynamics and bounded confi- dence models, analysis and simulations in Jounral of Artificial Societies and Social Simulation. Vol. 5. [28] Blondel V, Hendrickx J, Tsitsiklis J (2009) On krause's multi-agent con- sensus model with state-dependent connectivity in IEEE Trans. Auto. Control. Vol. 54, pp. 2586–2597. [29] Tsitsiklis J (1984) Ph.D. thesis (Dept. of Electrical Engineering and Computer Science, M.I.T., Boston, MA). [30] DeGroot M (1974) Reaching a consensus in Journal of American Statistcal Association. Vol. 69, pp. 118–121. [31] Deffuant G, Neau D, Amblard F, Weisbuch G (2000) Mixing beliefs among interacting agents in Adv. Compl. Syst. Vol. 3, pp. 87–98. [32] Weisbuch G, Deffuant G, Amblard F, Nadal J (2001) Interacting agents and continuous opinions dynamics in Heterogeneous agents, interac- tions, and economic performance. [33] Weisbuch G (2004) Bounded confidence and social networks in The Eu- ropean Physical Journal B - Condensed Matter and Complex Systems. Vol. 38, pp. 339–343. [34] Li L, Scaglione A, Swami A, Zhao Q (2013) Consensus, polarization and clustering of opinions in social networks. Selected Areas in Com- munications, IEEE Journal on 31(6):1072–1083. [35] Kahneman D (2003) Maps of bounded rationality: Psychology for be- havioral economics. American economic review pp. 1449–1475. [36] Martins AC (2008) Continuous opinions and discrete actions in opin- International Journal of Modern Physics C ion dynamics problems. 19(04):617–624. [37] Martins AC, Pereira CdB, Vicente R (2009) An opinion dynamics model for the diffusion of innovations. Physica A: Statistical Mechanics and its Applications 388(15):3225–3232. [38] Dimakis A, Kar S, Moura J, Rabbat M, Scaglione A (2010) Gossip algorithms for distributed signal processing. Proceedings of the IEEE 98(11):1847 –1864. 21 [39] Jadbabaie A, Molavi P, Sandroni A, Tahbaz-Salehi A (2012) Non- bayesian social learning. Games and Economic Behavior 76(1):210–225. 22 Figure 7: Opinion dynamics herding to 1 (top) and to 0 (bottom), xn(0) = 0.9, ∀n. 23 0501001502002503000.40.50.60.70.80.91txn(t)0500100015002000250030003500400000.10.20.30.40.50.60.70.80.91txn(t)
1802.08204
1
1802
2018-02-22T17:58:55
SCRank: Spammer and Celebrity Ranking in Directed Social Networks
[ "cs.SI" ]
Many online social networks allow directed edges: Alice can unilaterally add an "edge" to Bob, typically indicating interest in Bob or Bob's content, without Bob's permission or reciprocation. In directed social networks we observe the rise of two distinctive classes of users: celebrities who accrue unreciprocated incoming links, and follow spammers, who generate unreciprocated outgoing links. Identifying users in these two classes is important for abuse detection, user and content ranking, privacy choices, and other social network features. In this paper we develop SCRank, an iterative algorithm to identify such users. We analyze SCRank both theoretically and experimentally. The spammer-celebrity definition is not amenable to analysis using standard power iteration, so we develop a novel potential function argument to show convergence to an approximate equilibrium point for a class of algorithms including SCRank. We then use experimental evaluation on a real global-scale social network and on synthetically generated graphs to observe that the algorithm converges quickly and consistently. Using synthetic data with built-in ground truth, we also experimentally show that the algorithm provides a good approximation to planted celebrities and spammers.
cs.SI
cs
SCRank: Spammer and Celebrity Ranking in Directed Social Networks Alex Fabrikant Google Research Mountain View, CA, USA [email protected] Mohammad Mahdian Google Research New York, NY, USA [email protected] Andrew Tomkins Google Research Mountain View, CA, USA [email protected] 8 1 0 2 b e F 2 2 ] I S . s c [ 1 v 4 0 2 8 0 . 2 0 8 1 : v i X r a ABSTRACT Many online social networks allow directed edges: Alice can uni- laterally add an "edge" to Bob, typically indicating some kind of interest in Bob, or in Bob's content, without Bob necessarily recip- rocating with an "add-back" edge that would have indicated Bob's interest in Alice. (cid:140)is signi(cid:128)cantly a(cid:130)ects the dynamics of inter- actions in the social network. Most importantly, we observe the rise of two distinctive classes of users, celebrities and follow spam- mers, who accrue unreciprocated directed links in two di(cid:130)erent directions: celebrities a(cid:138)ract many unreciprocated incoming links, and follow spammers create many unreciprocated outgoing links. Identifying users in both of these two categories is an important problem since a user's status as a celebrity or as a follow spammer is an important factor in abuse detection, user and content ranking, privacy choices, and other social network features. In this paper we develop SCRank, an iterative algorithm that exploits a deep connection between these two categories, and clas- si(cid:128)es both celebrities and follow spammers using purely the so- cial graph structure. We analyze SCRank both theoretically and experimentally. Our theoretical analysis shows that SCRank al- ways decreases a potential function, and therefore converges to an approximate equilibrium point. We then use experimental eval- uation on a real global-scale social network and on synthetically generated graphs to observe that the algorithm converges very quickly, and consistently to the same solution. Using synthetic data with built-in ground truth, we also experimentally show that the algorithm provides a good approximation to the built-in set of celebrities and spammers. Finally, we generalize our convergence proof to a general class of "scoring" algorithms, and prove that under mild conditions, algorithms in this class minimize a (non- trivial) potential function and therefore converge. We give several examples to demonstrate the versatility of this general framework and usefulness of our techniques in proving theoretical results on the convergence of iterative algorithms. 1 INTRODUCTION Online social networks can be divided into two categories: undi- rected networks such as LinkedIn or (pre-2011) Facebook that re- quire the consent of both endpoints in order to establish an edge, and directed ones such as Twi(cid:138)er, Google+, and Flickr, that allow one user to unilaterally create a directed edge to another, such as by "following" the la(cid:138)er's public updates, without the la(cid:138)er creating a reciprocal (anti-parallel) edge to the former. As has been observed in practice [12], this simple distinction signi(cid:128)cantly a(cid:130)ects the dy- namics of relationships in the system: undirected social networks like Facebook tend to cultivate socializing with friends, while di- rected networks like Twi(cid:138)er, interacting with content produced by strangers constitutes a signi(cid:128)cant portion of social interactions. In the la(cid:138)er case, there are o(cid:137)en a few individuals who collect many incoming links, either because they are already famous outside the social network, or because they contribute exceptionally engaging, viral content to the social network's ecosystem. (cid:140)ese individuals are in a sense the "celebrities" of the network. On the other hand, we have nodes who accumulate many outgoing links to random strangers. We call these nodes "(follow) spammers". As we explain below, identifying celebrities and spammers of a network are inter- twined problems. (cid:140)is paper focuses on developing algorithms to identify users in these two classes. (cid:140)e simplest approach to identify a spammer is to count the number of unreciprocated outgoing edges of each node and classify the node as a spammer if this number exceeds a threshold. (cid:140)e problem with this approach is that o(cid:137)en a non-negligible number of regular users follow many celebrities, and this approach can identify such users as spammers. Similarly, classifying celebrities by counting the number of unreciprocated incoming links su(cid:130)ers from the problem that it can classify regular users who are targeted by many spammers (for example, by the virtue of having their name mentioned in a public, crawlable space) as celebrities. Instead, we focus on this recursive de(cid:128)nition of celebrities and spammers: • A celebrity is a node who is followed by many non-spammers. • A spammer is a node who follows many non-celebrities. (cid:140)is recursive de(cid:128)nition hints at a natural iterative approach for (cid:128)nding celebrities and spammers. In the next section, we mathe- matically formulate the problem and the iterative algorithm, which we call SCRank. We then analyze the convergence properties of SCRank, both theoretically and experimentally, and argue that its output provides useful information. We will use a real-world data set from LiveJournal, as well as randomly generated data, to exper- imentally evalute the convergence properties of our algorithm. To evaluate the output of our algorithm, we use randomly generated data with built in ground-truth, and show that the algorithm can recover a signi(cid:128)cant portion of the ground truth e(cid:129)ciently and accurately. Finally, in Section 5, we give a generalization of our potential function argument to a more general framework of scoring prob- lems, and prove that for any scoring problem satisfying a mild symmetry and monotonicity assumption, a (non-trivial) potential function can be associated with the natural iterative algorithm for the problem, and therefore the iterative algorithm provably con- verges. We give three concrete examples of this general framework to demonstrate the versatility of our framework. 1.1 Related work Various measures of an individual's standing in a social network has been the subject of much research in sociology and social com- puting, starting well before the dawn of online social networks. Among the two axes we study, celebrities and follow spammers, the lion's share of the prior work on social graph structure has focused on celebrities, typically with a goal of understanding and algorithmically locating highly in(cid:131)uential people for the purposes of ranking, marketing, predicting cascades, etc. [7], [2], and many other early sociometric studies focused on de(cid:128)ning and evaluating social centrality metrics. In the digital age, algorithms for selecting high-in(cid:131)uence sets of social network users from the social graph structure were pioneered by [9], followed by a large literature of its own. Much of the search engine literature focuses on (cid:128)nding in(cid:131)u- ential nodes on the web graph, with the results on PageRank [13] and HITS [10] forming perhaps the most in(cid:131)uential nodes in the citation network. (cid:140)ese and related techniques have been borrowed for social network applications as well, such as by [18]. While much of this work has focused on the relatively more sophisticated notion of in(cid:131)uence, as measured by impact on viral cascades, less a(cid:138)ention has been paid to questioning the idea that a high in-degree deter- mines a user's "celebrity" status. For the corresponding problem on the Web graph, [16] notably gave experimental evidence that corporate websites' in-degree is a be(cid:138)er predictor of a company's prominence and worth than PageRank. (cid:140)e follow spam problem has been recognized for several years now [3, 8], but most of the existing work that does consider the structure of the social graph still focuses on holistic machine- learning approaches that combine graph properties with a many signals derived from user content [1, 15, 17] - a very pragmatic approach for detecting existing spamming activity, but of limited utility in the common case where creating sibyl accounts is cheap [19], and most abuser accounts are thus young. (cid:140)e existing approaches also assign some form of "trust" seman- tics to each directed edge, typically making it di(cid:129)cult to cope with "social capitalists" [8]: the many legitimately popular celebrities such as Barack Obama or Lady Gaga who have been observed to reciprocate follow edges indiscriminately. Even when such indis- criminate behavior is fairly common, SCRank is una(cid:130)ected, since it entirely ignores reciprocated edges, and requires only a fraction of users to be discerning about follow-backs to get enough input signals. (cid:140)e potential function that makes our analysis work combines the potential functions of potential games [11] and Max-Cut games [4]. (cid:140)e form of the SCRank algorithm itself is inspired various iterative numerical algorithms used in machine learning such as EM and belief propagation [14], and more directly by the HITS [10] algorithm for web ranking. (cid:140)e di(cid:130)erences between SCRank and HITS are subtle, but vital to understanding the operation and anal- ysis behind SCRank, so we now address this speci(cid:128)c relationship. 1.2 SCRank vs HITS At (cid:128)rst blush, our reciprocal de(cid:128)nition of spammers and celebrities in terms of one another appears parallel to the de(cid:128)nitions of hubs and authorities in HITS. But mathematically, the structures are quite di(cid:130)erent. HITS is expressible as a linear transformation of 2 (cid:0)At(1 − (cid:174)s)(cid:1). either the original hub or authority vector, which converges by the Perron-Frobenius theorem to the (positive real) principal eigenvec- tor of a matrix based on the original graph. (cid:140)ere are two properties that set the spammer-celebrity iteration apart from HITS. First, the core update step of the spammer-celebrity iteration involves an a(cid:129)ne transformation rather than a linear transformation; such transformations do not in general a(cid:138)ain (cid:128)xed points. (cid:140)us, we use the current spammer vector (cid:174)s to compute an intermedate celebrity value (cid:174)c(cid:48) = A(1 − (cid:174)s) via an a(cid:129)ne transformation. Second, for rea- sons we describe below, the particular update we seek requires an elementwise modi(cid:128)cation to the results of the a(cid:129)ne transforma- tion by an arbitrary increasing function Fs. (cid:140)e new version of (cid:174)s is given by (cid:174)s = Fs((cid:174)c(cid:48)). (cid:140)e actual transformation is therefore no longer a(cid:129)ne, but will in general be non-linear. Likewise, a similar transformation applies to produce a new spammer vector from the current celebrity vector. Combining both the a(cid:129)ne transformation and the non-linear modi(cid:128)cation, we have (cid:174)c = Fc We now o(cid:130)er two words of intuition on the form of our up- date. First, the a(cid:129)ne structure comes about because, unlike HITS, outliers on the celebrity scale provide no information about spam- mers. On the contrary, only nodes that receive low scores on one scale may provide signi(cid:128)cant contributions to the score of nodes on the other scale. A li(cid:138)le algebraic manipulation will convince the reader that this property is fundamental to the nature of the relationship between these classes, and cannot be overcome by simple linear transformations of the variables, such as introducing "non-spammer" scores or the like. Second, the non-linear transfer function comes about for a re- lated reason. (cid:140)e 1 − (cid:174)s term can be interpreted as a "non-spammer" score if spammer scores lie in [0, 1], but in general if spammer scores may grow large, the a(cid:129)ne transformation will produce large nega- tive non-spammer scores, which break the intuition that links from spammers should not contribute one way or the other to celebrity scores. (cid:140)us, scores must be scaled to remain in [0, 1] in order to perform the iteration with the semantics we desire. In general, the machinery we develop here is appropriate in any situation that shows anti-reinforcing behavior: shady groups fund dishonest politicians, while honest politicians are funded by non-shady groups; and so forth. 2 THE ALGORITHM To formalize an algorithm based on the recursive de(cid:128)nition of the celebrities and spammers in the previous section, we de(cid:128)ne a celebrity score cv and a spammer score sv for each node v. All these scores are in [0, 1]. (cid:140)e algorithm is parameterized by two increasing functions Fc and Fs that map non-negative reals to [0, 1]. We denote the directed social network by G, and the vertex set, the edge set, and the number of vertices of G by V , E, and n. Also, the set of unreciprocated directed edges of G is denoted by A. In other words, A = {(u, v) : (u, v) ∈ E and (v, u) (cid:60) E}. (cid:140)e algorithm in presented in detail as Algorithm 1. We refer to this algorithm as the SCRank algorithm, for Spammer-Celebrity Rank. (cid:140)e algorithm is based on iterating the following two as- signments until either an approximate (cid:128)xed point is found, or a maximum number of iterations is reached: cv = Fc(cid:169)(cid:173)(cid:171)  (u,v)∈A (1 − su)(cid:170)(cid:174)(cid:172) sv = Fs(cid:169)(cid:173)(cid:171)  (v,u)∈A (1 − cu)(cid:170)(cid:174)(cid:172) (1) parameters ε and T Algorithm 1 (SCRank) Input: Directed social network G; functions Fc and Fs; Output: Celebrity score cv and spammer score sv for each v ∈ V 1: for all v in V do cv ← 0, sv ← 0 2: 3: end for 4: k ← 0 5: repeat 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: until δ < ε or k > T snew end for δ ← max{c − cnew ∞, s − snew ∞} c ← cnew s ← snew k ← k + 1 )) for all v in V do v ← Fc((u,v)∈A(1 − su)) v ← Fs((v,u)∈A(1 − cnew cnew end for for all v in V do u For our experiments, we will use the CDF of a normal distribution with mean µc and standard deviation σc as the function Fc. (cid:140)is is essentially a so(cid:137) step function where µc controls the location of the step (the threshold for the number of non-spammer followers to count a user as a celebrity) and σc controls the smoothness of this step function (a large σc means a smooth threshold at µc, while a small σc we get a sharp threshold). Similarly, we use the CDF of normal distribution with mean µs and standard deviation σs as Fs. We note that our results go through even if the functions Fs and Fc depend on the vertex v. (cid:140)is might be practically useful, for example, by allowing the threshold µs to depend on the number of reciprocated neighbors of the vertex (i.e., if a node has a large number of reciprocated edges, allow it to have more unrecipro- cated edges without counting it as a spammer). (cid:140)is and further generalizations will be discussed in Section 5. Our algorithm is similar in spirit to the Hubs and Authorities algorithm of Kleinberg [10]. (cid:140)e major di(cid:130)erence is that in our se(cid:138)ing, the celebrity score of a node is related to the non-spammer score of its followers. (cid:140)is negation makes a signi(cid:128)cant di(cid:130)erence: we need the spammer scores to be scaled in [0, 1] with 0 meaning a non-spammer and 1 meaning a spammer (and similarly for celebri- ties), whereas in the hubs and authorities algorithm it was enough to compute scores that induce reasonable rankings. (cid:140)is, forces us to use non-linear operators Fs and Fc. (cid:140)is is in contrast with hubs and authorities, which uses linear operators and therefore can characterize the scores as eigenvectors of a matrix. Note on the implementation. In order to be able to use the SCRank algorithm on graphs with hundreds of millions of nodes (as we do in Section 4), we need to take advantage of parallel computation. Fortunately, for the SCRank algorithm this is not hard to do, since the celebrity scores in each iteration only depend on the spammer scores last computed and vice versa. Using this, we implemented each iteration of SCRank as two Map-Reduce stages, without any blow-up in the size of the data in each iteration. (cid:140)is yielded a very e(cid:129)cient implementation which easily accommodated even our largest experiments in Section 4, on a social graph of over 400,000,000 nodes. 3 CONVERGENCE OF THE ALGORITHM Ideally, we would like to show that: (1) when there is no bound T on the number of iterations, SCRank converges to an (approximate) (cid:128)xed point; (2) the (cid:128)xed point is unique; and (3) the algorithm converges quickly to the (cid:128)xed point. In this section, we theoretically show that (1) holds for all directed social networks. We will give an example that shows that the (cid:128)xed point of the function is not necessarily unique, much like in HITS and other similar algorithms [6]. However, as we will discuss in the next section, we have not observed such examples in real or randomly generated data sets. Finally, we will experimentally show that the SCRank algorithm o(cid:137)en converges very quickly. We start by proving that the algorithm never falls into a loop. (cid:140)is is done by showing that there is a potential function whose value decreases in every iteration. (cid:140)e intuition behind this (complicated- looking) potential function is that it combines the potential function for max cut games [4] with those of potential games [11]. In the following theorem, we show the existence of this potential function. We will then use this result to prove that the algorithm converges to an approximate (cid:128)xed point of the Equations (1). Theorem 3.1. For every directed social network G and every pair of increasing di(cid:130)erentiable functions Fs and Fc , there is a function of the the vector (c, s) computed by the SCRank algorithm that strictly decreases in every iteration. (cid:138)erefore, the algorithm will never fall in an in(cid:128)nite loop. Proof. Let Rc = Fc([0, n]), i.e., Rc is the range of Fc when its domain is [0, n]. Since Fc is increasing and di(cid:130)erentiable, its inverse −1. Next, we on Rc is a well de(cid:128)ned strictly increasing function Fc de(cid:128)ne the following function: Þ x 0 Gc(x) = −1 c F (t)dt . Similarly, using Fs, we can de(cid:128)ne Rs and Gs. We are now ready to de(cid:128)ne our potential function. For any vector of celebrity and spammer scores (c, s) ∈ R2n, the function P is de(cid:128)ned as follows: P(c, s) :=  (1 − su)(1 − cv) + Gc(cv) + Gs(sv) (2) (u,v)∈A v ∈V v ∈V Next, we show that the value of this potential function decreases in every iteration of the algorithm. To do this, take the derivative of P with respect to cv, for a vertex v: = −  u:(u,v)∈A (1 − su) + F −1 c (cv) ∂P(c, s) ∂cv 3 (cid:140)is derivative is zero when cv is equal to (1 − su)), c v := Fc(  ∗ u:(u,v)∈A to c∗ v, and positive when cv > c∗ negative when cv < c∗ v. (cid:140)erefore, by v, the value of the potential changing cv from its old value cold v function can not increase. (cid:140)is means that the updates in line 7 of Algorithm 1 never increase the value of P. In fact, since F−1 is a c strictly increasing function, if at least one of the cv's change, then the potential function must strictly decrease. A similar argument shows that the updates in line 10 of Algorithm 1 also do not increase the value of P. (cid:140)is is enough to show that the algorithm never falls into an in(cid:128)nite loop. (cid:3) Next, we prove that the SCRank algorithm eventually converges to an approximate (cid:128)xed point (also referred to as an approximate equilibrium). Before stating the theorem, we need to de(cid:128)ne the notion of approximate (cid:128)xed point. De(cid:128)nition 3.2. An ε-approximate (cid:128)xed point of Equations (1) is a set of celebrity and spammer scores (cv , sv) for each node such that for each vertex v, we have cv − Fc(  sv − Fs(  (u,v)∈A (v,u)∈A (1 − su)) ≤ ε (1 − cu)) ≤ ε (3) Theorem 3.3. For every ε > 0, there is a (cid:128)nite number of iterations a(cid:135)er which the vector (c, s) computed by the SCRank algorithm is an ε-approximate (cid:128)xed point of Equations (1). Proof. We use the notation from the proof of (cid:140)eorem 3.1. Since Fc is increasing and di(cid:130)erentiable on a closed interval [0, n], there is an absolute constant α, such that for every non-negative x ∈ [0, n], the derivative of Fc at x is at most αc. (cid:140)is implies that the derivative of the function F−1 c on every point in Rc is at least 1/αc. Similarly, we can de(cid:128)ne αs for Fs and show that the derivative of F−1 Next, we prove that if an update operation changes the values by too much, it must also signi(cid:128)cantly decrease the value of the potential function. Assume in an iteration the value of cv is changed (the c∗ from cold v > v case can be handled similarly). (cid:140)en for every x ∈ [c∗ v ], cold v , cold v we have s on Rs is at least 1/αs. Let α = max(αc , αs). v ≥ ε. Assume c∗ v, where cold v −c∗ v < cold v to c∗ −1 c F (x) > F ∗ v) + (x − c ∗ v)/αc (1 − su) + (x − c ∗ v)/αc . =  −1 c (c u:(u,v)∈A v plusÞ cold (cid:140)erefore, the derivative of the function P(c, v) with respect to cv at cv = x is at least (x −c∗ v)/αc. (cid:140)us, the value of P(c, v) at cv = is at least its value at cv = c∗ v)/αcdx ≥ ε2 . cold 2αc v In other words, in each iteration where the value of at least one cv changes by at least ε, the value of the potential function decreases 2/(2α). Similarly, if the value of at least by at least ε one sv changes by at least ε, the potential function decreases by at 2/(2α). Since the value of the potential function least ε 2/(2αc) ≥ ε 2/(2αc) ≥ ε (x − c∗ v c∗ v Figure 1: Example with more than one (cid:128)xed point decreases in every iteration and can never become negative, a(cid:137)er a (cid:128)nite number of iterations it must decrease by an amount less than 2/(2α). (cid:140)is means that at this iteration, each score changes by at ε most ε, showing that we are at an ε-approximate (cid:128)xed point. (cid:3) Uniqueness of the (cid:128)xed point. It would be nice if we could prove that the (cid:128)xed point of Equations (1) is unique. (cid:140)is would mean that the values that the SCRank algorithm seeks to compute are uniquely well-de(cid:128)ned. Unfortunately, this result is not true in the worst-case, as the following example shows. Proposition 1. (cid:138)ere is a directed social network D and functions Fc and Fs such that more than one (c, s) satis(cid:128)es the Equations (1). Proof. Consider a regular bipartite graph with all the edges directed from part 1 to part 2. Intuitively, this situation can be explained by either declaring nodes in part 1 as spammers, or nodes in part 2 as celebrities. For a numeric example, say the degrees are 500, µs = µc = 100, and σs = σc = 25. Let F = Fc = Fs. (cid:140)en nodes in part 1 will have celebrity score F(0) ≈ 0 and spammer score s, and nodes in part 2 will have celebrity score c and spammer score F(0) ≈ 0, for values of (c, s) satisfying c = F(500(1 − s)) and s = F(500(1−c)). (cid:140)ese equations are plo(cid:138)ed in Figure 1. As can be seen in the picture, there are 3 (cid:128)xed points with (c, s) approximately equal to (1, 0), (0, 1), and (0.8, 0.8). (cid:140)e (cid:128)rst (cid:128)xed point corresponds to declaring nodes in part 1 as spammers, the second corresponds to declaring nodes in part 2 as celebrities, and the third is an unstable (cid:128)xed point between the other two. (cid:3) Despite the above example, as we will see in the next section, in none of the real world or randomly generated instances we have tried we have been able to discover more than one solution. 4 EXPERIMENTS In this section, we present the results of experiments showing that on real and generated data, the algorithm presented in the last section converges quickly and to the same point, independent of the starting con(cid:128)guration. We also show that the computed scores are reasonable quanti(cid:128)cations of celebritiness and spamminess in the social networks. (cid:140)is is done with randomly generated data sets 4 with a random generation process that embeds the ground truth against which the output of the algorithm can be evaluated. For experimentally evaluating convergence and uniqueness properties, we use randomly generated data as well as two real-world data sets, as described in the following. 4.1 Data Sets We use two sources of data in our experiments. (cid:140)e (cid:128)rst is based on real-world data from LiveJournal. (cid:140)e second is randomly gen- erated data according to a model described below. Randomly gen- erated data allows us to compare the results of the algorithm with the "ground truth" that the model is based on. (cid:140)is is in contrast with the real-world data set, which is used to evaluate the conver- gence and uniqueness properties of the SCRank algorithm. As we show, manually skimming the results on this data suggests that the outputs are reasonable, but we do not have quanti(cid:128)able ground truth. In the rest of this section, we describe the random generation process and basic information about our real-world data set. (cid:138)e random generation process. We use the following method to generate a random directed graph G that will be used as a test case for our algorithm: (cid:140)ere are N nodes in the graph, out of which two disjoint sets C and S are designated as the set of celebrities and spammers. We then use a graph generation method such as Erdos-R´enyi or preferential a(cid:138)achment to generate an undirected graph H with the vertex set V(G). (cid:140)e edges of this graph represent real friendship relationships among individuals. For each such edge uv in H, with probability 1 − p we add both directed edges uv and vu to G. With probability p, we add one of these two edges picked at random. (cid:140)is represent the fact that even among the edges corresponding to mutual friendship, some are not reciprocated. In addition to these edges, we add random directed edges from S to V(G) and from V(G) to C. We underscore that this models spammers indiscriminately linking to some subset of all nodes, including possibly celebrities and other spammers, and the converse for inbound links to celebrities. For generating these edges, we use a simple model of independent coin (cid:131)ips: for each pair (u, v) where u ∈ S and v ∈ V(G), we add (u, v) independently with probability ps. Similarly, for each (u, v) where u ∈ V(G) and v ∈ C, we add this edge independently with probability pc. (cid:140)ere is no other edge in the graph G. (cid:140)e parameters of the model are as follows: N , C, S, p, pc, ps, and the parameters of the generation model for the graph H. (cid:140)e algorithm is successful if it gives high cv scores to nodes in C (and low cv to nodes in V(G) \ C) and high sv scores to nodes in S (and low sv to nodes in V(G) \ S). For the experimental results we present in this paper, we have picked the following set parameters: N = 2000000, C = 1000, S = 5000, p = 0.2, pc = ps = 0.00025, and the graph H is a random graph with expected degree distribution that is a power law with exponent 0.5. (cid:140)e average degree in H is 100. (cid:140)ese choices are mostly based on our intuition for typical numbers on a social network. We have also tried the experiments on several other sets of parameters, and did not observe any signi(cid:128)cant change in our conclusions. 5 LiveJournal Data Set. Each node in this data set is a LiveJournal pro(cid:128)le, and edges correspond to friendship relationships declared on the pro(cid:128)les. (cid:140)is data set is crawled, and contains more than 4.8 million vertices and 660 million edges. LiveJournal users may choose to disallow crawling of their metadata via the robots.txt mechanism. Any user who did so was not included in the crawl, with all edges to and from this user removed from the data set. 4.2 Convergence speed Let c and s denote the vector of cv's and sv's, respectively. We can compute the (cid:96)1 distance between the vector c computed at the end of iteration t, and the one computed at the end of iteration t + 1 (and similarly for s). When both of these values reach zero, it means that the algorithm has converged to a solution. (cid:140)erefore, we can use these values as a measure of the convergence of the algorithm. We plot these values as a function of t for di(cid:130)erent data sets and for di(cid:130)erent initializations of the scores, to see if and how the initialization a(cid:130)ects convergence speed. (cid:140)e results (in log scale) for the three data sets are presented in Figure 2. (cid:140)e initializations labelled init 0, init 1, and init 0.5 cor- respond to initializing all scores to zero, all scores to one, and all scores to 0.5. We also tried initializing each score to a random number picked uniformly from [0, 1]; this initialization produced results that were essentially indistinguishable from init 0.5 in all data sets.1 As can be seen in the plots, di(cid:130)erent initializations do not di(cid:130)er signi(cid:128)cantly in terms of their convergence rate, although init 0.5 o(cid:137)en performs marginally be(cid:138)er. In all cases, the con- vergence seems to be exponentially fast (i.e., the log-scale plot has an almost constant negative slope) 4.3 Uniqueness of the solution To test whether the scores converge to a single point independent of the starting point, we plot the l1 distance between the vector computed by our algorithm starting from di(cid:130)erent initializations. In particular, we measure the di(cid:130)erence between init 0 and init 1, and between init 0 and init 0.5. (cid:140)e graphs, plo(cid:138)ed as functions of t in the log scale, are shown in Figure 3 for the LiveJournal and randomly generated data sets. As these graphs show, on the real-world data set a(cid:137)er less than 10 rounds, the solutions computed with di(cid:130)erent initializations are virtually identical. In randomly generated instances, even though the distance between the solutions decrease by about two orders of magnitude in the (cid:128)rst (cid:128)ve iterations, they do not converge to zero. (cid:140)is indicates that randomly generated instances probably contains small pockets of nodes with non-unique solutions. 4.4 Solution quality In this section, we argue that SCRank can recover a signi(cid:128)cant por- tion of celebrities and spammers. To show this experimentally, we use randomly generated graphs with the sets C and S in the random generation process as the hidden ground truth. (cid:140)e algorithm is successful if it assigns high celebrity scores to nodes in C and high spammer score to nodes in S. Figure 4 shows the distribution of 1Intuitively, this is due to the law of large numbers: for most nodes, they have enough neighbors so that the sum of the non-celebrity/non-spammer scores of their neighbors is essentially the same in init 0.5 and init rand. (a) LJ celebrity score (b) Synthetic graph celebrity score (c) LJ spammer score (d) Synthetic graph spammer score Figure 2: Log-scale l1 change in scores for LiveJournal and synthetic data, as a function of time celebrity and spammer scores, comparing, respectively, all vertices versus vertices in C; and all vertices versus vertices in S. (cid:140)e score distributions on these synthetic inputs are almost completely bi- modal, with both celebrity and spammer scores of generic vertices being strongly concentrated around zero. To be(cid:138)er observe the di(cid:130)erence between the two distributions, we also show plots of the distribution densities with logarithmic y-axes. We can also study the precision-recall tradeo(cid:130) of the output of the algorithm. We plot the precision of the algorithm (which we de(cid:128)ne as the percentage of users with celebrity/spammer score more than 0.5 who are in C/S, respectively) against recall (de(cid:128)ned as the percentage of nodes in C/S for which we compute a celebrity or spammer score, respectively, of more than 0.5). By adjusting the parameters of the model, we get a tradeo(cid:130) between precision and recall that is plo(cid:138)ed in Figure 5. 5 GENERALIZATION (cid:140)e potential function argument used in Section 3 to guarantee SCRank's convergence can be generalized to a much broader class of iterative algorithms, which we expect will be of independent interest. In particular, we will show that the same argument applies to any iteration that simulates best-response dynamics in a game where players have bounded real-valued strategies, and whose util- ities are strictly monotic, continuously di(cid:130)erentiable per-variable functions which depend only on a linear combination of the others' strategies, with symmetric linear combination weights. 6 (a) LJ: celebrity scores (b) Synthetic graph: celebrity scores (c) LJ: spammer scores (d) Synthetic graph: spammer scores Figure 3: Log of l1 di(cid:130)erence between scores computed with di(cid:130)erent initializations, as a function of time Before we de(cid:128)ne this formally, let us observe how this describes the SCRank algorithm. SCRank uses 2n variables - two "players" per SCRank agent. (cid:140)e convergence argument can be rephrased to ignore the fact the variables are arranged in pairs in the original setup. (cid:140)e updates in lines 6–11 of the algorithm are equivalent to the ci players making best-response moves one at a time, then the si players taking their turns. (cid:140)e utility/update functions for the cvs and sus both depend only on a linear combination of other u (u,v)∈A −su) = Fc(indeg v +L), and similarly . For every (u, v) ∈ A, cv's update function input will include for Fsu su with weight −1, and su's update function input will include cv with weight −1. (cid:140)is meets the "symmetricity" condition - that the matrix W of variable weights in the update function inputs must be = −1, and is 0 elsewhere. symmetric. In SCRank, Wcv su variables: Fcv (L = = Wsucv Formally, we de(cid:128)ne a general Monotonic Update on Symmetric Linear combinations Iteration (M USLI) system as: • Real-valued variables x1, . . . , xn with xi ∈ [ai , bi] • A symmetric weight matrix W with 0s on the diagonal. • For each variable, a strictly increasing, continously di(cid:130)er- entiable update function Fi : R → R which takes as input only (W x)i, the linear combination of the xis weighted by W 's ith row. Fi must preserve the bounds on xi, i.e. ai ≤ Fi((W (cid:174)x)i) ≤ bi whenever xj ∈ [aj , bj]) • An activation sequence A : Z≥0 → {1, . . . , n} determining, for each iteration t ≥ 0, the unique variable xA(t) that gets updated to FA(t)((W x)A(t)). (cid:140)e proof of (cid:140)eorem 3.3 generalizes to show: 7 (a) Linear-scale spammer scores (b) Log-scale spammer scores (c) Linear-scale celebrity scores (d) Log-scale celebrity scores Figure 4: Score distributions (p.d.f.) 8 Figure 5: Precision-recall graph for the detection of spam- mers in a randomly generated data set. Theorem 5.1. (cid:138)e state of a M USLI system, (cid:174)x, converges to a (cid:128)xed point under its iteration. Proof. (cid:140)e argument is very similar, relying just on a general- ization of the potential function. As above, the strictly increasing, continuously di(cid:130)erentiable Fis have well-de(cid:128)ned strictly increasing inverses F−1 , which lets us de(cid:128)ne Gi(z) and the potential function i P((cid:174)x) as: P((cid:174)x) = i Gi(xi) − 1 2 (cid:174)xTW (cid:174)x Þ z 0 Gi(z) = −1 i F (t)dt ; (cid:140)is yields the partials: = −(W (cid:174)x)i + F −1 i (xi) ∂P ∂xi For x∗ i = Fi((W (cid:174)x)i), this is zero, and, since Wii = 0, the (cid:128)rst term guarantees . is constant relative to xi, and the monotonicity of F−1 that updating xi to x∗ ≤ αi for some αi, and d F −1 i − x∗ old old i i d Fi(t) dt An iteration that starts at state x WLOG, a lower value x∗ i < x have, for all t ∈ [x∗ ]: old i , x i ≥ 1/αi. old to, i i ≥ ε, will old and updates xi from x can't increase P((cid:174)x). , changing it by x As before, 0 < (t) i dt i F −1 i (t) > F −1 ∗ ∗ i )/αi i ) + (t − x (x i ∗ old)i + (t − x = (W x i )/αi ∗ old−i , t) ≥ (t − x i )/αi t − x∗ old−i , x i αi 2 dt ≥ ε 2αi Þ x∗ ∗ i ) ≥ i x old i (x ∂P ∂xi old) − P(x P(x Since (cid:174)x remains within the compact set de(cid:128)ned by xi ∈ [ai , bi], P((cid:174)x) is bounded, and, since it decreases at each step of the iteration, there is, by the same argument as above, for any δ > 0, a step k∗ such that the update won't change xi by more than √2αiδ. (cid:3) Note that the proof doesn't even require that each variable be "activated" in(cid:128)nitely o(cid:137)en, but we expect most practical uses of this result will require that each xi be updated in(cid:128)nitely o(cid:137)en for convergence to a relevant value, or more o(cid:137)en than some threshold for stronger convergence bounds. To demonstrate the breadth of these systems, we now give a couple of examples. 5.1 Example: Graph connectivity As a trivial example of another algorithmic task solvable via a M USLI best-response iteration, consider the question of (undi- rected) graph reachability. If the graph's adjacency matrix is used as weights, with nodes as players, using starting state 0 for all players N(i) xi) that approximates a step function at x = 1 will clearly converge rapidly to a state where all nodes reachable from the origin are 1. except the origin, iterating updates of sigmoid Fi( 5.2 Example: In(cid:131)uence games In SCRank and the above example, M USLI systems are used as al- gorithms to compute a (cid:128)xed point of interest. We note that the one- at-a-time update dynamics and the Wii = 0 constraint mean that M USLI iterations can also be interpreted as classical best-response dynamics in games, immediately yielding: Corollary 5.2. A game whose best-response dynamics form a M USLI system (i.e. an n-player game with bounded real-valued strate- gies and strictly increasing, continuously di(cid:130)erentiable best-response functions that depend only on a linear combination of the other play- ers, with symmetric weights) is a potential game [11], with the above potential function, and is guaranteed to converge. (cid:140)is class of games is fairly broad, including, for instance: Fi((cid:174)x) = sgn (cid:140)e party a(cid:129)liation game. In the well-studied party a(cid:129)liation game [5], agents pick "political parties" −1 and 1 based on the weighted sum of their friends' and enemies' a(cid:129)liations: a player tries to be in the same party as her friends and in a di(cid:130)erent party than her enemies. Allowing fractional strategies and so(cid:137)- ening the best-response function from the original step function j xi xjwij to a sigmoid that approximates it produces a game whose best-response dynamics are a M USLI system. (cid:140)e above argument guarantees a potential function and convergence. We note that this is quite natural, since our potential function ar- gument is an extension of the max cut game potential argument that underlies the analysis of the party a(cid:129)liation game. (cid:140)e symmetrical technology di(cid:130)usion game. Consider a social network where agents are deciding, e.g., between 2 technologies with a network e(cid:130)ect such as cellular providers where a user bene- (cid:128)ts from having more friends use the same technology. In the US cellular market, this corresponds to free phone calls to people on the same network, and heavy charges for calls to people on another network beyond a (cid:128)xed monthly limit. Let weight Wij indicate how many minutes i and j expect to talk on the phone per month, 0 and 1 represent the provider choices, and (cid:174)x ∈ [0, 1]n be the current fractional provider choices, optionally considered as probabilities. A natural best-response function for i is to use (W (cid:174)x)i, the expected number of minutes she will spend talking to people using provider 1 (assuming minutes and provider choices are independent), as an 9 input to a sigmoid that is a so(cid:137) step function at or near the maxi- mum number of free calling minutes for users of provider 0 when calling users of provider 1. Assuming all phone calls are 2-way, the best-response dynamics constitute a M USLI system, immediately demonstrating that the game is a potential game and guaranteeing convergence. 6 CONCLUSION In this paper, we presented a framework for iterative algorithms for giving scores to nodes de(cid:128)ned recursively in terms of the scores of their neighbors, with a focus with one application in which such a recursive de(cid:128)nition comes quite naturally: computing celebrity and spammer scores on a directed social network. We theoretically proved that under a mild symmetry and monotonicity assump- tion, there is a potential function that decreases in every iteration of the iterative algorithm, and therefore, the iterative algorithm always converges to an approximate equilibrium. In the case of celebrity/spammer scoring, we experimentally showed that this convergence is extremely fast, the convergence point is unique, and when applied on randomly generated data with a built-in ground truth, it provides a good approximation to the ground truth. In addition to the obvious application of (cid:128)nding celebrities and link-spammers in online directed social networks, we believe that our potential function framework has the potential to be quite useful in theoretical analysis of iterative algorithms on social networks. Iterative algorithms such as belief propagation are notoriously hard to analyze theoretically, despite widespread practical use. (cid:140)e obvious open directions are to (cid:128)nd other applications or generalizations of our framework, or prove a theoretical bound on the convergence speed of the algorithm that is close to the practical observation. REFERENCES [1] F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonc¸alves. Detecting spammers and content promoters in online video social networks. In Proc. of SIGIR, pages 620–627. ACM, 2009. [2] P. Bonacich. Power and centrality: a family of measures. Amer. J. Sociology, 92:1170–1182, 1987. [3] P. Boutin. What's "follow spam" on Twi(cid:138)er? http://gawker.com/5036236/ whats-follow-spam-on-twitter, August 12, 2008. [4] G. Christodoulou, V. S. Mirrokni, and A. Sidiropoulos. Convergence and ap- proximation in potential games. In STACS 2006, volume 3884 of Lecture Notes in Computer Science, pages 349–360. 2006. [5] A. Fabrikant, C. H. Papadimitriou, and K. Talwar. (cid:140)e complexity of pure Nash equilibria. In Proc. of STOC, pages 604–612, 2004. [6] A. Farahat, T. LoFaro, J. C. Miller, G. Rae, and L. A. Ward. Authority rankings from hits, pagerank, and salsa: Existence, uniqueness, and e(cid:130)ect of initialization. SIAM Journal on Scienti(cid:128)c Computing, 27(4):1181–1201, 2006. 40:35–41, 1977. [7] L. Freemann. A set of measures of centrality based on betweenness. Sociometry, [8] S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, and K. P. Gummadi. Understanding and combating link farming in the twi(cid:138)er social network. In Proc. WWW, pages 61–70, 2012. through a social network. In Proc. of KDD, pages 137–146, 2003. J. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46, 1999. [11] D. Monderer and L. Shapley. Potential games. Games and Economic Behavior, twi(cid:138)er: (cid:140)e [12] T. O'Reilly. asym- http://radar.oreilly.com/2009/05/ [9] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of in(cid:131)uence 14:124–143, 1996. metric goodreads-vs-twitter-asymmetric-follow.html, May 10, 2009. bringing order to the web. 1999. [13] L. Page, S. Brin, R. Motwani, and T. Winograd. (cid:140)e PageRank citation ranking: Goodreads follow. [10] vs bene(cid:128)ts of [14] S. Russell, P. Norvig, and E. Davis. Arti(cid:128)cial intelligence: a modern approach. Prentice Hall, 2010. J. Song, S. Lee, and J. Kim. Spam (cid:128)ltering in twi(cid:138)er using sender-receiver [15] relationship. In R. Sommer, D. Balzaro(cid:138)i, and G. Maier, editors, Recent Advances in Intrusion Detection, volume 6961 of LNCS, pages 301–317. 2011. [16] T. Upstill, N. Craswell, and D. Hawking. Predicting fame and fortune: Pagerank or indegree? In ADCS, 2003. 1–10, 2010. [17] A. Wang. Don't follow me: Spam detection in twi(cid:138)er. In Proc. SECRYPT, pages [18] S. White and P. Smyth. Algorithms for estimating relative importance in net- [19] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social works. In Proc. of KDD, pages 266–275, 2003. network sybils in the wild. In Proc. IMC, pages 259–268, 2011. 10
1106.0359
1
1106
2011-06-02T02:44:26
Composite Social Network for Predicting Mobile Apps Installation
[ "cs.SI", "cs.HC", "physics.soc-ph" ]
We have carefully instrumented a large portion of the population living in a university graduate dormitory by giving participants Android smart phones running our sensing software. In this paper, we propose the novel problem of predicting mobile application (known as "apps") installation using social networks and explain its challenge. Modern smart phones, like the ones used in our study, are able to collect different social networks using built-in sensors. (e.g. Bluetooth proximity network, call log network, etc) While this information is accessible to app market makers such as the iPhone AppStore, it has not yet been studied how app market makers can use these information for marketing research and strategy development. We develop a simple computational model to better predict app installation by using a composite network computed from the different networks sensed by phones. Our model also captures individual variance and exogenous factors in app adoption. We show the importance of considering all these factors in predicting app installations, and we observe the surprising result that app installation is indeed predictable. We also show that our model achieves the best results compared with generic approaches: our results are four times better than random guess, and predict almost 45% of all apps users install with almost 45% precision (F1 score= 0.43).
cs.SI
cs
Composite Social Network for Predicting Mobile Apps Installation Wei Pan and Nadav Aharony and Alex (Sandy) Pentland MIT Media Laboratory 20 Ames Street Cambridge, Massachusetts 02139 Abstract We have carefully instrumented a large portion of the population living in a university graduate dormitory by giving participants Android smart phones running our sensing software. In this paper, we propose the novel problem of predicting mobile application (known as “apps”) installation using social networks and explain its challenge. Modern smart phones, like the ones used in our study, are able to collect different social net- works using built-in sensors. (e.g. Bluetooth proximity network, call log network, etc) While this information is accessible to app market makers such as the iPhone AppStore, it has not yet been studied how app mar- ket makers can use these information for marketing re- search and strategy development. We develop a simple computational model to better predict app installation by using a composite network computed from the dif- ferent networks sensed by phones. Our model also cap- tures individual variance and exogenous factors in app adoption. We show the importance of considering all these factors in predicting app installations, and we ob- serve the surprising result that app installation is indeed predictable. We also show that our model achieves the best results compared with generic approaches: our pre- diction results are four times better than random, and reach almost 45% prediction precision with 45% recall. 1 1 0 2 n u J 2 ] I S . s c [ 1 v 9 5 3 0 . 6 0 1 1 : v i X r a the bluetooth proximity network, from phone data. However, it remains an unknown yet important question whether these data can be used for app marketing. Therefore, in this paper we address the challenge of utilizing all different network data obtained from smart phones for app installation predic- tion. It is natural to speculate that there are network effects in users’ app installation, but we eventually realize that it was very difficult to adopt existing tools from large-scale social network research to model and predict the installation of cer- tain mobile apps for each user due to the following facts: 1. The underlying network is not observable. While many projects assume phone call logs are true so- cial/friendship networks (Zhang and Dantu 2010), others may use whatever network that is available as the un- derlying social network. Researchers have discovered that call network may not be a good approximation (Eagle and Pentland 2006). On the other hand, smart phones can easily sense multiple networks using built- in sensors and software: a) The call logs can be used to form phone call networks; b) Bluetooth radio can be used to infer proximity networks (Eagle and Pentland 2006); c) GPS data can be used to infer user moving pat- terns, and furthermore their working places and affilia- tions (Farrahi and Gatica-Perez 2010); d) Social network tools (such as the Facebook app and the Twitter app) can observe users’ online friendship network. In this work, our key idea is to infer an optimal composite network, the network that best describes app installation, from multi- ple layers of different networks easily observed by mod- ern smart phones, rather than assuming a certain network as the real social network explaining app installation. 2. Analysis for epidemics (Ganesh, Massouli´e, and Towsley 2005) and Twitter networks (Yang and Leskovec 2010) is based on the fact that network is the only mechanism for adoption. The only way to get the flu is to catch the flu from someone else, and the only way to retweet is to see the tweet message from someone else. For mobile app, this is, however, not true at all. Any user can simply open the AppStore (on iPhones) or the Android Market (on Android phones), browse over different lists of apps, and pick the one that appears most interesting to the user to install without peer influence. One big challenge, which Introduction projects have correlate with obesity (Colizza et al. 2007), demonstrated individual research networks such as diseases Recent social iors, and two. Many and lar (Eagle, Macy, and Claxton 2010) (Leskovec, Adamic, and Huberman 2007). that behav- (Christakis and Fowler 2007) name analyzed, popu- becoming increasing large-scale networks are this field is to We are interested in studying the network-based pre- diction for mobile applications (referred as “apps”) in- stallation, as the mobile application business is growing rapidly (Ellison 2010). The app market makers, such as iPhone AppStore and Android Market, run on almost all modern smart phones, and they have access to phone data and sensor data. As a result, app market makers can infer different types of networks, such as the call log network and Copyright c(cid:13) 2014, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. makes modeling the spreading of apps difficult, is that one can install an app without any external influence and information. One major contribution of this paper is that we demonstrate it is still possible to build a tool to observe network effects with such randomness. 3. The individual behavioral variance in app installation is so significant that any network effect might possibly be rendered unobservable from the data. For instance, some geek users may try and install all hot apps on the market, while many inexperienced users find it troublesome even to go through the process of installing an app, and as a result they only install very few apps. 4. There are exogenous factors in the app installation behav- iors. One particular factor is the popularity of apps. For in- stance, the Pandora Radio app is vastly popular and highly ranked in the app store, while most other apps are not. Our model takes this issue into account too, and we show that exogenous factors are important in increasing prediction precision. Classic diffusion models ask each one to list their affiliations (i.e. the academic de- partment), and rate their relationships with everyone else in the study. We believe for app market makers the af- filiation network can also be inferred simply by using phone GPS/cell tower information as shown by Farrahi et al(Farrahi and Gatica-Perez 2010). However, this is not the focus of this work, and here we simply use survey data in- stead. Though the friendship network is also collected using surveys, we suggest that the app market makers can obtain the friendship network from phones by collecting data from social networking apps such as the Facebook and Twitter apps. We summarize all the networks obtained from both phones and surveys in Table 1. We refer to all networks in Table 1 as candidate networks, and all candidate networks will be used to compute the optimal composite network. It should be noted that all networks are reciprocal in this work. We want to emphasize the fact that the network data we used in Table 1 are obtainable for app market makers such as Apple iTunes Store, as they have access to phone sensors as well as user accounts. Therefore, our approach in this paper can be beneficial to them for marketing research, customized app recommendation and marketing strategy making. are applicable as Granovetter’s such work (Granovetter and Soong 1983) to simulation, but lack data fitting and prediction powers. Statistical analysis used by social scientists such as matched sample estimation (Aral, Muchnik, and Sundararajan 2009) are only for identifying network effects and mechanism. Recently works in computer science for inferring network structure assume simple diffusion mechanism, and are only applicable to artificial simulation data on real net- works (Gomez Rodriguez, Leskovec, and Krause 2010) (Myers and Leskovec 2010). On the other hand, our work addresses the above is- sues in practical app marketing prediction. On the mobile-based behavioral prediction side, The closest research is the churn prediction problem in mobile net- works (Richter, Yom-Tov, and Slonim 2010), which uses call logs to predict users’ future decisions of switching mobile providers. To our knowledge, we don’t see other related works for similar problems. Our built-in sensing platform is constantly monitoring the installation of mobile apps. Every time a new app is in- stalled, this information will be collected and sent back to our server within a day. Overall, we receive a total of 821 apps installed by all 55 users. Among them, 173 apps have at least two users. For this analysis, we only look at app in- stallations and ignore un-installations. We first demonstrate statistics for all of the apps in the study: In Fig. 1(a), we plot the distribution of number of users installing each app. We discover that our data correspond very well with a power- law distribution with exponential cut. In Fig. 1(b), we plot the distribution of number of apps installed per user, which fits well with an exponential distribution. Data We collected our data from March to July 2010 with 55 par- ticipants, who are residents living in a married graduate stu- dent residency of a major US university. Each participant is given an Android-based cell phone with a built-in sens- ing software developed by us. The software runs in a pas- sive manner, and it didn’t interfere the normal usage of the phone. Our software is able to capture all call logs in the ex- periment period. We therefore obtained a call log network between all participants by treating participants as nodes and the number of calls between two nodes as weights for the edge in-between. The software also scans near- by phones and other Bluetooth devices every five min- utes to capture the proximity network between individu- als. The counts on the number of Bluetooth hits are used as edge weights similar to the call log network as done in Eagle et al (Eagle and Pentland 2006). We have also col- lected the affiliation network and the friendship network by deploying a survey, which lists all the participants and Fig. 1(a) and 1(b) illustrate detailed insight into our dataset. Even with a small portion of participants, the distri- bution characteristic is clearly observable. We find that apps have a power-law distribution of users, which suggests that most apps in our study community have a very small user pool, and very few apps have spread broadly. The exponen- tial decay in Fig. 1(b) suggests that the variance of individ- ual user is significant: There are users having more than 100 apps installed, and there are users having only a couple of apps. Model In this section, we describe our novel model for capturing the app installation behaviors in networks. In the following content, G denotes the adjacency matrix for graph G. Each user is denoted by u ∈ {1, ..., U }. Each app is denoted by u to a ∈ {1, ..., A}. We define the binary random variable xa represent the status of adoption (i.e. app installation): xa u = 1 if a is adopted by user n, 0 if not. As introduced in the previous section, the different social relationship networks that can be inferred by phones are de- noted by G1, ..., GM . Our model aims at inferring an opti- mal composite network Gopt with the most predictive power from all the candidate social networks. The weight of edge Network Type Call Log Network Undirected,Weighted Bluetooth Proximity Network Undirected,Weighted Undirected,Binary Undirected,Binary Friendship Network Affiliation Network Source # of Calls # of Bluetooth Scan Hits Survey Results (1: friend; 0: not friend) Survey Results (1: same; 0: different) Notation Gc Gb Gf Ga Table 1: Network data used in this study. α , α=−1.98 y= x 100 y = e β x, β= −0.04 ) x ≥ X ( r P 10−1 100 ) x ≥ X ( r P 10−1 10−2 10−3 100 101 x (# of Users per App ) 102 (a) 10−2 100 101 102 x (# of Apps Installed per User) 103 (b) Figure 1: Circles are real data, and lines are fitting curves. Left: Distribution of number of users for each app. Right: Distribution of number of apps each user installed. ei,j in graph Gm is denoted by wm in Gopt is simply denoted by wi,j. i,j. The weight of an edge Adoption Mechanism One base idea of our model is the non-negative accumulative assumption, which distinguishes our model from other linear mixture models. We define Gopt to be: Gopt = Xm αmGm, where ∀m, αm ≥ 0. (1) The intuition behind this non-negative accumulative as- sumption is as follows: if two nodes are connected by a cer- tain type of network, their app installation behaviors may or may not correlate with each other; On the other hand, if two nodes are not connected by a certain type of network, the absence of the link between them should lead to nei- ther positive or negative effect on the correlation between their app installations. As shown in Table 2 in the exper- iment session, our non-negative assumption brings signifi- cant performance increase in prediction. Non-negative as- sumption also makes the model stochastic and theoretically sound. We treat binary graphs as weighted graphs as well. Since α1, ..., αM is the non-negative weights for each can- didate network in describing the optimal composite network. We later refer to the vector (α1, ..., αM ) as the optimal com- posite vector. Our non-negative accumulative formulation is also similar to mixture matrix models in machine learning literature (El-Yaniv, Pechyony, and Yom-Tov 2008). We continue to define the network potential pa(i): where the neighbor of node i is defined by: N (i) = {j∃m s.t. wm i,j ≥ 0}. (3) The potential pa(i) can also be decomposed into poten- tials from different networks: wm i,jxa j ) , (4) pa(i) = Xm αm ( Xj∈N (i) {z pm a (i) } where pm a (i) is the potential computed from one single can- didate network. We can think of pa(i) as the potential of i installing app a based on the observations of its neighbors on the composite network. The definition here is also similar to incoming influence from adopted peers for many cascade models (Kempe, Kleinberg, and Tardos 2003). Finally our conditional probability is defined as: Prob(xa u = 1xa u′ : u′ ∈ N (u)) = 1 − exp(−su − pa(u)), (5) where ∀u, su ≥ 0. su captures the individual susceptibility of apps, regardless of which app. We use the exponential function for two reasons: 1. The monotonic and concave properties of f (x) = 1 − exp(−x) matches with recent research (Centola 2010), which suggests that the probability of adoption increases at a decreasing rate with increasing external network sig- nals. 2. It forms a concave optimization problem during maxi- mum likelihood estimation in model training. pa(i) = Xj∈N (i) wi,j xa j , (2) As shown in the experiment section and based on our expe- riences, this exponential model yields the best performance. Model Training We move on to discuss model training. During the train- ing phase, we want to estimate the optimal values for the α1, ..., αM and s1, ..., sU . We formalize it as an optimiza- tion problem by maximizing the sum of all conditional like- lihood. Given all candidate networks, a training set composed of u : ∀a ∈ a subset of apps TRAIN ⊂ {1, ..., A}, and {xa TRAIN, u ∈ {1, ..., U }}, we compute: arg max f (s1, ..., sU , α1, ..., αM ), s1,...,sU ,α1,...,αM Subject to: ∀u, su ≥ 0, ∀m, αm ≥ 0 (6) where: f (s1, ..., sU , α1, ..., αM ) Prob(xa u = 1xa u′ : u′ ∈ N (u)) u=1 = log(cid:20) Ya∈TRAIN Yu:xa Yu:xa u=0(cid:0)1 − Prob(xa = Xa∈TRAIN − Xu:xa   Xu:xa (su + pa(u))  u=1 u=0 u = 1xa u′ : u′ ∈ N (u))(cid:1)(cid:21) log(1 − exp(−su − pa(u)) (7) (8) Gp, which can be easily plugged into our composite network framework. Gp is constructed by adding a virtual node U +1 and one edge eU+1,u for each actual user u. The correspond- ing weight of each edge wU+1,u for computing pa(u) is C a, where C a is a positive number describing the popularity of an app. In our experiment, we use the number of installations of the app in this experimental community as C a. We have been looking at other sources to obtain reliable estimates for C a, but we found that the granularity from public sources to be unsatisfying. In practice for app market makers, we argue that C a can be easily obtained accurately by counting app downloads and app ranks. The exogenous factors also increase accuracy in measur- ing network effects for a non-trivial reason: Considering a network of two nodes connected by one edge, and both nodes installed an app. If this app is very popular, then the fact that both nodes have this app may not imply a strong network effect. On the contrary, if this app is very uncom- mon, the fact that both nodes have this app implies a strong network effect. Therefore, introducing exogenous factors does help our algorithm better calibrate network weights. Experiments Our algorithm predicts the probability of adoption (i.e. installing an app) given its neighbor’s adoption status. pi ∈ [0, 1] denotes the predicted probability of instal- lation, while xi ∈ {0, 1} denotes the actual outcome. The most common prediction measure is the Root Mean i=1(pi − xi)2). This mea- sure is known to assess badly the prediction method’s abil- ity (Goel et al. 2010). Since in our dataset most users have installed very few apps, a baseline approach can simply pre- dict the same small pi and still achieve very low RMSE. Square Error (RMSE = q 1 n Pn For app marketing, the key objective is not to know the probability prediction for each app installation, but to rank and identify a sub-group of individuals who are more likely to appreciate and install certain apps compared with average users. Therefore, we mainly adopt the approach in rank-aware measures from information retrieval prac- tices (Manning et al. 2008). For each app, we rank the like- lihood of adoption computed by prediction algorithms, and study the following factors: a) Mean Precision at k (MP-k): We select the top k indi- viduals with highest likelihood of adoption as predicted adopters from our algorithms, and compute precision at k ( # true adopters among k predicted adopters ). We average precisions at k among all apps in the testing set to get MP-k. On average each app has five users in our dataset. Therefore, the default value for k is five in the following text. MP- k measures algorithm’s performance on predicting most likely nodes. k This is a concave optimization problem. Therefore, global optimal is guaranteed, and there exist efficient algorithms scalable to larger datasets (Boyd and Vandenberghe 2004). We use a MATLAB built-in implementation here, and it usu- ally take a few seconds during optimization in our experi- ments. Compared with works on inferring net- works (Gomez Rodriguez, Leskovec, and Krause 2010) (Myers and Leskovec 2010), our work is different as we compute Gopt from existing can- didates networks. In addition, we don’t need any additional regularization term or tuning parameters in the optimization process. We emphasize that our algorithm doesn’t distinguish the causality problem (Aral, Muchnik, and Sundararajan 2009) in network effects: i.e.,we don’t attempt to understand the different reasons why network neighbors have similar app installation behaviors. It can either be diffusion (i.e. my neighbor tells me), or homophily (i.e. network neighbors share same interests and personality). Instead, our focus is on prediction of app installation, and we leave the causality problem as future work. Virtual Network for Exogenous Factors Obvious exogenous factors include the popularity and qual- ity of an app. The popularity and quality of an app will affect the ranking and review of the app in the App- Store/AppMarket, and as a result higher/lower likelihood of adoption. We can model this by introducing a virtual graph b) Optimal F1-score (referred later simply as F1 Score). The optimal F1-score is computed by computing F1-scores ( 2×precision×recall precision+recall )for each point on the Precision-Recall curve and selecting the largest F1 value. Unlike MP-k, the optimal F1 score is used to measure the overall prediction performance of our algorithms. For instance, F1 = 0.5 suggests the algorithm can reach a 50% precision at 50% recall. Prediction using Composite Network To begin with, we illustrate different design aspects for our algorithm. To demonstrate the importance of modeling both net- works and individual variances in our model, we here demonstrate the prediction performance with five configu- rations using a 5-fold cross-validation: a) to model both in- dividual variance and network effects; b) to model both indi- vidual variance and network effects, but exclude the virtual network Gp capturing exogenous factors; c) to model with only individual variance (by forcing αm = 0 in Eq. 6), d) to model with only network effects (by forcing su = 0, ∀u), and e) to model with network effects while allowing the composite vector to be negative. The results are illustrated in Table 2. We find the surprising results that app installations are highly predictable with individual variance and network in- formation as shown in Table 2. In addition, Table 2 clearly suggests that all our assumptions for the model are indeed correct, and both individual variance and network effects play important roles in app installation mechanism, as well as the exogenous factors modeled by Gp. We also notice that while accuracy almost doubles, it is often impossible to realize this improvement using RMSE. Therefore, we will not RMSE for the rest of the work. work related to app prediction with multiple networks, we here compare prediction performance with some alternative approaches we can think of. Since it is practically difficult to observe every user app installation behaviors, in our experiments we also want to test the performance of each algorithm when the test set is small. In particular, we evaluate the performance of differ- ent implementations with two approaches for cross valida- tion: 1) Normal-size training set: We randomly choose half of all the apps in the dataset as the training set, and test on the other half of the dataset. 2) Small-size training set: We randomly choose only 20% of all the app installations in our dataset as the training set, and test on the the rest 80% apps. In both cases, we repeat the process for five times for cross validation and take average of the results. our For feed it with algorithm, we networks Gp, Ga, Gb, Gf and Gc obtained by phones and sur- veys as described previously. For SVM, we apply two different approaches in predictions: • We don’t consider the underlying network, but simply use the adoption status of all other nodes as the features for each node. We test this approach simply to establish a baseline for prediction. We refer it as “SVM-raw”. • We compute the potential pm a (i) for each candidate net- work Gm, and we use all the potentials from all candi- date networks as features. Therefore, we partially borrow some ideas from our own model to implement this SVM approach. We refer this approach as “SVM-hybrid”. e r o c S 1 F 0.5 0.4 0.3 0.2 0.1 0 Rando m a G Gf b G c G O ur Approach Figure 2: We demonstrate the prediction performances using each single network here. For comparison, we also show the result of random guess, and the result using our approach, which combines all potential evidence. We now illustrate the prediction performance when our algorithm is only allowed to use one single network. The results are shown in Fig. 2. We find that except the affilia- tion network, almost all other networks predict well above chance level. The call log network seems to achieve the best results. We conclude that while network effects are strong in app installations, a well-crafted model such as our approach can vastly increase the performance by computing the com- posite network and counting other factors in. Prediction Performance We now test the performance of our model with some other implementations for predictions. As there is no other closer a use implementation We (Chang and Lin 2001), which is capable of generating probabilistic predictions rather than binary predictions. modern SVM We also replace Eq. 5 with a linear regression model by using pm a (i), ∀m together with # of apps per user (instead of learning su in our MLE framework) as independent vari- ables. We call this approach “Our Approach (Regression)” in the following text to distinguish the difference. We also force the non-negative accumulation assumption in the re- gression setting. Results for both the normal-size training set and the small- size training set are shown in Table 3, and we discover that our algorithm outperforms other competing approaches in all categories. However, we notice that with many our model assumptions, generic methods can also achieve reasonably well results. Performance on half of the users that are less active in app installation is also shown. Because this group of users are very inactive, they may be more susceptible to network influence in app installation behaviors. We notice that our algorithm performs better in this group with more than 10% improvement over other methods. Predicting Future Installations In app marketing, one key issue is to predict future app in- stallations. Predicting future app adoption at time t in our model is equivalent to predicting installation with part of the neighbor adoption status unknown. These unknown neigh- bors who haven’t adopted at time t may or may not adopt at t′ > t. Though our algorithm is trained without the informa- tion of time of adoption, we show here that the inferred in- Net.+ Ind. Var. + Exogenous Factor Net. + Ind. Var. Ind. Variance Only Net. Only (non-negative) Net. Only (allow negative) RMSE MP-5 F1 Score 0.25 0.26 0.29 0.26 0.30 0.31 0.29 0.097 0.24 0.12 0.43 0.42 0.24 0.37 0.12 Table 2: The performance of our approach under five different configurations. We observe that modeling both individual vari- ance and networks are crucial in performance as well as enforcing non-negative composition for candidate networks as in Eq. 1. Methods Our Approach SVM-raw SVM-hybrid Our Approach (Regression) Random Guess Using 20% as Training Set Using 50% as Training Set Using 50% as Training Set All Users MP-5 0.28 0.17 0.14 0.27 0.081 Low Activity Users MP-5 0.20 0.14 0.16 0.18 0.076 All Users MP-5 0.31 0.24 0.27 0.30 0.081 0.43 0.27 0.30 0.39 0.14 F1 Score 0.46 0.26 0.29 0.42 0.17 F1 Score F1 Score 0.43 0.32 0.30 0.41 0.17 Table 3: Prediction performance for our algorithm and competing methods is shown. dividual variance su and composite vector (α1, ..., αM ) can be used to predict future app adoption. We here apply the following cross-validation scheme to test our algorithm’s ability in predicting future installations: For the adopters of each app, we split them to two equal-size groups by their time of adoption. Those who adopted earlier are in G1, and those who adopted later are in G2. The train- ing phase is the same as the previous section; In the testing phase, each algorithm will only see adoption information for subjects in G1, and predict node adoption for the rest. The nodes in G2 will be marked as non-adopters during predic- tion phase. Results from cross validation are shown in Table 4. We notice that our algorithm still maintains the best perfor- mance and limited decrease in accuracy compared with Ta- ble 3. Since the number of adopted nodes are fewer than those in Table 3, we here show MP with smaller k in Table 4. Our Approach SVM-hybrid Our(Regression) Random MP-k k = 4 0.16 0.13 0.15 0.045 k = 5 0.15 0.12 0.14 0.045 F1 Score 0.35 0.32 0.33 0.090 k = 3 0.18 0.15 0.17 0.045 Table 4: MP-k and F1 scores for predicting future app in- stallations are shown above. Notice in Table 4 that the random guess precision is re- duced by half. Therefore, even the precision here is 30% lower than in Table 3, it is mainly due to the fact that nodes in G1 are no longer in the predicting set. Our accuracy is considerable as it is four times better than random guess. Predictions With Missing Historical Data In practice, sometimes it is not possible to observe the app installation for all users due to privacy reasons. Instead, for app market markers they may only be allowed to observe and instrument a small subset of a community. We here want to study if it is still possible to make some prediction in app installations under such circumstance. To formally state this problem, we assume that all the nodes 1, ..., U are divided into two groups. The observable group G1 and the unobservable group G2. During cross val- idation, only nodes in the observable group are accessible to our algorithms in the training process, and nodes in the un- observable group are tested with the prediction algorithms. Therefore, for our algorithm, even the individual variance su, u ∈ G1 is computed in the training process, we will not have su′ , u′ ∈ G2 for Eq. 5 in the testing phase. We illustrate the prediction precision results in Fig. 3. It seems that even trained on a different set of subjects without calibrating users variance, the composite vector learned by our algorithm can still be applied to another set of users and achieve 80% over random guess. Conclusion Our contributions in this paper include a) We show the data of a novel mobile phone based experiments on the app in- stallation behavior; b) We illustrate that there are strong net- work effects in app installation patterns even with tremen- dous uncertainty in app installation behavior; c) We show that by combining measurable networks using modern smart phones, we can maximize the prediction accuracy; d) We de- velop a simple discriminative model which combines indi- vidual variance, multiple networks and exogneous factors, and our model provides prediction accuracy four times bet- ter than random guess in predicting future installations. Future works include the causality problem in studying 0.2 0.15 P M 0.1 0.05 0 Our Approach SVM−hybrid Our Approach(Regression) Random Guess 50% 20% Percentage of All Subjects Used for Training Figure 3: The MP from our approach and two comparison approaches. We here set k for MP to be the average number of users in G2 for each testing app. network phenomena and a temporal model for app adoption. We believe the former one can be done with a much care- fully crafted lab experiments. For the latter one, we have attempted multiple temporal adoption models but failed.We suspect that the mechanism of temporal diffusion of apps is very complicated, and we leave this as a future work. Though our convex optimization framework is fast and reasonably scalable, it should be noted that still the proposed method in this paper may not be suitable to handle data from billions of cell phone users. Potential solutions include di- viding users into small clusters and then conquering, and sampling users for computation. The scalability problem re- mains a future work. Acknowledgements The authors want to thank Cory Ip for her remarkable efforts in managing the study, Dr. Riley Crane and Yves-Alexandre de Montjoye for helpful discussions, and the anonymous reviewers for their valuable comments. This research was sponsored by AFOSR under Award Number FA9550-10-1- 0122. The views and conclusions contained in this document are those of the authors and should not be interpreted as rep- resenting the official policies, either expressed or implied, of AFOSR or the U.S. Government. References [Aral, Muchnik, and Sundararajan 2009] Aral, S.; Muchnik, L.; and Sundararajan, A. 2009. Distinguishing influence- based contagion from homophily-driven diffusion in dy- namic networks. Proceedings of the National Academy of Sciences 106(51):21544. [Boyd and Vandenberghe 2004] Boyd, S., and Vanden- berghe, L. 2004. Convex optimization. Cambridge Univ Pr. The Spread of Be- [Centola 2010] Centola, D. havior in an Online Social Network Experiment. science 329(5996):1194. Lin, [Chang and Lin 2001] Chang, C.-J. sup- at port http://www.csie.ntu.edu.tw/cjlin/libsvm. vector machines. Software LIBSVM: a library for 2010. 2001. C.-C., and available [Christakis and Fowler 2007] Christakis, N., and Fowler, J. 2007. The spread of obesity in a large social network over 32 years. New England Journal of Medicine 357(4):370. [Colizza et al. 2007] Colizza, V.; Barrat, A.; Barthelemy, M.; Valleron, A.; and Vespignani, A. 2007. Modeling the world- wide spread of pandemic influenza: Baseline case and con- tainment interventions. PLoS Medicine 4(1):95. [Eagle and Pentland 2006] Eagle, N., and Pentland, A. 2006. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing 10(4):255–268. [Eagle, Macy, and Claxton 2010] Eagle, N.; Macy, M.; and Claxton, R. 2010. Network diversity and economic devel- opment. Science 328(5981):1029. [Eagle, Pentland, and Lazer 2009] Eagle, N.; Pentland, A.; and Lazer, D. 2009. Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences 106(36):15274. [El-Yaniv, Pechyony, and Yom-Tov 2008] El-Yaniv, R.; Pechyony, D.; and Yom-Tov, E. 2008. Better multiclass classification via a margin-optimized single binary problem. Pattern Recognition Letters 29(14):1954–1959. [Ellison 2010] Ellison, S. 2010. Worldwide and U.S. Mobile Applications, Storefronts, and Developer 20102014 Fore- cast and Year-End 2010 Vendor Shares: The ”Appification” of Everything. [Farrahi and Gatica-Perez 2010] Farrahi, K., and Gatica- Perez, D. 2010. Probabilistic Mining of Socio-Geographic Routines From Mobile Phone Data. Selected Topics in Sig- nal Processing, IEEE Journal of 4(4):746–755. [Ganesh, Massouli´e, and Towsley 2005] Ganesh, A.; Mas- souli´e, L.; and Towsley, D. 2005. The effect of network topology on the spread of epidemics. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, volume 2, 1455–1466. IEEE. [Goel et al. 2010] Goel, S.; Reeves, D.; Watts, D.; and Pen- nock, D. 2010. Prediction without markets. In Proceedings of the 11th ACM conference on Electronic commerce, 357– 366. ACM. [Gomez Rodriguez, Leskovec, and Krause 2010] Gomez Rodriguez, M.; Leskovec, J.; and Krause, A. 2010. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 1019–1028. ACM. [Granovetter and Soong 1983] Granovetter, M., and Soong, R. 1983. Threshold models of diffusion and collective be- havior. The Journal of Mathematical Sociology 9(3):165– 179. [Kempe, Kleinberg, and Tardos 2003] Kempe, D.; Klein- berg, J.; and Tardos, ´E. 2003. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, 137–146. ACM. [Leskovec, Adamic, and Huberman 2007] Leskovec, Inferring networks of diffusion and influence. J.; Adamic, L.; and Huberman, B. 2007. The dynamics of viral marketing. ACM Transactions on the Web (TWEB) 1(1):5. [Manning et al. 2008] Manning, C.; Raghavan, P.; Schutze, H.; and Corporation, E. 2008. Introduction to informa- tion retrieval, volume 1. Cambridge University Press Cam- bridge, UK. [Myers and Leskovec 2010] Myers, S., and Leskovec, J. 2010. On the convexity of latent social network inference. Arxiv preprint arXiv:1010.5504. [Richter, Yom-Tov, and Slonim 2010] Richter, Y.; Yom-Tov, E.; and Slonim, N. 2010. Predicting customer churn in mo- bile networks through analysis of social groups. In Proceed- ings of the 2010 SIAM International Conference on Data Mining (SDM 2010). [Yang and Leskovec 2010] Yang, J., and Leskovec, J. 2010. Modeling Information Diffusion in Implicit Networks. [Zhang and Dantu 2010] Zhang, H., and Dantu, R. 2010. Discovery of Social Groups Using Call Detail Records. In On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 489–498. Springer.
1610.06941
2
1610
2016-11-21T17:05:07
Recovering Metabolic Networks using A Novel Hyperlink Prediction Method
[ "cs.SI", "q-bio.MN" ]
Studying metabolic networks is vital for many areas such as novel drugs and bio-fuels. For biologists, a key challenge is that many reactions are impractical or expensive to be found through experiments. Our task is to recover the missing reactions. By exploiting the problem structure, we model reaction recovery as a hyperlink prediction problem, where each reaction is regarded as a hyperlink connecting its participating vertices (metabolites). Different from the traditional link prediction problem where two nodes form a link, a hyperlink can involve an arbitrary number of nodes. Since the cardinality of a hyperlink is variable, existing classifiers based on a fixed number of input features become infeasible. Traditional methods, such as common neighbors and Katz index, are not applicable either, since they are restricted to pairwise similarities. In this paper, we propose a novel hyperlink prediction algorithm, called Matrix Boosting (MATBoost). MATBoost conducts inference jointly in the incidence space and adjacency space by performing an iterative completion-matching optimization. We carry out extensive experiments to show that MATBoost achieves state-of-the-art performance. For a metabolic network with 1805 metabolites and 2583 reactions, our algorithm can successfully recover nearly 200 reactions out of 400 missing reactions.
cs.SI
cs
Recovering Metabolic Networks using A Novel Hyperlink Prediction Method Muhan Zhang1, Zhicheng Cui1, Tolutola Oyetunde2, Yinjie Tang2, and Yixin Chen1 1Department of Computer Science and Engineering, Washington University in St. Louis 2Department of Energy, Environmental & Chemical Engineering, Washington University in St. Louis {muhan, z.cui, toyetunde, yinjie.tang}@wustl.edu, [email protected] 6 1 0 2 v o N 1 2 ] I S . s c [ 2 v 1 4 9 6 0 . 0 1 6 1 : v i X r a Abstract Studying metabolic networks is vital for many areas such as novel drugs and bio-fuels. For biologists, a key challenge is that many reactions are impractical or expensive to be found through experiments. Our task is to recover the missing re- actions. By exploiting the problem structure, we model reac- tion recovery as a hyperlink prediction problem, where each reaction is regarded as a hyperlink connecting its participat- ing vertices (metabolites). Different from the traditional link prediction problem where two nodes form a link, a hyperlink can involve an arbitrary number of nodes. Since the cardinal- ity of a hyperlink is variable, existing classifiers based on a fixed number of input features become infeasible. Traditional methods, such as common neighbors and Katz index, are not applicable either, since they are restricted to pairwise similar- ities. In this paper, we propose a novel hyperlink prediction algorithm, called Matrix Boosting (MATBoost). MATBoost conducts inference jointly in the incidence space and adja- cency space by performing an iterative completion-matching optimization. We carry out extensive experiments to show that MATBoost achieves state-of-the-art performance. For a metabolic network with 1805 metabolites and 2583 reactions, our algorithm can successfully recover nearly 200 reactions out of 400 missing reactions. Introduction Reconstructed metabolic networks are important tools for understanding the metabolic basis of human diseases, in- creasing the yield of biologically engineered systems, and discovering novel drug targets (Bordbar et al. 2014). Semi- automated procedures have been recently developed to re- construct metabolic networks from annotated genome se- quences (Thiele and Palsson 2010). However, these net- works are often incomplete -- some reactions can be missing from them, which can severely impair their utility (Kumar, Dasika, and Maranas 2007). Thus, it is critical to develop accurate computational methods for completing metabolic networks. A method that can automatically recover missing reactions in metabolic networks is much desired. Link prediction (Liben-Nowell and Kleinberg 2007; Lu and Zhou 2011) has been studied broadly in recent years (Singh and Gordon 2008; Miller, Jordan, and Griffiths 2009; Rendle et al. 2009; Menon and Elkan 2011; Cao, Kong, and Yu 2014; Chen et al. 2015; Ermis¸, Acar, and Cemgil 2015; Song, Meyer, and Tao 2015; Wu et al. 2016). Existing meth- ods can be grouped into three types: topological feature- based approaches, latent feature-based approaches, and su- pervised learning approaches. Popular criterions and meth- ods include common neighbors, Jaccard coefficients (Liben- Nowell and Kleinberg 2007), Katz index (Katz 1953), and latent feature models (Miller, Jordan, and Griffiths 2009; Rendle et al. 2009; Menon and Elkan 2011) et al. How- ever, these approaches are restricted to predicting pairwise relations. None of them are directly applicable to predicting hyperlinks. A hyperlink relaxes the assumption that only two nodes can participate in a link. Instead, an arbitrary number of nodes are allowed to jointly form a hyperlink. A network made up of hyperlinks is called a hypernetwork or hypergraph. Many complex networks are actually hypernetworks. Ex- amples include biological networks, social networks with group relations, and citation networks. In metabolic net- works, every reaction can be regarded as a hyperlink among its component metabolites. A hypernetwork can be naturally represented as an incidence matrix S, where each column of S is a hyperlink and each row represents a vertex. If vertex i participates in hyperlink j, then Sij = 1, otherwise Sij = 0. In this paper, we model metabolic reaction recovery as a hy- perlink prediction problem in hypernetworks. For metabolic networks, the S matrix is also known as the Binary Stoichio- metric Matrix. Figure 1 shows an example. Although hypernetworks are common in the real world, there are still limited research on hyperlink prediction. One great challenge lies in the variable cardinality of hyperlinks. Existing classifiers for link prediction are based on a fixed number of input features (e.g., concatenating features of ver- tex a and features of vertex b). However, in hyperlink predic- tion, the number of vertices in a hyperlink is variable, which makes existing methods inapplicable. On the other hand, link prediction methods based on topological features, such as common neighbors, cannot be applied to hyperlink pre- diction either. The reason is that these measures are defined for pairs of nodes (links) instead of hyperlinks. A few basic methods for hyperlink prediction have poor performance on recovering metabolic networks. In summary, hyperlink pre- diction is an important, interesting, yet rarely touched chal- lenging problem. In this paper, we introduce a novel hyperlink prediction algorithm for recovering metabolic networks. Our key ob- servation is that a hyperlink s (a column vector in an inci- dence matrix) can be transformed into its equivalent matrix expression in the vertex adjacency space by ssT. In this way, we are able to first infer the pairwise relationships be- tween vertices leveraging existing link prediction methods, and then recover the missing hyperlinks through constrained optimization. Based upon this, we propose a two-step EM- like optimization method, which alternately performs a C step (completion) and an M step (matching) to find the best hyperlinks. We call the resulting algorithm Matrix Boost- ing (MATBoost). We compare our algorithm with six base- line methods on eight metabolic networks from five species. Experimental results demonstrate that our algorithm outper- forms the state-of-the-art methods by a large margin on re- covering missing metabolic reactions. Reaction Recovery as Hyperlink Prediction One significant difference between link prediction and hy- perlink prediction is the total number of possible links / hy- perlinks. For a network with M vertices, the total number of links is O(M 2), while the total number of hyperlinks will be O(2M ). This prevents us from giving a score to every possi- ble hyperlink like what we do in link prediction. Therefore, we consider a transductive inference setting, where a set of test hyperlinks are given as candidates, and we only classify the given test examples instead of classifying all. This set- ting is natural in practical applications. For instance, in the reaction prediction task, we do not need to consider all 2M possible reactions since most of them do not contain biolog- ical meanings. Instead, we restrict the candidate hyperlinks to be within a universal reaction pool. This pool is the set of all known metabolic reactions. Consequently, our task is to classify which reactions in the pool are the missing reactions for a specific metabolic network. Problem definition and notations We formally define the missing reaction recovery problem as follows: Given an M × N S binary stoichiometric matrix S (M metabolites and N S reactions) of a metabolic network, we assume that several reactions are missing from it. We de- note these missing columns by ∆S. We also have a universal reaction pool, whose binary stoichiometric matrix is denoted by U. U contains all known metabolic reactions, including both positive reactions (∆S) as well as negative reactions which do not belong to this metabolic network. Our task is to recover/predict as many missing reactions from U as possible. The corresponding hyperlink prediction problem is parallel. Given a training incidence matrix S (where some column hyperlinks ∆S are missing) and a testing incidence matrix U (the candidate hyperlinks to select from), we aim to predict which columns in U belong to ∆S. For an incidence matrix S, we can project it into the vertex adjacency space by A = SST. A is the weighted adjacency matrix where Aij is the number of hyperlinks that vertices i and j both participate in. In systems biology, A is called the Compound Adjacency Matrix. Matrix Boosting Algorithm We illustrate the proposed Matrix Boosting (MATBoost) al- gorithm in Figure 1. The overall framework is as follows. Input: Initial training adjacency matrix A = SST, candidate hyperlinks U, initial zero prediction scores Λ0, maximum iteration number Imax. Repeat from k = 1: a) Update A, set: Ak = A + [U Λk−1U T]A. (1) b) The C (completion) step: Input Ak, output the matrix completion results ∆ Ak. c) The M (matching) step: Input ∆ Ak, output the prediction scores Λk. If Λk − Λk−1F ≥ d) Stopping criterion: Λk−1−Λk−2F or k = Imax, stop the algorithm; otherwise k ← k + 1 and repeat from step a). k−2(cid:88) Output: The final prediction scores: ¯Λ = 1 k − 2 Λi. i=1 (2) We now explain each step in the following subsections. Building block 1: decomposition of the adjacency matrix Since direct inference in the incidence space is difficult (due to the variable cardinality of hyperlinks), we first project hy- perlinks into their vertex adjacency space and infer their ver- tex interactions. Given the training hyperlinks S, we can cal- culate the training adjacency matrix by A = SST. However, since S is not complete (some columns ∆S are missing), the resulting A is also incomplete. Because ∆S is missing, the complete incidence matrix should be [ S ∆S ]. We can calculate its adjacency matrix as follows: [ S ∆S ] [ S ∆S ]T = SST + ∆S∆ST = A + ∆A, (3) where we define ∆A = ∆S∆ST. We notice that since hy- perlinks ∆S are missing, the adjacency matrix A also incurs a loss ∆A. If we can accurately recover ∆A, we will be able to infer ∆S consequently. A straightforward idea is to perform link prediction on ∆A using A. However, this will cause problems because ∆A may overlap with A at some entries, while existing link prediction methods require that training links A and testing links ∆A are fully separated. To fix this issue, we first decompose A + ∆A as follows: A + ∆A = A + [∆A]A (cid:125) (cid:124) (cid:123)(cid:122) (cid:125) + [∆A] ¯A ∆A− , A+ (cid:123)(cid:122) (cid:124) (cid:26) Xij, 0, where we have used [X]A to denote the operation that only keeps the entries of X at A's nonempty entries and mask all else, which is defined as: [Xij]A = if Aij (cid:54)= 0 if Aij = 0. (4) (5) Figure 1: An illustration of MATBoost. The training incidence matrix S is first transformed to its adjacency matrix A. A has many missing entries some of which are from ∆S. The C (completion) step uses matrix factorization to complete the missing entries. The M (matching) step will search for the best matches from the candidate matrix U by solving a constrained optimization. The matched hyperlinks will then be added to A in order to correct A's bias. This procedure is iterated several times to boost the performance. [X] ¯A is conversely defined as keeping X only at A's empty entries. Equation (4) decomposes the complete adjacency matrix into A+ and ∆A−. A+ is the training adjacency matrix A plus the entries of ∆A that overlap with A. ∆A− is ∆A discarding its entries that overlap with A. Such a decom- position ensures that A+ and ∆A− are isolated from each other. Our goal is thus to leverage A+ to predict ∆A−, and subsequently, to recover ∆S. Building block 2: the completion step We first assume that A+ is known (which is not true be- cause ∆A is unknown beforehand, we will show how to it- eratively approximate it later). Then predicting ∆A− can be regarded as a matrix completion (Cand`es and Recht 2009) or weighted link prediction problem (Lu and Zhou 2010). Concretely, we aim to complete the empty entries of A+, which we denote by ∆ A. Ideally, the predicted ∆ A will resemble ∆A− by having large values at ∆A−'s nonempty entries and near-zero values at other places. (cid:88) In this paper, we adopt matrix factorization (Koren, Bell, and Volinsky 2009) to infer ∆A− because it is fast and ac- curate. The optimization problem is as follows: ij − yij2 2 + γR(Θ), k(cid:88) minimize A+ i<j,A+ ij >0 where yij = w0 + wi + wj + vif vjf , (6) Θ Θ is the set of all parameters w0, wi, wj, vif , vjf . f =1 The optimization only uses half of the training entries since the adjacency matrix A+ is symmetric. After training, we can complete the empty entries by: (cid:40) ∆ Aij = w0 + wi + wj + vT 0, ij (cid:54)= 0. if A+ i vj, if A+ ij = 0, (7) Building block 3: the matching step In the matching step, we aim to select a a batch of hyperlinks from U that best match the predicted ∆ A. Firstly, we define a diagonal matrix Λ containing the selection indicators λi for the ith hyperlink in U. λi is 1 if hyperlink i is selected and 0 otherwise. Now consider the optimization problem as follows: [U ΛU T] ¯A − ∆A−2 minimize F , subject to λi ∈ {0, 1}, i = 1 ... N U , Λ  λ1  , where Λ = λ2 ... λN U (8) N U is the number of columns in U, · F is the Frobenius norm. Theorem 1. The optimization problem (8) is an integer least square problem with the ground-truth indicators Λ∗ being a global minimum of it. (proof in the supplemental material) In practice, we will substitute ∆ A for ∆A− in (8) to solve Λ. However, integer least square (ILSQ) optimization is NP hard. When N U is large (usually thousands in metabolic networks), it is generally intractable. Therefore, we pro- pose a constrained lasso regression instead. The optimiza- ?10011001010000010111000100011110000100010001010000001100010001000010100010000121211212211123221312211121211112120212101122321211310120210101100Completion StepMatching StepUpdate AOutput PredictionsA=SST0001101101001001001001011001111001010000100101001000010101010101010100001110000101010100001+SAk=A+[U⇤k1UT]AAkUSS:thebinarystoichiometricmatrixofametabolicnetwork,wherecolumnsrepresentreactionsandrowsrepresentmetabolites.S:themissingreactionstopredict.U:theuniversalreactionpool,whichcontainsallknownreactions.A:thecompoundadjacencymatrixofS.Ak:thecorrectedadjacencymatrixatthekthiteration.Ak:thematrixcompletionresults(inred)atthekthiteration.Notations: tion problem is as follows: [U ΛU T] ¯A − ∆ A2 minimize F + α subject to 0 ≤ λi ≤ 1, i = 1 ... N U , Λ λi, (9) i=1 N U(cid:88)  ,  λ1 where Λ = λ2 ... λN U The above optimization relaxes the integer λi to be con- tinuous within [0, 1]. Because of the limited number of hy- perlinks in U that contribute to ∆A−, we add an lasso (L1) penalty to preserve the sparsity of solutions. We solve the above optimization using subgradient methods. After get- ting the prediction scores λi, we can rank the hyperlinks in U and select the top ones as our predictions of the missing hyperlinks. Combine all: boosting via iterative optimization In the completion step, we have assumed that A+ = A + [∆A]A is known in order to separate ∆A− from A+ and infer ∆A−. Notice that A+ is essentially the training ad- jacency matrix A plus the overlapping entries of the miss- ing hyperlinks ∆S∆ST. Thus, to approximate the unknown A+, we propose to iteratively add the predicted missing hy- perlinks U ΛU T into A (Λ is real matrix now) to remedy its bias from the real A+. Given the last iteration's prediction scores Λk−1, we first update Ak by adding to A the predicted hyperlinks [U Λk−1U T]A from the last iteration. After getting Ak, which is an approximation of A+, the algorithm performs the C step and M step subsequently. MATBoost performs this procedure in an iterative fashion and outputs the aver- age prediction scores in order to boost the performance. It is further equipped with an early stopping criterion which we will explain in the next section. Algorithm Analysis We provide two different views of the MATBoost algorithm in this section. First we define some notations: Definition 1. We define the C (completion) step (6) and (7) as a map Tc : A → A, where A is the space of adjacency matrices A. Tc takes an incomplete adjacency matrix Ak as input and outputs the predictions ∆ Ak. Definition 2. We define the M (matching) step (9) as a map Tm : A → L , where L is the space of diagonal prediction score matrices Λ. Tm takes the predictions ∆ Ak as input and outputs the prediction scores Λk. A coordinate descent view MATBoost may be viewed as an example of coordinate de- scent algorithms. In the C step, we fix Λ and update ∆ A. In the M step, we fix ∆ A and update Λ. Concretely, MATBoost can be viewed as an alteration between the two steps: C (completion) step: Fix Λk−1, update ∆ A by ∆ Ak = Tc(A + [U Λk−1U T]A). M (matching) step: Fix ∆ Ak, update Λ by Λk = Tm(∆ Ak). A fixed-point view Here we discuss the convergence properties and the stopping criterion of MATBoost under a fixed-point view. Definition 3. We define one iteration of both C and M steps as a map Tcm : L → L . Tcm takes the Λk−1 from the last iteration as input and outputs the new prediction scores Λk. Equivalently, Tcm(Λk−1) = Tm(Tc(A + [U Λk−1U T]A)). Having defined Tcm, we find that the MATBoost algo- rithm can be expressed as a fixed-point iteration algorithm (Khamsi and Kirk 2011), where the algorithm iteratively takes the intermediate result Λk = Tcm(Λk−1) as input to get Λk+1, Λk+2... until the stopping criterion is satisfied. Now we introduce the Banach fixed-point theorem. Theorem 2. (Banach fixed-point theorem (Palais 2007)) If Tcm is a contraction mapping, then MATBoost will itera- tively converge to a fixed-point Λ∗, which satisfies Λ∗ = Tcm(Λ∗). Theorem 3. If Tcm is a contraction mapping defined on the metric space (L, d) and d(Λx, Λy) = Λx − ΛyF , then the intermediate results Λ1, ..., Λk−2 of MATBoost satisfy the following inequality for any k > 2: Λk−1−Λk−2F < Λl−1−Λl−2F , ∀ 2 ≤ l < k. (10) Besides, Λk−2 is the closest point to Λ∗ among Λ0, ..., Λk−2. (proof in the supplemental material) From Theorem 3 we see that Λk − Λk−1F < Λk−1 − Λk−2F for all k is a necessary condition for Tcm being a contraction mapping on (L, d). Recall that the stopping cri- terion in MATBoost is Λk−Λk−1F ≥ Λk−1−Λk−2F . We can see that it is essentially tracking this necessary con- dition. Once it is broken, the fixed-point iteration will stop converging. And the algorithm will stop the iteration earlier by outputting the average scores before iteration k − 1. Since Tcm(Λ∗)− Λ∗F = 0, we may also regard Λk − Λk−1F = Tcm(Λk−1) − Λk−1F as a measure of how close the iteration k − 1 is to convergence. In practice, we find that Λk − Λk−1F typically drops sharply in the first iteration, then keeps decreasing for a few rounds, and then starts to fluctuate around a small value. In- stead of using the last Λk−2, we find that using the mean scores of Λ1 to Λk−2 usually achieves higher performance. We have Theorem 4 to explain it. Theorem 4. The MATBoost algorithm is an ensemble of k− 2 weak learners of Tcm with different input matrices A + [U ΛiU T]A, i from 0 to k − 3. Proof. It is easy to prove by noticing that Λ1 to Λk−2 are just the outputs of Tcm(Λ0) to Tcm(Λk−3). Thus the final prediction scores can be written as: ¯Λ = 1 k − 2 Λi = 1 k − 2 Tcm(Λi). (11) k−2(cid:88) i=1 k−3(cid:88) i=0 The theorem follows. Remark: We may regard A+[U ΛiU T]A as noisy samplings of A+. Therefore, MATBoost can benefit from ensemble learning which is expected to improve performance. Related Work Although hyperlinks are common in real world and can be used to model multi-way relationships, currently there are still limited research on hyperlink prediction. Xu et al. (Xu, Rockmore, and Kleinbaum 2013) proposed a super- vised HPLSF framework to predict hyperlinks in social net- works. To deal with the variable number of features, HPLSF uses their entropy score as a fixed-length feature for train- ing a classification model. To our best knowledge, this is the only algorithm that is specifically designed for hyperlink prediction in arbitrary-cardinality hypernetworks. Nevertheless, learning with hypergraphs as a special data structure is popular in the machine learning community, e.g., semi-supervised learning with hypergraph regulariza- tion (Yu, Tao, and Wang 2012; Tian, Hwang, and Kuang 2009), modeling label correlations via hypernetworks in multi-label learning (Sun, Ji, and Ye 2008), and modeling communities to improve recommender systems (Bu et al. (Zhou, Huang, and Scholkopf 2006) 2010). Zhou et al. studied spectral clustering in hypergraphs. They generalized the normalized cut (Shi and Malik 2000) algorithm to hy- pergraph clustering and proposed a hypergraph Laplacian. They also adapted their previous semi-supervised learning algorithm using graph regularization (Zhou, Huang, and Scholkopf 2005) to hypergraph vertex classification. These research mainly aim to improve the learning performance on nodes by leveraging their hyperlink relations. However, none of them focuses on predicting the hyperlink relations. Experimental Results effectiveness of the (MATBoost) algorithm in the proposed To demonstrate Matrix Boosting reac- tion recovery tasks, we compare it with six baseline methods on eight metabolic networks. The datasets and source code in this paper are available online: https://github.com/ufo0010/HyperLinkPrediction. Baselline algorithms We compare the proposed Matrix Boosting algorithm with the following six baseline algorithms: SHC (Spectral Hypergraph Clustering) (Zhou, Huang, and Scholkopf 2006) is a state-of-the-art hypergraph learning al- gorithm. SHC outputs classification scores by f = (I − ξΘ)−1y. The hyperparameter ξ is determined by searching over the grid {0.01,0.1,0.5,0.99,1} using five-fold cross val- idation. SHC is originally designed to classify hypergraph vertices leveraging their hyperlink relations. Here we trans- pose the incidence matrices to change each vertex into a hy- perlink and each hyperlink into a vertex. Thus SHC can be used for hyperlink prediction. HPLSF (Xu, Rockmore, and Kleinbaum 2013) is a hyper- link prediction method using supervised learning. It calcu- lates an entropy score among vertices along each latent fea- ture dimension in order to get a fixed-length feature input. We train a logistic regression model on these entropy fea- tures in order to output prediction scores. FM (Factorization Machine) (Rendle 2010; Rendle 2012) is a flexible factorization model. We use the classification function of FM, where columns of the training incidence matrix are directly used as input features to the model. HKatz is a generalization of Katz index (Katz 1953) for hy- perlinks. Concretely, a hyperlink containing m vertices will have m(m − 1)/2 pairwise Katz indices. We calculate their average as the HKatz (Hypernetwork Katz) index of the hy- perlink. The parameter β is determined by searching over {0.001,0.005,0.01,0.1,0.5} using five-fold cross validation. HCN is a generalization of common neighbors (Liben- Nowell and Kleinberg 2007) for hyperlinks. For a hyper- link containing m vertices, the average of the m(m − 1)/2 pairwise common neighbors is calculated as the HCN (Hy- pernetwork Common Neighbors) score for this hyperlink. Random: a theoretical baseline for comparing algorithms' performance against random. It is equal to assigning random scores between [0,1] to all testing hyperlinks. In MATBoost and FM, libFM (Rendle 2012) is adopted as the default matrix factorization software. The optimization scheme is MCMC, which has advantages of high accuracy and automatic regularization. The latent factor number k is set to 8 (default) in both algorithms. The lasso hyperparam- eter α and the maximum iteration number of MATBoost is set to 0.1 and 10 respectively. Evaluation and implementation We evaluate the reaction recovery performance based on their prediction scores. We adopt AUC (area under the ROC curve) as one measure. We also evaluate performance based on how many missing reactions can be successfully recov- ered if we select top n reactions in U as predictions (n is the number of missing reactions). We call the second measure "Recovered number". Compared to AUC, this measure only focuses on top predictions and can more directly reflect how well hyperlink prediction algorithms perform in practice. We implement our algorithms mainly in MATLAB. All experiments are done on a twelve-core Intel Xeon Linux server. All experiments are repeated twelve times and the average results are presented. Datasets and results We download all 11893 reactions from BIGG1 to build a uni- versal reaction pool. These reactions are collected from 79 metabolic networks of various organisms. We conduct ex- periments on eight metabolic networks from five species: E. coli, H. sapiens, M. barkeri, Cl. ljungdahlii, and H. pylori. For each metabolic network, we filter out the universal re- actions which contain exotic metabolites from the pool. We also filter out the network's existing reactions from the pool. Table 1 shows the statistics of the eight datasets. randomly delete [5:5:40], [25:25:200], (according to network size) reactions as missing hyperlinks, and keep each dataset, we [50:50:400] or [100:100:800] For 1http://bigg.ucsd.edu (a) iJO1366 dataset. (b) iAF1260b dataset. (c) e coli core dataset. (d) RECON1 dataset. (e) iAT PLT 636 dataset. (f) iAF692 dataset. (g) iHN637 dataset. (h) iIT341 dataset. Figure 2: Number of recovered reactions for different numbers of missing reactions. Dataset (a) iJO1366 (b) iAF1260b (c) e coli core (d) RECON1 (e) iAT PLT 636 (f) iAF692 (g) iHN637 (h) iIT341 Species E. coli E. coli E. coli H. sapiens H. sapiens M. barkeri Cl. Ljungdahlii H. pylori Vertices Hyperlinks Neg. Hyperlinks 1805 1668 72 2766 738 628 698 485 2583 2388 95 3742 1008 690 785 554 1253 1242 91 973 621 513 740 629 Table 1: Statistics of the eight datasets. the remaining ones as training data. Due to the space limit, we only present the results of "Recovered number". The AUC results are in the supplemental material. As shown in Figure 2, MATBoost generally achieves higher performance than other baselines. We observe that MATBoost recovers a significantly larger number of reac- tions than other baselines in datasets (a) -- (c) and (f) -- (h), and achieves competitive results with SHC in datasets (d) and (e). This is because: 1) MATBoost avoids directly performing inference in the incidence space that has size O(2M ) by first inferring the adjacency matrix. This trans- forms an O(2M ) problem into an O(M 2) problem, which greatly reduces the problem size and eases the problem; 2) MATBoost leverages the powerful matrix factorization tech- nique to perform inference in the adjacency space, which is able to well recover the unseen compound interactions given by ∆A−; 3) MATBoost infers the incidence matrix by solv- ing a constrained optimization problem, which recovers the reactions that best match the predicted compound interac- tions in adjacency space; 3) MATBoost takes advantage of a fixed-point iteration to boost performance and benefits from ensemble averaging. In all eight datasets, MATBoost is able to successfully recover over or nearly half of the missing re- actions with the increasing of missing number. This high recall in predicting top reactions is very important because biologists usually can only verify top predictions due to re- source and time limits. In addition, we observe that SHC generally ranks second. This is an interesting result indicating that vertices and hy- perlinks in a hypernetwork are sometimes interchangeable (by transposing the incidence matrix). We find that HKatz and HCN do not perform well. The phenomenon suggests that simply generalizing topological indices of links to hy- perlinks by averaging may not be able to reflect the like- lihood of a hyperlink. In terms of time complexity, MAT- Boost is also efficient. It takes only a few minutes to finish on the largest task. Conclusions In this paper, we consider the important task of predicting missing metabolic reactions for metabolic networks. By exploiting the problem structure, we model it as a hyper- link prediction problem. Hyperlink prediction is an interest- ing and challenging problem, however, relevant research are still limited. We proposed a novel algorithm for hyperlink prediction, called Matrix Boosting (MATBoost). It lever- ages the problem structure and implements an alternating C-M optimization framework in order to perform inference jointly in the incidence space and adjacency space. We have provided extensive evaluation results to demonstrate the un- matched performance of MATBoost. We compared our al- gorithm with six baselines. Experimental results on eight metabolic networks demonstrated that our MATBoost algo- rithm could recover over half of the missing reactions, which outperformed all existing methods by a large margin. Hyperlink prediction may also be useful in many other application domains such as collaboration, authorship, and 50100150200250300350400Missing number50100150Recovered numberiJO1366MATBoostSHCHPLSFFMHKatzHCNRandom50100150200250300350400Missing number50100150Recovered numberiAF1260bMATBoostSHCHPLSFFMHKatzHCNRandom510152025303540Missing number5101520Recovered numbere_coli_coreMATBoostSHCHPLSFFMHKatzHCNRandom100200300400500600700800Missing number100200300400500Recovered numberRECON1MATBoostSHCHPLSFFMHKatzHCNRandom50100150200250300350400Missing number50100150200Recovered numberiAT_PLT_636MATBoostSHCHPLSFFMHKatzHCNRandom255075100125150175200Missing number20406080100Recovered numberiAF692MATBoostSHCHPLSFFMHKatzHCNRandom255075100125150175200Missing number1020304050607080Recovered numberiHN637MATBoostSHCHPLSFFMHKatzHCNRandom255075100125150175200Missing number20406080Recovered numberiIT341MATBoostSHCHPLSFFMHKatzHCNRandom social networks. We will study them in our future work. References [Bordbar et al. 2014] Bordbar, A.; Monk, J. M.; King, Z. A.; and Palsson, B. O. 2014. Constraint-based models predict metabolic and associated cellular functions. Nature Reviews Genetics 15(2):107 -- 120. [Bu et al. 2010] Bu, J.; Tan, S.; Chen, C.; Wang, C.; Wu, H.; Zhang, L.; and He, X. 2010. Music recommendation by unified hypergraph: combining social media information and music content. In Proceedings of the 18th ACM inter- national conference on Multimedia, 391 -- 400. ACM. [Cand`es and Recht 2009] Cand`es, E. J., and Recht, B. 2009. Exact matrix completion via convex optimization. Founda- tions of Computational mathematics 9(6):717 -- 772. [Cao, Kong, and Yu 2014] Cao, B.; Kong, X.; and Yu, P. S. 2014. Collective prediction of multiple types of links in het- erogeneous information networks. In Data Mining (ICDM), 2014 IEEE International Conference on, 50 -- 59. IEEE. [Chen et al. 2015] Chen, Z.; Chen, M.; Weinberger, K. Q.; and Zhang, W. 2015. Marginalized denoising for link pre- diction and multi-label learning. In AAAI, 1707 -- 1713. Cite- seer. [Ermis¸, Acar, and Cemgil 2015] Ermis¸, B.; Acar, E.; and Cemgil, A. T. 2015. Link prediction in heterogeneous data via generalized coupled tensor factorization. Data Mining and Knowledge Discovery 29(1):203 -- 236. [Katz 1953] Katz, L. 1953. A new status index derived from sociometric analysis. Psychometrika 18(1):39 -- 43. [Khamsi and Kirk 2011] Khamsi, M. A., and Kirk, W. A. 2011. An introduction to metric spaces and fixed point the- ory, volume 53. John Wiley & Sons. [Koren, Bell, and Volinsky 2009] Koren, Y.; Bell, R.; and Volinsky, C. 2009. Matrix factorization techniques for rec- ommender systems. Computer (8):30 -- 37. [Kumar, Dasika, and Maranas 2007] Kumar, V. S.; Dasika, M. S.; and Maranas, C. D. 2007. Optimization based au- tomated curation of metabolic reconstructions. BMC bioin- formatics 8(1):1. [Liben-Nowell and Kleinberg 2007] Liben-Nowell, D., and Kleinberg, J. 2007. The link-prediction problem for social networks. Journal of the American society for information science and technology 58(7):1019 -- 1031. [Lu and Zhou 2010] Lu, L., and Zhou, T. 2010. Link pre- diction in weighted networks: The role of weak ties. EPL (Europhysics Letters) 89(1):18001. [Lu and Zhou 2011] Lu, L., and Zhou, T. 2011. Link predic- tion in complex networks: A survey. Physica A: Statistical Mechanics and its Applications 390(6):1150 -- 1170. [Menon and Elkan 2011] Menon, A. K., and Elkan, C. 2011. Link prediction via matrix factorization. In Machine Learn- ing and Knowledge Discovery in Databases. Springer. 437 -- 452. [Miller, Jordan, and Griffiths 2009] Miller, K.; Jordan, M. I.; and Griffiths, T. L. 2009. Nonparametric latent feature mod- els for link prediction. In Advances in neural information processing systems, 1276 -- 1284. [Palais 2007] Palais, R. S. 2007. A simple proof of the ba- nach contraction principle. Journal of Fixed Point Theory and Applications 2(2):221 -- 223. [Rendle et al. 2009] Rendle, S.; Freudenthaler, C.; Gantner, Z.; and Schmidt-Thieme, L. 2009. Bpr: Bayesian person- In Proceedings of alized ranking from implicit feedback. the twenty-fifth conference on uncertainty in artificial intel- ligence, 452 -- 461. AUAI Press. [Rendle 2010] Rendle, S. 2010. Factorization machines. In Data Mining (ICDM), 2010 IEEE 10th International Con- ference on, 995 -- 1000. IEEE. [Rendle 2012] Rendle, S. 2012. Factorization machines with libfm. ACM Transactions on Intelligent Systems and Tech- nology (TIST) 3(3):57. [Shi and Malik 2000] Shi, J., and Malik, J. 2000. Normal- ized cuts and image segmentation. Pattern Analysis and Ma- chine Intelligence, IEEE Transactions on 22(8):888 -- 905. [Singh and Gordon 2008] Singh, A. P., and Gordon, G. J. 2008. Relational learning via collective matrix factorization. In Proceedings of the 14th ACM SIGKDD international con- ference on Knowledge discovery and data mining, 650 -- 658. ACM. [Song, Meyer, and Tao 2015] Song, D.; Meyer, D. A.; and Tao, D. 2015. Top-k link recommendation in social net- works. In Data Mining (ICDM), 2015 IEEE International Conference on, 389 -- 398. IEEE. [Sun, Ji, and Ye 2008] Sun, L.; Ji, S.; and Ye, J. 2008. Hy- pergraph spectral learning for multi-label classification. In Proceedings of the 14th ACM SIGKDD international con- ference on Knowledge discovery and data mining, 668 -- 676. ACM. [Thiele and Palsson 2010] Thiele, I., and Palsson, B. Ø. 2010. A protocol for generating a high-quality genome-scale metabolic reconstruction. Nature protocols 5(1):93 -- 121. [Tian, Hwang, and Kuang 2009] Tian, Z.; Hwang, T.; and Kuang, R. 2009. A hypergraph-based learning algorithm for classifying gene expression and arraycgh data with prior knowledge. Bioinformatics 25(21):2831 -- 2838. [Wu et al. 2016] Wu, L.; Ge, Y.; Liu, Q.; Chen, E.; Long, B.; and Huang, Z. 2016. Modeling users preferences and social links in social networking services: A joint-evolving perspective. In Thirtieth AAAI Conference on Artificial In- telligence. [Xu, Rockmore, and Kleinbaum 2013] Xu, Y.; Rockmore, D.; and Kleinbaum, A. M. 2013. Hyperlink prediction in hypernetworks using latent social features. In Discovery Sci- ence, 324 -- 339. Springer. [Yu, Tao, and Wang 2012] Yu, J.; Tao, D.; and Wang, M. 2012. Adaptive hypergraph learning and its application in image classification. Image Processing, IEEE Transactions on 21(7):3262 -- 3272. [Zhou, Huang, and Scholkopf 2005] Zhou, D.; Huang, J.; and Scholkopf, B. 2005. Learning from labeled and un- labeled data on a directed graph. In Proceedings of the 22nd international conference on Machine learning, 1036 -- 1043. ACM. [Zhou, Huang, and Scholkopf 2006] Zhou, D.; Huang, J.; and Scholkopf, B. 2006. Learning with hypergraphs: Clus- tering, classification, and embedding. In Advances in neural information processing systems, 1601 -- 1608.
1710.09656
1
1710
2017-10-26T12:00:50
Tackling information asymmetry in networks: a new entropy-based ranking index
[ "cs.SI", "physics.soc-ph" ]
Information is a valuable asset for agents in socio-economic systems, a significant part of the information being entailed into the very network of connections between agents. The different interlinkages patterns that agents establish may, in fact, lead to asymmetries in the knowledge of the network structure; since this entails a different ability of quantifying relevant systemic properties (e.g. the risk of financial contagion in a network of liabilities), agents capable of providing a better estimate of (otherwise) unaccessible network properties, ultimately have a competitive advantage. In this paper, we address for the first time the issue of quantifying the information asymmetry arising from the network topology. To this aim, we define a novel index - InfoRank - intended to measure the quality of the information possessed by each node, computing the Shannon entropy of the ensemble conditioned on the node-specific information. Further, we test the performance of our novel ranking procedure in terms of the reconstruction accuracy of the (unaccessible) network structure and show that it outperforms other popular centrality measures in identifying the "most informative" nodes. Finally, we discuss the socio-economic implications of network information asymmetry.
cs.SI
cs
Tackling information asymmetry in networks: a new entropy-based ranking index Paolo Barucca,1, 2 Guido Caldarelli,3, 2 and Tiziano Squartini3, ∗ 1University of Zurich, Department of Banking and Finance, Zurich, ZH, Switzerland 2London Institute for Mathematical Sciences, 35a South St, Mayfair, London W1K 2XF, United Kingdom 3IMT School for Advanced Studies, P.zza S.Francesco 19, 55100 Lucca (Italy) (Dated: October 27, 2017) Information is a valuable asset for agents in socio-economic systems, a significant part of the information being entailed into the very network of connections between agents. The different interlinkages patterns that agents establish may, in fact, lead to asymmetries in the knowledge of the network structure; since this entails a different ability of quantifying relevant systemic properties (e.g. the risk of financial contagion in a network of liabilities), agents capable of providing a better estimate of (otherwise) unaccessible network properties, ultimately have a competitive advantage. In this paper, we address for the first time the issue of quantifying the information asymmetry arising from the network topology. To this aim, we define a novel index - InfoRank - intended to measure the quality of the information possessed by each node, computing the Shannon entropy of the ensemble conditioned on the node-specific information. Further, we test the performance of our novel ranking procedure in terms of the reconstruction accuracy of the (unaccessible) network structure and show that it outperforms other popular centrality measures in identifying the "most informative" nodes. Finally, we discuss the socio-economic implications of network information asymmetry. PACS numbers: 89.75.-k, 89.75.Fb, 89.70.Cf,64.60.Aq INTRODUCTION Recognizing the most relevant nodes in a net- worked system represents a topic of growing interest. This translates into identifying nodes with key fea- tures, be they structural or functional. Depending on the system under study, in fact, possessing cer- tain features may translate into accessing a compet- itive advantage or prominent position in the system. The problem has been tackled by defining a plethora of indices, aiming at quantifying the importance of a node in a given system: the so-called centrality measures [1–4]. The latter are intended to capture the role played by each node within the network by optimizing an opportunely-defined objective function: examples are provided by the degree-centrality (defined by the number of neighbors of each vertex) [2], the closeness-centrality (defined by the average distance of the reachable nodes from any, given, node) [5], the PageRank-centrality (defined by the number of "authoritative" nodes pointing at the vertex under consideration) [6], etc. All these centrality measures look at the topolog- ical role that nodes have in a network, disregarding the ability of a node to obtain information about the rest of the system. On the contrary, our methodol- ogy focuses on the difference in the information con- tained in the different pattern of interlinkages of each ∗ [email protected] node. We refer to this difference as to network infor- mation asymmetry and we will show how it allows nodes to obtain a significantly-better estimation of the (otherwise unaccessible) network properties. Our novel index measures the reduction of uncer- tainty over the remaining interlinkages that a node's own ego-network allows: the node whose accessible information provides the largest uncertainty reduc- tion will be identified as being the "most informa- tive" one. More quantitatively, for each node the uncertainty reduction is computed by comparing the Shannon entropy benchmark value - measurable by all nodes - with the one obtained by also condition- ing on the information ego-network on top of it. Several attempts to define entropy-based indices have been made [8–11]; however, the measures that have been proposed so far are based on specific definitions of Shannon entropy, an evidence that severely affects their applicability. As we will show in what follows, InfoRank can be understood as a generalization of these measures, applicable to any maximum-entropy ensemble and to any subset of nodes. The paper is organized as follows. In Section 1, we introduce the general methodology for comput- ing InfoRank in any ensemble of networks, given any set of commonly shared information. Then, we apply this general methodology to the case of the configu- ration model. In Section 2, we measure InfoRank on a number of real-world networks and verify its corre- lation with the reconstruction accuracy achieved by each node. Finally, in Section 3 we discuss the role of network information asymmetry in social, economic and financial systems. I. METHODS InfoRank: theoretical foundations This first subsection is devoted to illustrate the theoretical foundations of our proposed methodol- ogy, rooted into information theory. Let us focus on the simplest case of a single node: in order to calculate InfoRank each node (hereafter indexed by l) can be imagined to solve two different problems. The first one reads S = −(cid:88) − M(cid:88) G (cid:34)(cid:88) ηi i=0 G P (G) ln P (G) + (cid:35) (1) P (G)Ci(G) − C∗ i with S indicating the constrained Shannon entropy and C0(G) = C∗ 0 = 1 encoding the normalization condition. By solving the constrained-optimization problem above, node l finds that i=1 M(cid:88) ηiC∗ G e−(cid:80)M (cid:34)(cid:88) S = (where Z((cid:126)η) = (cid:80) S(l) = S −(cid:88) i=1 ηiCi(G)). On the other hand, the second problem node l has to solve reads ψlm m G P (G)alm(G) − a∗ lm (3) with S(l) being nothing else than the functional in 1 further constrained by imposing the node l specific pattern of interconnections (i.e. a∗ lm = 0, 1 where m runs over all the other nodes of the network). Upon solving the second constrained-optimization problem, the expression M(cid:88) i=1 (cid:88) m S(l) = θiC∗ i + ψlma∗ lm + ln Z(cid:48)((cid:126)θ, (cid:126)ψ) (4) (cid:80) G e−(cid:80)M i=1 θiCi(G)−(cid:80) Z(cid:48)((cid:126)θ, (cid:126)ψ) (where = m ψlmalm(G)) is found. Both functionals achieve a minimum in their stationary point (consistently, since we are trying to minimize each node - residual - uncertainty). This can be easily proven, upon noticing that the Hessian matrix of both S and S(l) is the covariance matrix of the constraints and, as such, positive-semidefinite. 2 In order to find the stationary point of S(l), node l must solve the equations δS(l) δψlm = 0, ∀ m, i.e. (cid:32) (cid:88) G e−(cid:80)M i=1 θiCi(G)−(cid:80) Z(cid:48)((cid:126)θ, (cid:126)ψ) (cid:33) m ψlmalm(G) alm(G) = a∗ lm (5) for each of the m values. In order to numerically evaluate the parameters ψlm, ∀ m, let us focus on a specific value, e.g. ψl1; we can then divide Z(cid:48)((cid:126)θ, (cid:126)ψ) into two subsums: one where al1 = 0 and one where al1 = 1. Thus, condition 5 can be rewritten as −(cid:80)M i=1 θiCi(G1)−ψl1−(cid:80) Z(cid:48)((cid:126)θ, (cid:126)ψ) e m((cid:54)=1) ψlmalm (cid:33) = a∗ l1 (cid:32) (cid:88) G1 (6) where the sum runs over the network configura- tions having al1 = 1 (and briefly indicated with the symbol G1). Analogously, Z(cid:48)((cid:126)θ, (cid:126)ψ) = Z(cid:48) 0((cid:126)θ, (cid:126)ψ) + e−ψl1 Z(cid:48) 1((cid:126)θ, (cid:126)ψ) where −(cid:80)M e Z(cid:48) 0((cid:126)θ, (cid:126)ψ) = i=1 θiCi(G0)−(cid:80) m((cid:54)=1) ψlmalm (7) (cid:88) (cid:88) G0 G1 (8) the first sum runs over the networks having al1 = 0 and the second sum runs over the networks having al1 = 1. Solving the likelihood equation in the case l1 = 0 brings to ψl1 = +∞; solving the likelihood a∗ l1 = 1 brings to ψl1 = −∞. equation in the case a∗ Thus, i + ln Z(cid:48) 1((cid:126)θ, (cid:126)ψ) is suppressed by the coefficient e−ψl1 which converges to zero; other- wise, if a∗ 1((cid:126)θ, (cid:126)ψ) since the term Z(cid:48) 0((cid:126)θ, (cid:126)ψ) is suppressed by the coeffi- cient eψl1 which converges to zero. l1 = 0 one has S(l) = (cid:80)M l1 = 1 then S(l) =(cid:80)M 0((cid:126)θ, (cid:126)ψ) since the term Z(cid:48) i + ln Z(cid:48) i=1 θiC∗ i=1 θiC∗ if a∗ The estimation of the other parameters proceeds in an analogous way, by applying the same line of reasoning to the "surviving" partition functions. In other words, specifying the single patterns of connec- tions means reducing the number of configurations over which the estimation of the constraints is car- ried out: thus, Z(cid:48)((cid:126)θ) runs over a smaller number of configurations than Z((cid:126)η). Let us now evaluate the expressions Z((cid:126)η) and Z(cid:48)((cid:126)θ) for the same value of the parameters (say (cid:126)µ): since the number of addenda in Z((cid:126)µ) is larger than the number of addenda in Z(cid:48)((cid:126)µ), it also holds true that ln Z((cid:126)µ) ≥ ln Z(cid:48)((cid:126)µ) and the inequivalence S((cid:126)µ) ≥ S(l)((cid:126)µ) is true as well. Let us now choose a i + ln Z((cid:126)η). and Z(cid:48) 1((cid:126)θ, (cid:126)ψ) = (2) −(cid:80)M i=1 θiCi(G1)−ψl1−(cid:80) m((cid:54)=1) ψlmalm , e (cid:35) particular value of the parameters, i.e. the point of minimum of S: (cid:126)µ = (cid:126)η∗. Thus, Quantifying the node-specific information S((cid:126)η∗) ≥ S(l)((cid:126)η∗) ≥ S(l)((cid:126)θ∗) (9) Let us now focus on a specific node, e.g. i. Con- straining the information encoded into its specific pattern of connections implies letting node i impose 3 where the second inequality follows from the very definition of minimum. Our ranking procedure builds upon the evidence that, by imposing more information on top of the common one, each node further reduces its uncertainty about the unknown network structure: the one reducing the residual un- certainty to the largest extent is identified as the "most informative" one. The same reasoning and calculations apply for the case of subsets of nodes, only quantifying the InfoRank of all possible sub- sets of s nodes in a network of size N would require (cid:1) Shannon entropies. computing(cid:0)N The next subsections will be devoted to illustrate the steps defining our approach, by focusing, for the sake of simplicity, on (the simplest case of) binary, undirected networks. s Quantifying the benchmark information Let us suppose the benchmark information, which is accessible to all nodes in the network A, to be rep- resented by the degree sequence. The benchmark model is, thus, represented by the usual Configura- tion Model (CM) [12], defined by the following sys- tem of equations: (cid:88) ≡ (cid:88) j((cid:54)=i) ki(A) = xixj j((cid:54)=i) 1 + xixj pij, ∀ i. (10) The informativeness of the degree sequence in ex- plaining the network structure can be quantified by calculating the value of the Shannon entropy defined by the chosen constraints: (cid:88) (cid:88) i S(i) 0 = (cid:88) j((cid:54)=i) i S0 = 1 2 = − 1 2 [pij ln pij + (1 − pij) ln(1 − pij)] (11) with S(i) indicating the contribution of node i to the 0 benchmark entropy S0 (the subscript 0 stresses the benchmark-like value of this functional, encoding a kind of information which is accessible to all nodes). Intuitively, the closer the S0 value to zero, the larger the explanatory power of the degree sequence with respect to the network structure. pij = xixj 1 + xixj = aij, ∀ j (12) i.e. treating as deterministic the links constituting its ego-network. As an example, let us suppose that node i is linked only with nodes 2 and 3 out of the = N constituting our ideal network, i.e. that = 1+xix3 0. This implies that the system of equations that node i has to solve becomes = ··· = xixN = 1 and xix1 1+xix1 = xix4 1+xix4 1+xixN xix3 xix2 1+xix2 k1(A) = k2(A) = k3(A) = k4(A) = x1x2 1 + x1x2 x2x1 1 + x2x1 x3x1 1 + x3x1 x4x1 1 + x4x1 + . . . 0 ··· + + . . . 1 ··· + + . . . 1 ··· + + . . . 0 ··· + x1xN 1 + x1xN x2xN 1 + x2xN x3xN 1 + x3xN x4xN 1 + x4xN ... (13) where we have explicitly specified the value of the coefficients quantifying the probability of node i to establish a connection with every other node (notice that we have omitted the equation controlling for the value of the i-th degree, since trivially satisfied). The system above can be rearranged by moving at the left hand side the known entries of the adjacency matrix: (cid:88) ≡ (cid:88) kl(A) − ail = xlxj j((cid:54)=l,i) 1 + xlxj j((cid:54)=l,i) lj , ∀ l((cid:54)= i) p(i) (14) i.e. the zeros and the ones characterizing the (miss- ing) links with node i. More explicitly: j((cid:54)=1,i) j((cid:54)=2,i) (cid:88) (cid:88) (cid:88) (cid:88) j((cid:54)=3,i) x1xj 1 + x1xj x2xj 1 + x2xj x3xj 1 + x3xj x4xj j((cid:54)=1,i) ≡ (cid:88) ≡ (cid:88) ≡ (cid:88) ≡ (cid:88) j((cid:54)=2,i) j((cid:54)=3,i) j((cid:54)=4,i) 1 + x4xj j((cid:54)=4,i) p(i) 1j p(i) 2j p(i) 3j p(i) 4j (15) k1(A) = k2(A) − 1 = k3(A) − 1 = k4(A) = ... where the superscript (i) stresses that the numerical value of the probability coefficients {p(i) jk} is induced by the specification of node i patterns of connec- jk (cid:54)= pjk. Notice, in fact, tions and, in general, p(i) that the problem of quantifying the informativeness of the ego-network of each node can be restated by imagining that the node itself is removed from the network, in such a way that a reduced adjacency ma- trix A remains naturally defined, inducing, in turn, a reduced system of equations: (cid:88) kl( A) = xlxj , ∀ l((cid:54)= i). (16) j((cid:54)=l,i) 1 + xlxj Calculating the node-specific InfoRank Once i has been removed from the network, the entropy of the "surviving" topological structure can be computed by employing the novel probability co- efficients defined by the system of equations in 16, i.e. (cid:88) (cid:88) k((cid:54)=j) j S(i) = − 1 2 [p(i) jk ln p(i) jk +(1− p(i) jk ) ln(1− p(i) jk )]. Since removing different nodes will, (17) in general, impact on the benchmark entropy S0 differently, a ranking is naturally induced by the amount of "un- certainty reduction" caused by the removal of each node. Since our aim is identifying the node(s) pos- sessing the largest amount of information, in order to define a novel ranking index, let us divide S(i) by S0 and take the complement to 1: Ii = 1 − S(i) S0 ; (18) as apparent from the definition, the larger the en- tropy reduction, the higher the rank of the node causing it. In what follows, the index Ii will be re- ferred to as to the InfoRank index. Approximating the node-specific InfoRank Although formally similar, the quantities S(i) 0 and S(i), respectively defined in eq. 11 and eq. 17, are conceptually very different and must not be con- fused. In fact, while S(i) just represents the contri- 0 bution of node i to the benchmark entropy S0, the second index S(i) quantifies the residual uncertainty after the removal of node i, accounting, in partic- ular, for the effect that removing such a node has on the remaining vertices. Whenever such an effect 4 FIG. 1. Toy network, whose nodes have been ranked ac- cording to InfoRank (red nodes are ranked higher than blue nodes). Since the node with the largest score is the one maximally reducing the residual uncertainty of the network, InfoRank is not completely determined by the nodes degrees: the center of the star, in fact, has exactly the same number of neighbors of other nodes (i.e. 7); differently from them, however, its removal would cause and entire portion of the network to become determinis- tic. can be ignored (i.e. when diminishing the nodes de- gree by one unit doesn't affect much the magnitude of the surviving probability coefficients), S(i) can be indeed approximated by S0 − S(i) 0 , further implying that Ii (cid:39) S(i) 0 /S0. Remarkably, the term S(i) 0 0 (cid:39) −(cid:80) can be simplified as well. For what concerns our analysis, two cases are worth to be mentioned. The first one con- cerns sparse networks: when assuming the proba- bility coefficients to satisfy the requirement pij (cid:28) 1, ∀ i (cid:54)= j, then pij (cid:39) xixj, ∀ i (cid:54)= j, implying that S(i) + ki. The second approximation is valid whenever the probability coefficients controlling for the connec- tions of node i are well represented by their av- erage value, in this case, one obtains that S(i) j((cid:54)=i)[pij ln pij − pij] = −ki ln N−1 ≡ pij; = ki 0 (cid:39) −(N − 1)(cid:2)pij ln pij +(cid:0)1 − pij (cid:80) (cid:1) ln(cid:0)1 − pij j((cid:54)=i) pij N−1 i.e. pij (cid:39) (cid:16) ki√ (cid:1)(cid:3). (cid:17) 2L II. RESULTS Ranking nodes in synthetic networks tem of equations ki(A) =(cid:80) rewritten as ki(A)+1 =(cid:80) In order to better illustrate the meaning of the InfoRank index, let us consider two extreme cases, i.e. the removal of either an isolated or a fully- connected node. It is intuitive that, in both cases, the knowledge of the connections of the considered nodes adds no information or, equivalently, that re- moving these nodes doesn't lead to any uncertainty reduction. This is readily seen by comparing the sys- tems 10 and 16. In presence of a hub, in fact, the sys- , ∀ i can be +1, ∀i((cid:54)= h) (with h denoting the hub). Since solving the lat- ter system with respect to {xi}i(cid:54)=h is equivalent to solve the former system, removing a hub doesn't change the information content of the network con- figuration; analogously, when considering an isolated node. On the other hand, the value Ii = 1 charac- terizes a node whose removal induces a configuration which is perfectly deterministic (i.e. composed by isolated nodes, cliques or both). Naturally, in the very special case of a star graph, the central node is both the hub and the vertex with largest InfoRank value. j((cid:54)=i) j((cid:54)=i,h) 1+xixj xixj xixj 1+xixj −(cid:80) A relationship between InfoRank and the node de- gree, nonetheless, exists. In order to understand it, let us start by considering the quantity S(i) 0 = j((cid:54)=i)[pij ln pij + (1 − pij) ln(1 − pij)], which cor- responds to the Shannon entropy of the N − 1 pos- sible connections of node i: the node bringing the largest contribution to S0, then, is the one maximiz- ing the aforementioned sum, i.e. the one encoding (N − 1) ln 2 nats into its connections (this unit of measure, also known as "natural bit", is a conse- quence of having chosen the base of the logarithm to be the natural one - in base 2, the overall contribu- tion would have been of N − 1 bits). Each of the ad- denda can, thus, be imagined to contribute with an average coefficient pij = 2 , fur- ther implying that a ranking based on the naıve con- tribution of each node to S0 would privilege nodes with ki (cid:39) (N − 1)/2 neighbors. j((cid:54)=i) pij N−1 = ki N−1 (cid:39) 1 (cid:80) InfoRank, instead, accounts also for the effect that constraining the pattern of connections of a given node has on the connections of the neighboring ones. Let us consider the synthetic network shown in fig. 0 }, one finds 1. Upon computing the vector {S(i) that the largest contribution to S0 comes from the hub, consistently with the previous discussion (no- tice, in fact, that kh = 10 (cid:39) (N − 1)/2 = 11). Let us know imagine, instead, to remove the cen- ter of the star: this would cause, in turn, an en- tire portion of the network to become deterministi- 5 cally determinable (7 nodes would become isolated, in fact). As a consequence, while the contribution 0 would be enriched by an additional amount of (cid:39) S(c) −kc(N − 1) [pleaf ln pleaf + (1 − pleaf ) ln (1 − pleaf )] (with pleaf = 1 N−1 ), removing the hub would just disconnect two more nodes (by retaining only the main contribution). InfoRank correctly assigns the highest score to the center of the star, pointing it out as the vertex establishing the most informative set of interconnections. Our index, in other words, en- codes higher-order corrections to the naıve contribu- tion S(i) 0 , by including the "effects" of the additional constraints on the neighboring vertices. Ranking nodes in real-world networks Let us now employ InfoRank to analyse real-world configurations. The core of our analysis will consist in a thorough comparison of a number of alterna- tive ranking indices (in what follows, binary, directed networks will be considered, since one of the chosen indicators becomes trivial in the undirected case): in order to consistently compare the ranking scores output by the selected algorithms, the former ones are normalized in order to let them range within the same interval. More specifically, if we let R(a) rep- resent the rank of node i according to the chosen al- (a) gorithm a, the applied transformation reads R i = i }) ∈ [0, 1] (R(a) and ensures that nodes with minimum rank are as- (a) signed a value R i = 0 (in blue, according to the color scale adopted throughout the paper); vicev- ersa, nodes with maximum rank are assigned a value (a) R i = 1 (in red, according to the color scale adopted throughout the paper). i })/(max{R(a) i }−min{R(a) i −min{R(a) i The first alternative index is represented by the degree-centrality, identifying the nodes characterized by the largest degree as the most important (i.e. cen- tral) ones. A first limitation of such an index lies in the nature of the connectivity concept, which lacks an obvious generalization to, e.g. the directed case we are considering in the present paper. In what follows we will adopt the following definition Di = kout i (19) which ranks the nodes according to the number of their out-neighbors. As evident from the first panel of fig. 4, the (out-)degree- centrality trivially identifies the hubs as the most central nodes. 3 and fig. 2, fig. The second indicator we have considered is the so-called closeness-centrality [5], defined as κi(cid:80) j dij Ci = 1 di = 6 (20) i.e. as the reciprocal of the average topological dis- tance of a vertex from the other, connected ones (κi is the number of nodes that can be reached from i - following the links direction - and dij is the topolog- ical distance separating i from any reachable node j). Intuitively, any two nodes are said to be "close" when their distance is "small", i.e. few links must be walked to reach one from the other. Naturally, the nodes with Ci = 0 are the ones with zero out- degree, while a node with exactly N − 1 connections will be also the most central one. Generally speak- ing, however, nodes with small degree do not nec- essarily have a small closeness-centrality value: an example is provided by the second panel of fig. 3, where nodes behaving like "local hubs" (e.g. at the center of star-like subgraphs) are, in fact, character- ized by a large Ci independently from their degree. On the other hand, nodes with a large degree do not necessarily have a large closeness-centrality value: in fact, the first panel of fig. 4 shows that although a large number of nodes can be reached from the hub, many lie at a large distance from it. Interestingly, as the second panels of fig. 2 and fig. 4 show, the nodes minimizing the (average) topolog- ical distance from them are the ones connected to a strongly connected component (SCC - either belong- ing to it or not). In the case of C. Elegans neural network, its large reciprocity ((cid:39) 0.43) further lev- els out the differences between the Ci values of such vertices. The third indicator considered in the present anal- ysis is the PageRank-centrality [6]. It is computed by solving to iterative equation 1 − α N + α Pi = (cid:32) (cid:88) j (cid:33) aji kout j Pj (21) FIG. 2. C. Elegans neural network [13]. From top to bot- tom, nodes are ranked according to their (out-)degree- centrality, closeness-centrality, PageRank-centrality, In- foRank (red nodes are ranked higher than blue nodes). Notice that, according to PageRank, (only) the node with largest in-degree is ranked first; the same node, however, is characterized by a zero out-degree which, in turn, causes its closeness-induced score to be zero as well. j which can be imagined to describe a Markov chain: if aji = 1 a walker moves from j to i with probability 1−α ; if aji = 0 such a probability becomes 1−α N + α kout (in a sense, the walker "jumps" from j to i). The introduction of the addendum accounting for jumps guarantees the convergence of the formula above to the stationary distribution of this dynamical process (which exists and is unique - its Markov chain, in fact, becomes strongly connected and aperiodic by construction) which also provides the searched rank- ing scores. In what follows we have set α = 0.85. N By oversimplifying a bit, PageRank scores higher nodes that are pointed either 1) by a large number of nodes which, in turn, have low out-degree (thus be- coming "authoritative" nodes) or 2) by authoritative 7 FIG. 3. US airports network in 1997 [14]. Nodes are ranked according to their value of (out-)degree-centrality (left), closeness-centrality (center) and InfoRank (right - red nodes are ranked higher than blue nodes). Nodes with a large (out-)degree-centrality (hubs) do not necessarily coincide with the nodes characterized by a large value of closeness- centrality: in fact, although many nodes can be reached by a walker leaving the hubs, these may lie at a large distance from it. nodes themselves [6]. The evidence that nodes with a large PageRank value do not necessarily coincide with the nodes having a large in-degree is provided by the Little Rock food web: in this particular case, a couple of species predated by a limited number of predators can be, indeed, observed; the former, however, constitute the only preys of the latter. In all the other cases the correlation coefficient between i } is quite large: 0.70 for the the vectors {Pi} and {kin US airports network (in 1997), 0.82 for the C. Ele- gans neural network, 0.99 for both the World Trade Web and the e-MID interbank network (notice that upon lowering α the two vectors become less corre- lated, since the random contribution to the dynam- ics becomes the prevalent one). Such a correlation has been also noticed elsewhere [16]. Let us now consider our novel InfoRank index. As a first observation, the ranking induced by it shows a little overlap with the one provided by the other indices, thus confirming its degree of novelty. The intuitive idea according to which the nodes with largest InfoRank are the ones disconnecting the largest number of subgraphs is confirmed upon look- ing at the fourth panel of fig. 2 and the third panel of fig. 3: when considering either the C. Elegans neural network or the US airport networks, in fact, vertices acting as "junctions" between a group of leaves and the remaining part of the network are of- ten assigned an InfoRank value that is larger than the one assigned to the "most internal" nodes. Natu- rally, when directed networks are considered, reduc- ing uncertainty does not necessarily imply isolating nodes: it is often enough to exactly determine either their out- or in-degree to gain a notable amount of information. Exploring the InfoRank degree-dependence Let us now consider the World Trade Web (WTW) [17]. The main reason we include it in our analysis is its link density: being much denser than the other networks considered so far, it also allows us to better understand the relationship between In- foRank and the degree sequence(s). Since the WTW topological structure can be de- duced with great accuracy from the knowledge of its degree-sequence(s) [18], we may also expect the latter to be correlated with the ranking indices con- sidered for the present analysis. This is indeed the case. As the fourth panel of fig. 5 shows, both the closeness-centrality and the PageRank are highly correlated with the total degree (i.e. ktot i = kout i + kin i ). The monotonic, increasing, relatioship between total degree and closeness-centrality can be straightforwardly explained by noticing that all countries have established a direct connection with the nodes that can be reached by them via some other (indirect) path. This is not true, for exam- ple, for the Little Rock food web shown in fig. 4: in that case, the node with largest out-degree is connected to only some of the nodes constituting a strongly connected sub-component; as a conse- quence, the overall distance from the set of reachable nodes increases. The monotonic, increasing, relationship between total degree and PageRank, instead, rests upon a double (empirical) evidence: countries with a large out-degree are 1) also characterized by a large in- degree and are usually 2) "pointed" by countries with a small out-degree. InfoRank, on the other hand, shows an overall bell-shaped trend with a maximum in correspon- i (cid:39) (N − 1)/2 + (N − 1)/2 = dence of the values ktot 8 N − 1. This means that the nodes providing the largest contribution to the entropy reduction overlap with the ones maximizing S(i) 0 . However, as evident upon inspecting fig. 8, this doesn't mean that the removal of a given node has a small impact on the other vertices; evident deviations from the S(i) trend 0 are, in fact, clearly visible: InfoRank adjusts the es- timation provided by exclusively accounting for the nodes degrees, although its functional dependence on them is, overall, similar to the one characterizing S(i) 0 . Exploring the relationship between InfoRank and the reconstruction accuracy As we have seen, InfoRank individuates the node(s) reducing the network residual uncertainty to the largest extent. We may, thus, suspect In- foRank to also "select" the nodes able to provide the best reconstruction of the network itself. In or- der to verify our conjecture, we have explicitly tested the agreement between the reconstruction achieved by each node and the observed network structure. In order to do so, we have computed an index of- ten employed to test the (global) goodness of a reconstruction algorithm: the accuracy, defined as (cid:104)A(cid:105) = i (cid:80) ber of true positives, i.e. (cid:104)T P(cid:105) =(cid:80) (cid:104)T N(cid:105) =(cid:80) (cid:104)T P(cid:105)+(cid:104)T N(cid:105) N (N−1) where (cid:104)T P(cid:105) is the expected num- (cid:80) j((cid:54)=i) aijpij, (cid:104)T N(cid:105) is the expected number of true negatives, i.e. j((cid:54)=i)(1− aij)(1− pij) and N is the to- tal number of vertices [7]. We have then summarized our findings by calculating the correlation between the vector {Ai} and the vector {Ii}. i FIG. 4. Little Rock food web [15]. From top to bot- tom, nodes are ranked according to their (out-)degree- centrality, closeness-centrality, PageRank-centrality, In- foRank (red nodes are ranked higher than blue nodes). Nodes with large in-degree do not necessarily coincide with nodes having a large value of PageRank: this is ev- ident in the case of food-webs, where species exist that are predated by a limited number of predators of which constitute the only preys. In other networks however, the correlation between the PageRank value and the in- degree is quite large. The results are reported in table I: while the cor- relation between InfoRank and accuracy is almost 1, when comparing the goodness of the reconstruction achieved by nodes ranked via alternative indices a worse agreement is found. In particular, e-MID and the WTW show a negative correlation value: this is due to the bell-shaped trend recovered, e.g. when scattering the accuracy value versus any of the cho- sen ranking indicators, consistently with the results illustrated in fig. 6. Exploring the relationship between InfoRank and systemic risk estimation In this subsection, we try to give a quantitative il- lustration of how reconstruction accuracy can lead to better estimation of relevant properties of a financial system, focusing on a real network of transaction in an interbank money market. Interbank money mar- kets are essential for financial institutions for the provision of liquidity. In such markets, information asymmetry [19] on the network of connections can 9 FIG. 5. Dependence of the (rescaled) ranking indices considered for the present analysis (closeness-centrality (cid:3), PageRank centrality ∗, InfoRank (cid:4)) on the nodes total degree. Notice how both e-MID and the World Trade Web are characterized by a strongly positive correlation between the closeness-centrality and the total degree and the PageRank centrality and the total degree; InfoRank, instead, is characterized by a bell-shaped trend for the same i (cid:39) (N − 1)/2 + (N − 1)/2 = N − 1. Although the nodes systems, whose point-of-maximum lies close to values ktot providing the largest contribution to the entropy reduction overlap with the ones maximizing S(i) 0 , this doesn't imply that the removal of a given node has a small impact on the other vertices (see also fig. 8). For what concerns sparser systems, instead, InfoRank shows an overall increasing trend while a clear functional dependence between closeness- centrality and total degree and PageRank centrality and total degree is not visible (a weakly positive correlation between closeness-centrality and total degree is, however, present in the C. Elegans neural network). translate in a better estimation of the expected pay- ments, widely recognized as a measure of systemic risk in networks of interbank liabilities [20]. Here, we focus on data from the e-MID (electronic market of interbank deposit) platform, that served a signif- icant percentage (∼ 17%) of the unsecured money market in the Euro Area before the 2007-2008 cri- sis [22]. We apply the clearing mechanism originally proposed in [20], in the generalization discussed in [21], and compute the payment vector, whose com- ponents represent the amount a financial institution is able to repay to its creditors. When the payment of a bank is less then its corresponding obligation, that bank is considered insolvent. Hence, comput- ing the payment vector corresponds to identify in- solvencies and estimate systemic risk in a financial network. A detailed discussion on such measures of systemic risk is found in [23, 24]. Insolvency of bank occurs when its equity, the difference between as- sets and liabilities, becomes negative. The external cash flow is given by the external assets Ae, affected by fire sales in case of insolvency, and external lia- bilities Le. Both are sampled from a Gaussian dis- tribution, with parameters µa = 10, σa = 0.1 and µl = 1, σl = 0.1, respectively. For our analysis on the role of InfoRank, first, we compute the payment vector {p(r) i } - that entails the information on sys- temic risk losses - starting from the real e-MID net- work. Secondly, for each node, we compute the pay- ment vector using a sample of networks from its spe- cific ensemble, then evaluate the normalized squared error of each these sampled payment vectors {p(s) i } with respect to the real payment vector. Finally, we calculate the mean over the set of sampled payment vectors and obtain the mean squared error that each node is subjected to in computing this systemic risk 10 FIG. 6. Dependence of the accuracy value on the (rescaled) ranking indices considered for the present analysis ((out-)degree-centrality x, closeness-centrality (cid:3), PageRank centrality ∗, InfoRank (cid:4)). Notice the clear, increasing, trend describing the functional dependence of the accuracy value on the InfoRank value, further confirming that the node(s) establishing the most informative sets of interconnections are the ones characterized by the largest InfoRank value(s). measure. In Figure 7, we recognize that a larger In- foRank yields a smaller error in the estimation of systemic risk. III. DISCUSSION We introduced a new index of node relevance in networks based on an information-theoretic ap- proach. Differently from other indices, InfoRank can be generalized in several, highly non-trivial, ways. First, its perfectly general derivation allows it to be employed to analyze directed, as well as weighted, networks with any set of commonly shared informa- tion. Secondly, it can be extended to quantify the informativeness of whole subsets of nodes: this is usually a major limitation for the other centrality in- dicators, tailored to provide single nodes estimates. Thirdly, it does not depend on any arbitrary parame- ter (as PageRank, for example), but only on a max- imum entropy principle. We verified the financial consequences of the information-theoretic approach we followed in this paper, by applying our algorithm to the estimation of contagion processes in the e- MID network of interbank loans. To the best of our knowledge, this work is the first to provide a quan- titative measure of network information asymmetry leading to competitive advantage for some agents upon others in socio-economic and financial systems. Finally, the ability of identifying highly informed nodes - characterized by high InfoRank values - may also provide strategies to optimally sample networks, when gathering information on individual nodes is costly, e.g. when surveying a financial system for regulatory purposes. ACKNOWLEDGEMENTS PB and TS acknowledge support from: FET Project DOLFINS nr. 640772 and FET IP Project MULTIPLEX nr. 317532. [1] Newman M.E.J. Networks: An Introduction. Ox- [2] Bloch F., Jackson M.O. & Tebaldi P. Centrality ford University Press (2010). Measures in Networks, arXiv:1608.05845 (2017). 11 [7] Squartini T., Cimini G., Gabrielli A. & Garlaschelli D. Network reconstruction via density sampling, Applied Network Science 2 (3), doi:10.1007/s41109- 017-0021-8 (2017). [8] Zhang Q., Meizhu L., Yuxian D. & Yong D. structure entropy of complex networks, Local arXiv:1412.3910v1 (2014). [9] Bianconi G., Pin P. & Marsili M., Assess- ing the relevance of node features for network structure, PNAS 106 (28), 1143311438, doi: 10.1073/pnas.0811511106 (2009). [10] Bianconi, G. The entropy of randomized network ensembles. Europhysics Letters 81 (2), 28005 (2007). [11] Borgatti S.P. Identifying sets of key players in a social network, Computational and Mathematical Organization Theory 12, 2134, doi:10.1007/s10588- 006-7084-x (2006). [12] Park J. & Newman M.E.J. The statistical mechan- ics of networks, Physical Review E 70, 066117, doi:10.1103/PhysRevE.70.066117 (2004). [13] Oshio K., Iwasaki Y., Morita S., Osana Y., Gomi S., Akiyama E., Omata K., Oka K. & Kawamura K., Tech. Rep. of CCeP, Keio Future 3, (Keio Univer- sity, 2003). [14] Colizza V., PastorSatorras R. & Vespignani A., Re- actiondiffusion processes and metapopulation mod- els in heterogeneous networks Nature Physics 3, 276-282 (2007). [15] Martinez N.D. Artifacts or Attributes? Effects of Resolution on the Little Rock Lake Food Web, Eco- logical Monographs 61 (4), 367-392 (1991). [16] Fortunato S., Boguna M., Flammini A. & Menczer F. Approximating PageRank from In-Degree in Lec- ture Notes in Computer Science 4936. Springer, Berlin (2008). [18] Squartini T., [17] Gleditsch, K.S. Expanded trade and GDP data, Journal of Conflicts Resolution 46, 712724 (2002). Fagiolo G., Garlaschelli D. Randomizing world trade. I. A binary net- work analysis, Physical Review E 84, 046117, doi:10.1103/PhysRevE.84.046117 (2011). [19] Wittenberg-Moerman R., The role of information asymmetry and financial reporting quality in debt trading: Evidence from the secondary loan mar- ket,Journal of Accounting and Economics 46 (2), 240-260 (2008). [20] Eisenberg L. & Noe T.H. Systemic risk in finan- cial systems, Management Science 47 (2), 236-249 (2001). [21] Rogers L.C.G. & Veraart L.A.M. Failure and rescue in an interbank network, Management Science 59 (4), 882-898, (2013). [22] Barucca P. & and Lillo F. The organization of the interbank network and how ECB unconven- tional measures affected the e-MID overnight mar- ket, arXiv:1511.08068 (2015). [23] Glasserman P. & Young P.H. Contagion in financial networks, Journal of Economic Literature 54 (3), 779-831 (2016). [24] Barucca P., Bardoscia M., Caccioli F., D'Errico M., Visentin G., Battiston S. & Caldarelli, G. Network valuation in financial systems, arXiv:1606.05164 (2016). FIG. 7. Mean squared error over the payment vector of the financial clearing process on the e-MID network. The parameters that account for fire sales effect and in- solvency costs in the Rogers-Veraart [21] clearing mecha- nism are α = β = .9. The dotted line is a linear fit of the data y = −0.087∗ x + 0.14 (RSS = 0.0070645), while the solid line is a quadratic fit y = −0.79∗x2−0.063∗x+0.14 (RSS = 0.007046). rAi,Ri Di Ci Pi Ii Little Rock food web 0.44 0.34 0.27 0.97 C. Elegans neural network 0.82 0.60 0.65 0.98 US airports network (1997) 0.89 0.39 0.89 0.99 e-MID interbank network 0.52 0.44 0.57 0.99 World Trade Web (1950) 0.097 0.008 0.098 0.99 -0.1 -0.23 -0.15 0.99 World Trade Web (1970) World Trade Web (2000) -0.39 -0.52 -0.42 0.99 TABLE I. Table showing the Pearson correlation coeffi- cient between the vector of accuracy values Ai and the vector of (rescaled) ranking scores Ri. The transforma- tion (which doesn't affect the correlation value) reads i }) ∈ R [0, 1] with R(a) representing the rank of node i according to the chosen algorithm a. i })/(max{R(a) i } − min{R(a) i (a) i = (R(a) i − min{R(a) [3] Borgatti S.P. Centrality and network flow, Social Networks 27, 55-71 (2005). [4] Benzi M. & Klymko C. A matrix analysis of different centrality measures, SIAM Journal on Matrix Analysis and Applications 36, 686706, doi:10.1137/130950550 (2013). [5] Sabidussi G. The centrality index of a graph, Psy- chometrika 31, 581603 (1966). [6] Langville A.N. & Meyer C. Google's PageRank and Beyond. Princeton University Press (2006). 12 (cid:16) kout (cid:17) 0 and −(N − 1)(cid:2)pout 0 (cid:39) −kout FIG. 8. Comparison between InfoRank Ii ((cid:4)) and S(i) (blue, dashed line). We have also tested the agreement between the latter and the two approximation derived in the Methods section (red, dashed line). While, for sparse networks, S(i) between S(i) ij = kout pout (cid:16) kin (cid:17) (cid:1) ln(cid:0)1 − pout ij +(cid:0)1 − pout (cid:1)(cid:3) − (N − 1)(cid:2)pin , for dense networks a non-trascurable difference exists ij +(cid:0)1 − pin ij (cid:1) ln(cid:0)1 − pin (cid:1)(cid:3) with + kout i − kin i ij ln pin i N−1 and pin ij = kin N−1 ). i ln pout + kin i i√ L ij ln i√ L ln i 0 ij ij ij
1812.08933
1
1812
2018-12-21T03:56:59
Neural Diffusion Model for Microscopic Cascade Prediction
[ "cs.SI", "physics.soc-ph" ]
The prediction of information diffusion or cascade has attracted much attention over the last decade. Most cascade prediction works target on predicting cascade-level macroscopic properties such as the final size of a cascade. Existing microscopic cascade prediction models which focus on user-level modeling either make strong assumptions on how a user gets infected by a cascade or limit themselves to a specific scenario where "who infected whom" information is explicitly labeled. The strong assumptions oversimplify the complex diffusion mechanism and prevent these models from better fitting real-world cascade data. Also, the methods which focus on specific scenarios cannot be generalized to a general setting where the diffusion graph is unobserved. To overcome the drawbacks of previous works, we propose a Neural Diffusion Model (NDM) for general microscopic cascade prediction. NDM makes relaxed assumptions and employs deep learning techniques including attention mechanism and convolutional network for cascade modeling. Both advantages enable our model to go beyond the limitations of previous methods, better fit the diffusion data and generalize to unseen cascades. Experimental results on diffusion prediction task over four realistic cascade datasets show that our model can achieve a relative improvement up to 26% against the best performing baseline in terms of F1 score.
cs.SI
cs
TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 1 Neural Diffusion Model for Microscopic Cascade Prediction Cheng Yang, Maosong Sun, Haoran Liu, Shiyi Han, Zhiyuan Liu, Huanbo Luan Abstract -- The prediction of information diffusion or cascade has attracted much attention over the last decade. Most cascade prediction works target on predicting cascade-level macroscopic properties such as the final size of a cascade. Existing microscopic cascade prediction models which focus on user-level modeling either make strong assumptions on how a user gets infected by a cascade or limit themselves to a specific scenario where "who infected whom" information is explicitly labeled. The strong assumptions oversimplify the complex diffusion mechanism and prevent these models from better fitting real-world cascade data. Also, the methods which focus on specific scenarios cannot be generalized to a general setting where the diffusion graph is unobserved. To overcome the drawbacks of previous works, we propose a Neural Diffusion Model (NDM) for general microscopic cascade prediction. NDM makes relaxed assumptions and employs deep learning techniques including attention mechanism and convolutional network for cascade modeling. Both advantages enable our model to go beyond the limitations of previous methods, better fit the diffusion data and generalize to unseen cascades. Experimental results on diffusion prediction task over four realistic cascade datasets show that our model can achieve a relative improvement up to 26% against the best performing baseline in terms of F1 score. Index Terms -- Information Diffusion, Neural Network ! 1 INTRODUCTION I Nformation diffusion is a ubiquitous and fundamental event in our daily lives, such as the spread of rumors, the contagion of viruses and the propagation of new ideas and technologies. The diffusion process, also called a cascade, has been studied over a broad range of domains. Though some works believe that even the eventual size of a cascade cannot be predicted [1], recent works [2], [3], [4] have shown the ability to predict the size, growth and many other key properties of a cascade. Nowadays the modeling and prediction of cascades play an important role in many real- world applications, e.g. production recommendation [5], [6], [7], [8], [9], epidemiology [10], [11], social networks [12], [13], [14] and the spread of news and opinions [15], [16], [17]. Most previous works on cascade prediction focus on the prediction of macroscopic properties such as the total number of users who share a specific photo [2] and the growth curve of the popularity of a blog [3]. However, macroscopic cas- cade prediction is a rough estimate of cascades and cannot be adapted for microscopic questions as shown in Fig. 1. Microscopic cascade prediction, which pays more attention to user-level modeling and prediction instead of cascade- level, is much more powerful than macroscopic prediction and allows us to apply user-specific strategies for real-world • Cheng Yang, Maosong Sun (corresponding author), Zhiyuan Liu and Huanbo Luan are with the Department of Computer Science and Tech- nology, Tsinghua University, Beijing 100084, China. E-mail: [email protected], {sms,liuzy}@mail.tsinghua.edu.cn, [email protected] • Haoran Liu is with the Department of Electric Engineering, Tsinghua University, Beijing 100084, China. E-mail: [email protected] Shiyi Han is with the Department of Computer Science, Brown Univer- sity, U.S.A. E-mail: [email protected] • Fig. 1. Macroscopic cascade prediction v.s. microscopic cascade pre- diction. applications. For example, during the adoption of a new product, microscopic cascade prediction can help us deliver advertisements to those users that are most likely to buy the product at each stage. In this paper, we focus on the study of microscopic cascade prediction. Though useful and powerful, the microscopic prediction of cascades faces great challenges because the real-world diffusion process could be rather complex [18] and usually partially observed [11], [19]: Complex mechanism. Since the mechanism of how a specific user gets infected 1 is sophisticated, traditional cascade models based on strong assumptions and simple formulas may not be the best choice for microscopic cascade prediction. Existing cascade models [20], [21], [22], [23] which could be adopted for microscopic prediction mostly ground in Independent Cascade (IC) model [12]. IC model 1. We use "infected" and "activated" alternatively to indicate that a user is influenced by a cascade. TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 2 assigns a static probability pu,v to user pairs (u, v) with pairwise independent assumptions, where the probability pu,v indicates how likely user v will get infected by user u when u is infected. Other diffusion models [24], [25] make even stronger assumptions that the infected users are only determined by the source user. Though intuitive and easy to understand, these cascade models are based on strong assumptions and oversimplified probability estimation for- mulas, both of which limit the expressivity and ability to fit complex real-world cascade data [26]. The complex mech- anism of real-world diffusions encourages us to explore more sophisticated models, e.g. deep learning techniques, for cascade modeling. Incomplete observation. On the other hand, the cascade data is usually partially observed indicates that we can only observe those users getting infected without knowing who infected them. However, to the best of our knowledge, existing deep-learning engined microscopic cascade mod- els [27], [28] are based on the assumption that the diffusion graph where a user can only infect and get infected by its neighbors is already known. For example, when we study the retweeting behavior on the Twitter network, "who infected whom" information is explicitly labeled in retweet chain and the next infected user candidates are restricted to the neighboring users rather than the whole user set. While in most diffusion processes such as the adoption of a product or the contamination of a virus, the diffusion graph is unobserved [11], [19], [29]. Therefore, these methods consider a much simpler problem and cannot be generalized to a general setting where the diffusion graph is unknown. To fill in the blank of general microscopic cascade pre- diction and address the limitations of traditional cascade models, we propose a neural diffusion model based on relaxed assumptions and employ up-to-date deep learning techniques, i.e. attention mechanism and convolutional neu- ral network, for cascade modeling. The relaxed assumptions enable our model to be more flexible and less constrained, and deep learning tools are good at capturing the complex and intrinsic relationships that are hard to be characterized by hand-crafted features. Both advantages allow our model to go beyond the limitations of traditional methods based on strong assumptions and oversimplified formulas and better fit the complicated cascade data. Following the experimental settings in [23], we conduct experiments on diffusion pre- diction task over four realistic cascade datasets to evaluate the performances of our proposed model and other state- of-the-art baseline methods. Experimental results show that our model can achieve a relative improvement up to 26% against the best performing baseline in terms of F1 score. To conclude, our contributions are 3-fold: • To the best of our knowledge, our work is the first attempt to employ deep learning techniques for gen- eral microscopic cascade prediction problem where the diffusion graph is unknown. • We design a neural diffusion model based on relaxed assumptions compared with the pairwise indepen- dence assumption in traditional cascade models and allow our model to better fit real-world cascades and generalize to unseen data. • Experimental results on diffusion prediction task over four realistic datasets demonstrate the effective- ness and robustness of our proposed model. Com- pared with the best performing baseline, our model can achieve a relative improvement up to 26% on F1 score. 2 RELATED WORKS We organize related works into macroscopic and micro- scopic cascade prediction methods. In terms of method- ology, our work is also related to network representation learning methods. 2.1 Macroscopic Cascade Prediction Most previous works on cascade prediction focused on macroscopic level prediction such as the eventual size of a cascade [4] and the growth curve of popularity [3]. Macro- scopic cascade prediction methods can further be classified into feature-based approaches, generative approaches, and deep-learning based approaches. Feature-based approaches formalized the task as a classification problem [2], [30] or a regression problem [31], [32] by applying SVM, logistic regression and other machine learning algorithms on hand- crafted features including temporal [33] and structural [2] features. Generative approaches considered the growth of cascade size as an arrival process of infected users and employed stochastic processes, such as Hawkes self-exciting point process [4], [34], for modeling. With the success of deep learning techniques in various applications, deep- learning based approaches, e.g. DeepCas [26] and Deep- Hawkes [35], were proposed to employ Recurrent Neural Network (RNN) for encoding cascade sequences into feature vectors instead of hand-crafted features. Compared with hand-crafted feature engineering, deep-learning based ap- proaches have better generalization ability across different platforms and give better performance on macroscopic pre- diction task. 2.2 Microscopic Cascade Prediction Our work is more related to microscopic cascade prediction which focuses on user-level modeling and predictions. We classify related works into three categories: IC-based ap- proaches, embedding-based approaches, and deep-learning based approaches. IC model [12], [15], [36], [37] is one of the most popu- lar diffusion models which assumed independent diffusion probability through each link. Extensions of IC model fur- ther considered time delay information by incorporating a predefined time-decay weighting function, such as continu- ous time IC [38], CONNIE [19], NetInf [20] and Netrate [21]. Infopath [22] was proposed to infer dynamic diffusion prob- abilities based on information diffusion data and study the temporal evolution of information pathways. MMRate [39] inferred multi-aspect transmission rates by incorporating aspect-level user interactions and various diffusion patterns. All above methods learned the probabilities from cascade sequences. Once a model is trained, it can be used for microscopic cascade prediction by simulating the generative process using Monte Carlo simulation. TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 3 Embedding-based approaches encoded each user into a parameterized real-valued vector and trained the pa- rameters by maximizing an objective function. Embedded IC [23] followed the pairwise independence assumption in IC model and modeled the diffusion probability between two users by a function of their user embeddings. Other embedding-based diffusion models [24], [25] made even stronger assumptions that infected users are determined only by the source user and the content of information item. As shown in previous work [26], such models with strong assumptions oversimplify the reality and generally show poor performance on real prediction tasks. Existing deep-learning based microscopic cascade pre- diction approaches [27], [28] focused on the retweeting and sharing behaviors in a social network where "who infected whom" information is explicitly labeled in retweet chain. The next infected user candidates are also restricted to the neighboring users when the diffusion graph is known. However, the diffusion graph is usually unknown for most diffusion processes [11], [19]. For example, during the con- tamination of a virus, by whom a patient gets infected is unobserved. Existing deep-learning based methods consid- ered a much simpler problem and cannot be generalized to a general setting where the diffusion graph is unobserved. To the best of our knowledge, our work is the first attempt to employ deep learning techniques for general microscopic cascade prediction problem where the diffusion graph is unknown. 2.3 Network Representation Learning Researchers have explored many algorithms to represent nodes in a network by real-valued vectors. By projecting topology structure into vectors, we can apply machine learn- ing techniques for many network applications, e.g. classifi- cation. Most network representation learning works focus on task unspecific learning where the downstream task is unknown. Early stage works [40] use eigenvector computa- tion to learn node embeddings. With the success of neural networks, people also employ simple neural networks for representation learning [41], [42]. For task specific learning, a certain task such as classification [43] and recommenda- tion [44] is specified and the network embeddings serve as the bottom layer of their model as what we will do in this paper. In terms of diffusion prediction task, Embedded IC [23] is proposed and will be used as our baseline method. 3 DATA OBSERVATION In this section, we will conduct data observation on real- world datasets and investigate the intrinsic relationships between activated users in a diffusion sequence. In specific, we will try to figure out whether consecutively activated users are more likely to be relevant and thus appear in more diffusion sequences together. We will first introduce the datasets. 3.1 Datasets We collect four real-world cascade datasets that cover a variety of applications for evaluation. A cascade is an item or some kind of information that spreads through a set of TABLE 1 Statistics of Datasets. # Users 982 540 498 19,546 # Links 506,582 62,605 158,194 18,687,423 # Cascades Avg. Length 23,802 471 8,304 6,158 7.66 13.63 8.43 36.74 Dataset Lastfm Irvine Memetracker Twitter users. Each cascade consists of a list of (user, timestamp) pairs where each pair indicates the fact that the user gets infected at the timestamp. Lastfm is a music streaming website. We collect the dataset from [45]. The dataset contains the full history of nearly 1, 000 users and the songs they listened to over one year. We treat each song as an item spreading through users and remove the users who listen to no more than 5 songs. Irvine is an online community for students at University of California, Irvine collected from [46]. Students can partic- ipate in and write posts on different forums. We regard each forum as an information item and remove the users who participate in no more than 5 forums. Memetracker 2 collects a million of news stories and blog posts and track the most frequent quotes and phrases, i.e. memes, for studying the migration of memes across a group of people. Each meme is considered to be an information item and each URL of websites or blogs is regarded as a user. Following the settings of previous works [23], we filter the URLs to only keep the most active ones to alleviate the effect of noise. Twitter dataset [47] concerns tweets containing URLs posted on Twitter during October 2010. The complete tweet- ing history of each URL is collected. We consider each distinct URL as a spreading item over Twitter users. We filter out the users with no more than 5 tweets. Note that the scale of Twitter dataset is competitive and even larger than the datasets used in previous neural-based cascade modeling algorithms [23], [28]. Note that all the above datasets have no explicit evidence about by whom a user gets infected. Though we have the following relationship in Twitter dataset, we still cannot trace the source of by whom a user is encouraged to tweet a specific URL unless the user directly retweets. We list the statistics of datasets in Table 1. Since we have no interaction graph information between users, we assume that there exists a link between two users if they appear in the same cascade sequence. Each virtual "link" will be assigned a parameterized probability in traditional IC model and thus the space complexity of traditional methods is relatively high especially for large datasets. We also calculate the average cascade length of each dataset in the last column. 3.2 Statistical Analysis Now we will try to reveal the correlation patterns between users by statistical results. By intuition, two consecutively infected users in a cascade sequence are more likely to have connections, e.g. one infects another, and thus participate in many other diffusion sequences together. 2. http://www.memetracker.org TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 4 (a) Lastfm (b) Irvine (c) Memetracker (d) Twitter Fig. 2. Statistical results of the expectation of co-occurrence times of two random users given the fact that they are both infected by a cascade with K users infected between them. Here < 10 and ≥ 10 are average co-occurrence times for K < 10 and K ≥ 10. (a) Lastfm (b) Irvine (c) Memetracker (d) Twitter Fig. 3. Statistical results of the expectation of co-occurrence times of two random users given the fact that they are both infected by a cascade with K users infected between them and they are the top 5% user pairs in terms of co-occurrence times satisfying the previous condition. To demonstrate this statement, we consider the follow- ing statistics: given the fact that user ui and uj are infected in a cascade sequence with K users infected between them in this sequence, what will be the expectation of the number of cascade sequences that user ui and uj both participate in? Here K = 0 indicates that user ui and uj are consecutively activated. If the intuition is true, then the expectation should decrease as K increases. Fig. 2 presents the statistical results of all four datasets. Here we list the results for K = 0, 1, 2, 3 and the average for K < 10 and K ≥ 10. The statistics show that the expec- tations of co-occurrence times for K < 10 are consistently larger than those for K ≥ 10. Note that the gap is not very large for some datasets due to the long-tail effect. Therefore, we further present the results only for the top 5% user pairs in terms of co-occurrence times for each K in Fig. 3. We can see the differences more clearly in this setting. These statistical results demonstrate that consecutively infected users in a cascade sequence are more likely to be relevant. By saying two users are "relevant", there could be a direct diffusion path between them or they are both likely to be infected by a third one. Also, we find that not only the most recently infected user will be relevant to the next infected one: As shown in Fig. 2 and 3, all recent infected users (K = 0, 1, 2, 3) could be relevant with minor differences (more relevant for smaller K). We will build our model based on these findings in next section. 4 METHOD In this section, we will start by formalizing the problem and introducing the notations. Then we propose two heuristic assumptions according to the data observations as our basis and design a Neural Diffusion Model (NDM) using deep learning techniques. Finally, we will introduce the overall optimization function and other details of our model. 0, ui 4.1 Problem Formalization A cascade dataset records the information that an item spreads to whom and when during its diffusion. For ex- ample, the item could be a product and the cascade records who bought the product at what moment. However, in most cases, there exists no explicit interaction graph between the users [23], [37]. Therefore, we have no explicit information about how a user was infected by other users. Formally, given user set U and observed cascade se- quence set C, each cascade ci ∈ C consists a list of users 1 . . . uici−1} ranked by their infection time, where ci {ui j ∈ U is the j-th user is the length of sequence ci and ui in the sequence ci. Note that we only consider the order of users getting infected and ignore the exact timestamps of infections in this paper as previous works did [23], [28], [29]. In this paper, our goal is to learn a cascade prediction model which can predict the next infected user uj+1 given a partially observed cascade sequence {u0, u1 . . . uj}. The learned model is able to predict the entire infected user sequence based on the first few observed infected users and thus be used for microscopic cascade prediction illustrated in Figure 1. In our model, we add a virtual user called "Terminate" to the user set U. At training phase, we append "Terminate" to the end of each cascade sequence and allow the model to predict next infected user as "Terminate" to indicate that no more users will be infected in this cascade. Further, we represent each user by a parameterized real- valued vector to project users into vector space. The real- valued vectors are also called embeddings. We denote the embedding of user u as emb(u) ∈ Rd where d is the 0123<10>=101616.51717.51818.519KCo−occurence Times0123<10>=101.81.851.91.9522.052.1KCo−occurence Times0123<10>=101520253035KCo−occurence Times0123<10>=104.555.566.57KCo−occurence Times0123<10>=107580859095100105110KCo−occurence Times0123<10>=1066.577.58KCo−occurence Times0123<10>=10120140160180200220240260KCo−occurence Times0123<10>=102025303540KCo−occurence Times TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 dimension of embeddings. In our model, a larger inner product between the embeddings of two users indicates a stronger correlation between the users. 4.2 Model Assumptions In traditional Independent Cascade (IC) model [12] set- tings, all previously infected users can activate a new user independently and equally regardless of their orders of getting infected. Many extensions of IC model further con- sidered time delay information such as continuous time IC (CTIC) [38] and Netrate [21]. However, none of these models tried to find out which users are actually active and more likely to activate other users at the moment. To address this issue, we propose the following assumption. Assumption 1. Given a recently infected user u, users that are strongly correlated to user u including user u itself are more likely to be active. This assumption is intuitive and straight-forward. As a newly activated user, u should be active and may infect other users. The users strongly correlated to user u are probably the reason why user u gets activated recently and thus more likely to be active than other users at the moment. We further propose the concept of "active user embedding" to characterize all such active users. Definition 1. For each recently infected user u, we aim to learn an active user embedding act(u) ∈ Rd which represents the embedding of all active users related to user u, and can be used for predicting the next infected user in next step. The active user embedding act(uj) characterizes the potential active users related to the fact that user uj gets infected. From the data observations, we can see that all recently infected users could be relevant to the next infected one. Therefore, the active user embeddings of all recently infected users should contribute to the prediction of next infected user, which leads to the following assumption. Assumption 2. All recently infected users should con- tribute to the prediction of next infected user and be pro- cessed differently according to the order of getting infected. Compared with the strong assumptions made by IC- based and embedding-based method introduced in related works, our heuristic assumptions allow our model to be more flexible and better fit cascade data. Now we will introduce how to build our model based on these two assumptions, i.e. extracting active users and unifying these embeddings for prediction. 4.3 Extracting Active Users with Attention Mechanism For the purpose of computing active user embeddings, we propose to use attention mechanism [48], [49] to extract the most likely active users by giving them more weights than other users. As shown in Figure 4, the active embedding of user uj is computed as a weighted sum of previously infected users: act(uj) = wjkemb(uk), (1) where the weight of uk is (cid:80)j wjk = exp(emb(uj)emb(uk)T ) m=0 exp(emb(uj)emb(um)T ) . (2) j(cid:88) k=0 j(cid:88) Note that wjk ∈ (0, 1) for every k and(cid:80)j m=0 wjm = 1. wjk is the normalized inner product between the embeddings of uj and uk which indicates the strength of correlation between them. 5 From the definition of active user embedding act(uj) in Eq. 1, we can see that the user embeddings emb(uk) which have a larger inner product with emb(uj) will be allocated a larger weight wjk. This formula naturally follows our assumption that users strongly correlated to user u including user u itself should be paid more attention. To fully utilize the advantages of a neural model, we further employ the multi-head attention [49] to improve the expressibility. Multi-head attention projects the user embeddings into multiple subspaces with different linear projections. Then multi-head attention performs attention mechanism on each subspace independently. Finally, multi- head attention concatenates the attention embeddings in all subspaces and feeds the result into a linear projection again. Formally, in a multi-head attention with h heads, the embedding of i-th head is computed as headi = wi jkemb(uk)W V i , (3) k=0 where wi jk = i (emb(uk)W K (cid:80)j exp(emb(uj)W Q m=0 exp(emb(uj)W Q i ∈ Rd×d are head-specific linear projection W V matrices. In particular, W Q can be seen to project user embeddings into receiver space and sender space respec- tively for asymmetric modeling. i )T ) i (emb(um)W K i and W K i i , W Q i , W K i )T ) (4) , Then we have the active user embedding act(uj) act(uj) = [head1, head2 . . . headh]W O, (5) indicates concatenation operation and W O ∈ where [] Rhd×d projects the concatenated results into d-dimensional vector space. Multi-head attention allows the model to "divide and conquer" information from different perspectives (i.e. sub- spaces) independently and thus is more powerful than the traditional attention mechanism. 4.4 Unifying Active User Embeddings for Prediction with Convolutional Network Different from previous works [21], [50] which directly give a time-decay weight that assumes larger weights for the most recently infected users, we propose to use a param- eterized neural network to handle the active user embed- dings at different positions. Compared with a predefined exponential-decay weighting function [21], a parameterized neural network can be learned automatically to fit the real- world dataset and capture the intrinsic relationship between active user embedding at each position and next infected user prediction. In this paper, we consider Convolutional Neural Network (CNN) to meet this purpose. CNN has been widely used in image recognition [51], recommender systems [52] and natural language process- ing [53]. CNN is a shift-invariant neural network and allows TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 6 Fig. 4. An overview of our Neural Diffusion Model (NDM). NDM sequentially predicts the next infected user based on the active embeddings (the blue nodes) of recent activated users and the active embeddings is computed by an attention layer over the user embeddings (the green nodes) of all previous infected users. us to assign position-specific linear projections to the em- beddings. Figure 4 illustrates an example where the window size of our convolutional layer win = 3. The convolutional layer first converts each active user embedding act(uj−n) into a U-dimensional vector by a position-specific linear n ∈ Rd×U for n = 0, 1 . . . win − 1. projection matrix W C Then the convolutional layer sums up the projected vectors and normalizes the summation by softmax function. Formally, given partially observed cascade sequence (u0, u1 . . . uj), the predicted probability distribution prej ∈ RU is prej = softmax( act(uj−n)W C n ), (6) n=0 (cid:80) where softmax(x)[i] = exp(x[i]) p exp(x[p]) and x[i] denotes the i- th entry of a vector x. Each entry of prej represents the probability that the corresponding user gets infected at next step. Since the initial user u0 plays an important role in the whole diffusion process, we further take u0 into considera- tion: win−1(cid:88) win−1(cid:88) act(uj−n)W C prej = softmax( init · Finit), (7) init ∈ Rd×U is the projection matrix for initial user where W C u0 and Finit ∈ {0, 1} is a hyperparameter which controls whether incorporate initial user for prediction or not. n + act(u0)W C n=0 4.5 Overall Architecture, Model Details and Learning Algorithms We naturally maximize the log-likelihood of all observed cascade sequences to build the overall optimization func- tion. log prei j[ui j+1], (8) (cid:88) ci−2(cid:88) ci∈C j=0 L(Θ) = j[ui n , W Q n , W K init, W C where prei j+1] is the predicted probability of ground truth next infected user ui j+1 at position j in cascade ci, and Θ is the set of all parameters need to be learned, including user embeddings emb(u) ∈ Rd for each u ∈ U, projection n ∈ Rd×d for matrices in multi-head attention W V n = 1, 2 . . . h, W O ∈ Rhd×d and projection matrices in con- n ∈ Rd×U for n = 0, 1 . . . win−1. volutional layer W C Implementation Details. We implement our model us- ing PyTorch 3 and optimize the parameters by gradient descent with Adam optimizer [54]. We further employ layer normalization [55] and residual connection [56] operation to active user embedding to avoid gradient explosion or vanishment problem that may occur in deep neural net- works. In other words, the active user embedding act(u) is replaced by LayerN orm(emb(u) + act(u)) instead where the LayerN orm(·) function encourages the output to have zero mean and unit variance. We also use dropout [57] to the attention mechanism to prevent our model from overfitting and the dropout rate is set to 0.1. Since the same user will 3. http://pytorch.org TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 7 Complexity. The space complexity of our model not be infected twice, we mask the users that are already infected in the Eq. 7 so that they won't be predicted. We release our source code at github 4 and all the details are listed. Hyperparameter settings will be introduced in next section. is O(dU) where d is the embedding dimension which is much less than the size of user set. Note that the space complexity of training traditional IC model will go up to O(U2) because we need to assign an infection probability between each pair of potential linked users. Therefore, the space complexity of our neural model is less than that of traditional IC methods. The computation of a single active embedding takes O(cid2) time where ci is the length of corresponding cas- cade and the next infected user prediction in Eq. 7 step takes O(dU) time. Hence the time complexity of training a single ci∈C(ci2d2 +cidU)) which is competitive with previous neural-based models such as embedded IC model [23]. But as we will show in the experiments, our model converges much faster than embedded IC model and is capable of handling large-scale dataset. cascade is O((cid:80) 5 EXPERIMENTS We conduct experiments on diffusion prediction task as previous works did [23] to evaluate the performance of our model and various baseline methods. We will first introduce the baseline methods, evaluation metrics and hyperparam- eter settings. Then we will present the experimental results and give further analysis about the evaluation. 5.1 Baselines We consider a number of state-of-the-art baselines to demonstrate the effectiveness of our algorithm. Most of the baseline methods will learn a transition probability matrix M ∈ RU×U from cascade sequences where each entry Mij represents the probability that user uj gets infected by ui when ui is activated. Netrate [21] considers the time-varying dynamics of diffusion probability through each link and defines three transmission probability models, i.e. exponential, power-law and Rayleigh, which encourage the diffusion probability to decrease as the time interval increases. In our experiments, we only report the results of exponential model since the other two models give similar results. Infopath [22] also targets on inferring dynamic diffusion probabilities based on information diffusion data. Infopath employs stochastic gradient to estimate the temporal dy- namics and studies the temporal evolution of information pathways. Embedded IC [23] explores representation learning tech- nique and models the diffusion probability between two users by a function of their user embeddings instead of a static value. Embedded IC model is trained by stochastic gradient descent method. LSTM is a widely used neural network framework [58] for sequential data modeling and has been used for cascade modeling recently. Previous works employ LSTM for some 4. https://github.com/albertyang33/NeuralDiffusionModel simpler tasks such as popularity prediction [26] and cascade prediction with known diffusion graph [27], [28]. Since none of these works are directly comparable to ours, we adopt LSTM network for comparison by adding a softmax classifier to the hidden state of LSTM at each step for next infected user prediction. 5.2 Hyperparameter Settings for Neural Models Though the parameter space of neural network based meth- ods is much less than that of traditional IC models, we have to set several hyperparameters to train neural models. To tune the hyperparameters, we randomly select 10% of training cascade sequences as validation set. Note that all training cascade sequences including the validation set will be used to train the final model for testing. For Embedded IC model, the dimension of user embed- dings is selected from {25, 50, 100} as the original paper did [23]. For LSTM model, the dimensions of user embed- dings and hidden states are set to the best choice from {16, 32, 64, 128}. For our model NDM, the number of heads used in multi-head attention is set to h = 8, the window size of convolutional network is set to win = 3 and the dimension of user embeddings is set to d = 64. Note that we use the same set of (h, win, d) for all the datasets. The flag Finit in Eq. 7 which determines whether the initial user is used for prediction is set to Finit = 1 for Twitter dataset and Finit = 0 for the other three datasets. We will show the robustness of our model in parameter sensitivity subsection. Note that neural models, i.e. Embedded IC, LSTM and NDM, are based on matrix multiplication operations and thus naturally benefit from the GPU acceleration. Therefore, we train these three methods on a GPU device (GeForce GTX TITAN X) instead of a CPU device (Intel Xeon E5-2620 @ 2.0GHz). 5.3 Diffusion Prediction To compare the ability of cascade modeling, we evaluate our model and all baseline methods on the diffusion predic- tion task. We follow the experimental settings in Embed- ded IC [23]. We randomly select 90% cascade sequences as training set and the rest as test set. For each cascade sequence c = (u0, u1, u2 . . . ) in the test set, only the ini- tial user u0 is given and all successively infected users Gc = {u1, u2 . . . uGc} need to be predicted. All baseline methods and our model are required to predict a set of users and the results will be compared with ground truth infected user set G. For baseline methods that ground in IC model, i.e. Netrate, Infopath and Embedded IC, we will simulate the infection process according to the learned pairwise diffusion probability and their corre- sponding generation process. For LSTM and our model, we can sequentially sample a user according to the probability distribution of softmax classifier at each step. Note that the ground truth infected user set could also be partially observed because the datasets are crawled within a short time window. Therefore, for each test sequence c with Gc ground truth infected users, all the algorithms are only required to predict the first Gc infected users in a single simulation. Also note that the simulation may terminate and stop infecting new users before activating Gc users. TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 8 Experimental results on diffusion prediction. TABLE 2 Metric Macro-F1 Micro-F1 Dataset Lastfm Irvine Twitter Lastfm Irvine Twitter Memetracker Memetracker Netrate 0.017 0.068 0.032 0.007 0.050 0.029 - - Infopath 0.030 0.110 0.052 0.044 0.046 0.142 0.073 0.010 Method Embedded IC 0.020 0.060 0.054 0.085 0.115 0.102 - - LSTM 0.026 0.102 0.041 0.103 0.072 0.137 0.080 0.052 NDM 0.056 0.139 0.076 0.139 0.095 0.171 0.108 0.087 Improvement +87% +26% +41% +35% +12% +20% +6% +67% Experimental results on diffusion prediction at early stage where only the first five infected users are predicted in each cascade. TABLE 3 Metric Macro-F1 Micro-F1 Dataset Lastfm Irvine Twitter Lastfm Irvine Twitter Memetracker Memetracker Netrate 0.018 0.071 0.031 0.016 0.076 0.028 - - Infopath 0.028 0.094 0.030 0.040 0.035 0.106 0.030 0.050 Method Embedded IC 0.010 0.042 0.027 0.013 0.040 0.029 - - LSTM 0.018 0.091 0.018 0.097 0.019 0.094 0.020 0.093 NDM 0.048 0.122 0.064 0.123 0.045 0.126 0.065 0.118 Improvement +71% +30% +106% +27% +29% +19% +117% +27% We conduct 1000 times Monte Carlo simulations for each test cascade sequence c for all algorithms and compute the u of each user u ∈ U. We evaluate infection probability P c the prediction results using two classic evaluation metrics: Macro-F1 and Micro-F1. Macro-F1. Macro-averaged F1 first computes the pre- cision prec, recall recc and F1 score fc locally for each test cascade sequence c in the test set Ctest. Then macro- averaged F-measure takes the average over all test cascade sequences: prec = , recc = , fc = (cid:80) (cid:80) u∈Gc P c u u∈U P c u M acro − F 1 = (cid:80) u∈Gc P c u Gc (cid:80) c∈Ctest fc Ctest . 2prec · recc prec + recc , Micro-F1. Micro-averaged F1 computes precision pre, recall rec globally by averaging over all predictions and serves as a complementary view by giving larger weights to longer cascades: c∈Ctest(cid:80) (cid:80) (cid:80) c∈Ctest Gc u∈Gc P c u , c∈Ctest(cid:80) (cid:80) (cid:80) c∈Ctest(cid:80) pre = u∈Gc P c u u∈U P c u , rec = M icro − F 1 = 2pre · rec pre + rec . To further evaluate the performance of cascade predic- tion at early stage, we conduct additional experiments by only predicting the first five infected users in each test cas- cade. We present the experimental results in Table 2 and 3. Here "-" indicates that the algorithm fails to converge in 72 hours. The last column represents the relative improvement of NDM against the best performing baseline method. We have the following observations: (1) NDM consistently and significantly outperforms all the baseline methods. As shown in Table 2, the relative improvement against the best performing baseline is at least 26% in terms of Macro-F1 score. The improvement on Micro-F1 score further demonstrates the effectiveness and robustness of our proposed model. The results also indicate that well-designed neural network models are able to sur- pass traditional cascade methods on cascade modeling. (2) NDM has even more significant improvements on cascade prediction task at early stage. As shown in Table 3, NDM outperforms all baselines by a large margin on both Macro and Micro F1 scores. Note that it's very important to predict the first wave of infected users accurately for real- world applications because a wrong prediction will lead to error propagation in following stages. A precise prediction of infected users at early stage enables us to better control the spread of information items through users. For example, we can prevent the spread of a rumor by warning the most vulnerable users in advance and promote the spread of a product by paying the most potential customers more attention. This experiment demonstrates that NDM has the ability to be used for real-world applications. (3) NDM is capable of handling large-scale cascade datasets. Previous neural-based method, Embedded IC, fails to converge in 72 hours on Twitter dataset with around 20 thousand users and 19 million of potential links. In contrast, NDM converges in 6 hours on this dataset with the same GPU device, which is at least 10 times faster than Embedded IC. This observation demonstrates the scalability of NDM. 5.4 Social Link Prediction Sometimes the underlying social network of users is avail- able, e.g. the Twitter dataset used in our experiments. In the Twitter dataset, a network of Twitter followers is ob- served though the information diffusion is not necessarily passed through the edges of the social network. Though the diffusion network and the social network do not strictly align with each other, we still expect that the most closely related users in information diffusion should also be socially TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 9 Fig. 5. Experimental results on social link prediction in Twitter dataset. Fig. 7. Comparisons between NDM and NDM+SN on diffusion prediction at early stage where only the first five infected users are predicted. the social links in Twitter dataset to some extent. Even the accuracy of LSTM is much higher than a random guess (around 0.005%). This indicates that information spreads through some social links frequently and thus these links can be inferred successfully. Moreover, our NDM model performs best on this task. This fact indicates that NDM can better capture the intrinsic relationship between users. Also, the absolute value of social link prediction accuracy is still not high enough (less than 5%). One possible reason is that the overlap between a diffusion network and a social network is small compared with the entire network. 5.5 Benefits from Social Network On the other side, we also hope that diffusion prediction process could benefit from the observed social network structure. We apply a simple modification on our NDM model to take advantage of the social network. Now we will introduce the modification in detail. Firstly, we embed the topological social network struc- ture into real-valued user features by DeepWalk [41], a widely used network representation learning algorithm. The dimension of network embeddings learned by DeepWalk is set to 32 which is half of the dimension d = 64 which is the representation size of our model. Secondly, we use the learned network embeddings to initialize the first 32 dimensions of the user representations of our model and fix them during the training process without changing any other modules. In other words, a 64-dimensional user representation is made up of a 32-dimensional fixed net- work embedding learned by DeepWalk from social network structure and another 32-dimensional randomly initialized trainable embedding. We name the modified model with Social Network considered as NDM+SN for short. This is a simple but useful implementation and we will explore a more sophisticated model to take the social network into modeling directly in future work. Fig. 6 and 7 show the comparison between NDM and NDM+SN. Experimental results show that NDM+SN is able to im- prove the performance on diffusion prediction task slightly Fig. 6. Comparisons between NDM and NDM+SN on diffusion predic- tion. connected in the social network. Therefore, we conduct social link prediction experiments to verify this statement. Firstly, we need to specify "the most closely related users". For Infopath algorithm, the model output directly contains the diffusion probability of each inferred edge. Thus we can rank the users by their diffusion probability to get the most closely related users. For LSTM and our model NDM, the output contains users' embeddings as real- valued vectors and we can simply use the inner product or the multi-head attention weight in Eq. 4 between user embeddings to measure the closeness of two users. Secondly, we use the following experimental settings for evaluation. Note that this setting is a reasonable choice but not the only choice. For each user u in the dataset, we select the most closely related user according to the first step and check whether this most closely related user is a follower of user u or not. Then we naturally use the accuracy as evaluation metric. We present the experimental results in Fig. 5. From the results in Fig. 5 we can see that all three al- gorithms, i.e. LSTM, Infopath and NDM, are able to predict 012345NDMInfopathLSTMRandomAccuracy (%)Micro−F1Macro−F100.050.10.150.2 NDMNDM+SNMicro−F1Macro−F100.050.10.150.2 NDMNDM+SN TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 10 (a) # heads h ∈ {1, 2, 4, 8} # (b) {16, 32, 64, 128} dimensions d ∈ (c) # window size win ∈ {2, 3, 4, 5} (d) Flag Finit ∈ {0, 1} Fig. 8. Parameter sensitivity of hyperparameters in Lastfm Dataset. Macro-F1 (Early) and Micro-F1 (Early) correspond to the prediction performance at early stage. with the help of incorporating social network structure as prior knowledge. The relative improvement of Micro-F1 is around 4%. The results demonstrate that our neural model is very flexible and can be easily extended to take advan- tage of external features. Note that these results are also consistent with those in previous subsection: The diffusion network and social network have overlapping parts but the overlapping part is relative small compared to the whole network. 5.6 Parameter Sensitivity In this subsection, we will take Lastfm dataset as an il- lustrative example to present how hyperparameter settings affect the performance of our model. We use the best set of hyperparameter settings as our basis, i.e. number of heads h = 8, window size of convolutional network win = 3, dimension of user embeddings d = 64 and flag of using initial user for prediction Finit = 0. Then we vary each hyperparameter while keeping others fixed. Figure 8 shows the performance on diffusion prediction under different hyperparameter settings. We can see that the performance of NDM is stable when we vary the hyperparameters within a reasonable range. NDM does not encounter serious overfitting problem when we double the dimension of embeddings d to 128. This experiment demonstrates the robustness of our model. 5.7 Interpretability Admittedly, the interpretability is usually a weak point of neural network models. Compared with feature engineering methods, neural-based models encode a user into a real- valued vector space and there is no explicit meaning of each dimension of user embeddings. In our proposed model, each user embedding is projected into 16 subspaces by an 8- head attention mechanism. Intuitively, the user embedding in each subspace represents a specific role of the user. But it is quite hard for us to link the 16 embeddings to interpretable hand-crafted features. We will consider the alignment between user embeddings and interpretable fea- tures based on a joint model in future work. Fortunately, we still have some findings in the convo- n ∈ Rd×U for n = 0, 1, 2 are lutional layer. Recall that W C position-specific linear projection matrices in convolutional layer and W C init is the projection matrix for the initial user. All four matrices are randomly initialized before training. In The scale of learned projection matrices in convolutional layer measured by Frobenius norm · 2 F . TABLE 4 Dataset Lastfm Irvine Twitter Memetracker W C init W C 60.0 32.3 13.3 16.6 13.9 13.9 130.3 93.6 0 W C 49.2 13.3 13.7 91.5 1 W C 2 49.1 13.0 13.7 91.5 a learned model, if the scale of one of these matrices is much larger than that of other ones, then the prediction vector is more likely to be dominated by the corresponding position. For example, if the scale of W C 0 is much larger than that of other ones, then we can infer that the most recent infected user contributes most to the next infected user prediction. Following the notations in Eq. 7, we set Finit = 1 for all datasets in this experiment and compute the square of Frobenius norm of learned projection matrices as shown in Table 4. We have the follow observations: 0 , W C (1) For all four datasets, the scales of W C 1 and W C 2 are competitive and the scale of W C is always a little bit 0 larger than that of the other two. This observation indicates that the active embeddings act(uj), act(uj−1), act(uj−2) of all three recently infected users will contribute to the pre- diction of uj+1. Also, the most recent infected user uj is the most important one among the three. This finding naturally matches our intuitions and verifies Assumption 2 proposed in method section. (2) The scale of W C init is the largest on Twitter dataset. This indicates that the initial user is very important in diffusion process on Twitter. This is partly because Twitter dataset contains the complete history of the spread of a URL and the initial user is actually the first one tweeting the URL. While in the other three datasets, the initial user is only the first one within the time window of crawled data. Note that we set hyperparameter Finit = 1 only for Twitter dataset in diffusion prediction task because we find that the performances are competitive or even worse on the other three datasets if we set Finit = 1. 6 CONCLUSION In this paper, we propose a Neural Diffusion Model (NDM) for microscopic cascade modeling. To go beyond the limita- tions of traditional cascade models based on strong assump- 12480.020.040.060.080.10ScoreMacro-F1Macro-F1 (Early)Micro-F1Micro-F1 (Early)1632641280.020.040.060.080.10ScoreMacro-F1Macro-F1 (Early)Micro-F1Micro-F1 (Early)23450.020.040.060.080.10ScoreMacro-F1Macro-F1 (Early)Micro-F1Micro-F1 (Early)010.020.040.060.080.10ScoreMacro-F1Macro-F1 (Early)Micro-F1Micro-F1 (Early) TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 11 tions and oversimplified formulas, we build our model based on two heuristic assumptions and employ deep learn- ing techniques including convolutional neural network and attention mechanism to implement the assumptions. Ex- perimental results on diffusion prediction task demonstrate the effectiveness and robustness of our proposed model. In addition, NDM greatly outperforms baseline methods on diffusion prediction at early stage, which shows the applica- bility and feasibility of NDM for real-world applications. For future works, we will consider linking neural-based model with hand-crafted features and statistics to improve the interpretability of learned models. An intelligible model is always welcome and can help us better understand the motivations and behaviors of users in a diffusion process. The incorporation of extra information for cascade mod- eling is also an intriguing direction. For example, the times- tamp information and the description of information items can be used for more accurate cascade modeling. ACKNOWLEDGMENTS This work was supported by the 973 Program (No. 2014CB340501), the Major Project of the National Social Science Foundation of China (13&ZD190) and the National Natural Science Foundation of China (No. 61772302). This work is also part of the NExT++ project, supported by the National Research Foundation, Prime Ministers Office, Singapore under its IRC@Singapore Funding Initiative. [2] REFERENCES [1] M. J. Salganik, P. S. Dodds, and D. J. Watts, "Experimental study of inequality and unpredictability in an artificial cultural market," science, 2006. J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and J. Leskovec, "Can cascades be predicted?" in Proceedings of WWW. ACM, 2014. [3] L. Yu, P. Cui, F. Wang, C. Song, and S. Yang, "From micro to macro: Uncovering and predicting information cascading process with behavioral dynamics," in Data mining (ICDM). IEEE, 2015, pp. 559 -- 568. [4] Q. Zhao, M. A. Erdogdu, H. Y. He, A. Rajaraman, and J. Leskovec, "Seismic: A self-exciting point process model for predicting tweet popularity," in Proceedings of the 21th ACM SIGKDD. ACM, 2015, pp. 1513 -- 1522. [5] P. Domingos and M. Richardson, "Mining the network value of [6] [7] customers," in Proceedings of SIGKDD. ACM, 2001. J. Leskovec, A. Singh, and J. Kleinberg, "Patterns of influence in a recommendation network," in Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 2006, pp. 380 -- 389. J. Leskovec, L. A. Adamic, and B. A. Huberman, "The dynamics of viral marketing," ACM Transactions on the Web (TWEB), vol. 1, no. 1, p. 5, 2007. [8] D. J. Watts and P. S. Dodds, "Influentials, networks, and public opinion formation," Journal of consumer research, vol. 34, no. 4, pp. 441 -- 458, 2007. S. Aral and D. Walker, "Identifying influential and susceptible members of social networks," Science, 2012. [10] H. W. Hethcote, "The mathematics of infectious diseases," SIAM [9] review, vol. 42, no. 4, pp. 599 -- 653, 2000. [11] J. Wallinga and P. Teunis, "Different epidemic curves for severe acute respiratory syndrome reveal similar impacts of control mea- sures," American Journal of epidemiology, 2004. [12] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing the spread of influence through a social network," in Proceedings of SIGKDD. ACM, 2003, pp. 137 -- 146. [13] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, "Finding effectors in social networks," in Proceedings of SIGKDD. ACM, 2010, pp. 1059 -- 1068. [14] P. A. Dow, L. A. Adamic, and A. Friggeri, "The anatomy of large facebook cascades." ICWSM, 2013. [15] D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins, "Informa- tion diffusion through blogspace," in Proceedings of WWW. ACM, 2004. [16] D. Liben-Nowell and J. Kleinberg, "Tracing information flow on a global scale using internet chain-letter data," Proceedings of the national academy of sciences, vol. 105, no. 12, pp. 4633 -- 4638, 2008. [17] J. Leskovec, L. Backstrom, and J. Kleinberg, "Meme-tracking and the dynamics of the news cycle," in Proceedings of SIGKDD. ACM, 2009, pp. 497 -- 506. [18] D. M. Romero, B. Meeder, and J. Kleinberg, "Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter," in Proceedings of WWW. ACM, 2011, pp. 695 -- 704. [19] S. Myers and J. Leskovec, "On the convexity of latent social network inference," in Advances in neural information processing systems, 2010, pp. 1741 -- 1749. [20] M. Gomez Rodriguez, J. Leskovec, and A. Krause, "Inferring networks of diffusion and influence," in Proceedings of SIGKDD. ACM, 2010. [21] M. G. Rodriguez, J. Leskovec, D. Balduzzi, and B. Scholkopf, "Uncovering the structure and temporal dynamics of information propagation," Network Science, vol. 2, no. 1, pp. 26 -- 65, 2014. [22] M. Gomez Rodriguez, J. Leskovec, and B. Scholkopf, "Structure and dynamics of information pathways in online media," in Proceedings of WSDM. ACM, 2013. [23] S. Bourigault, S. Lamprier, and P. Gallinari, "Representation learn- ing for information diffusion through social networks: an embed- ded cascade model," in Proceedings of WSDM. ACM, 2016. [24] S. Bourigault, C. Lagnier, S. Lamprier, L. Denoyer, and P. Gallinari, "Learning social network embeddings for predicting information diffusion," in Proceedings of WSDM. ACM, 2014. [25] S. Gao, H. Pang, P. Gallinari, J. Guo, and N. Kato, "A novel embedding method for information diffusion prediction in social network big data," IEEE Transactions on Industrial Informatics, 2017. [26] C. Li, J. Ma, X. Guo, and Q. Mei, "Deepcas: An end-to-end predictor of information cascades," in Proceedings of WWW. Inter- national World Wide Web Conferences Steering Committee, 2017, pp. 577 -- 586. [27] W. Hu, K. K. Singh, F. Xiao, J. Han, C.-N. Chuah, and Y. J. Lee, "Who will share my image?: Predicting the content diffusion path in online social networks," in Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. ACM, 2018, pp. 252 -- 260. [28] J. Wang, V. W. Zheng, Z. Liu, and K. C.-C. Chang, "Topological recurrent neural network for diffusion prediction," in ICDM. IEEE, 2017, pp. 475 -- 484. [29] Z. T. Kefato, N. Sheikh, and A. Montresor, "Di: Diffusion network inference through representation learning," 2017. [30] P. Cui, S. Jin, L. Yu, F. Wang, W. Zhu, and S. Yang, "Cascading outbreak prediction in networks: a data-driven approach," in Proceedings of SIGKDD. ACM, 2013. [31] O. Tsur and A. Rappoport, "What's in a hashtag?: content based prediction of the spread of ideas in microblogging communities," in Proceedings of WSDM. ACM, 2012, pp. 643 -- 652. [32] L. Weng, F. Menczer, and Y.-Y. Ahn, "Predicting successful memes using network and community structure." in ICWSM, 2014. [33] H. Pinto, J. M. Almeida, and M. A. Gonc¸alves, "Using early view patterns to predict the popularity of youtube videos," in Proceedings of WSDM. ACM, 2013, pp. 365 -- 374. [34] S. Gao, J. Ma, and Z. Chen, "Modeling and predicting retweeting dynamics on microblogging platforms," in Proceedings of WSDM. ACM, 2015. [35] Q. Cao, H. Shen, K. Cen, W. Ouyang, and X. Cheng, "Deephawkes: Bridging the gap between prediction and understanding of infor- mation cascades," in Proceedings of CIKM. ACM, 2017. [36] J. Goldenberg, B. Libai, and E. Muller, "Talk of the network: A complex systems look at the underlying process of word-of- mouth," Marketing letters, 2001. [37] K. Saito, R. Nakano, and M. Kimura, "Prediction of informa- tion diffusion probabilities for independent cascade model," in Knowledge-based intelligent information and engineering systems. Springer, 2008, pp. 67 -- 75. [38] K. Saito, M. Kimura, K. Ohara, and H. Motoda, "Learning continuous-time information diffusion model for social behavioral data analysis," in Asian Conference on Machine Learning. Springer, 2009, pp. 322 -- 337. TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 14, NO. 8, AUGUST 2015 12 [39] S. Wang, X. Hu, P. S. Yu, and Z. Li, "Mmrate: inferring multi-aspect diffusion networks with multi-pattern cascades," in Proceedings of SIGKDD. ACM, 2014, pp. 1246 -- 1255. [40] L. Tang and H. Liu, "Relational learning via latent social dimen- sions," in Proceedings of SIGKDD. ACM, 2009, pp. 817 -- 826. [41] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning of social representations," in Proceedings of SIGKDD. ACM, 2014, pp. 701 -- 710. [42] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line: Large-scale information network embedding," in Proceedings of WWW. International World Wide Web Conferences Steering Committee, 2015, pp. 1067 -- 1077. [43] T. N. Kipf and M. Welling, "Semi-supervised classification with graph convolutional networks," arXiv preprint arXiv:1609.02907, 2016. [44] C. Yang, M. Sun, W. X. Zhao, Z. Liu, and E. Y. Chang, "A neural network approach to jointly modeling social networks and mobile trajectories," TOIS, vol. 35, no. 4, p. 36, 2017. `O. Celma Herrada, "Music recommendation and discovery in the long tail," 2009. [46] T. Opsahl and P. Panzarasa, "Clustering in weighted networks," [45] Social networks, vol. 31, no. 2, pp. 155 -- 163, 2009. [47] N. O. Hodas and K. Lerman, "The simple rules of social conta- gion," Scientific reports, vol. 4, p. 4343, 2014. [48] D. Bahdanau, K. Cho, and Y. Bengio, "Neural machine trans- lation by jointly learning to align and translate," arXiv preprint arXiv:1409.0473, 2014. [49] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, Ł. Kaiser, and I. Polosukhin, "Attention is all you need," in Advances in Neural Information Processing Systems, 2017, pp. 5998 -- 6008. [50] M. G. Rodriguez, D. Balduzzi, and B. Scholkopf, "Uncovering the temporal dynamics of diffusion networks," arXiv preprint arXiv:1105.0697, 2011. [51] Y. LeCun et al., "Lenet-5, convolutional neural networks," URL: http://yann. lecun. com/exdb/lenet, 2015. [52] A. Van den Oord, S. Dieleman, and B. Schrauwen, "Deep content- based music recommendation," in Advances in neural information processing systems, 2013, pp. 2643 -- 2651. [53] R. Collobert and J. Weston, "A unified architecture for natural lan- guage processing: Deep neural networks with multitask learning," in Proceedings of ICML. ACM, 2008. [54] D. Kingma and J. Ba, "Adam: A method for stochastic optimiza- tion," arXiv preprint arXiv:1412.6980, 2014. [55] J. L. Ba, J. R. Kiros, and G. E. Hinton, "Layer normalization," arXiv preprint arXiv:1607.06450, 2016. [56] K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," in Proceedings of CVPR, 2016, pp. 770 -- 778. [57] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, "Dropout: A simple way to prevent neural net- works from overfitting," The Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929 -- 1958, 2014. [58] S. Hochreiter and J. Schmidhuber, "Long short-term memory," Neural computation, vol. 9, no. 8, pp. 1735 -- 1780, 1997. Cheng Yang is a 4-th year PhD student of the Department of Computer Science and Technol- ogy, Tsinghua University. He got his B.E. degree from Tsinghua University in 2014. His research interests include natural language processing and network representation learning. He has published several top-level papers in interna- tional journals and conferences including ACM TOIS, IJCAI and AAAI. Maosong Sun is a professor of the Department of Computer Science and Technology, Tsinghua University. He got his BEng degree in 1986 and MEng degree in 1988 from Department of Computer Science and Technology, Tsinghua University, and got his Ph.D. degree in 2004 from Department of Chinese, Translation, and Linguistics, City University of Hong Kong. His research interests include natural language pro- cessing, Chinese computing, Web intelligence, and computational social sciences. He has pub- lished over 150 papers in academic journals and international confer- ences in the above fields. He serves as a vice president of the Chinese Information Processing Society, the council member of China Computer Federation, the director of Massive Online Education Research Center of Tsinghua University, and the Editor-in-Chief of the Journal of Chinese Information Processing. Haoran Liu is a 4-th year undergraduate student of the Department of Electric Engineering, Ts- inghua University. His research interests include network representation learning and machine learning. Shiyi Han is a 1-st year master student in Com- puter Science department at Brown University. He got his B.E. degree from Beihang University in 2018. His research interests include natural language processing and machine learning. Zhiyuan Liu is an associate professor of the De- partment of Computer Science and Technology, Tsinghua University. He got his BEng degree in 2006 and his Ph.D. in 2011 from the Department of Computer Science and Technology, Tsinghua University. His research interests are natural lan- guage processing and social computation. He has published over 40 papers in international journals and conferences including ACM Trans- actions, IJCAI, AAAI, ACL and EMNLP. Huanbo Luan is the deputy director of NExT++ Research Center at both Tsinghua University and National University of Singapore. He re- ceived his B.S. degree in computer science from Shandong University in 2003 and Ph.D degree in computer science from Institute of Comput- ing Technology, Chinese Academy of Sciences in 2008. His research interests include natural language processing, multimedia information re- trieval, social media and big data analysis.
1605.01901
1
1605
2016-05-06T11:53:29
Bridging Online and Offline Social Networks: Multiplex Analysis
[ "cs.SI", "physics.soc-ph" ]
We show that three basic actor characteristics, namely normalized reciprocity, three cycles, and triplets, can be expressed using an unified framework that is based on computing the similarity index between two sets associated with the actor: the set of her/his friends and the set of those considering her/him as a friend. These metrics are extended to multiplex networks and then computed for two friendship networks generated by collecting data from two groups of undergraduate students. We found that in offline communication strong and weak ties are (almost) equally presented, while in online communication weak ties are dominant. Moreover, weak ties are much less reciprocal than strong ties. However, across different layers of the multiplex network reciprocities are preserved, while triads (measured with normalized three cycles and triplets) are not significant.
cs.SI
cs
Bridging Online and Offline Social Networks: Multiplex Analysis Sonja Filiposkaa,b, Andrej Gajduka, Tamara Dimitrovaa, Ljupco Kocareva,b,∗ aMacedonian Academy of sciences and Arts, Skopje, Macedonia bFaculty of Computer Science and Engineering, "Ss Cyril and Methodius University", Skopje, Macedonia Abstract We show that three basic actor characteristics, namely normalized reciprocity, three cycles, and triplets, can be expressed using an unified framework that is based on computing the similarity index between two sets associated with the actor: the set of her/his friends and the set of those considering her/him as a friend. These metrics are extended to multiplex networks and then computed for two friendship networks generated by collecting data from two groups of undergraduate students. We found that in offline communication strong and weak ties are (almost) equally presented, while in online communication weak ties are dominant. Moreover, weak ties are much less reciprocal than strong ties. However, across different layers of the multiplex network reciprocities are preserved, while triads (measured with normalized three cycles and triplets) are not significant. Keywords: Multiplex analysis, Social networks, Graph theory 1. Introduction Intensity of involvement among actors in a social network and the types of actions and interactions that arise between them are a long active topic in soci- ological research. The analysis of group structures has started with the study of dyads and triads that was pioneered by German sociologist Georg Simmel at the ∗[email protected] Preprint submitted to Phisica A November 6, 2018 end of the nineteenth century [1]. In network analysis, the importance of triads has long been emphasized in many research studies, including the highly influen- tial work of Granovetter [2] and, more recently, the work of Watts and Strogatz [3], where the notion of clustering (formation of many triangles in networks) is an integral part of the analysis. Thus, both social and network analysis that represent actors as networks nodes and their interactions as (un)directed links have shown that the network structural properties like reciprocity and cycles are very important when trying to explain processes like information spreading and network evolution. However, retaining the perspective on different connections, i.e. Granovet- ter's strong and weak ties, sheds additional light on the nature of connections between actors and provides deeper understanding of the triads formations and network clustering. Thus, deeper understanding of the network properties, and therefore the processes that run on top of it, can be gained if it is viewed as a collection of multiple types of links wherein each set of link types rep- resents a separate layer of the network. This multilayered representation has led to the introduction of the concept of multiplex networks which refers to systems in which nodes are connected through more than one type of edges, and therefore, belong to multiple interacting and co-evolving networks. The importance of multiplex networks in sociology has been emphasized by many scholars. In the seminal treatment of multiple networks as the foundation of social structure, White, Boorman and Breiger [4] and Boorman and White [5] argued that the patterning and interweaving of different types of ties are needed to describe and characterize social structures. It has been demonstrated that multiplexity is critical to diverse phenomena, such as the mobilization of social movements [6], the consolidation of political power [7], the emergence of trust in economic relationships [8], the creation of social bonds within civic networks [9], and the organization of party coalitions [10]. Multiplexity has been studied to understand scientific collaboration [11], structural logic of intra-organizational networks [12], formation of ties featuring both an economic and a social compo- nent in inter-organizational networks [13], and formation of relationships among 2 producers in the multiplex triads [14]. Multiplex networks have also been recently subject of particularly intense research by the network science and physics communities. Szell, Lambiotte, and Thurner [15] worked on correlations and overlap between different types of links and demonstrated the tendency of individuals to play different roles in different networks. Algorithmic detection of tightly connected groups of nodes known as communities in multiplex networks was studied in [16]. A framework for growing multiplexes where a node can belong to a different networks was developed by Nicosia et al [17], while Kim and Goh [18] studied the possibility of growth of coevolving layers that can shape the network structure and showed analytically and numerically that the coevolution can induce strong degree cor- relations across layers, as well as modulate degree distributions. Evolutionary game dynamics on structured populations in which individuals take part in sev- eral layers of networks of interactions simultaneously which accounts for the different kind of social ties each individual has was studied by Gomez et al [19]. In this paper we aim to study social relations among actors (strong and weak ties) as they appear in real life face-to face (offline) and virtual via social network sites (online) communications using the apparatus of multiplex network anal- ysis/analytics. Real data was collected using an online survey/questionnaire given to two groups of students (two classroom based social networks). The students answers were used to map their own perception of strong vs. weak of- fline and online connections, thus constructing several offline and online directed friendship networks that constitute the layers of our multiplex network. The primary goal of this research is to study the interrelationship of different social structures represented as multiplex networks. For this reason, we develop nor- malized actor characteristics for multiplex networks, including metrics for dyads (such as reciprocity) and triads. We found that normalized reciprocity, three cycles, and triplets of an actor can be expressed using an unifying framework that is based on the comparison of two sets associated with the actor: the set of her/his friends - out links and the set of actors that consider her/him as a friend - in links. By extending these metrics for multiplex networks, we were able to 3 observe the relationship of strong and weak ties in the offline and online space. Analyzing the collected data from two groups of undergraduate students we found that in offline communication strong and weak ties are (almost) equally presented, while in online communication weak ties are dominant. Moreover, weak ties are a lot less reciprocal than strong ties. However, while reciprocities are preserved across layers, the triads (measured using normalized three cycles and triplets) are not significant on the different layers of the multiplex network. This is the outline of the paper. First, we describe the participants in- volved in the study and the procedure for collecting data. Next, we address the network endogenous (structural) and exogenous factors. Endogenous fac- tors include graph characteristics such as reciprocity, three-cycles, transitive triplets, together with their normalized versions, as well as their generalizations for multiplex graphs. The section Results summarizes our findings regarding the offline and online multiplex networks generated by collecting the data described in the section Materials and Methods. We conclude the paper with the section Conclusions where we also discuss our future work. 2. Materials and Methods 2.1. Participants and the procedure Participants in this study were two groups of undergraduate students en- rolled on two courses given at the Faculty of Computer Science and Engineering within the Cyril and Methodius University in Skopje, Macedonia. During the courses there was a dedicated lecture to explain the study and it's objectives in which the students were informed about the research experiment and only those who agreed to participate were part of the experiment. Thus, the two groups represent two social networks of students that attend the same class during one semester of their studies. The total number of students in the first group, Group 1, is 171, out of which 153 voluntarily participated in the study. The gender distribution is almost equal; there were 86 female and 85 male students. The total number of students in the second group, Group 2, is 150 (118 male, 32 4 female), while only 80 participated in the At the end we summarize our findings regarding the offline and online multiplex networks generated from the collected datastudy. The students age for both groups ranges from 19 years to 22 years. Additional data was also collected for each student via the university online electronic course enrollment system (such as: gender, study program, GPA, accumulated credits). The online survey was developed by the research team. Each student (that participated in the study) was asked to select from the presented list of class- mates those with whom she/he was engaged in face-to-face (offline) communica- tion and Facebook (online) communication. Each chosen contact was described as weak or strong according to the student's own perception by the means of pre-defined categories for frequency of communication. In the case of face-to- face communication a contact (tie) is considered to be strong if the frequency of communication is higher than 5 interactions per month, while it is considered as weak contact (tie) if the number of interactions is larger than once in 3 months, but less than 5 interactions per month. When considering the online communi- cation, strong contacts (ties) are those with whom the student interacts more than five times per week, while a weak contact (tie) is the one with whom there was Facebook activity more than once a month, but less than five times per week. Facebook was chosen as the online social network representative since it's use is extremely wide spread among the population. 2.2. Friendship graphs as multiplex networks Graphs provide a powerful primitive for modeling data in social science. Nodes usually represent real world objects and edges indicate relationships be- tween objects. In sociology, nodes may have attributes associated with them and graphs may contain many different types of relationships. The node attributes are used to describe the features of the objects that the nodes represent. For example, a node representing a student may have attributes that represent the student's gender and department. Different types of edges in a graph correspond to different types of relationships between nodes, such as friends and classmates 5 relationships. Here we study friendship relations among n actors: the existence of a tie i → j will be described as i calling j a friend. The ties are represented as binary variables, denoted by xij. A tie from actor i to actor j, i → j, is either present or absent (xij then having values 1 and 0, respectively). The tie variables constitute the network, represented by its n × n adjacency matrix X = [xij] (self-ties are excluded). The graph is directed, where each tie i → j has a sender i, who will also be referred to as ego, and a receiver j, referred to as alter, as it is common in social network analysis. We model different types of relationships among actors using the concept of multiplex graphs. In sociology, multiplex graphs (networks) refer to the case when nodes (actors) are connected through more than one type of (socially relevant) ties. In mathematics, such graphs are also called multi-graphs (a multi-graph is a graph that is allowed to have multiple edges, that is, edges that have the same end nodes). We give a definition of multiplex graphs adapted for the study reported in this paper. Let V denote the set of nodes; nodes are connected via L different type of connections (ties). Each type of connection (together with the set of nodes) forms a (directed) graph with n vertices. We denote with Gα = (V, Eα) the graph which represents the connection type α, where Eα denotes the set of α-type ties, α = 1, . . . , L. Let [xij(Gα)] be n × n adjacency matrix of the graph Gα. A multiplex graph G is then defined as a collection of all graphs Gα and all edge-aggregated graphs of the form Eα), where α1, αm ∈ {1, . . . , L}. We assume that the case α1 = αm (V,∪αm is not excluded and thus write α=α1 G = {Gα1α2...αm = (V, Eα1 ∪ Eα2 ∪ . . . ∪ Eαm) : α1, . . . αm ∈ {1, . . . , L}} for the multiplex graph G. In the study discussed here, different types of edges correspond to the four types of friendship relations: online weak or strong con- nections and offline weak or strong connections. 6 2.3. Jaccard similarity coefficient In order to introduce an unifying framework for discussing graph character- istics, we use the Jaccard index, also known as Jaccard similarity coefficient. It measures the similarity between finite sets and is defined as the size of the intersection divided by the size of the union of the sets: A ∩ B J(A, B) = A ∩ B A ∪ B = A + B − A ∩ B , where S denotes the cardinality of the set S. J(A, B) is defined as 1. Note that If A and B are both empty, 0 ≤ J(A, B) ≤ 1. The Jaccard distance, which measures dissimilarity between sets and is a metric on the collection of all finite sets, is complementary to the Jaccard coefficient and is obtained by subtracting the Jaccard coefficient from 1. Using Jaccard index to introduce various actor-based characteristics is based on the following observation. Let Ai = {a : i → a} and Bj = {b : j → b}. Then Ai ∩ Bj = (cid:88) (cid:88) h xih and Bj =(cid:80) Ai ∪ Bj = h h h xjh. xihxjh xih + (cid:88) xjh −(cid:88) xihxjh, h h where Ai =(cid:80) 2.4. Network (endogenous) characteristics We consider a number of social network characteristics; those depending only on the network are called structural or endogenous characteristics, while characteristics depending on externally given attributes are called covariate or exogenous characteristics. 2.4.1. Simple-graph characteristics Let G = (V, E) be a directed graph and let i be an arbitrary node (actor) in the graph. We denote Sin i (k) and Sout i (k) for the k-in-neighborhood of i and 7 k-out-neighborhood of i, respectively, i.e., for the set of vertices from where vertex i can be reached and for the set of vertices that can be reached from i in k steps (using k directed edges). More formally, these sets are defined as i (k) = {j : there is a path of length k from j to i} Sin (k) = {j : there is a path of length k from i to j} Sout i (1) (2) The general case of arbitrary k will be discussed elsewhere, here we consider only to the case when k = 1. For k = 1 we use the shorter notations Sin i (1) = Sin i . In other words, we consider the 1-hop-neighbor sets of node and Sout i (1) = Sout i i defined as: Sout i Sin i = {j : i → j}, = {j : j → i}, (3) (4) If the existence of a tie i → j is being interpreted as j is a friend of i, then Sout is the set of nodes that consider i as j xij = Sout is the number of i's friends and din i their friend. For the cardinalities of these sets, we write dout is the set of i's friends, while Sin i i =(cid:80) i =(cid:80) . Therefore, dout j xji = Sin and din i i i i is the number of nodes that consider i as their friend. These two metrics are known as activity, i.e. tendency to establish friendships, and popularity, i.e. ability to gain friends, in social science. In this paper, we analyse several graph characteristics that can all be expressed using the Jaccard similarity index for a given pair of node sets. Out of the many different possible characteristics, here the focus is set on those that we consider most relevant for this study: reciprocity, three-cycles, and triplets. Reciprocity -- One of the most basic properties of social networks is reci- procity, represented by the number of reciprocated ties of actor i and defined as(cid:80) j xijxji, which can be rewritten as Reci = Sout i ∩ Sin i = Here we consider normalized reciprocity defied as: ri = J(cid:0)Sout i , Sin i (cid:1) = xijxji (cid:88) (cid:80) i −(cid:80) j xijxji j 8 dout i + din j xijxji . (5) The normalized reciprocity enables one to decide on the quantity of reciprocated ties when compared to the total number of ties of both actors. This normal- ization provides a perspective and places the phenomenon of reciprocity into context by comparing it to the total number of possibilities for reciprocated ties under the given circumstances. Three-cycles -- Next to reciprocity, an essential feature in most social networks is transitivity, or transitive closure which is rep- resented by two metrics: three-cycles and triplets. A cycle of length 3 in a given graph is defined as a sub-graph that consists of a sequence of directed edges i → j → h → i which connect a sequence of vertices i, j, h, all distinct from one another. We discuss the first metric, three-cycles, defined as the number of three-cycles an actor i is involved in, that is (cid:88) cyci = xijxjhxhi We introduce a normalized characteristic for the number of three-cycles an actor j,h i is involved in as follows: tci = = (cid:88) (cid:88) h h 1 din i 1 din i xhiJ(Sout i , Sin h ) (cid:80) h −(cid:80) xhi j xijxjh dout i + din j xijxjh h is the number of the common neighbors for both i and h or, the Sout i ∩ Sin number of i's friends that consider h to be a friend as well. The Jaccard index between these two sets Sout and Sin i h reflects how similar these sets are in terms of common versus non-common friends. Moreover, (cid:88) (cid:88) (cid:88) xhiSout i ∩ Sin h = xhi xijxjh h h j is the number of three-cycles that actor i is involved in. Therefore, by sum- marizing the Jaccard indexes J(Sout h ) for all h one can obtain a measure (metric) tci that represents the status of common versus non-common friends , Sin i of i in the graph when considered in terms of transitive three-cycles. Transitive triplets -- A transitive triplet of length 3 in a given graph is a sub- graph that consists of a sequence of directed edges i → j → h and i → h which 9 connect a sequence of vertices i, j, h that are all distinct from one another. Recall, the metric triplets is defined as the number of triplets an actor i is involved in, that is plti = xijxjhxih. (cid:88) In a similar fashion as for the three-cycles, one can define normalized metric for j.h the number of triplets in the graph: (cid:88) (cid:88) j j tpi = = 1 dout i 1 dout i xijJ(Sout i j ) , Sout (cid:80) j −(cid:80) xij h xihxjh dout i + dout h xihxjh Note that the normalized reciprocity, normalized transitive triplets, and normal- ized three-cycles are related to reciprocity, transitive triplets, and three-cycles, respectively - quantities that are commonly used in social science and graph theory. The fact, shown here, that they can be expressed with Jaccard simi- larity index not only brings novel understanding of these quantities, but also suggests how they can be extended for multiplex networks, which will be done in the next section. However, take into consideration that while using the Jac- card similarity index to express the network characteristics, we define it as 0 when both considered sets are empty in order to reflect the social aspects of the interpretation, i.e. two nodes that have no friends at all are not reciprocated and are not part of any triplets or cycles. 2.4.2. Multiplex-graph characteristics When considering a multiplex graph wherein α and β (α = β is not ex- cluded) represent two types of social relationships, the normalized reciprocity, normalized three-cycles, and normalized transitive triplets can be generalized as: ri(Gα, Gβ) = J(cid:0)Sout (cid:88) i tci(Gα, Gβ) = 1 din i i (Gβ)(cid:1) (Gα), Sin xhiJ(Sout i (Gα), Sin h (Gβ)) h 10 tpi(Gα, Gβ) = (cid:88) j 1 dout i xijJ(Sout i (Gα), Sout j (Gβ)). By using these metrics we can analyze how different types of links interact and form mixed dyad and triad formations. Recalling that in the general case a multiplex graph can consist of several different layers, the multiplex-graph extension of the reciprocity, cycles and triplets metrics enables us to study what type of links are stronger than others, as well as how the network characteristics change when considering only a subset of all existing interrelations among its nodes. We also consider the following two characteristics called overlapping indexes and defined as: oiout i (Gα, Gβ) = J(Sout i (Gα), Sout i (Gβ)) oiin i (Gβ)) i (Gα, Gβ) = J(Sin i (Gα), Sin These two metrics are introduced in order to create a contrasting view compared to the normalized multiplex graph characteristics as they are defined above. By analyzing the Jaccard similarity of sets of links for a given node that belong to different layers of the multiplex graph, we are able to infer the consistency of the relationship intensity for different types of links. In other words, does the node have the tendency to have different types of relationship with the same set of friends in different environments (for example, online and offline environment in our study case). We argue that the out overlapping index shows the node activity in creating and maintaining different types of links, while the in overlapping index represents the node popularity, i.e. ability to gain different types of relationships. 2.5. Exogenous characteristics Nodes in a graph may have a set of associated attributes, also called exoge- nous actor covariates. In order to emphasize the completeness of the approach, in this section we show that our unified framework based on the Jaccard sim- ilarity index can also be used for the analysis of the exogenous characteristics 11 of the multiplex graph. The results for the exogenous characteristics will be presented elsewhere. Let Ai be the set of attributes associated to the node i. There are two basic characteristics for the actor i: the out-attributes characteristic, measuring whether actors with higher similarity-index values tend to nominate more friends and hence have a higher out-degree; the in-attributes characteristic, measuring whether actors with higher similarity-index values will tend to be nominated by many others and hence have higher in-degrees. These two characteristics are defined as attout i = 1 dout i xijJ(Ai, Aj) xjiJ(Ai, Aj), attin i = 1 din i (6) (7) (cid:88) (cid:88) j j (cid:88) i,j;i<j which will be compared to the average un-networked similarity value computed as att = 2 n(n − 1) J(Ai, Aj). The characteristic attout nodes i and j for all the friends of i, that is, for all nodes in the set Sout i measures similarity of attributes of the pair of end- . The i characteristic attin i measures similarity of attributes of the pair of end-nodes i and j for those j that consider i as a friend, that is, for all nodes in the set Sin . i The quantities (6) and (7) can be extended for multiplex networks as 1 dout i (cid:88) (cid:88) j j attout i (Gα) = xij(Gα)J(Ai, Aj) attin i (Gα) = 1 din i xji(Gα)J(Ai, Aj) With this extension once can also analyze the similarity of the attributes for different pairs of nodes that are connected across different layers of the multiplex network. Therefore, these metrics provide insight into how different types of links influence the attribute based node similarity. 12 Figure 1: Visualization of a part of the multiplex graph constructed according to the data from Group 2 with 2 basic and 2 aggregated graphs. Note that all nodes (if present) are in the same positions across the layers. 3. Results Let V be the set of all students enrolled on a given course (group). For each group of students, there are four distinct directed graphs that have been generated based on the answers collected from the online survey: offline/online social network with strong ties and offline/online social network with weak ties, defined as: Gof s = (V, Eof s ), Gof w = (V, Eof w ), Gon s = (V, Eon s ), Gon w = (V, Eon w ), s = {i → j is an offline strong tie} Eof w = {i → j is an offline weak tie} Eof s = {i → j is an online strong tie} Eon w = {i → j is an online weak tie} Eon (8) (9) (10) (11) From these four (basic) graphs, five more aggregated graphs are constructed: Gof = (V, Eof ), Gon = (V, Eon), Gs = (V, Es), Eof = Eof Eon = Eon s ∪ Eof s ∪ Eon w w Es = Eon s ∪ Eof s 13 (12) (13) (14) Gw = (V, Ew), G = (V, E) E = Eof ∪ Eon = Es ∪ Ew Ew = Eon w ∪ Eof w (15) (16) Two multiplex networks are studied for two groups. Each network consists of nine layers or nine sets of ties: four basic - strong OFF, weak OFF, strong ON, and weak ON and five aggregated sets - strong, weak, ON, OFF, and all, as described with the given equations. In Fig. 1 a partial visual representa- tion of the multiplex network for Group 2 is presented aiming to conceptualize the different types of links in each layer together with the possible ways for aggregation. Table 1: Basic graph characteristics for all layers in the multiplex graph that represents the social interrelations between the students from Group 1 TotDegree Assor Group 1 strong OFF weak OFF OFF strong ON weak ON ON strong weak all V 153 153 153 153 153 153 153 153 153 E 675 756 4.412 4.941 1420 9.281 428 783 2.797 5.118 1201 7.850 730 4.771 1046 6.837 1487 9.719 V1 122 E1 630 Path Diam 4.632 14 135 150 693 3.856 1402 2.994 9 7 0.431 0.018 0.238 0.235 87 0.154 0.253 0.392 0.087 0.195 138 150 128 145 153 9 7 319 742 5.196 14 3.782 1192 3.251 689 4.339 11 1016 3.212 1487 2.937 7 7 Multiplex networks are particularly significant when they overlap and in- teract to create phenomena or processes that cannot be explained by a single network alone. Tables 1 and 2 summarize the basic graph characteristics for all graphs generated in the study (total of 9 graphs per group): number of actors V , number of ties E, average degree and assortativity. Recall, a directed graph is strongly connected if there is a directed path from each vertex to every other vertex. The strongly connected components (SCC) of a directed graph are its maximal strongly connected sub-graphs. The number of actors V1 and 14 Group 2 strong OFF weak OFF OFF strong ON weak ON ON strong weak all E 412 521 930 226 465 690 455 728 V 80 80 80 80 80 80 80 80 80 5.150 6.513 11.625 2.825 5.812 8.625 5.688 9.100 V1 64 E1 390 57 71 49 62 68 65 67 73 420 892 188 414 651 430 675 985 Path Diam 3.337 2.697 2.282 9 5 5 4.468 12 2.922 2.544 3.157 2.463 2.243 7 5 9 5 5 0.184 0.297 0.360 0.199 0.352 0.356 0.213 0.352 0.384 Table 2: Basic graph characteristics for all layers in the multiplex graph that represents the social interrelations between the students from Group 2 TotDegree Assor 1013 12.662 ties E1 for the largest SCCs for each of these graphs are also presented in the tables, including the average path length and the diameter. Since the number of participants in the two groups (153 versus 80) is differ- ent, it is significant to confirm that the same conclusions (especially concerning the ratios) hold for both groups. Namely, the number of strong ties is smaller than the number of weak ties: 689 versus 1016 (40% strong ties and 60% weak ties) for the first group and 430 versus 685 (41% strong ties and 59% weak ties) for the second group. However, if we take a closer look at the strong ties graphs, one can notice that there are more strong offline ties than strong online ties. This leads us to the conclusion that the students have closer friendship relations in the offline real rather than the online virtual environment. The number of ON ties is smaller than the number of OFF ties: 1192 versus 1402 (46% ON ties and 54% OFF ties) for Group 1 and 651 versus 892 (42% ON ties and 58% OFF ties) for Group 2. Moreover, the number of strong OFF ties is almost the same as the number of weak OFF ties for both groups: 630 and 693 (48% and 52%) for the first group and 390 and 420 (48% and 52%) for the second group. This suggests that weak communications are (almost) equally presented 15 in the online and real life communication. However, the number of strong ON ties is almost half the number of weak ON ties: 319 and 742 (30% and 70%) for the first group and 188 and 414 (31% and 69%) for the second group. This could be interpreted as the fact that students within one group interact with all colleagues no matter whether they consider them close or distant which could be due to the necessities of working together on different projects, homework or labs for example. However, looking at the number of online strong and online weak ties, we can infer that the students use the virtual world to spread weak and more common friendships most probably aiming to expand their circle of acquaintances. Comparing the average total degrees between basic graphs and aggregated graphs in the multiplex network it is fairly straightforward to conclude that both groups exhibit similar patterns for the average degrees: strong OFF and weak OFF graphs have average degrees 4.4 and 4.9 for the first group and 5.1 and 6.5 for the second group, respectively. Strong ON and weak ON graphs have average degrees 2.8 and 5.1 for the first group and 2.8 and 5.8 for the second group, respectively. At the aggregated level, the average degrees for strong and weak graphs are 4.8 and 6.8 for the first group and 5.7 and 9.1 for the second group, while for the OFF and ON graphs these numbers are 9.3 and 7.8 for the first group and 11.6 and 8.6 for the second group. Note that the average degrees for all graphs in the multiplex network of the second group are greater than the average degrees for the corresponding graphs of the first group. One possible explanation is that the students which are part of smaller group are more friendly and associative between them. This is especially the case in this scenario since the the students belonging to Group 2 have a more diverse background (i.e. type of study program, year of study and alike) compared to Group 1. However, we do not have more data to confirm (or disconfirm) this conclusion (hypothesis). Tables 3 and 4 provide summaries of the basic metrics: average values for the reciprocities, three cycles, and triplets for all (single) graphs in the mul- tiplex networks that represent group 1 and 2, respectively. All weak graphs 16 (weak OFF, weak ON, and weak) have smaller values for reciprocity, three cycles, and triplets for both groups indicating that weak ties are less socially significant. Both transitive triplets and three-cycles represent closed structures, however, triplets indicate hierarchical ordering in contrast to three-cycles which are against of such ordering. For all graphs studied here, the average values of transitive triplets is slightly larger than the average values of three-cycles showing that the elements of hierarchical ordering are present in these social networks. Also, the results given in both tables 3 and 4 indicate that there is a correlation between dyads (reciprocity) and triads (transitive triplet and three- cycle) such that larger (smaller) values of the former imply larger (smaller) values of the latter. Table 3: Basic endogenous characteristics for all layers in the multiplex network that represents social interactions in Group 1 Group 1 Average ri Average tci Average tpi strong OFF 0.445 weak OFF OFF strong ON weak ON ON strong weak all 0.154 0.467 0.465 0.204 0.442 0.482 0.278 0.492 0.153 0.029 0.147 0.141 0.045 0.133 0.159 0.061 0.155 0.168 0.039 0.190 0.136 0.049 0.173 0.177 0.074 0.200 Tables 5 and 6 show the average values of 5 different additional characteris- tics that are focusing on the interrelationship of different parts of the multiplex graph. Here, in addition to reciprocity, three-cycle, and triplet, we also have the two overlapping indexes, all as they are defined in the subsection Multiplex graph characteristics. The given results indicate that reciprocity is preserved across different layers of the multiplex network; in particular the ties in strong 17 Table 4: Basic endogenous characteristics for all layers in the multiplex network that represents social interactions in Group 2 Group 2 Average ri Average tci Average tpi strong OFF 0.425 weak OFF OFF strong ON weak ON ON strong weak all 0.074 0.335 0.448 0.099 0.342 0.509 0.148 0.360 0.156 0.041 0.139 0.146 0.049 0.115 0.150 0.081 0.153 0.161 0.049 0.200 0.149 0.064 0.172 0.171 0.102 0.216 OFF are reciprocal with ties in strong ON and vice versa (the normalized average values are ri(GOF F s , GON s ) = 0.417 and ri(GON s , GOF F s ) = 0.406, respectively. Similar values are also obtained for the pairs (OFF, ON) and (ON, OFF). How- ever, for the considered social multiplex network, the triads (measured with normalized three cycles and triplets) are not significant. On the other hand, the values for the overlapping indexes show that activity and popularity patterns among some layers of the multiplex network are significant. For instance, the number of out-degree and in-degree friends in the strong OFF layer coincides with the out-degree and in-degree friends in the strong ON layer. Or, out-degree and in-degree friends in the weak OFF layer are also out-degree and in-degree friends in the weak ON layer. On the other hand, the overlapping indexes for both out-degree (activity) and in-degree (popularity) are small for the following combinations of two graphs (strong ON, weak ON) and (strong OFF, weak, OFF) for both Groups 1 and 2. In social science structural equivalence is defined as "two nodes are consid- ered structurally equivalent if they share many of the same network neighbors." A possible operationalization of this definition could be done as follows: two 18 Table 5: Multiplex-graph characteristics for different pairs of layers reflecting the combined types of ties for Group 1 Group 1 Reciprocity tc2 tp2 oi1 oi2 strong OFF, strong ON 0.417 0.136 0.148 0.568 0.524 weak OFF, weak ON 0.160 0.032 0.037 0.427 0.512 strong OFF, weak OFF 0.091 0.061 0.065 0.025 0.005 strong ON, weak ON strong, weak OFF, ON 0.081 0.175 0.434 0.052 0.059 0.028 0.006 0.093 0.102 0.195 0.180 0.141 0.182 0.735 0.775 strong ON, strong OFF 0.406 0.145 0.136 0.568 0.524 weak ON, weak OFF 0.165 0.038 0.042 0.427 0.512 weak OFF, strong OFF 0.116 0.040 0.061 0.025 0.005 weak ON, strong ON weak, strong ON, OFF 0.098 0.207 0.433 0.046 0.064 0.028 0.006 0.075 0.098 0.195 0.180 0.139 0.179 0.735 0.775 nodes i and j are structurally equivalent if ri = rj, tci = tcj and tpi = tpj. We found that in each network some of the actors are structurally equivalent. For example in the strong ON graph for Group 1, the actors with id 2, 24, and 127 are structurally equivalent having ri = 1, tci = 0.55, and tpi = 0.532. These actors have out-degree and in-degree dout i = 4, respectively. Ta- ble 7 shows characteristics for those actors in the strong OFF graph that have i = 4 and din dout i = 4 and din i = 4. Again some of those actors are structurally equivalent (2 and 127). These initial results are very promising and open up a way to formally mathematically define the concept of structural equivalence. However, further deeper study on this matter must be carefully conducted in order to confirm the viability of our proposed method. For instance, if we relax the condition to approximately equal then nodes 80 and 83 from Table 7 will also be considered equivalent. Finally, we have also tested and confirmed the hypothesis of Granovetter. 19 Table 6: Multiplex-graph characteristics for different pairs of layers reflecting the combined types of ties for Group 2 Group 2 Reciprocity tc2 tp2 oi1 oi2 strong OFF, strong ON 0.411 0.127 0.138 0.517 0.470 weak OFF, weak ON 0.072 0.038 0.057 0.400 0.401 strong OFF, weak OFF 0.071 0.054 0.056 0.093 0.003 strong ON, weak ON strong, weak OFF, ON 0.062 0.132 0.334 0.042 0.047 0.102 0.001 0.086 0.095 0.269 0.141 0.117 0.181 0.708 0.604 strong ON, strong OFF 0.362 0.130 0.138 0.517 0.470 weak ON, weak OFF 0.067 0.040 0.047 0.400 0.401 weak OFF, strong OFF 0.110 0.041 0.070 0.093 0.003 weak ON, strong ON weak, strong ON, OFF 0.135 0.209 0.306 0.039 0.065 0.102 0.001 0.073 0.103 0.269 0.141 0.118 0.180 0.708 0.604 Consider two arbitrary selected individuals A and B and the set of all persons with ties to either or both of them. The hypothesis is: the stronger the tie between A and B, the larger the proportion of individuals in S to whom they will be both tied (connected by a weak or strong tie). For Group 1, there are a total of 5526 strong wedges out of which: 39.052 % are closed by another strong link, 33.406 % are closed by a weak link and 72.457 % are closed by any link. Also, there are a total of 29860 weak wedges out of which: 8.279 % are closed by a strong link, 9.752 % are closed by another weak link and 18.031 % are closed by any link. For Group 2, there are a total of 4811 strong wedges out of which: 39.243 % are closed by another strong link, 45.022 % are closed by a weak link and 84.265 % are closed by any link. Also, there are a total of 25424 weak wedges out of which: 14.301 % are closed by a strong link, 23.450 % are closed by another weak link and 37.752 % are closed by any link. 20 Table 7: Structural equivalence. Graph characteristics of the nodes in Group 1 with dout i = 4 and din strong OFF ri i = 4 tci tpi i = 2 i = 40 i = 80 i = 83 i = 94 i = 122 i = 127 i = 148 1 0.424 0.442 0.333 0.042 0.094 0.6 0.6 0.6 1 1 0.343 0.353 0.356 0.287 0.053 0.056 0.376 0.366 0.424 0.442 0.143 0.083 0.191 4. Conclusions By studying friendship relations among students enrolled on two different courses represented using a multiplex structure, a number of interesting con- clusions regarding the strength of online and offline ties can be drawn: (1) strong ties are preferred in face-to-face (offline) communications; (2) weak ties are equally presented in online and offline communications; (3) in offline com- munication, strong and weak ties are (almost) equally included; (4) in online communication weak ties are dominant; (5) weak ties (in three layers of the multiplex network: weak offline, weak online, and weak) are much less recip- rocal than strong ties; (6) dyads (that is, reciprocities) are preserved, however triads (measured with normalized three cycles and triplets) are not significant in different layers of a multiplex network; (7) activity and popularity patterns for some layers of the multiplex network are significant: out-degree and in-degree friends in one layer could also be out-degree and in-degree friends in another layer. These conclusions are supported by the data obtained from both groups. The number and consistency of the drawn conclusions have confirmed that by approaching the problem of different interrelationships between actors as a mul- tiplex network problem, one can gain useful insight on the importance of each 21 type of link within the social network as a whole, as well as on the interaction and overlapping between different link types, especially in the offline/online (real/virtual) environments as was our case of study. In the future, we plan to study how exogenous characteristics influence the structure of the multiplex network and how the network structure dominates the actors (students) characteristics and their temporal evolution. In particular, we will address questions on: how student grades are distributed; students' commitment and progress to the studies; how one could empower the students to obtain better grades or determine their specific areas of interest with greater success. Are the students with better grades and habits more central to the network or not, and how changing the placement of these individuals could influence the structure of the network? References [1] Simmel, G. (1908), "Soziologie, Untersuchungen uber die formen der vergesellschaftung" In K.H.Wolff (1950) (Ed., trans.), "The sociology of Georg Simmel", New York: Free Press (pp.87-408) [2] Granovetter M, "The strength of weak ties", American Journal of Sociol- ogy (1973), 81, 1287-1303 [3] Watts D. and Strogatz S., "Collective dynamics of small-world networks," Nature 393, 440 (1998). [4] Boorman, S.A., & White, H.C., "Social structure from multiple networks: II Role structures", American Journal of Sociology (1976), 81, 1384-1446 [5] White, H.C., Boorman, S.A., & Breiger, R.L., "Social structure from mul- tiple networks: I. Blockmodels of roles and positions" American Journal of Sociology (1976), 87, 517-547 [6] Gould, R.V., "Multiple Networks and Mobilization in the Paris Com- mune", American Sociological Review (1991), 56, 716-729 22 [7] Padgett, J.F., Ansell, C.K. "Robust Action and the Rise of the Medici", American Journal of Sociology (1993), 98, 1259-1319 [8] Granovetter, M. "Economic Action and Social Structure: The Problem of Embeddedness", American Journal of Sociology (1985), 91, 481-510 [9] Baldassarri, D., Diani, M., "The Integrative Power of Civic Networks", American Journal of Sociology (2007), 113, 735-780 [10] Grossman, M., Dominguez, C.B.K. "Party Coalitions and Interest Group Networks", American Politics Research (2009), 37, 767-800 [11] Maggioni MA, Breschi S, Panzarasa P, "Multiplexity, growth mechanisms and structural variety in scientific collaboration networks", Industry and Innovation (2013), 20(3): 185-194 [12] Rank ON, Robins GL, Pattison PE, "Structural logic of intraorganiza- tional networks", Organization Science (2010) 21(3): 745-764 [13] Ferriani S, Fonti F, Corrado R, "The social and economic bases of net- work multiplexity: Exploring the emergence of multiplex ties", Strategic Organization (2012), 11(1): 7-34 [14] Shipilov AV, Li SX, "The Missing link: The effect of customers on the formation of relationships among producers in the multiplex triads", Or- ganization Science (2012), 23(2): 472-91 [15] Szell M, Lambiotte R, Thurner S, "Multirelational organization of large- scale social networks in an online world", PNAS (2010), 107:13636-13641 [16] Mucha PJ, Richardson T, Macon K, Porter MA, Onnela JP, "Community structure in time dependent, multiscale, and multiplex networks", Science (2010), 328: 876-878 [17] Nicosia V, Bianconi G, Latora V, Barthelemy M, "Growing multiplex networks", Phys. Rev. (2013), Lett. 111: 058701. 23 [18] Kim JY, Goh KI, "Coevolution and correlated multiplexity in multiplex networks", Phys. Rev. (2011), Lett. 111: 058702 [19] Gomez-Gardenes J, Reinares I, Arenas A, Floria LM, "Evolution of coop- eration in multiplex networks", Sci (2012), Rep. 2: 620. [20] Sola L, Romance M, Criado R, Flores J, Garcia del Amo A, Boccaletti S, "Eigenvector centrality of nodes in multiplex networks", arXiv (2013), 1305.7445 24
1604.03235
1
1604
2016-04-12T03:43:33
Growing Wikipedia Across Languages via Recommendation
[ "cs.SI", "cs.DL" ]
The different Wikipedia language editions vary dramatically in how comprehensive they are. As a result, most language editions contain only a small fraction of the sum of information that exists across all Wikipedias. In this paper, we present an approach to filling gaps in article coverage across different Wikipedia editions. Our main contribution is an end-to-end system for recommending articles for creation that exist in one language but are missing in another. The system involves identifying missing articles, ranking the missing articles according to their importance, and recommending important missing articles to editors based on their interests. We empirically validate our models in a controlled experiment involving 12,000 French Wikipedia editors. We find that personalizing recommendations increases editor engagement by a factor of two. Moreover, recommending articles increases their chance of being created by a factor of 3.2. Finally, articles created as a result of our recommendations are of comparable quality to organically created articles. Overall, our system leads to more engaged editors and faster growth of Wikipedia with no effect on its quality.
cs.SI
cs
Growing Wikipedia Across Languages via Recommendation Ellery Wulczyn Wikimedia Foundation [email protected] Robert West Stanford University [email protected] Leila Zia Wikimedia Foundation [email protected] Jure Leskovec Stanford University [email protected] 6 1 0 2 r p A 2 1 ] I S . s c [ 1 v 5 3 2 3 0 . 4 0 6 1 : v i X r a ABSTRACT The different Wikipedia language editions vary dramatically in how comprehensive they are. As a result, most language editions con- tain only a small fraction of the sum of information that exists across all Wikipedias. In this paper, we present an approach to filling gaps in article coverage across different Wikipedia editions. Our main contribution is an end-to-end system for recommending articles for creation that exist in one language but are missing in an- other. The system involves identifying missing articles, ranking the missing articles according to their importance, and recommending important missing articles to editors based on their interests. We empirically validate our models in a controlled experiment involv- ing 12,000 French Wikipedia editors. We find that personalizing recommendations increases editor engagement by a factor of two. Moreover, recommending articles increases their chance of being created by a factor of 3.2. Finally, articles created as a result of our recommendations are of comparable quality to organically created articles. Overall, our system leads to more engaged editors and faster growth of Wikipedia with no effect on its quality. 1. INTRODUCTION General encyclopedias are collections of information from all branches of knowledge. Wikipedia is the most prominent online encyclopedia, providing content via free access. Although the web- site is available in 291 languages, the amount of content in different languages differs significantly. While a dozen languages have more than one million articles, more than 80% of Wikipedia language editions have fewer than one hundred thousand articles [24]. It is fair to say that one of the most important challenges for Wikipedia is increasing the coverage of content across different languages. Overcoming this challenge is no simple task for Wikipedia vol- unteers. For many editors, it is difficult to find important miss- ing articles, especially if they are newly registered and do not have years of experience with creating Wikipedia content. Wikipedians have made efforts to take stock of missing articles via collections of "redlinks"1 or tools such as "Not in the other language" [15]. Both technologies help editors find missing articles, but leave ed- itors with long, unranked lists of articles to choose from. Since editing Wikipedia is unpaid volunteer work, it should be easier for 1 Redlinks are hyperlinks that link from an existing article to a non- existing article that should be created. Copyright is held by the International World Wide Web Conference Com- mittee (IW3C2). IW3C2 reserves the right to provide a hyperlink to the author's site if the Material is used in electronic media. WWW 2016, April 11–15, 2016, Montréal, Québec, Canada. ACM 978-1-4503-4143-1/16/04. http://dx.doi.org/10.1145/2872427.2883077. editors to find articles missing in their language that they would like to contribute to. One approach to helping editors in this pro- cess is to generate personalized recommendations for the creation of important missing articles in their areas of interest. Although Wikipedia volunteers have sought to increase the con- tent coverage in different languages, research on identifying miss- ing content and recommending such content to editors based on their interests is scarce. Wikipedia's SuggestBot [6] is the only end-to-end system designed for task recommendations. However, SuggestBot focuses on recommending existing articles that require improvement and does not consider the problem of recommending articles that do not yet exist. Here we introduce an empirically tested end-to-end system to bridge gaps in coverage across Wikipedia language editions. Our system has several steps: First, we harness the Wikipedia knowl- edge graph to identify articles that exist in a source language but not in a target language. We then rank these missing articles by impor- tance. We do so by accurately predicting the potential future page view count of the missing articles. Finally, we recommend missing articles to editors in the target language based on their interests. In particular, we find an optimal matching between editors and miss- ing articles, ensuring that each article is recommended only once, that editors receive multiple recommendations to choose from, and that articles are recommended to the the most interested editors. We validated our system by conducting a randomized experi- ment, in which we sent article creation recommendations to 12,000 French Wikipedia editors. We find that our method of personaliz- ing recommendations doubles the rate of editor engagement. More important, our recommendation system increased the baseline ar- ticle creation rate by a factor of 3.2. Also, articles created via our recommendations are of comparable quality to organically created articles. We conclude that our system can lead to more engaged editors and faster growth of Wikipedia with no effect on its quality. In Sec. 2 we present the system for identifying, ranking, and recommending miss- ing articles to Wikipedia editors. In Sec. 3 we describe how we evaluate each of the three system components. In Sec. 4 we discuss the details of the large scale email experiment in French Wikipedia. We discuss some of the opportunities and challenges of this work and some future directions in Sec. 5 and share some concluding remarks in Sec. 6. The rest of this paper is organized as follows. 2. SYSTEM FOR RECOMMENDING MISS- ING ARTICLES We assume we are given a language pair consisting of a source language S and a target language T . Our goal is to support the creation of important articles missing in T but existing in S. Figure 1: System overview. Sec. 2.1, 2.2, 2.3 describe the com- ponents in detail; we evaluate them in Sec. 3.1, 3.2, 3.3. Figure 2: Language-independent Wikidata concepts (oval) linking to language-specific Wikipedia articles (rectangular). Clusters are merged via redirects and inter-language links hand-coded by Wikipedia editors. Our system for addressing this task consists of three distinct stages (Fig. 1). First, we find articles missing from the target lan- guage but existing in the source language. Second, we rank the set of articles missing in the target language by importance, by build- ing a machine-learned model that predicts the number of views an article would receive in the target language if it existed. Third, we match missing articles to well-suited editors to create those articles, based on similarities between the content of the missing articles and of the articles previously edited by the editors. The steps are explained in more details in the following sections. 2.1 Finding missing articles For any pair of languages (S,T ), we want to find the set of arti- cles in the source language S that have no corresponding article in the target language T . We solve this task by leveraging the Wiki- data knowledge base [20], which defines a mapping between lan- guage-independent concepts and language-specific Wikipedia arti- cles. For example, the abstract concept Q133212 in Wikidata maps to 62 language-specific Wikipedia articles about tumors (such as the TUMOR article in German Wikipedia, TUMEUR in French Wiki- pedia or NOVOTVORINA in Croatian Wikipedia). We refer to these language-independent concepts as Wikidata concepts. This mapping induces a clustering of the Wikipedia articles from all languages, such that each cluster contains all articles about the same concept in the different languages. Therefore, a simple ap- proach to finding articles that are present in S but missing in T would be to consider those concepts whose cluster contains an arti- cle in S but none in T . We could, for example, assume that Estonian Wikipedia has no coverage of the TUMOR concept because the cor- responding Wikidata concept Q133212 has no link to the Estonian language. A complicating factor is that distinct Wikidata concepts may cor- respond to nearly identical real-world concepts, but every Wikidata concept can link to only one article per language. For example, there are separate Wikidata concepts for NEOPLASM and TUMOR. The English and German Wikipedias have decided that these con- cepts are similar enough that each only covers one of them: German covers TUMOR, while English covers NEOPLASM, so the simple ap- proach described above would consider the NEOPLASM article to be missing in German-something we want to avoid, since the topic is already covered in the TUMOR article. In order to solve this problem, we need a way to partition the set of Wikidata concepts into groups of near-synonyms. Once we have such a partitioning, we may define a concept c to be missing in language T if c's group contains no article in T . In order to group Wikidata concepts that are semantically nearly identical, we leverage two signals. First, we extract inter-language links which Wikipedia editors use to override the mapping speci- fied by Wikidata and to directly link articles across languages (e.g., in Fig. 2, English NEOPLASM is linked via an inter-language link to German NEOPLASMA). We only consider inter-language links added between S and T since using links from all languages has been shown to lead to large clusters of non-synonymous concepts [3]. Second, we extract intra-language redirects. Editors have the ability to create redirects pointing to other articles in the same language (e.g., as shown in Fig. 2, German Wikipedia contains a redirect from NEOPLASMA to TUMOR). We use these two addi- tional types of links-inter-language links and redirects-to merge the original concept clusters defined by Wikidata, as illustrated by Fig. 2, where articles in the red and blue cluster are merged under the same concept by virtue of these links. In a nutshell, we find missing articles by inspecting a graph whose nodes are language-independent Wikidata concepts and lan- guage-specific articles, and whose edges are Wikidata's concept- to-article links together with the two additional kinds of link just described. Given this graph, we define that a concept c is miss- ing in language T if c's weakly connected component contains no article in T . 2.2 Ranking missing articles Not all missing articles should be created in all languages: some may not be of encyclopedic value in the cultural context of the target language. In the most extreme case, such articles might be deleted shortly after being created. We do not want to encourage the creation of such articles, but instead want to focus on articles that would fill an important knowledge gap. A first idea would be to use the curated list of 10,000 articles ev- ery Wikipedia should have [23]. This list provides a set of articles that are guaranteed to fill an important knowledge gap in any Wi- kipedia in which they are missing. However, it is not the case that, conversely, all Wikipedias would be complete if they contained all of these articles. For instance, an article on PICADA, an essential aspect of Catalan cuisine, may be crucial for the Catalan and Span- ish Wikipedias, but not for Hindi Wikipedia. Hence, instead of trying to develop a more exhaustive global ranking and prioritizing the creation of missing content according to this global ranking, we build a separate ranking for each language pair. Ranking criterion. We intend to rank missing articles according to the following criterion: How much would the article be read if it were to be created in the given target language? Since this quantity is unknown, we need to predict it from data that is already known, such as the popularity of the article in languages in which it already exists, or the topics of the article in the source language (all features are listed below). In particular, we build a regression model for predicting the nor- malized rank (with respect to page view counts) of the article in question among all articles in the target language. The normalized rank of concept c in language T is defined as yT (c) := rankT (c) T , (1) Sec. 2.1 & 3.1FindmissingarticlesRankarticles byimportanceMatcheditors andarticlesSec. 2.2 & 3.2Sec. 2.3 & 3.3Q1216998de:Tumoren:Neoplasmde:Neoplasmafr:Néoplasiefr:Tumeurzh:肿瘤et:KasvajaWikipediaRedirectWikidataQ133212 where rankT (c) is the (unnormalized) rank of T 's article about con- cept c when all articles in language T are sorted in increasing or- der of page view counts. We considered page views received by each article in our dataset over the period of six months prior to the data collection point. Page view data was obtained via the raw HTTP request logs collected by the Wikimedia Foundation. Re- quests from clients whose user-agent string reveals them as bots were excluded [14]. For a given source–target pair (S,T ), the model is trained on con- cepts that exist in both languages, and applied on concepts that exist in S but not in T . We experiment with several regression techniques (Sec. 3.2), finding that random forests [5] perform best. Features. Finally, we describe the features used in the regression model for source language S and target language T . Here, cL is the article about concept c in language L. Information about cT is not available at test time, so it is also excluded during training. Wikidata count: The more Wikipedias cover c, the more impor- tant it is likely to be in T . Hence we include the number of Wiki- pedias having an article about c. Page views: If c is popular in other languages it is also likely to be popular in T . Thus these features specify the number of page views the articles corresponding to c have received over the last six months in the top 50 language versions of Wikipedia. Since some languages might be better predictors for T than others, we include page view counts for each of the 50 languages as a separate feature. (If the article does not exist in a language, the respective count is set to zero.) In addition to the raw number of page views, we also include the logarithm as well as the normalized page view rank (Eq. 1). Geo page views: If cS is popular in certain countries (presum- ably those where T is spoken), we expect cT to be popular as well. Hence these features specify the number of page views cS has re- ceived from each country. Source-article length: If cS contains substantial content we ex- pect c to be important in T . Hence we consider the length of cS (measured in terms of bytes in wiki markup). Quality and importance classes: If cS is considered of high qual- ity or importance, we expect c to be an important subject in general. To capture this, we use two signals. First, several Wikipedias clas- sify articles in terms of quality as 'stub', 'good article', or 'featured article' based on editor review [25]. Second, members of WikiProj- ects, groups of contributors who want to work together as a team to improve a specific topic area of Wikipedia, assign importance classes to articles to indicate how important the article is to their topical area [22]. We compute the maximum importance class that cS has been given by any WikiProject. Quality and importance class labels are coded as indicator variables. Edit activity: The more editors have worked on cS, the more important we expect c to be for T as well. Hence we consider the number of editors who have contributed to cS since it was created, as well as the number of months since the first and last times cS was edited. Links: If cS is connected to many articles that also exist in T then the topical area of c is relevant to T . Therefore this feature counts the numbers of inlinks (outlinks) that cS has from (to) articles that exist in T . We also include the total indegree and outdegree of cS. Topics: Some topics are more relevant to a given language than others. To be able to model this fact, we build a topic model over all articles in S via Latent Dirichlet Allocation (LDA) [4] and include the topic vector of cS as a feature. We use the LDA implementation included in the gensim library [18], set the number of topics to 400, and normalize all topic vectors to unit length. Figure 3: Embedding of an editor's edit history into the topic vector space. 2.3 Matching editors to articles Our high-level objective is to encourage editors to create im- portant articles. We have already described how to find important missing articles (Sec. 2.1, 2.2). What is needed next is to find the best editors to create those articles. We hypothesize that editors are more likely to create articles that fall into their area of interest, and therefore we need a way of capturing how interested an editor is in creating a given article (Sec. 2.3.1). Finally, in order to make the most effective recommendations, we need a way to combine the in- herent importance of an article with an editor's interest in creating that article (Sec. 2.3.2), and to match editors with articles based on the resulting scores (Sec. 2.3.3). 2.3.1 Editor interest modeling For an editor e and concept c we want to score how closely c matches the topics of interest to e. Later we will use these interest scores to match editors with missing articles. We quantify e's interest in creating an article about c via the sim- ilarity of c to the articles e has previously edited (i.e., e's edit his- tory). This idea is illustrated schematically in Fig. 3, where the black crosses represent the articles e has edited, summarized in a single point by the orange cross. Gray dots stand for missing ar- ticles that could potentially be recommended to e. The closer two points, the more similar the concepts they represent, and the closer a missing article (gray cross) is to e's summarized edit history (or- ange cross), the better a recommendation it is. Operationalizing this idea poses the challenges of (1) representing articles in a vec- tor space and (2) aggregating an entire edit history into a single point in that vector space. Vector-space representation of concepts. First, to embed con- cepts in vector space, we represent the concept c by the LDA topic vector of cS (cf. Sec. 2.2). We can include contributions e made in languages other than S if the edited articles have a corresponding article in S. In this case, we use the topic vector of cS to represent the edited article. The distance between two concepts is measured as the Euclidean2 distance between their normalized topic vectors. Aggregating edit histories into interest vectors. Second, to sum- marize edit histories as interest vectors, we proceed as follows. For each revision made by e, we compute the number of bytes that were added to the article. We then compute the total number of bytes e has added to an article over the course of all the revisions to that article. Revisions that remove bytes are not included. This way, each concept appears at most once in each edit history. We con- sider three different methods of summarizing an edit history into a single vector in the LDA topic space, which we refer to as the editor's interest vector (all interest vectors are normalized to unit length): 2Since vectors are normalized, cosine distance and Euclidean dis- tance are equivalent for our purposes. topic vectors for articlesin e's edit historyinterest vector for editor etopic vectors forarticles in S that are missing in TVW GolfFront Wheel DriveVW Golf VIIBMW B38Engine EfficiencyMotor Sailor 1. Average. The interest vector for editor e is computed as the mean of the topic vectors of all articles in e's edit history. 2. Weighted average. As above, with the difference that each concept c is weighted by the logarithm of the number of bytes e has added to c. 3. Weighted medoid. The interest vector is defined as the topic vector of the article from e's edit history that minimizes the weighted sum of distances between it and all other topic vec- tors from the edit history. Weights are computed as above. History size. When computing an interest vector, we may not want to include all articles from the edit history. For instance, some ed- itors have worked on thousands of articles, which leads to unnec- essarily long interest vector computation times and very dense in- terest vectors when using averaging. An editor's interests may also evolve over time, so including articles edited a long time ago adds noise to the signal of what topics the editor is interested in now. For these reasons, we introduce history size as a tunable parameter, specifying the number of most recently edited articles considered for computing interest vectors. 2.3.2 We aim to recommend a missing article cT to an editor e if (1) concept c is important in the target language T and (2) it is relevant to e's interests. Above, we have proposed methods for quantifying these two aspects, but in order to make effective rec- ommendations, we need to somehow integrate them. Integrating importance and interest A simple way of doing so is to first rank all articles missing from language T by importance (Sec. 2.1), then discard all but the K most important ones (where K is a parameter), and finally score the relevance of each remaining concept c for editor e by computing the distance of c's topic vector and e's interest vector (Sec. 2.3.1). A slightly more complex approach would be to keep all missing articles on the table and compute a combined score that integrates the two separate scores for article importance and editor–article in- terest, e.g., in a weighted sum or product. Both approaches have one parameter: the number K of most im- portant articles, or the weight for trading off article importance and editor–article interest. Since we found it more straightforward to manually choose the first kind of parameter, we focus on the se- quential strategy described first. 2.3.3 Matching When several editors simultaneously work on the same article, the danger of edit conflicts arises. In order to prevent this from happening, we need to ensure that, at any given time, each article is recommended to only a single editor. Further, to avoid over- whelming editors with work, we can make only a limited number of recommendations per editor. Finally, we want the articles that we recommend to be as relevant to the editor as possible. Formally, these goals are simultaneously met by finding a matching between editors and articles that maximizes the average interest score be- tween editors and assigned articles, under the constraints that each article is assigned to a unique editor and each editor is assigned a small number k of unique articles. We formulate this matching problem as a linear program [7] and solve it using standard optimization software. In practice, we find that a simple greedy heuristic algorithm gives results that are as good as the optimal solutions obtained from the matching algorithm. The heuristic algorithm iterates k times over the set of editors for whom we are generating recommendations and assigns them the article in which they are interested most and which has not yet been assigned. Rank Lenient precision 0.85 [0.64, 0.95] 0.90 [0.70, 0.97] 0.95 [0.76, 0.99] 1.00 [0.84, 1.00] 1.00 [0.84, 1.00] 1 101 1,001 10,001 100,001 Strict precision 0.55 [0.34, 0.74] 0.55 [0.34, 0.74] 0.90 [0.70, 0.97] 0.95 [0.76, 0.99] 0.95 [0.76, 0.99] Table 1: Empirical values with 95% credible intervals for pre- cision of missing-article detector (Sec. 2.1). Rows are predicted importance levels of missing articles; for definition (also of two kinds of precision), cf. Sec. 3.1. 3. OFFLINE EVALUATION Before evaluating our system based on deploying the complete pipeline in a live experiment (Sec. 4), we evaluate each component offline, using English as the source language S, and French as the target language T . 3.1 Finding missing articles Here we assess the quality of the procedure for detecting miss- ing articles (Sec. 2.1). We do not assess recall since that requires a ground-truth set of missing articles, which we do not have. Fur- thermore, using English as a source and French as the target, our procedure produces 3.7M missing articles. Given this large num- ber of articles predicted to be missing, we are more concerned with precision than with recall. Precision, on the other hand, is straight- forward to evaluate by manually checking a sample of articles pre- dicted to be missing for whether they are actually missing. Our first approach to evaluating precision was to sample 100 articles uniformly at random from among the 300K most impor- tant ones (according to our classifier from Sec. 2.2). This gives 99% precision: only one of 100 actually exists. The English EC- TOSYMBIOSIS was labeled as missing in French, although French ECTOSYMBIOSE exists-it just has not been linked to Wikidata yet. Since precision might not be as high for the most important miss- ing articles, we ran a second evaluation. Instead of taking sample test cases at random, we took a sample stratified by predicted im- portance of the missing article. We manually checked 100 cases in total, corresponding to ranks 1–20, 101–120, 1,001–1,020, 10,001– 10,020, and 100,001–100,020 in the ranking produced by our im- portance model (Sec. 2.2). In addition to the unambiguous errors arising from missing Wi- kidata and inter-language links, we observed two types of cases that are more difficult to evaluate. First, one language might spread content over several articles, while the other gathers it in one. As an example, French covers the Roman hero HERCULE in the arti- cle about the Greek version HÉRACLÈS, while English has separate articles for HERCULES and HERACLES. As a consequence, the En- glish article HERCULES is labeled as missing in French. Whether HERCULE deserves his own article in French, too, cannot be an- swered definitively. Second, a concept might currently be covered not in a separate article but as a section in another article. Again, whether the concept deserves a more elaborate discussion in an ar- ticle of its own, is a subjective decision that has to be made by the human editor. Since it is hard to label such borderline cases un- equivocally, we compute two types of precisions. If we label these cases as errors, we obtain strict precision; otherwise we obtain le- nient precision. Precision results are summarized in Table 1. While we overall achieve good performance (lenient precision is at least 85% across importance levels), the results confirm our expectation that detect- ing missing articles is harder for more prominent concepts (strict Model RMSE Spearman correlation Mean baseline Source-language baseline Random forests 0.287 0.276 0.130 N/A 0.673 0.898 Table 2: Importance ranking test results (Sec. 3.2). Figure 5: Empirical page view ranks for newly created articles as a function of predicted ranks (for target language French). Results. As seen in Table 2, the simple mean baseline yields an RMSE of 0.287. The source-language baseline improves on this only slightly, with an RMSE of 0.276. Fig. 4 plots the prediction of this baseline against the ground-truth value (i.e., it shows a scat- ter plot of the normalized ranks in English and French). We see that, while there is significant correlation, the source-language rank tends to overestimate the target-language rank. Table 2 compares the performance of the baselines with the tuned random forest regression model. The latter performs better by a large margin in terms of both RMSE (0.130 vs. 0.276) and Spear- man correlation (0.898 vs. 0.673). We conclude that leveraging additional features in a machine-learned model lets us overcome the aforementioned overestimation bias inherent in the source-lan- guage baseline. To validate that highly ranked missing articles indeed attract more page views after being created, we performed a time-based evalua- tion by tracking readership for the set of 5.7K English articles that were missing in French Wikipedia as of June 25, 2015, but were created by July 25, 2015. Rank predictions are made based on features of the English articles before June 25, and empirical page view ranks are computed based on traffic from July 25 through Au- gust 25. Fig. 5 shows that the predicted ranks of these new articles correlate very well with their empirical ranks. The RMSE between the predicted rank and the empirical rank is 0.173, which is higher than the offline validation step suggests (0.130; Table 2). This is to be expected, since empirical ranks were computed using page view counts over a single month directly after the article is created, whereas the model was trained on ranks com- puted using page view counts over six months for articles that may have existed for many years. Articles predicted to have a low rank that get created tend to have a higher empirical rank than predicted. This makes sense if the creation is prompted by news events which drive both the creation and subsequent readership, and which are not anticipated by the model. Figure 4: Scatterplot of page view ranks for articles in English vs. French Wikipedia. precision is only 55% for the two highest importance levels). We conclude that it is important to ask editors to whom we make sug- gestions to double-check whether the article is really missing in the target language. Since the effort of this manual check is small compared to the effort of creating the article, this is a reasonable requirement. 3.2 Ranking missing articles In this section we discuss the performance of our method for ranking missing articles by importance. Recall that here impor- tance is measured in terms of the number of page views received by a page once it is created. We use English as the source, and French as the target language. Evaluation metrics. We use two evaluation metrics, Spearman's rank correlation coefficient and root mean squared error (RMSE). The former is appropriate as we care mostly about the ranking of predictions, rather than the exact predicted values. The latter is useful because it has a natural interpretation: since we predict nor- malized page view ranks (Sec. 2.2), an RMSE of, say, 0.1 means that the average article ranks 10 percentile points higher or lower than predicted. Baselines. The simplest baseline is to always predict the same con- stant value. We use the mean normalized rank over all articles in the target language (i.e., 0.5) as the constant and call this the mean baseline. It is reasonable to assume that the newly created version of an article in the target language will not be too different in terms of page view rank, compared to the version in the source language. Hence our second baseline (termed source-language baseline) is given by the normalized rank of the already existing source version of c (yS(c) in the notation of Eq. 1). Random forests. In order to improve upon these baselines, we experimented with several regression techniques, including linear regression, ridge regression, least-angle regression, and random forests, using implementations in scikit-learn [17]. We found that random forests [5] gave the best performance, so we focus on them. In all experiments, the data is split into a training and a testing set. To tune the hyperparameters of the random forest model (the num- ber of trees in the ensemble, as well as their maximum depth), we perform cross-validation on the training set. Feature set added Page views 1 2 Topics 3 Links 4 Geo page views 5 Qual. & import. classes 6 Edit activity 7 Source-article length RMSE Spearman correlation 0.165 0.133 0.132 0.131 0.130 0.130 0.130 0.827 0.893 0.895 0.895 0.898 0.898 0.898 Table 3: Forward stepwise feature selection results (features explained in Sec. 2.2). Feature importance. Finally, to better understand which feature sets are important in our prediction task, we used forward stepwise feature selection. At each iteration, this method adds the feature set to the set of training features that gives the greatest gain in perfor- mance. Feature selection is done via cross-validation on the train- ing set; the reported performance of all versions of the model is based on the held-out testing set. For an explanation of all features, see Sec. 2.2. The results are listed in Table 3. As expected, the single strongest feature set is given by the page views the missing article gets in Wikipedias where it already exists. Using this feature set gives an RMSE of 0.165, a significant decrease from the 0.276 achieved by the source-language baseline (Table 2). Enhancing the model by adding the LDA topic vector of the source version of the miss- ing article results in another large drop in RMSE, down to 0.133. Thereafter, adding the remaining feature sets affords but insignifi- cant gains. 3.3 Matching editors and articles Here we evaluate our approach to modeling editors' interests and matching editors with missing articles to be created. Recall that we model articles as topic vectors (Sec. 2.3.1), and an editor e's inter- est vector as an aggregate of the topic vectors corresponding to the articles e has edited. To measure the predictive power of these in- terest vectors with regard to the edits e will make next, we hold out e's most recently edited article and use the remaining most recent w articles to compute e's interest vector (where w is the history size parameter, cf. Sec. 2.3.1). Then, all articles of the source language S are ranked by their distance to e's interest vector, and we measure the quality of the prediction as the reciprocal rank of the held-out article in the rank- ing. The quality of a method, then, is the the mean reciprocal rank (MRR) over a test set of editors. Fig. 6 explores how performance depends on the history size w and the edit-history aggregation method (Sec. 2.3.1), for a set of 100,000 English Wikipedia editors who have contributed to at least two articles. We observe that the average and weighted-average methods perform equally well (considerably better than weighted medoids). Their performance increases with w up to w = 16 and then slowly decreases, indicating that it suffices to consider short edit-history suffixes. Under the optimal w = 16 we achieve an MRR of 0.0052. That is, the harmonic mean rank of the next article an editor edits is 1/0.0052 = 192. Keeping in mind that there are 5M articles in English Wikipedia, this is a good result, indicating that editors work within topics as extracted by our LDA topic model. 4. ONLINE EXPERIMENT Figure 6: Mean reciprocal rank of predicting the article a user edits next, based on her previous w edits (logarithmic x-axis), with bootstrapped 95% confidence intervals; one curve per ag- gregation method. tify important missing articles, match them to appropriate editors based on their previous edits, and suggest to these editors by email that they might be interested in creating those articles. We focus on the source/target pair English/French and, to lower the partici- pation threshold, give contacted editors the option to use a content translation tool built by the Wikimedia Foundation [16]. To assess the effectiveness of our system, we then ask the fol- lowing research questions: RQ1 Does recommending articles for creation increase the rate at which they are created compared to the rate at which articles are organically created in Wikipedia? RQ2 Do our targeted recommendations increase editor engage- ment, compared to a scenario where we ask editors to create randomly assigned important missing articles? RQ3 How high is the quality of articles created in response to our targeted recommendations? 4.1 Experimental design In order to measure the outcomes of recommending missing ar- ticles to editors, we need a set of articles as well as a set of edi- tors. The set of articles included in the experiment consists of the top 300K English articles missing in French (Sec. 2.1) in the im- portance ranking (Sec. 2.2). These articles were assigned to three groups A1, A2, and A3 (each of size 100K) by repeatedly taking the top three unassigned articles from the ranking and randomly as- signing each to one of the three groups. This ensures that the arti- cles in all three groups are of the same expected importance. There were 12,040 French editors who made an edit in the last year and displayed proficiency in English (for details, cf. Appendix A.1.). These editors are suitable for receiving recommendations and were randomly assigned to treatment groups E1 and E2. All other French Wikipedia editors were assigned to the control group E3. Within E3, there are 98K editors who made an edit in the last year. Based on these groupings, we define three experimental condi- tions (Fig. 7): The challenge we address in this research is to boost the creation of articles purveying important knowledge. We now put our solu- tion to this challenge to the test in an in vivo experiment. We iden- C1 Personalized recommendation: Editors in group E1 were sent an email recommending five articles from group A1 ob- tained through our interest-matching method (Sec. 2.3). Potentially created Actually created Creation rate C1 30,055 316 C2 30,145 177 1.05% 0.59% C3 100,000 322 0.32% Table 4: Article creation rates for the experimental conditions defined in Sec. 4.1. ference between conditions C1 and C2 is that in C1 articles are as- signed to editors based on our recommendation method, whereas in C2 articles are assigned to editors randomly. Therefore, by compar- ing the article creation rates of conditions C1 and C2, we may ad- dress the potential concern that a boost in article creation rate might be caused by the mere fact that an email recommending something was sent, rather than by the personalized recommendations con- tained in the email. Table 4 shows the article creation rates for all experimental con- ditions. Important articles not recommended to any editor (C3) had a background probability of 0.32% of being organically created within the month after the experiment was launched. This probabil- ity is boosted by a factor of 3.2 (to 1.05%) for articles that were rec- ommended to editors based on our interest-matching method (C1). On the other hand, articles that were recommended to editors on a random, rather than a personalized, basis (C2) experienced a boost of only 1.8 (for a creation rate of 0.59%).3 A possible confound in comparing the creation rates in C1 and C2 to C3 is the possibility that our recommendation emails diverted effort from articles in C3 and that, consequently, the creation rate in C3 is an underestimate of the organic creation rate. Although the number of editors in E1 and E2 is small (6K each) compared to the number of editors in E3 (over 98K), they differ in that editors in E1 and E2 showed proficiency in English, which might be correlated with high productivity. To address this concern, we computed the creation rate for the top 300K most important missing articles in the month prior to the experiment. We found a creation rate of 0.36%, which is only slightly higher than the rate we observed in C3 (0.32%). This indicates that the degree of underestimation in C3 is small. A possible confound in comparing the creation rates between C1 and C2 is that, if articles matched via personalization are also pre- dicted to be more important, then the boost in creation rate might not stem from topical personalization but from the fact that more important articles were recommended. To investigate this possibil- ity, we compare the predicted importance (Sec. 2.2) of the articles recommended in condition C1 and C2. Fig. 9 shows that the two distributions are nearly identical, which implies that the boost in article creation rate is not mediated merely by a bias towards more popular articles among those recommended in C1. We conclude that recommending articles to suitable editors based on their previously edited articles constitutes an effective way of increasing the creation rate of articles containing important knowl- edge. Although some of this increase is caused merely by remind- ing editors by email to contribute, the quality of the specific per- sonalized suggestions is of crucial importance. 4.2.2 RQ2: Effect on editor engagement We continue our evaluation with a more editor-centric analysis. To gauge the effectiveness of our method in terms of editor engage- ment, we pose the following questions: What fraction of contacted 3All pairs of creation rates are statistically significantly different (p < 10−7 in a two-tailed two-sample t-test) with highly non-over- lapping 95% confidence intervals. Figure 7: Experimental design of user test. Figure 8: Screenshot of the content translation tool. The user is in the process of translating the NASA HELIOS article from English to French. C2 Randomized recommendation: Editors in group E2 were sent an email recommending five articles selected from group A2 at random. (In both conditions C1 and C2, each article was assigned to at most one editor.) C3 No recommendation: Articles in group A3 were not recom- mended to any editor. Editors in group E3 did not receive any recommendations. Note that not all articles from groups A1 and A2 were recom- mended to editors: each group contains 100K articles, but there are only about 6K editors in each of E1 and E2; since every editor re- ceived five recommendations, only about 30K of the 100K articles in each group were recommended. Emails were sent to the editors in conditions C1 and C2 on June 25, 2015. The emails were written in French and generated from the same template across conditions (cf. project website [27] for exact text). To facilitate the article-creation process, each of the five rec- ommendations was accompanied with a link to the translation tool that allows for easy section-by-section translation from the source to the target language (Fig. 8). 4.2 Results We now evaluate the data collected through the experiment de- scribed above to answer research questions RQ1, RQ2, and RQ3. 4.2.1 RQ1: Effect on article creation rates We measure the article creation rate for each condition as the fraction of articles in the respective group that were created in the one-month period after the recommendation email was sent. (Ap- pendix A.2 provides methodological details on how we count the articles created in each condition.) Comparing the article creation rates of conditions C1 and C3 will let us estimate the effect of personalized recommendation on the probability that an article is created. Further, note that the only dif- Personalized recommendationRandomized recommendationArticlesA1A2A3EditorsE1E2No recommendationConditionC1:C2:C3:E3 Figure 9: Box plots for predicted page view rank for articles in experimental conditions C1 and C2. Figure 10: Editor activation rate in condition C1 as a function of months since last edit. Editors contacted Active editors Publishing editors Activation rate Publication rate Personal (C1) Random (C2) 6,029 145 69 2.4% 1.1% 6,011 258 137 4.3% 2.3% Table 5: Effect of personalizing the recommendations. editors become active in creating a recommended article? Are ed- itors more likely to become active in response to an email if they receive personalized, rather than random, recommendations? Formally, we define an active editor as an editor who starts work- ing on a recommended article in the translation tool (without neces- sarily publishing it), and a publishing editor as one who starts and publishes a recommended article. Given these definitions, we com- pute activation and publication rates as the fractions of all editors in each group who become active or published, respectively. Table 5 compares these rates between the personalized (E1) and randomized (E2) editor groups (corresponding to experimental con- ditions C1 and C2), showing that about one in fifty editors in the randomized group (E2) started a recommended article in the trans- lation tool (activation rate 2.4%), and that half of them went on to publish the newly created article (publication rate 1.1%). In the personalized group (E1), on the other hand, the activation (publi- cation) rate is 4.3% (2.3%); i.e., personalization boosts the activa- tion as well as the publication rate by a factor of about two.4 This clearly shows that personalization is effective at encouraging edi- tors to contribute new important content to Wikipedia. Recency of activity. The set of 12K editors who received recom- mendation emails included editors proficient in both English and French and having made at least one edit within the 12 months prior to the experiment (cf. Appendix A.1). However, being active many months ago does not necessarily imply being currently interested in editing. So, in order to obtain a more fine-grained understanding of activation rates, we bucketed editors into three roughly equally sized groups based on how many months had passed between their last edit and the experiment. Fig. 10 shows that users who were active recently are much more likely to participate, for an activa- 4Publication and activation rates in the two conditions are statisti- cally significantly different (p < 10−5 in a two-tailed two-sample t-test) with highly non-overlapping 95% confidence intervals. tion rate of 7.0% among editors with at least one edit in the month before the experiment (compare to the overall 4.3%; Table 5). 4.2.3 RQ3: Article quality We conclude the analysis of results by evaluating the quality of articles created with the help of our recommendations. This is im- portant as it is conceivable that editors might work more thoroughly when creating articles of their own accord, compared to our situa- tion, where editors are extrinsically prompted to create new con- tent. Deletion rate. We define the deletion rate as the percent of newly created articles deleted within 3 months of being created. The dele- tion rate for articles in C1 that were published in response to rec- ommendations is 4.8%, 95% CI [2.6%, 8.6%], while the deletion rate for articles in C2 that were published in response to recommen- dations is 9.3%, 95% CI [4.8%, 17.3%]. Note that this difference is not significant (p = 0.063). The aggregate deletion rate of articles published in response to recommendations (conditions C1 and C2) is 6.1%, 95% CI [3.9%, 9.4%]. In comparison, the overall deletion rate of articles created in French Wikipedia in the month following the experiment is vastly higher at 27.5%, 95% CI [26.8%, 28.2%] (p < 0.001). Automatic quality score. We use the article quality classifier built for French Wikipedia [19, 12] to assess the quality of articles cre- ated by recommendation. Given an article, the model outputs the probability that the article belongs to each of the six quality classes used in French Wikipedia. Fig. 11 shows the averaged quality class probabilities for articles created and published in response to rec- ommendations (conditions C1 and C2) and for articles that were organically created but are of similar estimated importance (condi- tion C3) 3 months after creation. As a baseline, we also include the distribution for a random sample of French Wikipedia articles. Ar- ticles created based on recommendations are of similar estimated quality compared to articles that were organically created and the average French Wikipedia article. Article popularity. Although not directly related to article quality, we include here a brief comparison of article popularity. Fig. 12 shows the distributions over the number of page views received in the first 3 months after creation for articles created due to a recom- mendation and for all other French Wikipedia articles created in the month after the start of the experiment. On average, articles created < 11-44<months since last edit0.010.020.030.040.050.060.070.08activation rate95% confidence interval Figure 11: Aggregated quality class probabilities for articles in conditions C1 and C3, as well as for a set of 1,000 randomly se- lected French Wikipedia articles (with bootstrapped 95% con- fidence intervals). Figure 13: Screenshot of the Web application for translation recommendation. 13]. In other words, languages form barriers preventing knowledge already available in some editions of the free encyclopedia from being accessible to speakers of other languages [2, 28]. Until recently, very little was done to support cross-language content creation, with the exception of a few initiatives in specific topic areas such as the translation of medical information at the height of the Ebola crisis [1]. Multilingual contributors have been identified as playing a key role in transferring content across dif- ferent language editions, particularly in smaller Wikipedias which still struggle to reach a critical mass of editors [11]. Part of this research uses knowledge from the rich literature on personalized task recommendation. Instead of going over that lit- erature exhaustively, we refer the interested reader to the state of the art research on personalized task recommendation systems in crowdsourcing environments [10]. In the rest of this section, we discuss how future research can help address some of the challenges we faced in our work. Email campaigns. Email campaigns such as the one conducted in this research are limiting in several respects. Emailing recom- mendations involves contacting editors who may not be interested in receiving recommendations. On the other hand, editors who en- joy the recommendations may wish to receive more of them. To address these issues, we built a Web application5 that allows users to request missing article recommendations for several language pairs. In order to make the tool useful for new editors without an edit history and to allow existing editors to explore different inter- ests, we prompt users for a seed article. The topic vector for the seed article is used analogously to the user's interest vector and is used to generate personalized recommendations as described in Sec. 2.3.1. Fig. 13 shows the relevant missing articles generated by the application for a user interested in translating articles on GE- NETICS from English to Romanian. Incentives to contribute. As part of this research we did not test for the impact of different incentive mechanisms. The only in- centivizing information participants received was that the recom- mended articles were important and missing in their language. Fu- ture research on the effect of different incentive mechanisms and how much they can increase or sustain the observed boost in the article creation rate is a promising direction. 5http://recommend.wmflabs.org Figure 12: Box plots for the number of page views received in the first three months after creation for articles created due to a recommendation (C1/C2) and for all other French articles created in the month after the start of the experiment (Other). Summary based on a recommendation attract more than twice as many page views as organically created articles. 4.2.4 In conclusion, personalized recommendations from our system constitute an effective means of accelerating the rate at which im- portant missing articles are created in a given target language. The chance of an article recommended via personalization being cre- ated is three times that of a similar article being created organically. Further, personalizing recommendations to the emailed editor adds significant value over sending randomly selected recommendations via email, in terms of both article creation rate and editor engage- ment. Finally, the articles created in response to our targeted rec- ommendations are less likely to be deleted than average articles, are viewed more frequently, and are of comparable quality. 5. DISCUSSION AND RELATED WORK Each Wikipedia language edition, large or small, contains signif- icant amounts of information not available in any other language [8, The measure of importance. In this work we rank the missing articles with respect to their predicted page views once they are created. However, it is debatable whether page views should be used as the sole measure of importance. For example, an article which is predicted to be widely read in a language may not meet the requirements for notability [26] in that language project even if the article exists in one or more other languages. This is because the notability policies and practices are sometimes different in dif- ferent Wikipedia language projects. Using notability as a substitute for predicted page views has the limitation that building a good training set is hard. Although many articles have been deleted from Wikipedia due to the lack of their notability, this is not the only reason for deletion and not all articles that are still in Wikipedia are notable. Research in identifying better measures of importance for article ranking can improve the quality of the recommendations. Language imperialism and translation. An editor contacted in the experiment described recommending translations from English to French as an act of "language imperialism". Providing only En- glish as a source language would imply that all concepts worth translating are contained in English Wikipedia, that only non-English Wikipedias need to be augmented by translation, and that out of all Wikipedia articles that cover a concept, only the English version should be propagated. A related concern is that different Wiki- pedia language editions cover the same concepts very differently [13] and that fully translated articles may fail to contain important information relevant to a particular language community. A ma- jor advantage of computer-supported human translation over the current state-of-the-art in machine translation is that human trans- lators who understand the culture of the target language can alter the source where appropriate. An interesting avenue of further re- search would be to compare the cultural differences expressed in the initial version as well as the revisions of translated articles with their source texts. Knowledge gaps. In this work we focused on missing articles that are available in one language but missing in another. There are multiple directions in which future research can expand this work by focusing on other types of missing content. For example, an ar- ticle may exist in two languages, but one of the articles may be more complete and could be used to enhance the other. Given a method of determining such differences, our system could eas- ily be extended to the task of recommending articles for enhance- ment. Alternatively, there may be information that is not available in any Wikipedia language edition, but is available on the web. The TREC KBA research track [9] has focused on this specific aspect, though their focus is not limited to Wikipedia. By personalizing the methodologies developed by TREC KBA research one could help identify and address more knowledge gaps in Wikipedia. 6. CONCLUSION In this paper we developed an end-to-end system for reducing knowledge gaps in Wikipedia by recommending articles for cre- ation. Our system involves identifying missing articles, ranking those articles according to their importance, and recommending important missing articles to editors based on their interests. We empirically validated our proposed system by running a large-scale controlled experiment involving 12K French Wikipedia editors. We demonstrated that personalized article recommendations are an ef- fective way of increasing the creation rate of important articles in Wikipedia. We also showed that personalized recommendations increase editor engagement and publication rates. Compared to organically created articles, articles created in response to a rec- ommendation display lower deletion rates, more page views and comparable quality, In summary, our paper makes contributions to the research on increasing content coverage in Wikipedia and presents a system that leads to more engaged editors and faster growth of Wikipedia with no effect on its quality. We hope that future work will build on our results to reduce the gaps of knowledge in Wikipedia. Acknowledgements. The authors would like to thank Dario Taraborelli for fruitful discussions, the Wikimedia Foundation Language Engineering team for technical support prior, and the French Wikipedia community for their engagement. This research has been supported in part by NSF CNS- 1010921, IIS-1149837, NIH BD2K, NIH R01GM107340, ARO MURI, DARPA XDATA, DARPA SIMPLEX, Stanford Data Science Initiative, Boe- ing, SAP, and Volkswagen. 7. REFERENCES [1] P. Adams and F. Fleck. Bridging the language divide in health. Bulletin of the World Health Organization, 93(6):356–366, 2015. [2] E. Adar, M. Skinner, and D. S. Weld. Information arbitrage across multi-lingual Wikipedia. In WSDM, 2009. [3] P. Bao, B. Hecht, S. Carton, M. Quaderi, M. Horn, and D. Gergle. Omnipedia: Bridging the Wikipedia language gap. In CHI, 2012. [4] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet allocation. J. Mach. Learn. Res., 3:993–1022, 2003. [5] L. Breiman. Random forests. Machine Learning, 45(1):5–32, 2001. [6] D. Cosley, D. Frankowski, L. Terveen, and J. Riedl. SuggestBot: Using intelligent task routing to help people find work in Wikipedia. In IUI, 2007. [7] J. Edmonds. Maximum matching and a polyhedron with 0,1-vertices. J. Res. Nat. Bur. Standards B, 69:125–130, 1965. [8] E. Filatova. Multilingual Wikipedia, summarization, and information trustworthiness. In SIGIR Workshop on Information Access in a Multilingual World, 2009. [9] J. R. Frank, D. A. Max Kleiman-Weiner, N. Feng, C. Zhang, C. Ré, and S. I. Building an entity-centric stream filtering test collection for TREC 2012. In TREC, 2012. [10] D. Geiger and M. Schader. Personalized task recommendation in crowdsourcing information systems: Current state of the art. Decision Support Systems, 65:3–16, 2014. [11] S. A. Hale. Multilinguals and Wikipedia editing. In WebSci, 2014. [12] A. Halfaker and M. Warncke-Wang. Wikiclass, 2015. https://github.com/wiki-ai/wikiclass. [13] B. Hecht and D. Gergle. The tower of Babel meets Web 2.0: User-generated content and its applications in a multilingual context. In CHI, 2010. [14] T. Langel. UA Parser, 2015. https://github.com/tobie/ua-parser. [15] M. Manske. Not in the other language. https://tools. wmflabs.org/not-in-the-other-language/. [16] MediaWiki. Content translation, 2015. https: //www.mediawiki.org/wiki/Content_translation. [17] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn: dia, chosen a French title for the recommended missing article, and started translating their first section. This makes determining if an editor became active in response to the recommendation email easy if they used the tool. A complicating factor is that there were 39 ed- itors who published a recommended translation (as captured by the publicly available edit logs) but did not engage with the translation tool at all. We also consider these editors to be active. Counting articles created organically. To determine the organic creation rate of article group A3, we need to determine which newly created French articles previously existed in English, and divide by the number of articles that previously existed only in English and not in French. We observe that, within one month of being cre- ated, nearly all new French articles (92%) were linked to Wikidata, so to determine if a new article had an English version, we may simply check if the respective Wikidata concept had an English ar- ticle associated with it. 62% of the new French articles meet this criterion. Further, since many newly created articles are spam and quickly deleted, we only consider articles that have persisted for at least one month. This defines the 324 articles created organically in condition C3 (Table 4). Machine learning in Python. J. of Mach. Learn. Res., 12:2825–2830, 2011. [18] R. Rehurek and P. Sojka. Software framework for topic modelling with large corpora. In LREC Workshop on New Challenges for NLP Frameworks, 2010. [19] M. Warncke-Wang, D. Cosley, and J. Riedl. Tell me more: An actionable quality model for Wikipedia. In WikiSym, 2013. [20] Wikidata, 2015. https: //www.wikidata.org/wiki/Wikidata:Main_Page. [21] Wikipedia. Babel template, 2015. https://en.wikipedia.org/wiki/Wikipedia:Babel. [22] Wikipedia. Importance assessments, 2015. https: //en.wikipedia.org/wiki/Wikipedia:WikiProject_ Wikipedia/Assessment#Importance_assessment. [23] Wikipedia. List of articles every wikipedia should have, 2015. https://meta.wikimedia.org/wiki/List_of_ articles_every_Wikipedia_should_have. [24] Wikipedia. List of Wikipedias. Website, 2015. https: //meta.wikimedia.org/wiki/List_of_Wikipedias. [25] Wikipedia. Quality assessments, 2015. https: //en.wikipedia.org/wiki/Wikipedia:WikiProject_ Wikipedia/Assessment#Quality_assessments. [26] Wikipedia. Wikipedia:Notability, 2015. https: //en.wikipedia.org/wiki/Wikipedia:Notability. [27] E. Wulczyn, R. West, and L. Zia. Project website. https://meta.wikimedia.org/wiki/Research: Increasing_article_coverage. [28] C.-M. A. Yeung, K. Duh, and M. Nagata. Providing cross-lingual editing assistance to Wikipedia editors. In Computational Linguistics and Intelligent Text Processing, pages 377–389. Springer, 2011. APPENDIX A. ONLINE EXPERIMENT: METHODOLOGICAL DETAILS A.1 Editor and article selection Editor selection. Only editors with high proficiency in both En- glish and French are suitable for translating from English to French. Editors can explicitly signal their proficiency level in different lan- guages on their user pages using the Babel template [21]. Editors of French Wikipedia who signaled high proficiency in English were included in the experiment. We also included editors who made an edit in both French and English Wikipedia in the 12 months be- fore the experiment (regardless of their use of the Babel template), assuming that these editors would be proficient in both languages. Since the same editor can have different user names on different Wikipedias, we use the email addresses associated with user ac- counts to determine which English and French accounts correspond to the same editor. We obtained a total of 12,040 editors. Article selection. We find English articles missing in French us- ing the method described in Sec. 2.1. We excluded disambigua- tion pages, very short articles (less than 1,500 bytes of content) and rarely read articles (less than 1,000 page views in the last 6 months). A.2 Counting articles created Counting recommended articles created. The translation tool starts logging an editor's actions after they have signed into Wikipe-
1911.08994
1
1911
2019-11-07T03:23:27
A Hierarchical Optimizer for Recommendation System Based on Shortest Path Algorithm
[ "cs.SI", "cs.IR" ]
Top-k Nearest Geosocial Keyword (T-kNGK) query on geosocial network is defined to give users k recommendations based on some keywords and designated spatial range, and can be realized by shortest path algorithms. However, shortest path algorithm cannot provide convincing recommendations, so we design a hierarchical optimizer consisting of classifiers and a constant optimizer to optimize the result by some features of the service providers.
cs.SI
cs
A Hierarchical Optimizer for Recommendation System Based on Shortest Path Algorithm Jiacheng Dai, Zhifeng Jia, Xiaofeng Gao(cid:63), and Guihai Chen Shanghai Key Laboratory of Scalable Computing and Systems, Department of Computer Science and Engineering, Shanghai Jiao Tong University, {daijiacheng,fergusjia}@sjtu.edu.cn, {gao-xf,gchen}@cs.sjtu.edu.cn Shanghai 200240, China Abstract. Top-k Nearest Geosocial Keyword (T-kNGK) query on geoso- cial network is defined to give users k recommendations based on some keywords and designated spatial range, and can be realized by short- est path algorithms. However, shortest path algorithm cannot provide convincing recommendations, so we design a hierarchical optimizer con- sisting of classifiers and a constant optimizer to optimize the result by some features of the service providers. Keywords: Geosocial Network · Keyword query · Spatial Query. 1 Problem Statement Top-k Nearest Geosocial Keyword Search Query (T-kNGK) works on a geosocial network. A T-kNGK query's task is to recommend k service providers (SP's) that best meet the user's requirement (keywords and location). Shortest path algorithms are used to solve this problem. We simply take the length of the shortest path between user u and SP v as the basis for recommendation. A geosocial network [1] is a weighted undirected graph G = (V, E, W, K, L). We give a simple instance Figure 1 to illustrate its structure and contents. The weight of an edge shows the intimacy between users or rating for SPs (mapped to [0, 1]). Each SP v has a keyword set kv ∈ K and location lv ∈ L. The process of a T- kNGK query is shown in Figure 2 (together with the Hierarchical Optimizer). The defect of T-kNGK query is that it seems to be unconvincing since it only references one comment (one path) due to shortest path algorithm. Therefore, we should optimize the results of T-kNGK query to enhance reliability and avoid extreme bad cases. 2 Hierarchical Optimizer Constant Optimizer We try to let the SP's with more comments get higher score and reduce the score of SP's who have few comments. We define multiplier α to calculate the new score Scorec. αsi = 1 + 1 average−min1≤j≤n{countsj } )γ β ( countsi−average when countsi < average and αsi = 1 + 1 max1≤j≤n{countsj }−average )γ when β ( countsi ≥ average, where average = , β and γ are adjustable pa- rameters and countsi is the number of comments of SP si. Finally, Scorec = αsi × ratingsi. (cid:63) Xiaofeng Gao is the corresponding author. countsi−average n Σn j=1countsj 2 J. Dai et al. Fig. 1. An instance of geosocial network Fig. 2. The optimized T-kNGK query Rank Classifier We defined four features to train a classifier which ranks the SP's from 1 to 5: "Matched Keyword Ratio" Ratiom = , "Specific Key- kq∩ksi kq , "Count of Ratings" Countsi , "Average Score" word Ratio" Ratios = Scoreavgsi . kq∩ksi ksi In the Hierarchical Optimzer, we first use Rank Classifier to rank the SP's we get from the shortest path algorithm and sort them by their rank. Then we use Constant Optimizer to calculate Scorec and sort the SP's of the same rank by Scorec. Thus, we got the optimized results. 3 Experiments and Results We use Yelp dataset (over 3 GB and has over 6.5 million reviews) which contains all the data we need in the T-kNGK query and the hierarchical optimizer. For Constant Optimizer, we set β = 5 and γ = 2. For Rank Classifier, we choose random forest with accuracy of 82%. We use 80% of the data to train the model and 20% to test the model. First, we run shortest path algorithm on the geoso- cial network built on Yelp dataset and get some raw result. Then we use our Hierarchical Optimizer to re-order the raw results and get ideal result. One of our optimized result is shown in Figure 3. Fig. 3. The result of optimization Acknowledgments. This work was supported by the National Key R&D Program of China [2018YFB1004703]; the National Natural Science Founda- tion of China [61872238, 61672353]; the Shanghai Science and Technology Fund [17510740200]; the Huawei Innovation Research Program [HO2018085286]; the State Key Laboratory of Air Traffic Management System and Technology [SKLAT M20180X]; and the Tencent Social Ads Rhino-Bird Focused Research Program. References 1. Y. Sun, N. Pasumarthy, and M. Sarwat, On Evaluating Social Proximity-Aware Spatial Range Queries, in IEEE International Conference on Mobile Data Man- agement (MDM), KAIST, Taejeon, South Korea, 2017, pp. 7281.
1110.2724
1
1110
2011-10-12T18:11:16
Information Transfer in Social Media
[ "cs.SI", "physics.soc-ph", "stat.AP" ]
Recent research has explored the increasingly important role of social media by examining the dynamics of individual and group behavior, characterizing patterns of information diffusion, and identifying influential individuals. In this paper we suggest a measure of causal relationships between nodes based on the information-theoretic notion of transfer entropy, or information transfer. This theoretically grounded measure is based on dynamic information, captures fine-grain notions of influence, and admits a natural, predictive interpretation. Causal networks inferred by transfer entropy can differ significantly from static friendship networks because most friendship links are not useful for predicting future dynamics. We demonstrate through analysis of synthetic and real-world data that transfer entropy reveals meaningful hidden network structures. In addition to altering our notion of who is influential, transfer entropy allows us to differentiate between weak influence over large groups and strong influence over small groups.
cs.SI
cs
Information Transfer in Social Media Greg Ver Steeg and Aram Galstyan∗ USC Information Sciences Institute,Marina del Rey, CA 90292 (Dated: December 20, 2013) Recent research has explored the increasingly important role of social media by examining the dynamics of individual and group behavior, characterizing patterns of information diffusion, and identifying influential individuals. In this paper we suggest a measure of causal relationships between nodes based on the information–theoretic notion of transfer entropy, or information transfer. This theoretically grounded measure is based on dynamic information, captures fine–grain notions of influence, and admits a natural, predictive interpretation. Causal networks inferred by transfer entropy can differ significantly from static friendship networks because most friendship links are not useful for predicting future dynamics. We demonstrate through analysis of synthetic and real–world data that transfer entropy reveals meaningful hidden network structures. In addition to altering our notion of who is influential, transfer entropy allows us to differentiate between weak influence over large groups and strong influence over small groups. I. INTRODUCTION Recent years have witnessed an explosive growth of various social media sites such as online social networks, discussion forums and message boards, and inter-linked blogs. For researchers, social media serves as a fertile ground for examining social interactions on an unprece- dented scale [4]. One important problem is the charac- terization and identification of influentials, which can be defined as users who influence the behavior of large num- bers of other users. Recent work on influence propaga- tion has used numerous characterizations of influentials based on topological centrality measures such as Pager- ank score [8, 11]. To characterize influence in Twitter, re- searchers have suggested number of followers, mentions, and retweets [5], and Pagerank of follower network [9]. It has been observed, however, that the purely structural measures of influence can be misleading [6] and high pop- ularity does not necessarily imply high influence [14, 16]. More recent work has used the size of the cascade trees [1] and influence–passivity score [14]. One serious drawback of existing methods is that they are based on explicit causal knowledge (i.e., A responds to B), whereas for many data sets such knowledge is not available and needs to be discovered. Here we suggest a model–free approach to uncover- ing causal relationships and identifying influential users based on their capacity to predict the behavior of other users, through the information-theoretic notion of trans- fer entropy, interchangeably referred to as information transfer. In a nutshell, transfer entropy between two stochastic processes characterizes the reduction of un- certainty in one process due to the knowledge of the other process; a mathematical definition is given below. Transfer entropy can be thought of as a nonlinear gen- eralization of Granger causality [3], and has been used extensively in computational neuroscience, e.g., for ex- amining causal relationships in cortical neurons [7]. In contrast to other correlation measures such as mutual information, transfer entropy is asymmetric and allows differentiation in the direction of information flow. Fur- thermore, whereas most existing studies are concerned with aggregate measures of influence, the approach out- lined here allows more fine–grained analysis of informa- tion diffusion by analyzing information transfer on each existing link in the network. Finally, our approach is model-free. Information–theoretic measures allow us to statistically characterize our uncertainty without making assumptions about human behavior. The rest of this paper is organized as follows. We begin by describing the basic intuition and mathemat- ics behind the information transfer, and briefly mention computational issues of the approach. In Section III A we present results of our simulation with synthetically gen- erated data, where we thoroughly examine how the infor- mation transfer depends on various characteristics of the data generating process. In Section III B we present our results on real-world data extracted from user activities on Twitter. We conclude the paper by discussing results and some future work in Section IV. II. TRANSFER ENTROPY A. Notation For each user, X , we record the history of activity, e.g., timing of tweets, as a sequence of times as SX = {tj : 0 < t1 < t2 . . .}. In general, we assume each user’s activity is described by some stochastic point process. We are limited by finite data to consider finite temporal (cid:26) 1 if ∃tj ∈ SX ∩ (b, a], resolution, so we introduce the binned random variable, 0 otherwise. BX (a, b) ≡ (1) ∗ {gregv,galstyan}@isi.edu If we observe the actions of a user for some long period of time T , we can define probabilities over these coarse- (cid:90) T grained variables. Fix δ ∈ R, then δ P (BX (t, t − δ) = Xt ) ≡ 1 T − δ dt[Bi (t, t − δ) = Xt ] Similarly, we could define a joint probability distribution over a sequence of adjacent bins, P (BX (t, t − δ0 ) = Xt , BX (t − δ0 , t − δ0 − δ1 ) = Xt−1 , . . .), with widths δ0 , δ1 , . . . , δk ∈ R. We will omit the binning function for succinctness, P (Xt , Xt−1 , . . . , Xt−k ). We can write this even more compactly by defining X (t−k) ≡ {Xt , . . . , Xt−k }. t The dynamics of a user may depend on users they are linked to in some unknown, arbitrary way. There- fore, for two users X and Y , with activities recorded by SX , SY , we define a joint probability distribution using a common set of bins denoted with widths δ0 , δ1 , . . . as , Y (t−k) P (X (t−k) ). Conditional and marginal probability t t distributions are defined in the usual way and we use the standard definition for conditional entropy for discrete H (AB ) = − (cid:88) random variables A, B distributed according to P (A, B ), P (A, B ) log P (AB ). A,B B. Definition of transfer entropy The transfer entropy introduced in [15] is defined as , X (t−l) ) − H (Yt Y (t−k) TX→Y = H (Yt Y (t−k) t−1 t−1 t−1 ) (2) The first term represents our uncertainty about Yt given Y ’s history only. The second term represents the smaller uncertainty when we know X ’s history as well. Thus, transfer entropy explicitly describes the reduction of un- certainty in Yt due to knowledge of X ’s recent activity. Note that information transfer is asymmetric, as opposed to mutual information, and thus better suited for char- acterizing directed information transfer. For simplicity, we take l = k from here on. C. Sampling problems and solutions The use of information–theoretic techniques to analyze real-world point processes has been studied almost exclu- sively in the context of neural activity[17]. Therefore, it is in this literature that the problems associated with estimating entropies for sparse point process data have been explored most thoroughly. The fundamental prob- lem is that, in the absence of sufficient data, estimating entropies from probability distributions based on binned frequencies leads to systematic bias [13]. Intuitively, if we have k bins of history then we need O(2k ) pieces of data in order to sample all possible histories. 2 A variety of remedies are available and we make use of several. The most obvious solution is to restrict our- selves to situations where we have adequate data. In the subsequent analysis, we filter out users that are below a certain activity level. In practice, however, raising our activity threshold high enough to guarantee convergence of entropies would eliminate almost all users from our dataset. The next remedy to apply is to estimate the average magnitude of the systematic bias that results from using sparse data and subtract it from our estimate. When we calculate the entropies in Eq. 2, we subtract out the Panzeri-Treves bias estimate[12]. Fig. 2 illustrates the effect of this bias correction as a function of amount of data collected. The definition in Eq. 2 implicitly depends on bin widths specified by the δi ’s. The simplest procedure, and the one taken in the neural spike train literature, is to set all the bins to have equal width. We have a great deal of pre-existing empirical knowledge about human activity that can help us improve on this method. Many studies have shown that humans exhibit a heavy tail in the dis- tribution of their response times to communications[2]. This implies that bins accounting for recent activity should be narrower while bins accounting for older ac- tivity can be wider. We can even base these bin widths on measured response times, if such data is available. Us- ing more informative bins means we can use fewer bins, reducing the effect of sampling problems. A final technique to reduce bias is discussed in [17] and uses a class of binless entropy estimators. These techniques carry their own mathematical difficulties and we will not consider them here. With these tools in hand, we can proceed to use information transfer to analyze user activity in social media. III. RESULTS In this section we report the results of our experiments with both synthetic data and real world data from Twit- ter. The ultimate goal is to infer information transfer between agents in the network by analyzing their pat- terns of activity. Patterns of activity could include many things including timing, content, and medium of mes- sages. We focus only on the timing of activity on Twitter (tweeting of URLs). In principle, our analysis could be extended to include more complex information, but, as discussed, this would require either more data or better methods for dealing with sparse data. We test and validate our ability to infer information transfer from patterns of activity in two ways. First, while our information–theoretic analysis of social net- work data uses only timing of activity, the data includes unique identifiers allowing us to track the flow of informa- tion through the network. On Twitter, we track specific URLs. We can use the spread of these trackable pieces of information to confirm that the information transfer inferred solely from the timing of activity corresponds to actual exchanges of information. For the synthetic data, we dictate that an agent’s ac- tivity depends on its neighbors’ activity in some fixed way. This allows us to check how well information trans- fer recovers the hidden dependence structure from activ- ity patterns alone. For instance, even without knowing anything about the network structure, we find that a sufficient amount of data allows perfect reconstruction of the underlying network. A. Experiments with synthetic data To form a better understanding of different factors im- pacting information transfer, we performed extensive ex- periments with synthetically generated data. Ideally, we would like our synthetic data to reflect, in a tunable way, the challenges we face with real world data. These chal- lenges include a long tail for human response times, het- erogeneous response to neighbors’ activity, background noise affecting node dynamics, incorrect data, and insuf- ficient data. We explore these challenges first for a pair of nodes, and then for an entire network. We model user activity as a coupled, non-homogeneous Poisson point process. Suppose that we have two nodes and a single link from X → Y . We can characterize Y ’s activity in terms of a time-dependent rate. We define (cid:88) X ≡ SX ∩ [0, t), that is, the activity for X until time t. S t g(t − ti ) λY (tS t X ) = µ + γ ti∈S t X (3) The first term, µ, represents a constant rate of back- ground activity. The second term represents a time- dependent increase in the rate of activity in response to activity from a neighbor. The strength of influence of X is parametrized by γ . In practice, we will set the background rate equal to a constant and vary the rela- (cid:16) 1 hour (cid:17)3 tive strength γ /µ through the parameter γ . The time dependence of the influence is captured by the function g . We set g(∆t) = min(1, ) to reflect the ob- ∆t served fact that the distribution of human response times are characterized by a long tail[2]. Along with a causal network, Eq. 3 defines a genera- tive model for point process activity. We can efficiently generate activity according to this model using the thin- ning method discussed in [10]. We vary the total amount of data by fixing the background rate µ = 1 event/day and varying the total amount of observation time, T . Equivalently, we could have fixed T and varied the rate of activity. After fixing the parameters, we can gener- ate data and then use that data to infer the appropriate probabilities to calculate information transfer according to Eq. 2. As discussed in Sec. II C, we take a variety of measures to ensure good estimation. In this case, we directly con- trol the amount of data through the parameter T . For 3 the bin widths we choose δ0 = 1 sec, fixing the finest temporal resolution. For the history we choose wider bin widths for less recent history. In the synthetic examples we take the past three hours of history into account by choosing δ1 = 1 hour, δ2 = 2 hours. Also, it should be assumed that the Panzeri-Treves bias estimate has been taken into account, except in Fig. 2(a) where we compare results without bias correction. FIG. 1: If we have influence from X → Y but not vice versa, the asymmetry in the information transfer correctly reflects the direction of influence. Information transfer plotted for a single pair of users. Note that in the example in Eq. 3, we have allowed X to affect Y , but not vice versa. As a first test we can generate some data for a pair of users and then compare TX→Y and TY →X . In Fig. 1, we compare these two quan- tities when γ /µ = 2 as a function of the total observation time T . In Fig. 2 we examine the accuracy and convergence of information transfer estimates as a function of time both with and without bias correction. We ran 200 trials and plot the mean and standard deviation of the information transfer estimate at each time step. Clearly, there is a systematically high estimate in the low sampling regime, but, even in that case, higher influence leads to a higher information transfer on average. The Panzeri-Treves bias correction drastically reduces, but does not completely eliminate, this systematic error. Next, we consider the same scenario, where we gen- erate X, Y according some stochastic process, but now imagine that we do not see all activity. That is, what if we do not see every event due to limited sampling? This is often the case, for instance, with Twitter data, where researchers typically have access to only a small fraction of all tweets, ranging from 1% − 20%. So we set a sampling parameter f , and say that for each ti ∈ SX , we only keep that event with probability f . A summary of how the final transfer entropy, TY →X , depends on the sampling rate, f , is given in Fig. 3. We show the results after 500 days to guarantee enough data to be very close to convergence. We see that sampling drastically reduces the inferred transfer entropy, destroying our ability to de- duce flow of information. So far, we have only considered two nodes with a single link between them. Now, we want to consider a directed, causal network of N nodes, with some arbitrary connec- 4 FIG. 4: Each row represents a different user. Each line repre- sents an event for that user over a time period of thirty days. With enough data we could calculate the information transfer between each pair of users and recover the unknown network structure exactly. pick some threshold T0 , and if TX→Y > T0 , we con- sider there to be an edge from X → Y , otherwise not. We could check our true positive rate and false posi- tive rate as a function of T0 , as shown in Fig. 5(a), for N = 20, γ /µ = 1.0 and time = 450 days. We show an ex- ample of the recovered versus actual network in Fig. 5(b), using a threshold picked according to F-measure. The previous example was chosen to show what kinds of errors arise given a weak signal. In general, with either enough data or strong enough influence, we can perfectly recover the underlying graph structure. If we consider the area under the ROC curve (AUC), as in Fig. 5(a), then an AUC of 1 corresponds to perfect reconstruction of the graph. We summarize the AUCs for random networks with N = 20 and (cid:104)k(cid:105) = 3, while varying T and γ /µ in Fig. 6. As a final experiment, we can consider the effect of al- lowing different γ between different pairs of nodes. Fig. 7 shows that transfer entropy is able to recover the relative influence well. In principle, there are many other effects we could have considered to make a more realistic synthetic model. Background and influence rates should vary for different individuals. There may be periodicity defined by daily, weekly, and monthly cycles. However, because informa- tion transfer makes no model assumptions, it is relatively insensitive to such details. The main constraint is data, which is why we focused on sensitivity to amount and quality of observations. B. Results for Twitter dataset (a) (b) FIG. 2: Mean and std for the estimate of information transfer averaging over 200 pairs of users with γ /µ = 0, 2 as a function of time. (a) Results without correcting for bias and (b) with Panzeri-Treves bias correction[12]. FIG. 3: A summary of the mean and std of the inferred value of TY →X averaged over 200 trials as a function of the sampling rate, with T = 500 days and γ /µ = 2. tivity pattern. We consider a similar stochastic model as defined in Eq. 3, except now we denote the set of Y ’s (cid:88) (cid:88) neighbors (i.e., people who can influence Y ) as N (Y ). λY (tS tN (Y ) ) = µ + g(t − ti ) X ∈N (Y ) ti∈S t X γX (4) To begin we imagine γX = γ for all neighbors, but in general a node may be affected more strongly by some neighbors than others. A sample of activity generated according to this model is given in Fig. 4. The challenge is to take the information given by the activity and recover the underlying graph structure. For each pair of nodes, X, Y , we calculate TX→Y . Then we Twitter is a popular micro-blogging service. As of July 2011, users send 200 million tweets per day. Twitter has become an important tool for researchers both due to the volume of activity and because of the easily available tools for data collection. Twitter’s “Gardenhose” API, allows access to 20% − 30% of all tweets. Unfortunately, as discussed in Sec. III A, filtering of 105010015020002.(cid:180)10(cid:45)64.(cid:180)10(cid:45)66.(cid:180)10(cid:45)68.(cid:180)10(cid:45)60.00001TimedaysInformationTransferΓΜ(cid:61)2ΓΜ(cid:61)0105010015020002.(cid:180)10(cid:45)64.(cid:180)10(cid:45)66.(cid:180)10(cid:45)68.(cid:180)10(cid:45)60.00001TimedaysInformationTransferΓΜ(cid:61)2ΓΜ(cid:61)0525507510002.(cid:180)10(cid:45)74.(cid:180)10(cid:45)76.(cid:180)10(cid:45)78.(cid:180)10(cid:45)71.(cid:180)10(cid:45)61.2(cid:180)10(cid:45)6Samplingrate(cid:37)InformationTransfer 5 FIG. 7: Information transfer between pairs of nodes for vary- ing γ /µ with T = 500 days. The black line corresponds to the mean information transfer for a given γ /µ and the shaded re- gion denotes the standard deviation after 100 trials. who tweeted a URL in the three week collection period. The data we used was collected in the fall of 2010 [6]. The dataset included about 70 thousand distinct URLs, 3.5 million tweets, and 800 thousand users. We further filtered our results to “very active” users, namely, users who tweeted at least 10 URLs during this time period. Before we can calculate transfer entropy as presented in Eq. 2, we need to specify the relevant bin widths. We take the finest resolution to be δ0 = 1 second, the same resolution as presented by the Twitter API. For binning of the history, we used distribution of observed re-tweet response times to motivate a choice of δ1 = 10 min, δ2 = 2 hours, δ3 = 24 hours. Although we saw a long tail of re-tweet times stretching into days, our data were insuffi- cient to include this weak effect. By limiting ourselves to only three bins, we only have to sample over 8 possible histories. Note that the activity is for any tweeting of URLs; our calculations do not make use of the informa- tion encoded in the URL. We then calculate the transfer entropy between each pair of users who are connected. The result of this procedure is the construction of a directed, weighted graph, where each edge in the original directed graph is now labeled by the calculated transfer entropy. We can now compare standard measures of in- fluence to measures based on this weighted graph. The simplest measure of influence on static graphs is to count the number of followers a user has. This ignores the fact that not all followers are the same, nor do followers re- act in the same way to different people that they follow. For instance, it may be that a recommendation from a close friend is worth more to a person than the same recommendation from five acquaintances. This problem is only exacerbated by the recent emergence of “follow- ers for pay” services, which seek to artificially inflate the number of followers to your Twitter account. In Fig. 8, we explore the comparison between out degree and trans- fer entropy and we find that although on average people with more followers have more transfer entropy, two peo- ple with the same number of followers may have vastly different influence as measured by transfer entropy. To verify that transfer entropy is a meaningful quan- tity, we could test how well the transfer entropy, based (a) (b) (a) ROC curve and (b) transfer–entropy induced FIG. 5: graph for the synthetically generated data described in the text. Threshold is chosen according to F-measure. Black solid lines correspond to true positives, red dashed lines to false positives and blue dotted lines to false negatives. FIG. 6: AUC of the network inferred using transfer entropy as a function of T , with γ /µ = 2, 4. data can lead to a drastic reduction in the measured in- formation transfer. Instead, the Gardenhose API was used to identify URLs being tweeted. Then, the search API was used to find all mentions of these URLs in any tweets by any users. In this way, the filtering limitation is avoided, while we restrict ourselves to the domain of URL posting. Additionally, each URL corresponds to a unique piece of information whose movement through the network can be traced. The data also includes the full social network among “active users”, in this case, anyone 0501001502002503003500.750.800.850.900.951.00DaysAUC(cid:224)ΓΜ(cid:61)4(cid:230)ΓΜ(cid:61)20.00.51.01.52.02.53.03.505.(cid:180)10(cid:45)71.(cid:180)10(cid:45)61.5(cid:180)10(cid:45)62.(cid:180)10(cid:45)62.5(cid:180)10(cid:45)63.(cid:180)10(cid:45)6ΓΜInformationTransfer duplicate accounts. Many of the accounts on this list have since been banned by Twitter. 6 User Free2BurnMusic Earn Cash Today BuzTweet com Free2Burn Kamagra drug2 sougolinkjp kcal bot nr1topforex wpthemeworld viagrakusurida BoogieFonzareli A tango Kamagra drug2 dti affiliate Best of Deals viagrakusurida kcal bot kamagra 100mg3 viagra drug kcal bot Follower Free2Burn income ideas scate Free2BurnMusic sogradrug3 sogolinksite FF kcal bot nr1forexmoney wpthememarket viagrakusuride Nyce Hunnies kobuntango sogra drug3 kekkonjyoho Orbilook SMI kamagra 100mg3 Family Mart viagrakusuride baiagura drug Seven Eleven I.T.(·10−6 ) 4328 1159 1006 939 929 903 902 795 709 679 668 662 638 630 621 561 542 535 532 530 TABLE I: List of edges with highest information transfer. All are promotion accounts and many of the accounts have been banned since the data were collected. To see more complex examples, we restrict ourselves to the top 1000 edges according to information trans- fer. Then we look at the largest connected compo- nents. The largest component involved 600 users in Brazil, most of whom had multiple tweets of the form “BOMBE O SEU TWITTER, COM MILHARES DE NOVOS FOLLOWERS, ATRAVES DO SITE: http://? #QueroSeguidores”, where “?” was a frequently chang- ing URL. Google translates this as “Pump up your Twit- ter, get thousands of new followers, link to this site: http://? #IWantFollowers.” Clicking on some of these links suggests that this a “followback” service. You agree to follow previous users who have signed up and in return other users of the service follow your account. It also ap- pears from the text that you are required to re-tweet the link to get your followers. Some other examples of high information transfer clusters are shown in Fig. 10. We consider another advantage of measuring influence through information transfer by looking at two users who had almost the same outgoing transfer entropy (∼ 0.025, in the top 20 for individuals in our dataset), but vastly different behavior of followers. The first Twitter ac- count is SouljaBoy, a prominent American rapper who is also very active in social media. The second account is “silva marina”, the Twitter account of Marina Silva, a popular Brazilian politician. This data was taken dur- ing the run up to the Brazilian presidential election, in which Marina Silva was a candidate; she received 19.4% of the popular vote. At first it seems surprising that the SouljaBoy, who has six times the followers, should have a similar outgoing transfer entropy to a politician known mostly in one country and with fewer than a mil- FIG. 8: For each user, we compare the number of their fol- lowers to their cumulative outgoing transfer entropy. Note that the outgoing transfer entropy may differ by an order of magnitude for people with the same number of followers. only on the timing of activity, matches the measured flow of information, as determined by tracing specific URLs. To that end, for each pair of connected users, X → Y , we count how many specific URLs were first tweeted by X and then subsequently re-tweeted by Y . This num- ber is compared to the transfer entropy in Fig. 9. The existence of even a weak correlation is surprising consid- ering the limited amount of data and the fact the transfer entropy is not making use of URL or re-tweet informa- tion at all. We also note that while a high number of re-tweets implies high information transfer, a low num- ber of re-tweets is uncorrelated with information transfer. This makes sense because information transfer measures influence that is not necessarily in the form of re-tweets; we will give some examples below. FIG. 9: The number of URLs that were first tweeted by user X and subsequently tweeted by X’s follower, Y, is correlated with the calculated transfer entropy between X and Y, even though transfer entropy is calculated only from the timing of activity, without regard for specific URLs. Pearson’s correla- tion coefficient is 0.22. Table I shows the edges with the highest information transfer. These accounts are all solely for the purpose of promotion. Taking the top example, for instance, reveals that these two accounts will tweet exactly the same mes- sage within a few seconds of each other. Note that in the text of their tweets neither account uses re-tweets or an “@” for attribution. Twitter specifically forbids indis- criminate automatic re-tweets and has a policy against 7 The strength of Marina Silva’s influence along with the serendipitous timing before the Brazilian elections sug- gests another intriguing possibility. It seems likely that not only does transfer entropy vary for different follow- ers, it may vary over time as well. This suggests that a dynamic estimate of information transfer could detect changes in the importance of individuals in the network. IV. DISCUSSION We have presented a novel information–theoretic ap- proach for measuring influence. In contrast to previous studied that focused on aggregate measures of influence, the transfer entropy used here allows us to characterize and quantify the causal information flow for any pair of users. For a small number of users, this can allow us to reconstruct the network of connections from user activity alone. For large networks, this allows us to identify the most important links in the network. The method used here for calculating information transfer did not require any explicit causal knowledge in the form of re-tweets or other textual information. On the one hand, this may be an advantage in situations where such information is either missing or misleading, as was the case in the example for marketers on Twit- ter. On the other hand, we may be neglecting valuable information, and in the future we would like to incorpo- rate textual information in more sophisticated ways but still within an information–theoretic approach. Although this should be straightforward in principle, in practice entropy based approaches require large amounts of data. More complex signals require a commensurate increase in data. Therefore, the other main thrust of future work should be towards reducing data required for entropy es- timation, either through better bias correction or through binless approaches[17]. Because this measure has a rigorous interpretation in terms of predictability, it allows us to easily understand results that might otherwise seem anomalous. For in- stance, in one example we found that Marina Silva, the Brazilian presidential candidate, had high information transfer both to and from a Brazilian news service. Nei- ther Twitter account ever retweeted or explicitly men- tioned a tweet of the other. However, there was an ex- ternal cause, the upcoming debates and elections, that explains both of their activities. Without knowing this external cause, it is entirely consistent to say that either user’s activity could help you predict the others. In fact, it may be possible to use this bi-directional predictability to identify external causes in the first place. Another result that is easy to understand in the con- text of predictability is the high incidence of “spam” in our results. This is no surprise since a large amount of spam is produced by automated systems and these sys- tems are intrinsically very predictable. Although identi- fying spam is a natural application of our analysis, some human behavior stood out as well. Diehard fandom also (a) (b) (c) FIG. 10: (a) This cluster appears to be non-automated, and revolves around fandom of singer Justin Bieber. (b) The clus- ter of drug spam accounts. (c) An account which aggregates soccer news by following and re-tweeting different regional soccer accounts. lion Twitter followers. On the other hand, Fig. 11 re- veals the reason for this disparity. Marina Silva may have fewer followers, but her effect on them tended to be much stronger. Marina Silva’s activity tended to be a better predictor of her followers’ behavior than Soulja Boy’s activity was for his followers. FIG. 11: A histogram showing the probability distribution of outgoing transfer entropy for followers of two different Twitter accounts. 00.000010.000020.000030.000040.00.20.40.60.8I.T.toasinglefollowerProbabilitySouljaBoysilva_marina leads to quite predictable behavior. Many existing notions of ill- influence are static, defined, ad hoc, or only apply in aggregate. Information transfer is a rigorously defined, dynamic measure capable of capturing fine-grain notions of influence and admitting a straightforward predictive interpretation. Many of the mathematical techniques necessary have already been de- veloped in the neuroscience literature and we have shown how to usefully adapt them to a social media context. Acknowledgments 8 We would like to thank Armen Allahverdyan for useful discussions. This research was supported in part by the National Science Foundation under grant No. 0916534 and US AFOSR MURI grant No. FA9550-10-1-0569. [1] Eytan Bakshy, Jake M. Hofman, Winter A. Mason, and Duncan J. Watts. Everyone’s an influencer: quantifying influence on twitter. In Proc. fourth ACM international conference on Web search and data mining, WSDM ’11, pages 65–74, New York, NY, USA, 2011. ACM. [2] Albert-Laszlo Barab´asi. The origin of bursts and heavy tails in human dynamics. Nature, 435:207–211, May 2005. [3] Lionel Barnett, Adam B. Barrett, and Anil K. Seth. Granger causality and transfer entropy are equivalent for gaussian variables. Phys. Rev. Lett., 103:238701, Dec 2009. [4] Claudio Castellano, Santo Fortunato, and Vittorio Loreto. Statistical physics of social dynamics. Rev. Mod. Phys., 81(2):591–646, May 2009. [5] Meeyoung Cha, Hamed Haddadi, Fabrcio Benevenuto, and Krishna P. Gummadi. Measuring user influence in twitter: The million follower fallacy. In in ICWSM 10: Proceedings of international AAAI Conference on We- blogs and Social, 2010. [6] Rumi Ghosh and Kristina Lerman. Predicting influential users in online social networks. In Proc. KDD workshop on Social Network Analysis (SNAKDD), May 2010. [7] Boris Gourevitch and Jos J Eggermont. Evaluating in- formation transfer between auditory cortical neurons. J Neurophysiol, 97(3):2533–43, 2007. [8] Glen Jeh and Jennifer Widom. Scaling personalized web search. In Proceedings of the 12th international confer- ence on World Wide Web, WWW ’03, pages 271–279, New York, NY, USA, 2003. ACM. [9] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. What is twitter, a social network or a news media? In Proceedings of the 19th international conference on World wide web, WWW ’10, pages 591–600, New York, NY, USA, 2010. ACM. Seismicity analysis through point- [10] Yosihiko Ogata. process modeling: A review. Pure appl. geophys., 155:471–507, 1999. [11] Lawrence Page, Sergey Brin, Ra jeev Motwani, and Terry Winograd. The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Pro ject, 1998. [12] S. Panzeri and A. Treves. Analytical estimates of limited sampling biases in different information measures. Net- work: Computation in Neural Systems, 7:87–107, 1996. [13] Stefano Panzeri, Riccardo Senatore, Marcelo A. Monte- murro, and Rasmus S. Petersen. Correcting for the sam- pling bias problem in spike train information measures. Journal of Neurophysiology, 98(3):1064–1072, 2007. [14] Daniel M. Romero, Wo jciech Galuba, Sitaram Asur, and Bernardo A. Huberman. Influence and passivity in social media. Social Science Research Network Working Paper Series, August 2010. [15] Thomas Schreiber. Measuring information transfer. Phys. Rev. Lett., 85(2):461–464, Jul 2000. [16] Greg Ver Steeg and Aram Galstyan. Information transfer in social media. In Workshop on Information Networks, Stern School of Business, New York University, 2011. [17] Jonathan D. Victor. Approaches to information-theoretic analysis of neural activity. Biological Theory, 1(3):302– 316, 2006.
1907.00725
1
1907
2019-06-26T04:16:20
Social Media-based User Embedding: A Literature Review
[ "cs.SI" ]
Automated representation learning is behind many recent success stories in machine learning. It is often used to transfer knowledge learned from a large dataset (e.g., raw text) to tasks for which only a small number of training examples are available. In this paper, we review recent advance in learning to represent social media users in low-dimensional embeddings. The technology is critical for creating high performance social media-based human traits and behavior models since the ground truth for assessing latent human traits and behavior is often expensive to acquire at a large scale. In this survey, we review typical methods for learning a unified user embeddings from heterogeneous user data (e.g., combines social media texts with images to learn a unified user representation). Finally we point out some current issues and future directions.
cs.SI
cs
Social Media-based User Embedding: A Literature Review Department of Information Systems,University of Maryland, Baltimore County Shimei Pan∗ and Tao Ding {shimei, taoding01}@umbc.edu 9 1 0 2 n u J 6 2 ] I S . s c [ 1 v 5 2 7 0 0 . 7 0 9 1 : v i X r a Abstract Automated representation learning is behind many recent success stories in machine learning. It is of- ten used to transfer knowledge learned from a large dataset (e.g., raw text) to tasks for which only a small number of training examples are available. In this paper, we review recent advance in learning to represent social media users in low-dimensional embeddings. The technology is critical for creat- ing high performance social media-based human traits and behavior models since the ground truth for assessing latent human traits and behavior is of- ten expensive to acquire at a large scale. In this survey, we review typical methods for learning a unified user embeddings from heterogeneous user data (e.g., combines social media texts with images to learn a unified user representation). Finally we point out some current issues and future directions. 1 Introduction People currently spend a significant amount of time on so- cial media to express opinions, interact with friends and share ideas. As a result, social media data contain rich informa- tion that is indicative of who we are and predictive of our online or real world behavior. With the recent advent of big data analytics, social media-based human trait and be- havioral analytics has increasingly been used to better under- stand human minds and predict human behavior. Prior re- search has demonstrated that by analyzing the information in a user's social media account, we can infer many latent user characteristics such as political leaning [Pennacchiotti and Popescu, 2011; Kosinski et al., 2013; Benton et al., 2016], brand preferences [Pennacchiotti and Popescu, 2011; Yang et al., 2015], emotions [Kosinski et al., 2013], mental disorders [De Choudhury et al., 2013], personality [Kosin- ski et al., 2013; Schwartz et al., 2013; Liu et al., 2016; Golbeck et al., 2011], substance use [Kosinski et al., 2013; Ding et al., 2017] and sexual orientation [Kosinski et al., 2013]. Although social media allow us to easily record a large amount of user data, the characteristics of social media data also bring significant challenges to automated data analyt- ics. For example, the texts and images are unstructured data. Making sense of unstructured data is always a big challenge. It is also hard to efficiently search and analyze a large so- cial graph. Moreover, social media analytics can easily suffer from the curse of dimensionality problem. If we use the basic text features such as unigrams or TF*IDF scores as the fea- tures to represent text, we can easily have hundreds of thou- sands of text features. Moreover, assessing human traits and behavior often requires psychometric evaluations or medical diagnosis, which are expensive to perform at a large scale (e.g., only trained professionals can provide an accurate as- sessment on whether someone has substance use disorders or not). Without proper user feature learning, a machine learn- ing model can easily overfit the training data and will not gen- eralize well to new data. Recent years have seen a surge in methods that automat- ically encode features in low-dimensional embeddings us- ing techniques such as dimension reduction and deep learn- ing [Mikolov et al., 2013; Le and Mikolov, 2014; Bengio et al., 2013; Grover and Leskovec, 2016; Perozzi et al., 2014]. Representation learning has increasingly become a critical tool to boost the performance of complex machine learning applications. In this paper, we review recent work on au- tomatically learning user representations from social media data. Since automated user embedding simultaneously per- forms latent feature learning and dimension reduction, it can help downstream tasks to avoid overfitting and boost perfor- mance. 2 Overview Here we define social media-based user embedding as the function that maps raw user features in a high dimensional space to dense vectors in a low dimensional embedding space. The learned user embeddings often capture the essential char- acteristics of individuals on social media. Since they are quite general, the learned user embeddings can be used to support diverse downstream user analysis tasks such as user prefer- ence prediction [Pennacchiotti and Popescu, 2011], person- ality modeling [Kosinski et al., 2013] and depression detec- tion [Amir et al., 2017]. Automated user embedding is different from traditional user feature extraction where a pre-defined set of features is extracted from data. For example, based on the Linguistic In- quiry and Word Count (LIWC) dictionary [Pennebaker et al., 2015], a set of pcycholinguistic features can be extracted from text. Similarly, a set of egocentric network features such as degree, size and betweenness centrality can be extracted from one's social network. The main difference between user em- bedding and traditional user feature extraction is that in user embedding, the user features are not pre-defined. They are latent features automatically learned from data. Figure 1 shows the typical architecture of a system that employs automated user embedding for personal traits and behavior analysis. One or more types of user data are first extracted from a social media account. For each type of user data such as text or image, a set of latent user fea- tures is learned automatically via single-view user embed- ding (e.g., text-based user embedding and image-based user embedding). The embeddings learned from different types of user data (e.g., text embeddings and image embeddings) are combined to form a single unified user representation via multi-view user embedding. The output of multi-view user embedding is then used in subsequent applications to predict human traits and behavior. Given the page limit, we define the scope of this survey quite narrowly to include only embedding methods published within the last 10 years that have been used to learn user rep- resentations from social media data. Although very relevant, We exclude embedding methods that do not learn a repre- sentation of social media users. For example, we exclude the papers on learning word embeddings from social media data [Zeng et al., 2018]. Table 1 lists the papers included in our survey. We summarize each paper along six dimensions: Data Type, Single-view Embedding Method, Auxiliary Train- ing Task, Multi-view Embedding Method, Target Task and Supervised Tuning. Figure 1: A Typical System Architecture 3 Single-View User Embedding Since most papers in table 1 learn user embedding from text, we focus on text-based user embeddings. We will also discuss the typical methods used in learning user embeddings from social networks. Finally, we briefly describe how to learn user embeddings from other types of social media data such as likes and images. 3.1 Text-based User Embedding The goal of text-based user embedding is to map a sequence of social media posts by the same user into a vector repre- sentation which captures the essential content and linguistic style expressed in the text. Here, we focus on methods that do not require any human annotations such as traditional unsu- pervised dimension reduction methods (e.g., Latent Dirichlet Allocation and Single Value Decomposition) or the more re- cent neural network-based prediction methods. Latent Dirichlet Allocation (LDA) LDA is a generative graphical model that allows sets of ob- servations to be explained by unobserved latent groups. In natural language processing, LDA is frequently used to learn a set of topics (latent themes) from a large number of doc- uments. Several methods can be used to derive a user rep- resentation based on LDA results:(1)User-LDA which treats all the posts from each user as a single document and trains an LDA model to drive the topic distribution for this docu- ment. The per-document topic distribution is then used as the representation for this user. (2) Post-LDA which treats each post as a separate document and trains an LDA model to de- rive a topic distribution for each post. All the per-post topic distribution vectors by the same user are aggregated (e.g., by averaging them) to derive the representation of each user. Ac- cording to [Ding et al., 2017], Post-LDA often learns better Among them, Data Type is used to indicate the types of social media data used in each study. Here, text refers to user-generated text data (e.g., tweets or status update on Face- book); like refers to things/people a social media user likes such as books, celebrities, music, movies, TV shows, pho- tos and products; user profile includes demographic informa- tion (gender, age, occupation, relationship status etc.) and aggregated statistics (the number of friends, followers, fol- lowings etc.); image includes the profile and background pho- tos as well as the images shared on social media; social net- work refers to social connections between different user ac- counts such as the friendship network on Facebook and the follower/retweet network on Twitter. We also list the main methods used in Single-view and Multi-view user embedding. They typically employ unsuper- vised or self-supervised learning to automatically uncover the latent structures/relations in the raw data. To employ self- supervised user embedding, frequently an Auxiliary Training Task is employed for which the system can easily construct a large number of training examples. We will explain the de- tails of these methods later. Target task describes the down- stream applications that make use of the learned embeddings. We also indicate whether the learned embeddings are further tuned/adjusted so that they are optimized for the target tasks. In the following, We first present the typical Single-view User Embedding methods. Then we summarize the methods that combine multiple types of user information together to form a unified user representation. Paper Data Type [Pennacchiotti and Popescu, 2011] text,user profile [Kosinski et al., 2013] like [Schwartz et al., 2013] text Single-view embedding Method LDA SVD LDA Auxiliary Training Task NA NA NA Multi-view embedding Task concatenation NA NA Target Task political learning ethnicity user preference age,gender, personality relationship substance use religion political learning age,gender personality attribute user interests text network SVD DeepWalk NA NA node prediction NA user SVD NA concatenation occupation text, profile text text text network user profile text network text text like text Word2Vec LDA LDA LDA PCA Word2vec PCA NA Doc2vec Doc2vec Word2vec LDA Word2vec word prediction NA NA NA NA NA interest occupation volunteerism NA CCA topic engagement word prediction NA word prediction NA word prediction like prediction word prediction NA CCA NA word prediction NA friend recommendation age, gender political learning sarcasm detection substance use political learning depression et [Gao et al., 2014] [Perozzi al., 2014] [Preot¸iuc-Pietro et al., 2015] [Song et al., 2015] [Hu et al., 2016] [Song et al., 2016] [Benton 2016] et al., et [Wallace 2016] [Ding et al., 2017] al., [Preot¸iuc-Pietro et al., 2017] [Zhang 2017] [Ding 2018a] [Liao et al., 2018] [Zhang 2018a] [Ribeiro 2018] [Zhang 2018b] et al., et al., et al., [Do et al., 2018] [Amir et al., 2017] text et al., network NA [Wang et al., 2017] user profile network NMF et al., like SVD, LDA NA NA NA NA NA NA NA NA UPPSNE gender NA NA SNE NA education political learning community delay discounting group classification user image popularity GraphSage hateful user ANRL group classification word prediction node prediction NA concatenation location network,user profile image text text network network user profile text network timestamp Doc2vec NA VGGNet LSTM GloVe NA Doc2vec Node2Vec Target- task Tuning No No No No No No No No Yes No Yes No No No No NA No No Yes No No Yes Table 1: Summary of User Embedding Methods user representations than User-LDA in downstream applica- tions. This may be due to the fact that social media posts are often short and thus each post may only have a single topic, which makes it easier for LDA to uncover meaningful topics than from one big document containing all the user posts. Matrix Representation Since we can also use a matrix to represent user-word and word-word co-occurrences, matrix optimization techniques are often used in learning user embeddings. If we use a sparse matrix to represent the relations between users and words where each row represents a user and each column represents a unique term in the dataset, we can use matrix decomposi- tion techniques such as Singular Value Decomposition (SVD) and Principle Component Analysis (PCA) to yield a set of more manageable and compact matrices that reveal hidden relations and structures in the data (e.g., correlation, orthogo- nality and sub-space relations). Recently, there is a surge of new text embedding methods that are designed to capture the semantics of words and docu- ments. Except for GloVe ( Global Vectors for Word Repre- sentation), which uses matrix optimization to learn a general representation of words, most text embedding methods em- ploy neural network-based methods. Since neural network- based methods are supervised learning methods, to learn user embeddings, we often need an auxiliary training task for which a large number of training examples can be automati- cally constructed from raw social media data. We called these methods self-supervised machine learning. Word Embedding Word2Vec is a popular neural network-based method de- signed to learn dense vector representations for individual words. The intuition behind the model is the Distributional Hypothesis, which states words that appear in the same con- text have similar meanings. There are two models for training a representation of word: Continuous Bag of Word (CBOW) and Skip Gram (SG) model. CBOW predicts a target word from one or more context words, while SG predicts one or more context words from a target word. Thus, predicting words in the neighborhood is the auxiliary task used to train word embeddings. The models are frequently trained using either a hierarchical softmax function (HS) or negative sam- pling (NS) for efficiency. To learn user embeddings from so- cial media posts, the word2vec model is first applied to learn a vector representation for each word. Then a simple average of all the word vectors by the same user is used to represent a user [Benton et al., 2016; Ding et al., 2017]. GloVe is an unsupervised learning algorithm designed to learn vector representations of words based on aggregated global word-word co-occurrence statistics from a text corpus. GloVe employs a global log bi-linear regression model that combines the advantages of global matrix factorization with that of local context window-based methods. GloVe has been used in [Ding et al., 2017] to learn a dense vector for each word. To summarize all the words authored by a user, we can use a vector aggregation function such as average to combine the vectors of all the words in a user's posts. Document Embedding Doc2Vec is an extension of Word2Vec, which produces a dense low dimensional feature vector for a document. There are two Doc2Vec models: Distributed Memory (DM) and Distributed Bag-of-Words (DBOW). Given a sequence of to- kens in a document, DM can simultaneously learn a vector representation for each individual word token and a vector for the entire document. In DM, each sequence of words (e.g. a document) is mapped to a sequence vector (e.g., document vector) and each word is mapped to a unique word vector. The document vector and one or more word vectors are aggre- gated to predict a target word in the context. DBOW learns a global vector to predict tokens randomly sampled from a doc- ument. Unlike DM, DBOW only learns a vector for the entire document. It does not use a local context window since the words for prediction are randomly sampled from the entire document. There are two typical methods for learning a user embed- ding from doc2vec results: (1) User-D2V which combines all the posts by the same user in one document and trains a doc- ument vector to represent the user. (2) Post-D2V which treats each post as a document and train a doc2vec model to learn a vector for each post. To derive a user embedding, all the post vectors from the same person can be aggregated using "average". Recurrent Neural Networks (RNN). The text embedding methods described above ignore the tem- poral order of the words in a post and of the posts in a user account. Since the order of text contains important infor- mation, to capture the sequential relations between words and posts, Recurrent Neural Network (RNN) models such as Long Short-Term Memory (LSTM) can be used [Zhang et al., 2018a]. The input to an LSTM is a sequence of word em- beddings and the output of an LSTM is a sequence of hidden states, which are the input to downstream applications. Sim- ilar to word2vec, a language model-based auxiliary task is used to train a LSTM model on raw texts. Among all the text embedding methods we discussed, some employ prediction-based technologies (e.g., Word2Vec, Doc2Vec and LSTM), others use count-based methods (e.g., PCA, SVD, LDA and GloVe). There are some empirical evidence indicating that prediction-based methods may have some advantage over count-based methods in feature learn- ing [Baroni et al., 2014]. Among all the text embedding methods we discussed, only LDA generates embeddings that are somewhat interpretable. 3.2 Social Network-based User Embedding The objective of social network-based user embedding is to map very large social networks into low-dimensional embed- dings that preserve local and global topological similarity. These methods focus primarily on learning a user represen- tation that captures essential social structures and relations of a user. The three most widely used network embedding meth- ods are DeepWalk [Perozzi et al., 2014], Node2vec [Grover and Leskovec, 2016] and Matrix Factorization. DeepWalk learns latent representations of vertices in a net- work from truncated random walks. It first generates short random walks. Each random walk S = v1, v2, ..., vl is treated as a sequence of words in a sentence. DeepWalk then em- ploys the SkipGram model (SG) in word2vec to learn the la- tent representation of a vertex. The learned embeddings can be used in many applications such as predicting user interests and anomaly detection [Perozzi et al., 2014]. Node2Vec is a modification of DeepWalk which employs a biased random walk to interpolate between Breadth-first Sampling (BFS) and Depth-first Sampling (DFS). With bi- ased random walks, Node2vec can better preserve both the second-order and high-order proximity [Grover and Leskovec, 2016]. Given the set of neighboring vertices gen- erated by a biased random walk, Node2Vec learns the vertex representation using the SkipGram model (SG). The learned embedding has been used to characterize a Twitter user's so- cial network structure [Do et al., 2018] and predict user inter- ests [Grover and Leskovec, 2016]. Non-Negative Matrix Factorization (NMF) is a matrix de- composition method with the additional constraint that all the entries in all the matrices have only positive values. The connections between network vertices are represented in an adjacency matrix. Non-negative matrix factorization is used to obtain a low-dimensional embedding of the original ma- trix. NMF was used in [Wang et al., 2017] to learn a network-based user embedding that preserves both the first- and second-order proximity. 3.3 Other Single-View User Embedding Methods In addition to texts and social networks, it is also possible to learn user embeddings from other types of social media data such as likes and images. For example, User Like Embed- ding was used in [Kosinski et al., 2013; Ding et al., 2018a] for personality and delay discounting prediction. Many text- based user embedding methods are also applicable here. For example, SVD was used in [Kosinski et al., 2013]; LDA, GloVe, Word2Vec, Doc2vec were used in [Ding et al., 2017; Ding et al., 2018a]. In addition, AutoEncoder (AE) can be used in learning like embeddings. AE is a neural network- based feature learning method [Hinton and Salakhutdinov, 2006]. It learns an identity function so that the output is as close to the input as possible. Although an identity function seems a trivial function to learn, by placing additional con- straints (e.g,, to make the number of neurons in the hidden layer much smaller than that of the input), we can still force the system to uncover latent structures in the data. Finally, Image-based User Embedding can be obtained by extracting low-level latent image features from pre-tained deep neural network models such as VGGNet [Simonyan and Zisserman, 2014]. 4 Multi-View User Embedding To obtain a comprehensive and unified user representation based on all the social media data available, we need to com- bine user features from different views together. In addi- tion to simply concatenating features extracted from different views, we can also apply machine learning algorithms to sys- tematically fuse them. We categorize these fusion methods into two types: (a) general fusion methods (b) customized fusion methods. General fusion methods can be applied to diverse types of embedding vectors such as text and image embedding or text and like embedding . In contrast, cus- tomized fusion methods are specifically designed to combine certain types of user data together. For example, ANRL is a method specifically designed to fuse user attributes and net- work topology together [Zhang et al., 2018b]. 4.1 General Fusion Methods First, we introduce two widely used general fusion methods. Canonical Correlation Analysis (CCA) CCA is a statisti- cal method that explores the relationships between two mul- tivariate sets of variables (vectors) [Hardoon et al., 2004]. Given two feature vectors, CCA tries to find a linear trans- formation of each feature vector so that they are maximally correlated. CCA has been used in [Sharma et al., 2012; Ding et al., 2017] for multi-view fusion. Deep Canonical Correlation Analysis (DCCA) DCCA is a non-linear extension of CCA, aiming to learn highly corre- lated deep architectures [Andrew et al., 2013]. The intuition is to find a maximally correlated representation of two fea- ture vectors by passing them through multiple stacked layers of nonlinear transformation. Typically, there are three steps in training DCCA: (1) using a denoising autoencoder to pre- train each single view; (2) computing the gradient of the cor- relation of top-level representation; (3) tuning parameters us- ing back propagation to optimize the total correlation. The features learned from multiple views are often more informative than those from a single view. Comparing with single-view user embedding, multi-view embedding achieved significantly better performance in predicting demographics [Benton et al., 2016], politic leaning [Benton et al., 2016] and substance use [Ding et al., 2017]. 4.2 Customized Fusion Methods Several studies in our survey employ algorithms that are specifically designed to combine certain types of data. For example, [Zhang et al., 2017] proposed a new algorithm called User Profile Preserving Social Network Embedding (UPPSNE), which combines user profiles and social net- work structures to learn a joint vector representation of a user. Similarly, Attributed Network Representation Learn- ing (ANRL) [Zhang et al., 2018a] employed a deep neu- ral network to incorporate information from both network structure and node attributes. It learns a single user rep- resentation that jointly optimizes AutoEncoder loss, Skip- Gram loss and Neighbour Prediction Loss. [Liao et al., 2018] proposed a Social Network Embedding framework (SNE), which learns a combined representations for social media users by preserving both structural proximity and attribute proximity. [Ribeiro et al., 2018] creates embeddings for each node with word embeddings learn from text using GloVe and the activity/network-centrality attributes associated with each user. So far, most of the customized fusion methods are de- signed to fuse network topology with additional node infor- mation (e.g., user profiles). 5 Embedding Fine Tuning Using Target Tasks In many cases, the learned user embeddings are simply used as the input to a target task. It is also possible that the learned user embeddings can be further refined to better support the target tasks with supervised learning. For example, in [Miura et al., 2017], the authors propose an attention-based neural network model to predict geo-location. It simultaneously learns text, network and metadata embeddings in supervised In [Song et al., 2016], the authors collected fine turning. multi-view user data from different platforms (e.g., Twitter, Facebook, LinkedIn of the same user) and predicted volun- teerism based on user attributes and network features. Then, they combine these two sets of features in supervised fine tuning to enhance the final prediction. [Farnadi et al., 2018] learned a hybrid user profile which is a shared user represen- tation learned from three data sources. They were combined at decision level to predict multiple user attributes (e.g., age, gender and personality). 6 Discussion Large-scale social media-based user trait and behavior analy- sis is an emerging multidisciplinary field with the potential to transform human trait and behavior analysis from controlled small scale experiments to large scale studies of natural hu- man behavior in an open environment. Although raw so- cial media data are relatively easy to obtain, it is expensive to acquire the ground truth data at a large scale. The pro- posed unsupervised/self-supervised user embedding methods can alleviate the "small data" problem by transferring knowl- edge learned from raw social media data to a new target task. This step is very important for many human trait and behav- ior analysis applications. According to [Benton et al., 2016; Preot¸iuc-Pietro et al., 2015], machine learning models that in- corporate unsupervised/self-supervised user embedding sig- nificantly outperform the baselines that do not employ use embedding. Based on the survey, we have also identified a few major issues in the current social media analysis research. 6.1 Although systems employing user embeddings significantly outperform baselines in terms of prediction accuracy, these systems also suffer from one significant drawback: low inter- pretability. Since user embedding features are latent features automatically uncovered by the system, it is often difficult for humans to understand the meaning of these features. This may significantly impact our ability to gain insight into these behavioral models. So far, there have not been much work fo- cusing on learning user representations that are both effective and interpretable. 6.2 Ethical Issues Due to the privacy concerns in accessing user data on social media and the sensitive nature of the inferred user character- istics, if not careful, there could be significant privacy conse- quences and ethical implications. So far, most of the studies in our survey focused primarily on optimizing system perfor- mance. There have not been sufficient discussion on ethical concerns when conducting research in this field. Interpretability 7 Future Directions Each of the main issues we identified above also presents a good opportunity for future work. 7.1 we need more research on learning high-performance user representations that are also interpretable. Some preliminary work has conducted in this area. In [Ding et al., 2018b], a Interpretable User Representation Learning knowledge distillation framework was proposed to train be- havior models that are both highly accurate and interpretable. Developing causal models for both inference and interpreta- tion is another potential new direction. 7.2 Ethical Research on Data-driven Behavior Analysis Ethical issues are complex, multifaceted and resist simple so- lutions. In addition to privacy concerns in data collection, researchers working on social media-based human trait and behavior analysis also face other ethical challenges including informed consent, traceability and working with children and young people. There is an urgent need for the research com- munity to decide an ethical framework to guide researchers to navigate obstacles, gain trust and still allow them to capture salient behavioral and social phenomena. Recently there is a surge of interests and research on fair data-driven decision making. As a researcher, we also need to be aware of the po- tential impact of social media analytics on the well-being of individuals and our society. We have also identified a few possible research directions to improve the state of the art user embedding techniques. 7.3 Temporal User Embedding since most social media data are collected over a long period of time and associated with time stamps, it is an ideal data source for longitudinal data analysis. Also, for many medical and public health applications, analyzing behavioral changes over time is critical to understanding one's decision making process. Although Recurrent Neural Networks such as LSTM can capture some sequential patterns, they totally ignore the time stamp associated with each event. More work on learn- ing user embedding from time is needed. 7.4 User Embedding with Multi-task Learning Since individual traits and behavior are highly correlated, building a prediction model that simultaneous infer multiple correlated traits and behavior should yield better performance than predicting each trait/behavior separately. Most exist- ing studies only predict one user attribute/behavior at a time. More research is needed to jointly train and predict multiple user attributes together for better performance. 7.5 Cross-platform Fusion It is also common for a user to have multiple accounts on different social media platforms. Recently, new technologies have been developed to link different social media accounts of the same user together [Abel et al., 2013]. With this linked data, it is possible to perform novel cross-platform user trait and behavior analysis such as (1) domain bias analysis that focuses on studying the impact of domain or social media platform on user trait and behavior analysis, (2) domain adap- tation that addresses how to adjust prediction models trained on one platform (e.g., Twitter) to predict the traits and behav- ior on another platform (e.g., Facebook). So far, there is some initial work on domain bias analysis and correction [Kilic¸ and Pan, 2016]. More research is needed in order to develop more robust tools for human trait and behavior analysis. References [Abel et al., 2013] F. Abel, E. Herder, G. Houben, N. Henze, and D. Krause. Cross-system user modeling and personalization on the social web. UMUAI, 2013. [Amir et al., 2017] Silvio Amir, Glen Coppersmith, Paula Car- valho, Mario J Silva, and Bryon C Wallace. Quantifying mental health from social media with neural user embeddings. In Ma- chine Learning for Healthcare Conference, 2017. [Andrew et al., 2013] G. Andrew, R. Arora, J. Bilmes, and K. Livescu. Deep canonical correlation analysis. In ICML, 2013. [Baroni et al., 2014] M. Baroni, G. Dinu, and G. Kruszewski. Don't count, predict! a systematic comparison of context-counting vs. context-predicting semantic vectors. In ACL, 2014. [Bengio et al., 2013] Yoshua Bengio, Aaron Courville, and Pascal Vincent. Representation learning: A review and new perspec- tives. IEEE Trans. Pattern Anal. Mach. Intell., 35(8), 2013. [Benton et al., 2016] A. Benton, R. Arora, and M. Dredze. Learn- ing multiview embeddings of twitter users. In ACL, 2016. [De Choudhury et al., 2013] Munmun De Choudhury, Michael Ga- mon, Scott Counts, and Eric Horvitz. Predicting depression via social media. In ICWSM, 2013. [Ding et al., 2017] T. Ding, W. Bickel, and S. Pan. Multi-view un- supervised user feature embedding for social media-based sub- stance use prediction. In EMNLP, 2017. [Ding et al., 2018a] Tao Ding, Warren K Bickel, and Shimei Pan. Predicting delay discounting from social media likes with unsu- pervised feature learning. In ASONAM, 2018. [Ding et al., 2018b] Tao Ding, Fatema Hasan, Warren K Bickel, and Shimei Pan. Interpreting social media-based substance use prediction models with knowledge distillation. In ICTAI, 2018. [Do et al., 2018] Tien Huu Do, Duc Minh Nguyen, Evaggelia Tsili- gianni, Bruno Cornelis, and Nikos Deligiannis. Twitter user ge- olocation using deep multiview learning. In ICASSP, 2018. [Farnadi et al., 2018] Golnoosh Farnadi, Jie Tang, Martine De Cock, and Marie-Francine Moens. User profiling through deep multimodal fusion. In WSDM, 2018. [Gao et al., 2014] H. Gao, J. Mahmud, J. Chen, J. Nichols, and Michelle X. Zhou. Modeling user attitude toward controversial topics in online social media. In ICWSM, 2014. [Golbeck et al., 2011] Jennifer Golbeck, Cristina Robles, and Karen Turner. Predicting personality with social media. In CHI, 2011. [Grover and Leskovec, 2016] Aditya Grover and Jure Leskovec. node2vec: Scalable feature learning for networks. In KDD, 2016. [Hardoon et al., 2004] D. Hardoon, S. Szedmak, and J. Shawe- Taylor. Canonical correlation analysis: An overview with appli- cation to learning methods. Neural computation, 16(12), 2004. [Hinton and Salakhutdinov, 2006] G. Hinton and R. Salakhutdinov. Reducing the dimensionality of data with neural networks. sci- ence, 313(5786), 2006. [Hu et al., 2016] T. Hu, H. Xiao, J. Luo, and T. Nguyen. What the language you tweet says about your occupation. In ICWSM, 2016. [Kilic¸ and Pan, 2016] D. Kilic¸ and S. Pan. Analyzing and prevent- ing bias in text-based personal trait prediction algorithms. In IC- TAI, 2016. [Kosinski et al., 2013] M. Kosinski, D. Stillwell, and T. Graepel. Private traits and attributes are predictable from digital records of human behavior. PNAS, 110(15), 2013. [Le and Mikolov, 2014] Quoc Le and Tomas Mikolov. Distributed representations of sentences and documents. In ICML, 2014. [Liao et al., 2018] Lizi Liao, Xiangnan He, Hanwang Zhang, and Tat-Seng Chua. Attributed social network embedding. TKDE, 2018. [Liu et al., 2016] L. Liu, D. Preotiuc-Pietro, Z. Samani, M. Moghaddam, and L. Ungar. Analyzing personality through social media profile picture choice. In ICWSM, 2016. [Mikolov et al., 2013] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. Distributed representations of words and phrases and their compositionality. In NIPS, 2013. [Miura et al., 2017] Yasuhide Miura, Motoki Taniguchi, Tomoki Taniguchi, and Tomoko Ohkuma. Unifying text, metadata, and user network representations with a neural network for geoloca- tion prediction. In ACL, 2017. [Pennacchiotti and Popescu, 2011] M. and A. Popescu. A machine learning approach to twitter user classification. ICWSM, 2011. Pennacchiotti [Pennebaker et al., 2015] James W Pennebaker, Ryan L Boyd, Kayla Jordan, and Kate Blackburn. The development and psy- chometric properties of liwc2015. Technical report, 2015. [Perozzi et al., 2014] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. Deepwalk: Online learning of social representations. In KDD, 2014. [Preot¸iuc-Pietro et al., 2015] D. Preot¸iuc-Pietro, V. Lampos, and N. Aletras. An analysis of the user occupational class through twitter content. In ACL, 2015. [Preot¸iuc-Pietro et al., 2017] D. Preot¸iuc-Pietro, Y. Liu, D. Hop- kins, and L. Ungar. Beyond binary labels: political ideology prediction of twitter users. In ACL, 2017. [Ribeiro et al., 2018] Manoel Horta Ribeiro, Pedro H Calais, Yuri A Santos, Virg´ılio AF Almeida, and Wagner Meira Jr. Char- acterizing and detecting hateful users on twitter. In AAAI, 2018. [Schwartz et al., 2013] A. Schwartz, J. Eichstaedt, M. Kern, L. Dz- iurzynski, S. Ramones, M. Agrawal, A. Shah, M. Kosinski, D. Stillwell, M. Seligman, et al. Personality, gender, and age in the language of social media: The open-vocabulary approach. PloS one, 8(9), 2013. [Sharma et al., 2012] A. Sharma, A. Kumar, H. Daume, and D. Ja- cobs. Generalized multiview analysis: A discriminative latent space. In CVPR, 2012. [Simonyan and Zisserman, 2014] Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale im- age recognition. arXiv:1409.1556, 2014. [Song et al., 2015] X. Song, L. Nie, L. Zhang, M. Liu, and T. Chua. Interest inference via structure-constrained multi-source multi- task learning. In IJCAI, 2015. [Song et al., 2016] X. Song, Z. Ming, L. Nie, Y. Zhao, and T. Chua. Volunteerism tendency prediction via harvesting multiple social networks. TOIS, 2016. [Wallace et al., 2016] Silvio Amir Byron C Wallace, Hao Lyu, and Paula Carvalho M´ario J Silva. Modelling context with user em- beddings for sarcasm detection in social media. CoNLL, 2016. [Wang et al., 2017] Xiao Wang, Peng Cui, Jing Wang, Jian Pei, Wenwu Zhu, and Shiqiang Yang. Community preserving net- work embedding. In AAAI, 2017. [Yang et al., 2015] C. Yang, S. Pan, J. Mahmud, H. Yang, and P. Srinivasan. Using personal traits for brand preference predic- tion. In EMNLP, 2015. [Zeng et al., 2018] Ziqian Zeng, Xin Liu, and Yangqiu Song. Bi- ased random walk based social regularization for word embed- dings. In IJCAI, 2018. [Zhang et al., 2017] Daokun Zhang, Jie Yin, Xingquan Zhu, and Chengqi Zhang. User profile preserving social network embed- ding. In IJCAI, 2017. [Zhang et al., 2018a] Wei Zhang, Wen Wang, Jun Wang, and Hongyuan Zha. User-guided hierarchical attention network for multi-modal social image popularity prediction. In WWW, 2018. Jiajun Bu, Sheng Zhou, Pinggang Yu, Jianwei Zhang, Martin Ester, and Can Wang. Anrl: Attributed network representation learning via deep neural networks. In IJCAI, 2018. [Zhang et al., 2018b] Zhen Zhang, Hongxia Yang,
1809.07690
1
1809
2018-08-11T05:57:04
Optimal flow analysis, prediction and application
[ "cs.SI", "cs.AI" ]
This thesis employs statistical learning technique to analyze, predict and solve the fixed charge network flow (FCNF) problem, which is common encountered in many real-world network problems. The cost structure for flows in the FCNF involves both fixed and variable costs. The FCNF problem is modeled mixed binary linear programs and can be solved with standard commercial solvers, which use branch and bound algorithm. This problem is important for its widely applications and solving challenges. There does not exist a efficient algorithm to solve this problem optimally due to lacking tight bounds. To the best of our knowledge, this is the first work that employs statistical learning technique to analyze the optimal flow of the FCNF problem. Most algorithms developed to solve the FCNF problem are based on the cost structure, relaxation, etc. We start from the network characteristics and explore the relationship between properties of nodes, arcs and networks and the optimal flow. This is a bi-direction approach and the findings can be used to locate the features that affect the optimal flow most significantly, predict the optimal arcs and provide information to solve the FCNF problem. In particular, we define 33 features based on the network characteristics, from which using step wise regression, we identify 26 statistical significant predictors for logistic regression to predict which arcs will have positive flow in the optimal solutions. The predictive model achieves 88% accuracy and the area under receiver operating characteristic curve is 0.95. Two applications are investigated. Firstly, the predictive results can be used directly as component critical index. The failure of arcs with higher critical index result in more cost increase over the entire network.
cs.SI
cs
UNIVERSITY OF OKLAHOMA GRADUATE COLLEGE OPTIMAL FLOW ANALYSIS, PREDICTION AND APPLICATIONS A THESIS SUBMITTED TO THE GRADUATE FACULTY in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE By WEILI ZHANG Norman, Oklahoma 2015 OPTIMAL FLOW ANALYSIS, PREDICTION AND APPLICATIONS A THESIS APPROVED FOR THE DEPARTMENT OF ENGINEERING BY Dr. Charles D. Nicholson, Chair Dr. Kash A. Barker Dr. Suleyman Karabuk c(cid:13) Copyright by WEILI ZHANG 2015 All rights reserved. This thesis is dedicated to my wife for her endless love, support and understanding. Acknowledgments First and foremost, I would like to express my deepest gratitude to my advisor, Dr. Charles D. Nicholson, for his excellent guidance, patience, encouragement and providing me with an excellent laboratory for doing research. It has been a privilege for me to work with him. He has taught me all the necessary skills to be a good scientific researcher. I appreciate all his contributions of time and ideas that made my research journey productive and fascinating. Not only do his recommendations contribute to my research over the course of my studies, but his recommendations have also been a source of inspiration in many other aspects of my life. In addition, I would like to thank him due to coming to the gym and teaching me how to work out correctly. I gratefully acknowledge the funding sources provided by Dr.Nicholson and Dr. Naiyu Wang that made my graduate studies possible. Special thanks goes to Dr. Naiyu Wang who kindly hired me as her research assistant and funded me during my graduate studies. Her support and companionship were endless. My research would not have been possible without her kind support. I would also acknowledge Dr. Kash A. Barker who has always been supportive during the course of my studies. I am grateful to him for his enthusiasm for providing a friendly and enjoyable atmosphere in the School of Industrial and Systems Engineering. I also like to thank Dr. Suleyman Karabuk for accepting to be in my committee. Finally, I would like to appreciate all the faculties and staff for building the new Master degree of Data Science and Analytics, which is a fantastic and interesting program. It is my honor to be the first graduate student in this program. My time at the University of Oklahoma was made enjoyable in large part due to the many friends and groups that became a part of my life. My iv time at the University of Oklahoma was also enriched by getting along with absolutely nice faculty members, and amazing graduate and undergraduate students. v Contents 1 Introduction 1.1 Fixed Charge Network Flow Problem . . . . . . . . . . . . . . 1.2 Identification of Critical Components . . . . . . . . . . . . . . 1.3 Principal Goals and Thesis Outlines . . . . . . . . . . . . . . . 2 Background 2.1 Fixed Charge Network Flow Formulation . . . . . . . . . . . . 2.2 Logistic Regression Model . . . . . . . . . . . . . . . . . . . . 3 Optimal Flow Analysis 3.1 Network Features Extraction . . . . . . . . . . . . . . . . . . . 3.2 Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 Akaike Information Criterion Selection . . . . . . . . . . . . . 4 Validation and Interpretation 4.1 Model Diagnostics 4.2 . . . . . . . . . . . . . . . . . . . . . . . . Interpretation of Logistic Regression Model . . . . . . . . . . . 5 Applications of Predictive Model 5.1 Important Index and Case Study . . . . . . . . . . . . . . . . 5.2 Regression Based Relaxation . . . . . . . . . . . . . . . . . . . 5.2.1 RBR Formulation . . . . . . . . . . . . . . . . . . . . . 5.2.2 RBR Computation Results . . . . . . . . . . . . . . . . 6 Conclusion 7 Future Research References vi 1 1 3 5 7 7 8 11 11 14 18 21 21 26 29 29 35 35 36 43 46 48 List of Tables 3.1 Entire Feature List of arc (i, j) ∈ A . . . . . . . . . . . . . . . . . . . 3.2 Statistic Information of arc (i, j) ∈ A of Train Dataset 3.3 Logistic Regression Model with 26 predictors . . . . . . . . . . 4.1 Confusion Matrix with Cut-off 0.49 of Train Dataset . . . . . 4.2 Static Information of Selected Features of Test Dataset . . . . 4.3 Confusion Matrix with Cut-off 0.49 of Test Dataset . . . . . . 4.4 Confusion Matrix of logistic regression with only lij on Train . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dataset 5.1 Probability and Failure Effect for Each Arc in Network . . . . 5.2 Statistics Information of the Test Bed . . . . . . . . . . . . . . 5.3 Objective Gap and Time Difference Statistics . . . . . . . . . 15 16 20 23 24 25 28 33 38 39 vii List of Figures 3.1 Example of Node i . . . . . . . . . . . . . . . . . . . . . . . . 4.1 Cost Value over Cut-off of Train Dataset . . . . . . . . . . . . 4.2 ROC Curve on Test Dataset . . . . . . . . . . . . . . . . . . . 14 23 23 5.1 Small Directed Network with 10 Nodes and 28 Arcs . . . . . . 32 5.2 Distribution of Failure Effect by Removing Top Two Critical Arcs 34 41 5.3 Distribution of Gap between zRBR and zLP by Level . . . . . 41 5.4 CPU Time of RBR and LP over Number of Variables . . . . . 5.5 Distribution of Gap between zRBR and zGRB by Level . . . . . 42 viii Abstract This thesis employs statistical learning technique to analyze, predict and solve the fixed charge network flow (FCNF) problem, which is common encountered in many real-world network problems. The cost structure for flows in the FCNF involves both fixed and variable costs. The FCNF problem is modeled mixed binary linear programs and can be solved with standard commercial solvers, which use branch and bound algorithm. This problem is important for its widely applications and solving challenges. There does not exist a efficient algorithm to solve this problem optimally due to lacking tight bounds. To the best of our knowledge, this is the first work that employs statistical learning technique to analyze the optimal flow of the FCNF problem. Most algorithms developed to solve the FCNF problem are based on the cost struc- ture, relaxation, etc. We start from the network characteristics and explore the relationship between properties of nodes, arcs and networks and the op- timal flow. This is a bi-direction approach and the findings can be used to locate the features that affect the optimal flow most significantly, predict the optimal arcs and provide information to solve the FCNF problem. In particular, we define 33 features based on the network characteristics, from which using step wise regression, we identify 26 statistical significant predic- tors for logistic regression to predict which arcs will have positive flow in the optimal solutions. The predictive model achieves 88% accuracy and the area under receiver operating characteristic curve is 0.95. Two applications are in- vestigated. Firstly, the predictive results can be used directly as component critical index. The failure of arcs with higher critical index result in more cost increase over the entire network. Specifically, in the 100 instances, total cost has an average of 9.8% increase while blocking highest two critical arcs. ix Secondly, we develop a regression-based relaxation (RBR) solution approach to the FCNF problem, in which the variable costs are replaced by a function of predictive probability. The rigorous experiments demonstrate the efficacy of the RBR by outperforming linear programming and state-of-the-art standard exact technique. x Chapter 1 Introduction 1.1. Fixed Charge Network Flow Problem The fixed charge network flow problem (FCNF) was first developed by Hirsch and Dantzig [29], which can be easily described as follows. For a given network, each node has supply/demand request and all the arcs between nodes have variable and fixed costs. The aim of the FCNF is to select the arcs and assign flow on them to transfer commodities from supply nodes to demand nodes, such that the total cost is minimum. Many practical problems, such like transportation problem [3, 22], lot sizing problem [49], facility location problem [41], network design [33, 27, 14] and others [30, 2, 37, 56, 58, 40, 61, 54, 55, 59, 60, 57] can be modeled as the FCNF. The FCNF is NP-hard [26] and over the decades, a significant number of papers have been published providing solution approaches to the FCNF. In 1966, Driebeek [21] proposed an algorithm to solve a mixed integer problem, which contains a large number of continuous variables and a few integer vari- 1 ables. He solved the problem without integer constraints first and search for the optimum integer solution. This work was among the pioneers of mixed integer programming. Many techniques commonly utilities branch and bound (B&B) to search the exact solution of the FCNF. Kennington and Unger [31] presented a new branch and bound algorithm to fixed charge transportation problem, which exploited the underlying transportation structure. Barr et al. [5] revised B&B to solve large scale and sparse fixed charge transportation problem. Cabot and Erenguc [11] discussed three properties that may improve B&B algorithm. Palekar et al. [44] developed a stronger conditional penalty for the FCNF problem, which reduced the B&B enumeration and solving time significantly. Ortega and Wolsey [43] developed branch and cut system for un- capacitated FCNF problem, including a heuristic for the dicut inequalities and branching and pruning rules. Hewitt et al. [28] obtained better solution us- ing careful neighborhood search from arc-based formulation of the FCNF and improved the lower bound by linear relaxation of the path-based formulation. Due to lacking the tight upper and lower bounds, the B&B algorithm might be computational difficulty for the large-scale and complex problems. Hence, ap- proximate solution approaches to find the near-optimal solution for the FCNF have generated considerable research interests. Balinski [3] formulated fixed cost transportation problem as integer programming and proposed a approx- imate method of solution. Sun et al. [50] applied Tabu search algorithm to solve the FCNF problem, using recency based and frequency based memories, intermediate and long term memory processes. For local search, they used network simplex method. Kim and Pardalos [32] developed a dynamic slope scaling procedure, incorporating variable and fixed costs together as a new 2 coefficient and solve linear programming problem iteratively. Monteiro et al. [38] proposed a hybrid ant colony optimization algorithm to combine two as- pects of meta-heuristic search behavior, exploration and exploitation. Based on spanning tree and Prüfer number representation, Molla-Alizadeh-Zavardehi et al. [37] proposed an artificial immune algorithm and genetic algorithm and discussed the proper values of parameters. State-of-the-art MIP solvers combine a variety of cutting plane techniques, heuristics and the branch and bound algorithm to find the global optimal solu- tion. All the modern MIP solvers use preprocessing/pre-solve methods to find a better upper bound by taking information from the original formulations, then the solvers are able to reduce the search space during B&B procedure, which significantly accelerate the entire solving processes [9]. More details of the preprocessing techniques can be found in the books of Nemhauser and Wolsey [39], Wolsey [52], Fügenschuh and Martin [25] and Mahajan [35]. 1.2. Identification of Critical Components Modern societies are heavily dependent on many distributed systems, e.g. com- munication networks [13], electric power transmission networks [20], trans- portation networks [62], and all these belongs to network science area. A substantial body of work has been done to identify critical components of networks. In general,the removal or blockage of one or more critical links could have direct and serious economic consequences in terms of overall sys- tem performance [6, 47]. Therefore, we need to identify critical segments in the network, as specified by several national and transnational directives [8]. 3 The definition of criticality is always associated with a metric, such as travel time, maximum traffic flow, reliability and resilience, etc and the failure of critical components affect the system performance most. The term 'criticality' is used to qualify the role that the elements play with respect to the global properties of the whole network. Many literature employed topological approach to identify critical components, which is capable of identifying the network edges and nodes whose failure can induce a severe structural damage to the network through the physical discon- nection of its parts [16, 10]. However, focusing on network topology neglects other characteristics of the network. Eusgeld et al. [23] employed simulation technique to capture the dynamics of the operational scenarios involving the most vulnerable parts of the critical infrastructure combined with the analysis of network topology. Bier et al. [7] proposed a computational efficient greedy algorithm, named max line interdiction algorithm, to identify the highest load line in the power system. Dheenadayalu et al. [19] identified critical high- way links using localized level-of-service measures such as the volume/capacity (V/C) ratio. Scott et al. [45] developed a comprehensive Network Robustness Index for identifying critical components and network performance consid- ering traffic flow, capacity and network connectivity. Through hypothetical networks, they proved that the Network Robustness Index yields different greater system-wide benefits with respect to travel time savings, than solution identified by V/C ratio. Besides network analysis and simulation approach, optimization is widely to identify critical components. Zio et al. [63] proposed a multi-objective opti- mization model aimed at the maximization of the importance of the impor- 4 tance of the groups and minimization of their dimension. They applied the model to analyze the Italian high-voltage electrical transmission network. Sim- ilarly, Shen et al. [46] developed three objectives including the maximization of the number of connected components, minimization of the largest component size and maximization of the minimum cost required to reconnect the whole network, by deleting a group of nodes. In addition, Demšar et al. [18] proposed a dual graph model to identify critical locations in a spatial network in terms of vulnerability risk. Crucitti et al. [15] proved that the disruption of a single critical node is sufficient to decrease the efficiency or performance of the entire system. Barker et al. [4] involves two critical importance measures considering the adverse impact while blocking the link and positive impact if the link is not disrupted in the disaster. In summary, the critical index can be built in terms of different scenarios. Removing the network component and quantifying the corresponding system- wide consequence is widely employed to build the component importance index regardless which technique used in the literature. 1.3. Principal Goals and Thesis Outlines As the best of our knowledge, none of existing literature have developed models to analyze and predict which arcs are used in the optimal solution of the FCNF. This is the first paper that employs statistical learning technique to analyze the optimal flow of the FCNF and distinguishes the features to predict the optimal arcs. This thesis involves three tasks. Task 1 will extract network features that can be used as predictors and how to develop a predictive model with 5 these features. By solving thousands of random generated FCNF instances, we collect over 60, 000 observations and develop logistic regression model based on the dataset, which can be used to quantify the influence of each statistical significant network characteristics. Task 2 will validate the predictive model through a series of diagnostic techniques will interpret the model. Task 3 of this thesis, will discuss two applications of this model. The first one is to identify critical arcs in a network with respect to the FCNF problem without solving any optimization problems. The other one is named regression-based relaxation (RBR), a approximate method for the FCNF. The remainder of this thesis is organized as follows. Chapter 2 introduces the background of the FCNF and the logistic regression model. The whole process for developing logistic regression model is discussed in Chapter 3 and Chapter 4 validates and interprets the predictive model. Chapter 5 introduces two applications of the predictive model. Chapter 6 and 7 summarize the thesis and future work, respectively. 6 Chapter 2 Background 2.1. Fixed Charge Network Flow Formulation The fixed charge network flow (FCNF) problem is described on a network G = (N, A), where N and A are the set of node index i and arc index (i, j), respectively. Let cij and fij denote the variable and fixed cost of arc (i, j) ∈ A, respectively. Each node has a supply/demand request Ri (Ri > 0 if node i is a supply node; Ri < 0 if node i is a demand node; otherwise, Ri = 0). Artificial capacity, Mij, is used in the problem formulation to ensure that the fixed cost fij is incurred whenever there is a positive flow on arc (i, j) ∈ A. There are two variables in the FCNF, xij denotes the flow and yij represents the corresponding decision variable on arc (i, j) ∈ A . All the instances in this work are single-commodity FCNF and the formulation is as follows, 7 min (cid:88) s.t. (cid:88) (i,j)∈A (i,j)∈A (cijxij + fijyij) (cid:88) xij − (j,i)∈A xji = Ri 0 ≤ xij ≤ Mijyij yij ∈ {0, 1} (2.1) (2.2) (2.3) (2.4) ∀i ∈ N ∀(i, j) ∈ A ∀(i, j) ∈ A Here, the objective function in (2.1) is nonlinear. Constraint (2.2) ensures that the inflow and outflow satisfy the supply/demand at node i ∈ N. Mi,j is arc capacity in constraint (2.3) to ensure that the flow on arc (i, j) ∈ A can be positive only when the arc (i, j) ∈ A is open (yij = 1). If arc(i, j) is not capacitated, Mij should be artificially set to a number which is larger than the total supply requests to not inhibit feasible solution. Constraint (2.4) defines yij as binary, which makes the problem a 0-1 mixed integer programming problem. 2.2. Logistic Regression Model The logistic regression is a classification model and only has one response/dependent variable. The logistic regression is commonly used in data mining applications, computer science, biology and so on [12]. There are two classes of the logistic regression, binomial and multinomial. The response variable of binomial logis- tic regression has exactly two classes or binary outcomes, while multinomial logistic regression has more than two. The dependent variable in this paper, 8 denoted by Y , is binary and Y = 1, arc is used in the FCNF 0, otherwise. The initial output of the logistic regression is not 0 or 1, but the probability that the response variable equals to 1, which in this work refers to the like- lihood that the arc has positive flow in the optimal solution of the FCNF. The probability is derived by a logistic function of a variety of independent predictors and the logistic regression coefficients. We use π(p) = P (Y = 1p1, p2, . . . , pk, . . . , pK) to represent the conditional probability of Y = 1 given pk when the logistic regression is used. The specific logistic regression model is, π(p) = 1 + e−(β0+β1p1+β2p2+···+βkpk+···+βK pK ) 1 (2.5) where K is the total number of independent predictors, pk is the kk predictor and βk is the kth parameter. Let g(p) denote the logistic transformation of π(p) and defined as, g(p) = ln[ π(p) 1 − π(p) ] = β0 + β1p1 + β2p2 + ··· + βkpk + ··· + βKpK The logit, g(p), is linear in its parameters. The logistic transformation has many desirable properties of linear regression which we will use to discuss the model and interpretation. Transforming the likelihood to binary value needs 9 a cut-off point, above which the response variable is set to 1. The details of setting the cut-off value is discussed in Chapter 4. 10 Chapter 3 Optimal Flow Analysis 3.1. Network Features Extraction In this section, we extract features from network to predict which arcs will be open in the optimal solutions of the FCNF with four types of features (network, arcs, relaxation solutions and nodes). In the network level, the features include the total number of nodes (n), the number of arcs (m), the sum of supply requests (S) and the density of network , which is denoted . The total supplies is transformed to the average supply per by ρ = m 2) 2(n n. Arc (i, j) ∈ A has variable cost cij and fixed cost fij based on node, ¯S = S formulation (2.1). Let γij denote the ratio between fixed cost and variable cost of arc (i, j) ∈ A, γij = fij cij ∀(i, j) ∈ A. 11 Let lij denote the flow solution of arc (i, j) ∈ A in linear relaxed FCNF problem and the normalized value of lij is denoted by ¯lij, ¯lij = lij S ∀(i, j) ∈ A. The value of ¯lij indicates the optimal flow of the linearized FCNF, and another binary predictor of the optimal arc is created, which is denoted by lB ij, 1, ¯lij > 0 0, otherwise. lB ij = The two predictors are both related with the optimal flow in the linear relaxed FCNF, but reflect two different types of information. The value of ¯lij indicates ij shows the arc is open or not in the how much flow on arc (i, j) ∈ A and lB linearized FCNF. The information of head node i and tail node j of arc (i, j) ∈ A should also be considered as the features that may facilitate the predictive model due to the fact that the goal of FCNF is to transfer commodities from supply nodes to demand nodes through several transshipment nodes. Accordingly, we detail the predictors associated with head node i ∈ N, with which tail node j ∈ N is same. Let ti denote the type of node i ∈ N,  ti = 1, ri > 0 0, ri = 0 . −1, ri < 0 12 This is to say if node i is a supply node, ti = 1; if node i is a transshipment node, ti = 0 ; and otherwise if node i is a demand node, ti = −1. Let di∗ denote the outdegree of node i. It is reasonable to assume that the nodes adjacent to node i have a significant influence on the corresponding response variable. For example, if a supply node is connected with node i, the probabilities of this arc and other arcs out from node i to be selected will increase. Let dS i∗ i∗) denote the number of supply (demand) tail nodes adjacent to node i. If a demand node is connected with node i, the probabilities of this arc and other (dD arcs into node i to be selected will increase as well. Let rS i∗) denote the sum of supply (demand) requirements of the tail endpoints adjacent to node i. i∗ (rD In the same way, the indegree of node i is denoted as d∗i, the number of supply (demand) head nodes adjacent to node i is denoted by dS∗i (dD∗i), and sum of supply (demand) requests of head endpoints adjacent to node i are denoted as rS∗i (rD∗i). Figure 3.1 illustrates the notations with a small directed network, in which the number under each node is the requirements of that node and arrow shows the direction of the corresponding arc. The value of di is 6 because we have three arcs into node i and three arcs out from node i. The requirement of node i is 100 and thus the value of ti is 1. All the notations defined before are showed in this figure. We observe that all the predictors with respect to degrees and requirements are correlated with the size and total requirements of each specified instance, consequently it is necessary to normalize such predictors. All the predictors with respect to degrees are divided by the number of nodes N, and then we i∗, ¯d∗i, ¯dS∗i, ¯dD∗i ( ∀i ∈ N). All the predictors related with i∗, ¯rS∗i, ¯rD∗i have ¯di, ¯di∗, ¯dS requirements are divided by total supply S, and we get ¯ri, ¯rS i∗ , ¯dD i∗, ¯rD 13 Figure 3.1: Example of Node i In summary, we totally have 33 predictors for a individual arc (∀i ∈ N). (i, j) ∈ A as summarized in Table 3.1. 3.2. Data Collection In order to obtain sufficient data set, we create 1249 single-commodity FCNF instances randomly, each which has characteristics corresponding to difficult FCNF problem instances (e.g. high fixed to variable cost ratio). All prob- lems are solved by GUROBI 5.6 on the platform of Windows 7 64bit machine with Intel Xeon CPU E5-1620 and 8 GB RAM. The tests include network works with range in 5 to 15, thus we can solve them optimally quickly. For each problem, the number of arcs m is randomly selected. Specifically, we randomly choose n − 1 ≤ stance where each of the m 2 The percentage of supply, demand, and transshipment nodes are respectively m 2 ≤ undirected arcs is replaced by two directed arcs. and create a connected network in- n(n − 1) 2 randomly selected with approximate probabilities 0.2, 0.2 and 0.6. The proba- 14 i100−100−100100100100−100di=6ti=1di∗=3ri=100dSi∗=1dDi∗=2rSi∗=100rDi∗=−200d∗i=3dS∗i=2dDi∗=1rSi∗=200rD∗i=−100 Table 3.1: Entire Feature List of arc (i, j) ∈ A Notation Description n m ρ ¯S cij fij γij ¯lij lB ij ti tj ¯ri ¯rj ¯rS i∗ ¯rD i∗ ¯rS∗i ¯rD∗i ¯rS j∗ ¯rD j∗ ¯rS∗j ¯rD∗j ¯di∗ ¯dS i∗ ¯dD i∗ ¯d∗i ¯dS∗i ¯dD∗i ¯dj∗ ¯dS j∗ ¯dD j∗ ¯d∗j ¯dS∗j ¯dD∗j number of nodes total number of arcs network density average supply variable cost of arc (i, j) fix cost of arc (i, j) ratio between fix cost and variable cost of arc (i, j) normalized value of linearized relaxation solution of arc (i, j) binary version of linearized relaxation solution of arc (i, j) type of head node i type of tail node j requirements of head node i requirements of tail node j sum of supply requirements of tail endpoints adjacent to node i sum of demand requirements of tail endpoints adjacent to node i sum of supply requirements of head endpoints adjacent to node i sum of demand requirements of head endpoints adjacent to node i sum of supply requirements of tail endpoints adjacent to node j sum of demand requirements of tail endpoints adjacent to node j sum of supply requirements of head endpoints adjacent to node j sum of demand requirements of head endpoints adjacent to node j outdegree of head node i number of supply tail nodes adjacent to node i number of demand tail nodes adjacent to node i indegree of head node i number of supply head nodes adjacent to node i number of demand head nodes adjacent to node i outdegree of tail node j number of supply tail nodes adjacent to node j number of demand tail nodes adjacent to node j indegree of tail node j number of supply head nodes adjacent to node j number of demand head nodes adjacent to node j 15 Table 3.2: Statistic Information of arc (i, j) ∈ A of Train Dataset Max. Notation Min. 5.00 15.00 210.00 8.00 0.13 1.00 84.93 0.00 20000 2018 0.00 0.00 -1.00 -1.00 0.00 -1.00 0.00 -11.00 0.07 0.00 0.00 0.07 0.00 0.00 0.00 1st Qu. Median Mean 11.71 10.00 89.86 50.00 0.69 0.51 307.20 480.50 5.01 2.52 40024 29998 5242 42839 0.02 0.00 0.11 0.00 0.15 -1.00 -0.16 0.00 0.60 0.40 -0.65 -1.00 0.00 0.64 -0.66 -1.00 0.64 0.50 0.17 0.28 0.18 0.10 0.64 0.50 0.28 0.00 0.00 0.18 0.11 0.00 3rd Qu. 14.00 126.00 0.88 622.93 7.49 50056 15942 0.00 0.00 1.00 0.15 0.90 -0.45 1.01 0.00 0.83 0.38 0.25 0.83 0.62 0.36 0.00 n m ρ ¯S cij fij γij ¯lij lB ij ti, tj ¯ri, ¯rj i∗, ¯rS ¯rS j∗ i∗, ¯rS ¯rD j∗ ¯rS∗i, ¯rS∗j ¯rD∗i, ¯rD∗j ¯di∗, ¯dj∗ ¯dS i∗, ¯dS j∗ i∗, ¯dD ¯dD j∗ ¯d∗i, ¯d∗j ¯dS∗i, ¯dS∗j ¯dD∗,i, ¯dD∗,j yij 12.00 84.00 0.72 456.75 5.00 39983 7997 0.00 0.00 0.00 0.00 0.60 -0.69 0.00 0.00 0.67 0.27 0.17 0.67 0.00 0.00 0.00 1325.80 10.00 60000 141547369 1.00 1.00 1.00 1.00 1.00 0.00 10.00 0.00 0.93 0.83 0.67 0.93 0.93 0.93 1.00 bilities are approximate in that adjustments are made to ensure an instance is feasible. The variable costs and fixed costs for each link are randomly assigned on U (0, 20) and U (20000, 60000), respectively. The total requirements for each supply node is randomly assigned on U (1000, 2000). The total requirements of supply node is distributed randomly as negative requirements to the demand nodes. The statistics information of the final predictors created in Table 3.1 in our train dataset are reported in Table 3.2. Please note that head nodes and tail nodes share the same statistical information. Every arc in each instance is an unique record in our dataset and there are 16 61594 rows in train dataset with 1067 instances and 37651 rows in test dataset with 182 instances. The yij is the binary variable in the optimal solution of the FCNF instances and it is apparently to observe from Table 3.2 that the average value of yij is quite low, which means only 11% of arcs are used in the optimal solutions overall and this value is smaller when the problem is larger. Zhang and Nicholson [53] provides evidence to illustrate that only a tiny proportion of integer variables are nonzero in the optimal solution of general mixed integer programming problems. Among the 61594 records, only 6755 arcs are used (yij = 1) and a huge proportion of arcs are relative useless (yij = 0). Accordingly, the dataset now is biased and can not be used to perform analysis at this point. Moreover, the records are related with each other in the same instance since an trivial arc could be chosen if the optimal arc is removed, which is like an underlying feature affecting the probability, consequently it is necessary to adjust the data set to weaken this effect. To make the dataset fair and reasonable to train predictive model, we use the undersampling technique to adjust train dataset as described below. Reversely, we can also use oversampling to increase the number of records where yij = 1. Process of undersampling: Step 1. Fetch the records that yij equals 1 and number of rows is stored as Row1; Step 2. Set Row0 = 0 as the number of rows that yij equals 0; Step 3. Randomly fetch a record from the records that yij equals 0, and Row0 = Row0 + 1; Step 4. If Row0 < Row1, go to step 3; otherwise, output all records and stop. Following above process, the final train dataset contains 13349 rows and the 17 mean value of yij is 0.51. Note, the undersampling procedure is only performed on train dataset but not on the test dataset. 3.3. Akaike Information Criterion Selection In this subsection, we use stepwise variable selection algorithm to select the features based on the Akaike information criterion (AIC) [1]. The formulation of AIC is [51], AIC = −2logL + 2K, (3.1) where L is the likelihood and K is the number of predictors. From the for- mulation (3.1), it is straightforward to identify that step wise regression pro- cess handles the trade-off between the performance and the complexity of the model. Step wise AIC process could be performed with three directions: backward, forward and bi-direction. In this work, the process of backward stepwise selec- tion starts from 33 predictors and the value of AIC equals to 7, 924.72, drops one feature at each step, and finally stops at 26 predictors with AIC value of 7, 910. The final logistic regression model is reported in Table 3.3, in which the value of coefficients (β) indicates the magnitude and direction of the features affecting the probability that an arc is in the optimal solution. The odds ratio 18 (OR) is the exponential of the coefficients (β) and can be derived by, π(pk) = odds(π(pk)) = OR(pk) = 1 1 + e−β0+βkpk , , π(pk) 1 − π(pk) odds(π(pk + 1)) odds(π(pk)) = eβk. The value of OR provides an interpretation for the coefficients β, which is the change of dependent variable for 1-unit increase/decrease of the corresponding independent predictor. If the predictor is binary, replace the π(pk + 1) with π(pk = 1) and π(pk) with π(pk = 0). 19 Table 3.3: Logistic Regression Model with 26 predictors Predictors (Intercept) n m cij fij γij ti = 0 ti = 1 tj = 0 tj = 1 ¯lB ij ¯lij ¯ri ¯rS i∗ ¯rD i∗ ¯rS∗i ¯rD∗i ¯rS j∗ ¯rD j∗ ¯rS∗j ¯di∗ ¯d∗i ¯dD i∗ ¯dS∗i ¯dD∗i ¯dj∗ ¯dD j∗ ¯dS∗j ¯dD∗j β 8.32E+00 -4.80E-02 -5.52E-03 -8.79E-02 -1.50E-04 1.28E-07 -5.43E-01 2.17E+00 -3.01E+00 -2.38E+00 1.40E+00 5.76E+00 9.67E-01 7.65E-01 8.78E-01 -2.15E-01 4.64E-01 -7.97E-01 -9.17E-01 -1.22E-01 -2.59E+00 -2.69E+00 -1.30E+00 1.84E+00 4.57E+00 -2.30E+00 -1.58E+00 3.19E+00 1.26E+00 Std. Error 4.41E-01 2.63E-02 1.86E-03 1.04E-02 3.49E-06 1.15E-07 3.15E-01 2.60E-01 2.98E-01 2.10E-01 1.16E-01 5.11E-01 3.38E-01 1.73E-01 1.99E-01 5.46E-02 8.81E-02 1.67E-01 2.04E-01 4.16E-02 5.67E-01 3.37E-01 7.08E-01 4.98E-01 5.85E-01 5.69E-01 7.49E-01 4.96E-01 5.04E-01 OR Pr(> z) 4121.613533 <2.00E-16 0.067393 0.953095662 0.994499185 0.003003 0.915861616 <2.00E-16 0.999850511 <2.00E-16 1.000000128 0.268276 0.58094453 0.084507 8.793387337 <2.00E-16 0.049242412 <2.00E-16 0.092458073 <2.00E-16 4.067383833 <2.00E-16 318.3018034 <2.00E-16 0.004193 2.629516529 2.148779486 9.98E-06 9.82E-06 2.406323346 8.15E-05 0.806380148 1.590104918 1.40E-07 1.86E-06 0.450724045 6.71E-06 0.399596496 0.003284 0.884971357 0.07487015 4.79E-06 1.37E-15 0.067609958 0.066353 0.272259397 6.296538261 0.000221 5.60E-15 96.73739121 5.19E-05 0.100258844 0.034836 0.205769226 24.21567135 1.26E-10 0.01215 3.536013632 Significant code *** . ** *** *** . *** *** *** *** *** ** *** *** *** *** *** *** ** *** *** . *** *** *** * *** * Significant codes: '***', 0.001; '**', 0.01; '*', 0.05; i referred to the head node i and j referred to the tail node j of arc (i, j) ∈ A 20 Chapter 4 Validation and Interpretation 4.1. Model Diagnostics In this subsection, a series of diagnostic techniques are performed to validate the logistic regression model as showed in Table 3.3. Firstly, k-fold cross validation is used on the train data set. Specifically, k equals to 10 in our test, which is the most common used value of k [36]. The train data set is randomly partitioned into 10 equal size subsamples. A single subsample is retained as validation data set for testing the model and the remaining 9 subsamples are used as training data. This process is repeated 10 times, in which each subsample is employed as test exactly once. The 10 results then are averaged to give one estimation. In this test, the average estimation accuracy is 0.884. Then, analysis of confusion matrix, also named contingency table or an error matrix [48], is performed on the train dataset as well, which is widely used to visualize the performance of logistic regression. In the confusion matrix, each row represents the number of 1 or 0 from observations (yij in Table 3.2), which 21 is called actual value, and every column shows the predict values from logistic regression model. Confusion matrix reports four derivations, false positives (FP), false negatives (FN), true positives (TP), and true negatives (TN). Let F P R denote the false positive rate and F N R denote the false negative rate. The formulation to compute F P R and F N R are, F P R = F N R = F P F P + T N F N F N + T P , . As explained before, the logistic regression model only gives the probability that an arc is used in the optimal solution. Therefore, there is a need to find a cut-off point, so that the response variable with the probability larger than the point is set to 1; otherwise, the response variable is assigned with 0. To find the optimal cut-off point, two costs are associated with F P R and F N R, represented by CF P R and CF N R, and the false cost function is, CF P RF P R + CF N RF N R. (4.1) The optimal cut-off point is obtained by solving the minimization problem with the false total cost based on formulation (4.1) as objective function,. Accordingly, the optimal solution varies with different cost structures, which should be determined by specified applications. Assume the cost of F P R equals to F N R in this thesis, Figure 4.1 plots the cost as a function of cut-off point and the optimal cut-off point is 0.49. The detailed confusion matrix with cut-off point equals to 0.49 is listed in Table 4.1. Furthermore, the model is validated on test data set, which is never touched 22 Figure 4.1: Cost Value over Cut-off of Train Dataset Table 4.1: Confusion Matrix with Cut-off 0.49 of Train Dataset Predictive False True Actual 0 1 5683 (TN) 638 (FP) 899 (FN) 6129 (TP) Figure 4.2: ROC Curve on Test Dataset 23 CutoffExplicit cost0.00.20.40.60.81.00.10.20.30.40.5False positive rateTrue positive rate0.00.20.40.60.81.00.00.40.800.20.61 Table 4.2: Static Information of Selected Features of Test Dataset 1st Qu. Median 20.00 19.00 50.00 84.00 0.00 0.00 476.90 312.20 2.50 5.00 Mean 20.62 89.86 0.00 464.20 5.01 3rd Qu. 23.00 126.00 0.00 565.50 7.52 20000.00 2024.00 30150.00 5256.00 40260.00 8038.00 40140.00 42790.00 50180.00 15940.00 60000.00 78880000.00 Notation n m 1 N 2 ¯S cij fij γij ¯lij ti ¯ri ¯rS i∗ ¯rD i∗ ¯rS∗i ¯rD∗i ¯di∗ ¯dS i∗ ¯dD i∗ ¯d∗i ¯dS∗i ¯dD∗,i yij Min. 15.00 8.00 0.00 58.22 0.00 0.00 -1.00 -1.00 0.00 -1.00 0.00 -19.00 0.04 0.00 0.00 0.04 0.00 0.00 0.00 0.00 -1.00 -0.10 0.47 -0.88 0.00 -0.98 0.50 0.19 0.10 0.50 0.00 0.00 0.00 Max. 25.00 210.00 0.00 993.60 10.00 0.99 1.00 0.99 1.00 0.00 16.11 0.00 0.96 0.61 0.48 0.96 0.96 0.96 1.00 0.01 0.15 0.00 0.65 -0.65 0.65 -0.66 0.65 0.27 0.18 0.65 0.27 0.19 0.07 0.00 1.00 0.09 0.86 -0.46 1.09 0.00 0.83 0.36 0.25 0.83 0.60 0.35 0.00 0.00 0.00 0.00 0.68 -0.68 0.00 0.00 0.68 0.27 0.18 0.68 0.00 0.00 0.00 24 Table 4.3: Confusion Matrix with Cut-off 0.49 of Test Dataset Predictive False True Actual 0 1 29820 (TN) 221 (FP) 5363 (FN) 2246 (TP) before. The statistics information of test data set is summarized in Table 4.2, in which we can see the number of nodes ranges between 15 and 25. Therefore, the problems solved in the test data set are larger than train data and none of problems exist in both data sets. Firstly, Table 4.3 reports the confusion matrix applied test data set with cut-off point of 0.49. According to the table, the predictive model also performs well. Secondly, receiver operating characteristic (ROC) is used to measure the performance of the predictive mode as the cut-off point is varied. This curve is created by true positive rate and false positive rate. The diagonal is called random guess line since that if we guess randomly, F P R and T P R are 50% to 50% (Figure 4.2). The ROC space is the distance between point on ROC curve and line. The best possible prediction yield the left corner point (0, 1) which is also named perfection classification. In this test, the area under ROC curve achieves 0.95. In summary, through rigorous validation process, it can be inferred that the logistic regression model is accurate on both train data set and test data set. The final model is displayed in Table 3.3 and the cut-off point is set as 0.49 in the Chapter 5. 25 4.2. Interpretation of Logistic Regression Model This section interprets the notations and the corresponding values in the lo- gistic regression model in detail. Firstly, the model is in agreement with some intuitive network characteristics and quantifies the exact effect statistically. In Table 3.3, m denotes the total number of arcs in the network and is statistical significant in terms of the low p-value (0.003) and the high significant code ('***' refers to the most significance). The logistic parameter of m (βm) equals −5.52E−03 with the standard error of 1.86E−03 and the corresponding odds ratio is 0.994, which is obtained by taking the exponential of βm. This is to say, holding every predictors constant except m, when the network has one more arc, the response variable decreases by 0.5%. Intuitively, more arcs in the network results in more alternative paths exiting in the network. There- fore, the overall probability for an arc to be selected in the optimal solution is naturally negative correlated with the number of arcs. Both variable and fixed costs have a significantly effect on the response variables as showed in Table 3.3. The 1-unit increase of variable cost and fixed cost can drop the response variable by 8.4% and 0.01%, respectively. However, we can not di- rectly infer that variable costs are more influential than fixed costs, since the odds ratio should be combined with the range of the predictors to evaluate the impact. As shown in Table 3.2, the range of cij is 10 and the corresponding of response variable has maximum 84% increase/decrease, while the fij can vary between 20, 000 and 60, 000, hence the possible corresponding probability can increase/decrease by 400% at most. Consequently, fixed cost has more effect with above variety with this range. Secondly, two hidden findings can be concluded from the model. Although 26 fixed and variable costs are statistical significant, the ratio between them is not so important because the p-value is 0.27 and the odds ratio of γij is 1.000000128, close to 1. In addition, total supply requirements and density are involved in our candidate predictors, but they are not statistically sig- nificant in terms of Akaike information criterion. Therefore, the accuracy of the predictive model is not affected by total supply requests and the network density. Thirdly, an arc is whether or not used in the FCNF is notably affected by the corresponding head and tail nodes because almost all the features of nodes are statistically significant. For example, the response variable increases by 779% if the type of head node changes from demand to supply. This could also be verified by the odds ratio of ¯ri, which indicates that 1-unit increase of the requests of head node leads to 162% increase of response variable. Keeping the other predictors constant, if the indegree of the head node increase 1-unit, there is 93% decrease of the response variable. The other relationships can be found in Table 3.3. Finally, an arc has positive flow in the linear relaxed FCNF has a much higher probability to be used in the original FNCF. With the notable influence of ¯lij, the response variable is 3, 1730% more likely to be used when the flow of arc increases from zero to full capacity. If an arc is open in the linearized FCNF, the likelihood of this arc has positive flow increases by 307%. This property is commonly employed to improve the branch and bound technique at either root node or branch nodes [24, 17, 34, 53]. This paper provides statistical evidence to support these works but also indicates the non-negligible difference between the optimal solutions of the linear relaxation problem and the original 27 Table 4.4: Confusion Matrix of logistic regression with only lij on Train Dataset Predictive False True Actual 0 1 6187 (TN) 2844 (FP) 395 (FN) 3923 (TP) FCNF. In order to illustrate the problem, we build a logistic regression model on the train dataset only with one predictor ( ¯lij) and the confusion matrix is showed in Table 4.4. The total false cost of Table 4.4 is 0.21, while the logistic regression model (Table 3.3) is only 0.11, in which other predictors revise the misclassification of ¯lij. All these findings can be applied to analyze the networks characteristics, identify critical components of the network and provide preprocessing information to the FCNF problem. 28 Chapter 5 Applications of Predictive Model 5.1. Important Index and Case Study According to literature review in Section 1.2, to identify the critical compo- nents or develop components importance index (CII), a measure is required to evaluate the network performance. In this thesis, the objective value of the optimal solution in FCNF is employed to quantify the network service level. The objective value is not a single cost value, but results through solving the FCNF. The optimal solution considers many metrics that are widely used in- dividually to evaluate the network, e.g. network flow, link capacity, delivery costs and network connectivity. Since FCNF is NP-hard and computational expensive to find the optimal solution, no existing literature uses it to mea- sure the network performance. When the problem extends to identify critical groups of edges of different sizes over the entire network, it is a NP-complete combination problem, which is difficult to solve by itself. The predictive model provides a efficient, simple, inexpensive and practical way to compute the CII 29 for each arc in terms of FCNF without solving any NP-complete or NP-hard problems, which extends the metrics of evaluating network performance family. The CII is defined as the probability that an arc is selected in the optimal solution of the FCNF for the reason that, intuitively, destruction or damaging of arcs in the optimal solutions causes a rerouting of the flow from optimal path to a non-optimal path with higher costs between supply and demand nodes. The higher probability indicates the arc is more important and vice verse. To formulate the measure, let πij denote the likelihood that arc (i, j) ∈ A is used in the optimal solution, the value of which is directly from the predictive model developed in Section 3.3. Let bij represent whether or not to remove arc (i, j) ∈ A from the network, 0, remove arc (i,j) 1, otherwise bij = ∀(i, j) ∈ A. Furthermore, let z = z(bij) where z(bij) represents the relationship between total cost of the network and removal status of arc (i, j) ∈ A, z(bij) = min (cid:88) s.t. (cid:88) (i,j)∈A (cijxij + fijyij) (cid:88) xij − xji = Ri (i,j)∈A (j,i)∈A 0 ≤ xij ≤ Mijyij yij ∈ {0, 1} yij ≤ bij bij ∈ {0, 1} 30 ∀i ∈ N ∀(i, j) ∈ A ∀(i, j) ∈ A ∀(i, j) ∈ A ∀(i, j) ∈ A Finally, we define the failure effect as the percentage increase of cost caused by the disruption of segments compared with the cost incurred when all arcs are present in the network (bij = 0,∀(i, j) ∈ A) represented by z0. Let η(bij) denote the failure effect and the equation is expressed as, η(bij) = z(bij) − z0 z0 × 100% In real-world, it is not practical to solve the large FCNF problem exactly and the value of ηij is unavailable due to the computational difficulty. According to our experiments, the solving time increase significantly when the number of nodes achieves 30. However, the predictive model is simply linear calculation and can output the results immediately. The critical components measure approach is illustrated with a random directed network as depicted in Figure 5.1. Node 1, 7 and 9 are supply nodes and node 0, 5 and 6 are demand nodes. The arrow on the line indicates the direction and each node-pair has two directed arcs, thus we total have 28 arc variables. The value of z0 for this instance is 316074. Table 5.1 displays the variable cost, fixed cost, probability to be in optimal solution, failure effect for each arc comprising the network. Note, since this is a directed network, arc (0, 1) ∈ A is not same as arc (1, 0) ∈ A. Based on this table, both the probability of arc (7, 6) and (9, 0) is 0.99, and their failure effects are 10.22% and 6.78%, respectively. Although they do not have the lowest variable cost or fixed cost, the endpoints of these two arcs are a pair of supply and demand nodes. The predictive model automatically considers all the features of this arc and give the probability that the likelihoods of these two arcs to be selected in the optimal solution are close to 1. Some arcs with 31 Figure 5.1: Small Directed Network with 10 Nodes and 28 Arcs low costs, e.g. (6, 7), (0, 9), (8, 0), (5, 8) and (8, 7), have high CII values as well. These arcs can be contrasted with arcs with very low CII values, which means they do not contribute to any failure effects. In addition, according to the table, the directed arcs connecting same pair of nodes do not share same failure effect and probability. For example, the value of probability and failure effect of arc (9, 4) are much higher than arc (4, 9). Consequently, it is non-trivial to consider the direction of arcs in the identification of critical components. Finally, optimization approach to Zio et al. [63], Shen et al. [46] can only find the optimal critical segments in the network, but the predictive model is capable to calculate CII for each bridge. Accordingly, decision maker can combine the CII with other indices, e.g. social and economic, to select critical components. In order to evaluate the quality of critical identification method, the experi- ment design includes tests on a variety of network densities, each which has characteristics corresponding to difficult FCNF problem instances (e.g. high fixed to variable cost ratio). The tests consists of 100 networks with 20 nodes, 32 1234567890 Table 5.1: Probability and Failure Effect for Each Arc in Network Arc(i, j) (7,6) (9,0) (9,4) (1,0) (6,7) (1,2) (0,9) (8,0) (2,5) (5,8) (7,3) (8,7) (4,6) (3,7) (7,8) (0,1) (2,3) (5,2) (4,9) (8,5) (0,8) (3,2) (2,1) (6,4) (4,2) (4,3) (3,4) (2,4) cij 7.20 6.51 5.95 9.69 1.93 7.17 3.10 7.54 8.90 3.90 1.47 0.13 9.09 4.93 5.68 1.27 5.90 2.53 1.21 4.01 8.61 3.43 5.07 7.67 7.62 4.77 6.18 3.63 fij 41011.33 44846.94 22028.81 42158.06 24561.20 44364.01 28765.87 26588.18 52552.74 28365.83 43307.38 33349.63 53894.90 40543.16 49949.96 56093.72 31594.21 46060.27 48247.28 57456.67 47039.03 41127.17 50998.22 48589.75 39342.56 46389.37 48528.36 54166.87 πij 0.99 0.99 0.95 0.95 0.82 0.73 0.66 0.49 0.45 0.35 0.23 0.17 0.11 0.09 0.09 0.04 0.03 0.03 0.03 0.02 0.02 0.01 0.01 0.01 0.01 0.00 0.00 0.00 ηij 10.22 % 6.78 % 7.81 % 7.81 % 10.22 % 0.37 % 6.78 % 4.54 % 0.37 % 7.81 % 7.81 % 7.81 % 4.54 % 0.37 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 0.00 % 33 Figure 5.2: Distribution of Failure Effect by Removing Top Two Critical Arcs for which we can solve optimally in a reasonable time horizon. Specifically, we create a connected network with the number of arcs randomly selected between 38 to 380. In this experiment, we perform comparison of failure ef- fect by blocking two arcs with highest CII and two arcs with lowest CII. The distribution of failure effect by removing top two critical arcs is displayed in Figure 5.2. Among all the 100 instances, the blockage of the two critical arcs leads to average 9.85% increase of network cost and in some cases, the failure effect achieves over 30%. However, the failure effects of two non-critical arcs are average to 0.21% and in the 94 instances among tests, the failure effects are 0%. Consequently, it is reasonable to conclude that the arcs with higher CII values can lead to more failure effects and should be protected as critical segments. 34 0.000.020.040.060102030Failure EffectDensity 5.2. Regression Based Relaxation 5.2.1 RBR Formulation In this section, a novel approximate solution approach to the FCNF based on the predictive model is discussed, which is named regression-based relaxation (RBR). Let pij denote the probability that arc (i, j) ∈ A is open in the FCNF problem, which is calculated by the predictive model. Let c ij = − ln pij where 0 < pij ≤ 1(∀(i, j) ∈ A) and z(cid:48) RBR denote the objective value of the RBR FCNF, which is defined as (cid:48) (cid:88) (cid:88) (i,j)∈A (i,j)∈A z(cid:48) RBR = = (cid:48) ijxij c −xij ln pij (cid:89) pxij ij = − ln (i,j)∈A The RBR problem formulation is: min z(cid:48) RBR subject to (2.2) -- (2.4). In a simple case with single supply node s, single demand node t, and total network supply equal to 1 in a feasible problem, the RBR solution will be a most probable feasible path from s to t. That is, if Pst denotes a most probable feasible path from s to t, (cid:89) min z(cid:48) RBR = − ln pij (i,j)∈Pst and xij = 1 ⇐⇒ xij ∈ Pst. In general for feasible FNCF problems with x ≥ 0, the solution to RBR identifies a set of arcs which form feasible likely paths from possibly many supply nodes to many demand nodes. 35 Here, the RBR problem is linear and can be solved immediately. The optimal solution of RBR is easily transformed to a feasible solution of the original FCNF. Let x∗ ij denote the value of optimal flows on arc (i, j) ∈ A in the RBR problem, and the corresponding decision variables, y∗ ij , are assigned as, 1, x∗ y∗ ij = ij > 0 0, otherwise ∀(i, j) ∈ A. (5.1) The updated solution satisfies all the constraints in the FCNF. Let the objec- tive value of the FCNF found using RBR be denoted by zRBR and calculated by, (cid:88) (i,j)∈A zRBR = (cijx∗ ij + fijy∗ ij). 5.2.2 RBR Computation Results In order to evaluate the solution quality and efficacy of the RBR approximate solution approach to the FCNF, we randomly generate 626 FCNF instances as the test bed, which includes a large variety of network sizes and all the instances have characteristics with respect to difficult FCNF (high fixed and variable cost ratio). The tests are classified into three levels by the number of nodes, 224 easy (10− 300 nodes), 236 medium (350− 650 nodes), and 166 hard (700 − 1000 nodes) problems. The number of arcs, m, is randomly selected. The percentage of supply, demand and transshipment nodes are randomly chosen with respectively approximate probabilities, 0.2, 0.2, and 0.6. The probabilities are approximate because adjustments are necessary to ensure 36 the instance is feasible. The variable costs and fixed costs follow U(0, 10) and U(20000, 60000), respectively. The total number of supplies is randomly assigned on U(1000, 2000). Let ρs and ρd denote the percentage of supply and demand nodes, respectively. Table 5.2 reports the statistics of the network characteristics of the test bed (Min., 1st Qu., Median, Mean, 3rd Qu. and Max.). The smallest instance is composed of 10 nodes and 20 directed arcs, which is close to the problem size of train dataset, whereas the largest problem contains 1, 000 nodes and 82, 010 arcs, which is extremely lager than the network in train and test dataset. Furthermore, the first quarter of number of nodes is 250 which is also much larger than the largest problem in train and test dataset. The average supply quantity ranges from 333 to 1, 971. The ratio of fixed costs to variable costs averages to 8, 008. The test bed includes FCNF instances with 10% to 50% of nodes as supply nodes, and 8% to 40% as demand nodes. The experiments employs linear programming (LP) relaxation and state-of- the-art exact technique as the benchmarks. The objective value of the FCNF found using LP relaxation is denoted by zLP. We select state-of-the-art Gurobi software as the exact optimization technique, which is a commercial optimiza- tion (linear, integer and mixed integer programming) software. By default setting, Gurobi uses 14 different MIP heuristics, 16 cutting plane strategies, and several presolve techniques [42]. The best objective value found using Gruobi 5.6.3 is denoted as zGRB. The experiments are performed on a Win- dows 7 64bit machine with Intel Xeon CPU E5-1620 and 8 GB RAM. The time limit for all three techniques is 60 seconds and the actual running time for RBR, LP and Gurobi are recoded as tRBR, tLP and tGRB, respectively. 37 Table 5.2: Statistics Information of the Test Bed Paramters Min. 10 20 0.03 333 7110 0.1000 0.0800 n m ρ ¯S γ ρs ρd 1st Qu. Median Mean 446.7 29520 0.55 968.4 8008 0.3173 0.2033 400 26270 0.58 947 8000 0.3178 0.2000 250 9497 0.24 858.2 7986 0.3000 0.1887 3rd Qu. Max. 1000 82010 1.00 1971 9809 0.5000 0.4000 700 46480 0.89 1039 8010 0.3329 0.2161 In this section, we report the analysis of solution quality and efficiency of RBR, LP and Grurobi. Let zx gap denote the percentage gap between zRBR and zx, zx gap = zRBR − zx zx × 100%. (5.2) where zx is one of zLP or zGRB. Let tx faster/slower than x ∈ {LP, GRB}, diff denote how many times RBR is tx diff = tx tRBR , (5.3) here, if tLP diff equals to 2, then solving the RBR problem is twice faster than diff equals to 0.5, then tRBR is twice solving the LP problem; reversely, if tLP longer than tLP. The performance is measured with respect to zx diff together. Based on the formulation (5.2), if RBR outperforms LP (Gurobi) in terms of objective gap and tx value, the value of zLP gap (zGRB with respect to CPU time, the value of tLP gap ) is negative; if RBR outperforms LP (Gurobi) diff ) is larger than 1. Let binary diff (tGRB 38 Table 5.3: Objective Gap and Time Difference Statistics RBRvsLP RBRvsGRB Levels Easy Medium Hard Overall 97.12 91.96 -43.39 -46.94 -32.03 -25.23 0.00 0.00 1.26 1.26 31.5 24.65 147 186.2 51.69 5.28 -20.60 -44.93 -6.16 14.29 51.20 51.20 3.31 3.31 2052 5756 82430 82430 100 -46.94 -36.18 -7.31 2.93 26.55 116.9 98.05 -44.93 -29.84 14.62 11.28 177 2791 100 -45.05 -35.57 -11.96 3.17 41.48 186.2 46.41 -41.17 -1.25 32.68 87.41 591 5752 θLP = 1(%) min zLP gap(%) mean zLP max zLP gap(%) gap(%) min tLP diff mean tLP diff max tLP diff gap (%) θGRB = 1(%) min zGRB gap (%) mean zGRB max zGRB min tGRB diff mean tGRB diff max tGRB diff gap (%) variable θx denote whether RBR outperforms x ∈ {LP, GRB}, θx = [zx gap < 0][tx diff > 1] where, [X] returns 1 if X is true; otherwise, returns 0. In this investigation, we claim RBR outperforms LP (Gurobi) only when θLP = 1 (θGRB = 1), respectively. Table 5.3 reports the experimental results by techniques. Overall, RBR outperforms LP in 97.12% of the test bed and is never outper- formed by LP (the maximum value of zLP gap is 0.00%). Figure 5.3 shows the distribution of objective gap between RBR and LP by difficult levels. RBR 39 finds objective values average 32.03% lower than LP relaxation solution ap- proach. The percentage of FCNF instances in which RBR outperforms LP in both solution quality and efficiency achieves 100% for the medium and hard problems. For some specified instances, RBR performs quite well and the highest improvement of RBR to LP achieves 46.94%. In addition, running time of solving a RBR problem is overall 31.5 times faster than solving a LP relaxation problem. Based on the minimum value of tLP diff (1.26), there does not exist a problem instance in which RBR uses longer time than LP. Figure 5.4 plots the running time as a function of the number of variables, from which it is observed that the running time of RBR is not affected apparently by the size of the problem instances (average tRBR = 0.33 seconds), albeit the run- ning time of LP appears exponential relationship with the number of variables (average tLP = 12.75 seconds). Specifically, LP performs equally with RBR only when the number of nodes is less than 10. Therefore, RBR is guaranteed to find a better solution in a shorter time period than LP regardless of the scale and complexity of FNCF problem. State-of-the-art exact solver outperforms RBR with respect to solution quality in 95% of the test instances, but solving RBR problem is overall 5, 756 times faster than GRB with 60 seconds limit. In detail, GRB achieves the time limit (60 seconds) when the number of variables is 220, in which RBR only runs around 0.001 seconds. The solution produced by RBR begins showing comparable to Gurobi when the difficult level is medium. Figure 5.5 shows the gap distribution between zRBR and zGRB by difficult level. For hard FCNF problems, RBR outperforms Gurobi in 98% of the hard instances and is only outperformed by Gurobi in 5 over 248 hard cases. The average improvement 40 Figure 5.3: Distribution of Gap between zRBR and zLP by Level Figure 5.4: CPU Time of RBR and LP over Number of Variables 41 EasyMediumHard01020304050−50−40−30−20−100−50−40−30−20−100−50−40−30−20−100Gap (%)Observations0204060020000400006000080000Number of VariablesCPU Time (Seconds)TechniqueLPRBR Figure 5.5: Distribution of Gap between zRBR and zGRB by Level for hard instances is around 30% with much less running time. Since the running time of Gurobi is always extended to 60 seconds while average RBR running time is only 0.33 seconds, the investment in involving RBR as a pre- prosessing technique to the FCNF is efficient. Specifically, RBR could could find a better upper bound in the solving process and then reduce total running time of optimization solver. 42 EasyHardMedium0255075−3003060−3003060−3003060Gap (%)Observations Chapter 6 Conclusion The fixed charge network flow problem has many real-world applications and can be transformed to various problem types. Because it is a classically NP- hard problem, many approximate algorithms have been developed to find a near-optimal solution in a reasonable time period. This research provides a novel and original framework to analyze the optimal flow of the FCNF. In this work, we address three questions in terms of the analysis, prediction and application. Firstly, by analyzing the possible features that may affect the optimal flow, we follow three levels from the entire network to an arc and to a single node to ensure we extract all the useful features. There are 33 independent features and only 26 of them are employed as predictors for the final predictive model with respect to Akaike information criterion. The validation process includes most common diagnostic techniques, e.g. confusion matrix, k-fold cross vali- dation, ROC curve. The results indicate that the predictive ability is highly accurate on both train dataset and test dataset. According to the model, we 43 can conclude that: (1) as the increase of network size, the average probability for each arc decreases; (2) the characteristics of arcs (e.g. variable and fixed costs) and nodes (e.g. node type and degree) have a statistical significant ef- fect on the likelihood; (3) the logistic regression model is in agreement with that the linear relaxation and original problem share a significant proportion of optimal arcs. However, our study also finds that the linear relaxed FCNF loses considerable number of optimal arcs in the original problems. The rest predictors play an important role on improving the predictive capability. It is observed that the types of nodes of the arc and endpoints adjacent to the nodes provide a vital contribution in reducing the predictive errors. Secondly, this predictive model can be used directly to identify critical arcs in the network. The component importance index (CII) is defined as the likelihood that the arc is selected in the optimal solution and the network performance is evaluated by the objective value of the FCNF. In our rigorous tests, the failure effects cased by high-CII arcs are statically significant than cased by low-CII arcs. The FNCF has never been used to measure the network performance due to the computational difficulty, not to mention quantifying the failure effect for each arc. The values of CII in our experiments are consis- tent with the failure effects and rank all the arcs, which supports the decision make on critical components identification or priorization. Finally, the other application of the predictive mode is presented in the work, which we name regression-based relaxation (RBR). The RBR solution ap- proach replaces the objective function with the natural logarithm of the prod- uct of probabilities calculated by predictive model. Then, the optimal solu- tion of RBR problem is the most probable feasible path of the original FCNF 44 problem. The solution quality of RBR is compared with linear programming relaxation solution approach, and state-of-the-art optimization software. The rigorous experiments show that RBR outperforms LP in 97.12% of the test bed and produced objective values average 32.03% lower than LP on average. Overall, solving a RBR problem is 31.5% times faster then solving a LP prob- lem. The empirical results indicates RBR stably outperforms Gurobi in the large-scale and high-complexity FNCF problems. In summary, it is the first time to combine statistical learning technique and network flow problem. There are several vital network characteristics affecting the optimal flow regardless of the density and total requirements of the prob- lem. The predictive model provides a novel approach to analyze and predict the optimal flow, which can be used independently on the identification of the critical components or approximate solution approach to the FCNF. The regression-based relaxation is one of possible applications and shows great advantage over the linear programming and standard exact technique. In the future work we will explore more applications that most benefit from this predictive model. 45 Chapter 7 Future Research Solution approach to discrete optimization has been popular for many years, but still a evolving research area. This research is the first to apply machine learning algorithms to study the optimal flows of the FCNF instead of tran- sitional approach. We exploited the special structures of the FCNF problem and presented two possible applications. As part of our research, we identify the following important research topics that we plan to explore. 1. Network Science. Currently, many research topics have transfered from single object to a group of homogeneous or inhomogeneous objects, e.g., trans- portation network, social network and community networks, etc. Network science, as a maturing field, offers a unique perspective to tackle complex problems, impenetrable to linear-proportional thinking. The framework pro- posed in this work is for a specified optimization problem, but the concept or procedure can be applied to all types of networks with modification of fea- tures. In the future work, more types of network problems will be explored by this procedure and reversely, these networks can be employed to validate the 46 methodology. 2. Solution Approach to difficult optimization problem. Due to the success of regression-based relaxation, we plan to develop strategy combing the RBR and Branch-and-bound technique to provide a high efficiency exact solution approach to the FCNF problem. Furthermore, many difficult opti- mization problems has their own characteristics, such like Knapsack problem, traveling salesman problem, and job shop scheduling, etc, thus, we can study the parameters, decision variables and constraints of these problems and de- velop predictive model based on the known optimal solution. 3. Scala Machine Learning. As the datasets growing exponentially, many machine learning techniques are not practical to apply because of the limitation of computational power. Scala machine learning is a relative new area in artificial intelligent area. According to the experimental results in this work, the predictive model can be trained on a small data set of easy-solve instances, and keep its highly accuracy for larger and more complex problems. This conclusion is same as Scala Machine Learning and we plan to explore methods to apply machine learning algorithms to big data more reliably and efficiently. 47 References [1] H. Akaike. A new look at the statistical model identification. Automatic Control, IEEE Transactions on, 19(6):716 -- 723, 1974. [2] C. Armacost, A. Barnhart and K. Ware. Composite variable formulations for express shipment service network design. Transportation science, 36 (1):1 -- 20, 2002. [3] M. Balinski. Fixed-cost transportation problems. Naval Research Logistics Quarterly, 8(1):41 -- 54, 1961. [4] K. Barker, J. Ramirez-Marquez, and C. Rocco. Resilience-based net- work component importance measures. Reliability Engineering & System Safety, 117:89 -- 97, 2013. [5] R. Barr, F. Glover, and D. Klingman. A new optimization method for large scale fixed charge transportation problems. Operations Research, 29 (3):448 -- 463, 1981. [6] M.G. Bell. A game theory approach to measuring the performance reli- ability of transport networks. Transportation Research Part B: Method- ological, 34(6):533 -- 545, 2000. 48 [7] V. M. Bier, E. R. Gratz, N.J. Haphuriwat, W. Magua, and K.R. Wierzbicki. Methodology for identifying near-optimal interdiction strate- gies for a power transmission system. Reliability Engineering & System Safety, 92(9):1155 -- 1161, 2007. [8] J. Birchmeier. Systematic assesment of the degree of criticality of infras- tructures. In Proceedings of ESREL, pages 859 -- 64, 2007. [9] E. Bixby, M. Fenelon, Z. Gu, E. Rothberg, and R. Wunderling. MIP: The- ory and practice closing the gap. In System modelling and optimization, pages 19 -- 49. Springer, 2000. [10] E. Bompard, R. Napoli, and F. Xue. Analysis of structural vulnerabilities in power transmission grids. International Journal of Critical Infrastruc- ture Protection, 2(1):5 -- 12, 2009. [11] A. Cabot and S. Erenguc. Some branch-and-bound procedures for fixed- cost transportation problems. Naval Research Logistics Quarterly, 31(1): 145 -- 154, 1984. [12] H. Camdeviren, A. Yazici, Z. Akkus, R. Bugdayci, and M. Sungur. Com- parison of logistic regression model and classification tree: An application to postpartum depression data. Expert Systems with Applications, 32(4): 987 -- 994, 2007. [13] R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin. Resilience of the in- ternet to random breakdowns. Physical review letters, 85(21):4626, 2000. [14] A. Costa. A survey on benders decomposition applied to fixed-charge 49 network design problems. Computers & Operations Research, 32(6):1429 -- 1450, 2005. [15] P. Crucitti, V. Latora, and M. Marchiori. Model for cascading failures in complex networks. Physical Review E, 69(4):045104, 2004. [16] P. Crucitti, V. Latora, and M. Marchiori. Locating critical lines in high- voltage electrical power grids. Fluctuation and Noise Letters, 5(02):L201 -- L208, 2005. [17] E. Danna, E. Rothberg, and C. Le Pape. Exploring relaxation induced neighborhoods to improve mip solutions. Mathematical Programming, 102 (1):71 -- 90, 2005. [18] U. Demšar, O. Špatenková, and K. Virrantaus. Identifying critical loca- tions in a spatial network with graph theory. Transactions in GIS, 12(1): 61 -- 82, 2008. [19] Y. Dheenadayalu, B. Wolshon, and C. Wilmot. Analysis of link capacity estimation methods for urban planning models. Journal of transportation engineering, 130(5):568 -- 575, 2004. [20] I. Dobson, B.A. Carreras, V.E Lynch, and D.E. Newman. Complex sys- tems analysis of series of blackouts: Cascading failure, critical points, and self-organization. Chaos: An Interdisciplinary Journal of Nonlinear Science, 17(2):026103, 2007. [21] N. Driebeek. An algorithm for the solution of mixed integer programming problems. Management Science, 12(7):576 -- 587, 1966. 50 [22] M. El-Sherbiny and R. Alhamali. A hybrid particle swarm algorithm with artificial immune learning for solving the fixed charge transportation problem. Computers & Industrial Engineering, 64(2):610 -- 620, 2013. [23] I. Eusgeld, W. Kröger, G. Sansavini, M. Schläpfer, and E. Zio. The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures. Reliability Engineering & System Safety, 94(5):954 -- 963, 2009. [24] M. Fischetti and A. Lodi. Local branching. Mathematical programming, 98(1-3):23 -- 47, 2003. [25] A. Fügenschuh and A. Martin. Computational integer programming and cutting planes. Handbooks in Operations Research and Management Sci- ence, 12:69 -- 121, 2005. [26] M. Garey and S. David. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York, NY, 1979. [27] I. Ghamlouche, T. Crainic, and M. Gendreau. Cycle-based neighbour- hoods for fixed-charge capacitated multicommodity network design. Op- erations research, 51(4):655 -- 667, 2003. [28] M. Hewitt, G. Nemhauser, and M. Savelsbergh. Combining exact and heuristic approaches for the capacitated fixed-charge network flow prob- lem. INFORMS Journal on Computing, 22(2):314 -- 325, 2010. [29] W. Hirsch and G. Dantzig. The fixed charge problem. Technical report, DTIC Document, 1954. 51 [30] J. Jarvis, R. Rardin, V. Unger, R. Moore, and C. Schimpeler. Optimal design of regional wastewater systems: A fixed-charge network flow model. Operations Research, 26(4):538 -- 550, 1978. [31] J. Kennington and E. Unger. A new branch-and-bound algorithm for the fixed-charge transportation problem. Management Science, 22(10): 1116 -- 1126, 1976. [32] D. Kim and P. Pardalos. A solution approach to the fixed charge net- work flow problem using a dynamic slope scaling procedure. Operations Research Letters, 24:195 -- 203, 1999. [33] P. Lederer and R. Nambimadom. Airline network design. Operations Research, 46(6):785 -- 804, 1998. [34] A. Lodi. Mixed integer programming computation. In 50 Years of Integer Programming 1958-2008, pages 619 -- 645. Springer, 2010. [35] A. Mahajan. Presolving mixed -- integer linear programs. Wiley Encyclo- pedia of Operations Research and Management Science, 2010. [36] G. McLachlan, K. Do, and C. Ambroise. Analyzing microarray gene ex- pression data, volume 422. John Wiley & Sons, 2005. [37] S. Molla-Alizadeh-Zavardehi, M. Hajiaghaei-Keshteli, and R. Tavakkoli- Moghaddam. Solving a capacitated fixed-charge transportation problem by artificial immune and genetic algorithms with a prüfer number repre- sentation. Expert Systems with Applications, 38(8):10462 -- 10474, 2011. [38] M. Monteiro, D. Fontes, and F. Fontes. An ant colony optimization algo- 52 rithm to solve the minimum cost network flow problem with concave cost functions. In GECCO, pages 139 -- 146, 2011. [39] G. Nemhauser and L. Wolsey. Integer and combinatorial optimization, volume 18. Wiley New York, 1988. [40] Charles D Nicholson and Weili Zhang. Optimal network flow: A pre- dictive analytics perspective on the fixed-charge network flow problem. Computers & Industrial Engineering, 99:260 -- 268, 2016. [41] L. Nozick. The fixed charge facility location problem with coverage re- strictions. Transportation Research Part E: Logistics and Transportation Review, 37(4):281 -- 296, 2001. [42] Gurobi Optimization. Inc.. gurobi optimizer reference manual, version 5.0, 2012. [43] F. Ortega and L. Wolsey. A branch-and-cut algorithm for the single- commodity, uncapacitated, fixed-charge network flow problem. Networks, 41(3):143 -- 158, 2003. [44] U. Palekar, M. Karwan, and S. Zionts. A branch-and-bound method for the fixed charge transportation problem. Management Science, 36(9): 1092 -- 1105, 1990. [45] D.M. Scott, D.C. Novak, L. Aultman-Hall, and F. Guo. Network robust- ness index: a new method for identifying critical links and evaluating the performance of transportation networks. Journal of Transport Geography, 14(3):215 -- 227, 2006. 53 [46] S. Shen, J. Smith, and R. Goli. Exact interdiction models and algorithms for disconnecting networks via node deletions. Discrete Optimization, 9 (3):172 -- 188, 2012. [47] B.L. Smith, L. Qin, and R. Venkatanarayana. Characterization of freeway capacity reduction resulting from traffic accidents. Journal of Transporta- tion Engineering, 129(4):362 -- 368, 2003. [48] S.V. Stehman. Selecting and interpreting measures of thematic classifica- tion accuracy. Remote sensing of Environment, 62(1):77 -- 89, 1997. [49] E. Steinberg and H. Napier. Optimal multi-level lot sizing for require- ments planning systems. Management Science, 26(12):1258 -- 1271, 1980. [50] M. Sun, J. Aronson, P. McKeown, and D. Drinka. A tabu search heuristic procedure for the fixed charge transportation problem. European Journal of Operational Research, 106(2):441 -- 456, 1998. [51] W. Venables and B. Ripley. Modern applied statistics with S. Springer, 2002. [52] L. Wolsey. Integer programming, volume 42. Wiley New York, 1998. [53] W. Zhang and C. Nicholson. Objective scaling ensemble approach for integer linear programming. Manuscript Submitted for Publication, 2014. [54] Wei-li ZHANG and Lin-du ZHAO. Lattice gas model for simulating pedes- trian evacuation in the dormitory fire [j]. Journal of Safety and Environ- ment, 1:045, 2010. 54 [55] Weili Zhang and Charles Nicholson. A multi-objective optimization model for retrofit strategies to mitigate direct economic loss and population dis- location. Sustainable and Resilient Infrastructure, 1(3-4):123 -- 136, 2016. [56] Weili Zhang and Charles D Nicholson. Prediction-based relaxation solu- tion approach for the fixed charge network flow problem. Computers & Industrial Engineering, 99:106 -- 111, 2016. [57] Weili Zhang and Naiyu Wang. Resilience-based risk mitigation for road networks. Structural Safety, 62:57 -- 65, 2016. [58] Weili Zhang and Naiyu Wang. Bridge network maintenance prioritization under budget constraint. Structural safety, 67:96 -- 104, 2017. [59] Weili Zhang and Zhengyu Yao. A reformed lattice gas model and its application in the simulation of evacuation in hospital fire. In Industrial Engineering and Engineering Management (IEEM), 2010 IEEE Interna- tional Conference on, pages 1543 -- 1547. IEEE, 2010. [60] Weili Zhang, Naiyu Wang, and Charles Nicholson. Resilience-based post- disaster recovery strategies for road-bridge networks. Structure and In- frastructure Engineering, 13(11):1404 -- 1413, 2017. [61] Weili Zhang, Peihui Lin, Naiyu Wang, Charles Nicholson, and Xianwu Xue. Probabilistic prediction of postdisaster functionality loss of commu- nity building portfolios considering utility disruptions. Journal of Struc- tural Engineering, 144(4):04018015, 2018. [62] J. Zheng, Z. Gao, and X. Zhao. Clustering and congestion effects on 55 cascading failures of scale-free networks. EPL (Europhysics Letters), 79 (5):58002, 2007. [63] E. Zio, L.R. Golea, et al. Identifying groups of critical edges in a real- istic electrical network by multi-objective genetic algorithms. Reliability Engineering & System Safety, 99:172 -- 177, 2012. 56
1801.04898
1
1801
2018-01-15T18:15:46
Network assembly of scientific communities of varying size and specificity
[ "cs.SI", "physics.soc-ph" ]
How does the collaboration network of researchers coalesce around a scientific topic? What sort of social restructuring occurs as a new field develops? Previous empirical explorations of these questions have examined the evolution of co-authorship networks associated with several fields of science, each noting a characteristic shift in network structure as fields develop. Historically, however, such studies have tended to rely on manually annotated datasets and therefore only consider a handful of disciplines, calling into question the universality of the observed structural signature.To overcome this limitation and test the robustness of this phenomenon, we use a comprehensive dataset of over 189,000 scientific articles and develop a framework for partitioning articles and their authors into coherent, semantically-related groups representing scientific fields of varying size and specificity. We then use the resulting population of fields to study the structure of evolving co-authorship networks. Consistent with earlier findings, we observe a global topological transition as the co-authorship networks coalesce from a disjointed aggregate into a dense giant connected component that dominates the network. We validate these results using a separate, complimentary corpus of scientific articles, and, overall, we find that the previously reported characteristic structural evolution of a scientific field's associated co-authorship network is robust across a large number of scientific fields of varying size, scope, and specificity. Additionally, the framework developed in this study may be used in other scientometric contexts in order to extend studies to compare across a larger range of scientific disciplines.
cs.SI
cs
Network assembly of scientific communities of varying size and specificity Daniel T. Citron1, ∗ and Samuel F. Way2, † 1Department of Physics, Cornell University, Ithaca, New York, 14853 USA 2Department of Computer Science, University of Colorado, Boulder CO, 80309 USA How does the collaboration network of researchers coalesce around a scientific topic? What sort of social restructuring occurs as a new field develops? Previous empirical explorations of these questions have examined the evolution of co-authorship networks associated with several fields of science, each noting a characteristic shift in network structure as fields develop. Historically, however, such studies have tended to rely on manually annotated datasets and therefore only consider a handful of disciplines, calling into question the universality of the observed structural signature. To overcome this limitation and test the robustness of this phenomenon, we use a comprehensive dataset of over 189,000 scientific articles and develop a framework for partitioning articles and their authors into coherent, semantically-related groups representing scientific fields of varying size and specificity. We then use the resulting population of fields to study the structure of evolving co-authorship networks. Consistent with earlier findings, we observe a global topological transition as the co- authorship networks coalesce from a disjointed aggregate into a dense giant connected component that dominates the network. We validate these results using a separate, complimentary corpus of scientific articles, and, overall, we find that the previously reported characteristic structural evolution of a scientific field's associated co-authorship network is robust across a large number of scientific fields of varying size, scope, and specificity. Additionally, the framework developed in this study may be used in other scientometric contexts in order to extend studies to compare across a larger range of scientific disciplines. Keywords: collaboration networks, network assembly, social network analysis, topic modeling, scientometrics I. INTRODUCTION A co-authorship network outlines the professional con- nections between scientific researchers and their collab- orators. Co-authorship networks are important objects of study, as they are a measurable representation of the communities that assemble in order to work in an par- ticular area of research. Such communities allow for the transfer of knowledge and skills and sharing of resources required for researching complex problems [1–4]. The as- sembly of co-authorship networks represents one aspect of the more general problem of understanding the process through which social or collaborative networks attract new members and evolve structurally over time [5, 6]. The recent availability of electronic publishing and on- line repositories of scientific articles has enabled large- scale studies of scientific research practices [7–9]. In par- ticular, these repositories provide record of collaborations between the authors of each paper, making it possible to construct comprehensive co-authorship networks and an- alyze their assembly over time. Two recent studies have investigated the development of a small group of research fields (9 and 12 fields, re- spectively), by measuring the assembly of each field's co-authorship network using a large electronic collec- tion of articles [10, 11]. Expanding upon historiograph- ical surveys, they search for patterns in the growth and development of co-authorship networks across different ∗ [email protected][email protected] scientific fields. These studies argue that while each field differs in size and publishing practices (differing in rate of publication, size of collaborations, etc.), nev- ertheless there appear to be common patterns in how each field's co-authorship network develops. Specifi- cally, each co-authorship network undergoes a topolog- ical transition in which a densely connected giant com- ponent of researchers forms over time. This dramatic structural change has been compared to the emergence of a giant component seen in a percolation transition [12], and serves as an empirical indication that the re- search community undergoes large-scale social reorgani- zation as more researchers join and collaborate with oth- ers [3, 10, 11]. Another study [13] takes three example fields (complex networks research; ADS/CFT; Randall-Sundrum model) and describes three stages of development characteristic to co-authorship network assembly in science. Each net- work begins as a set of disconnected groups, which then join together to form a large treelike component. As the research community grows and mixes further, the large component becomes densely connected to itself through the formation of long-range ties. This general pattern is consistent with what was reported in [10, 11], which also emphasized how the long-range ties between authors created a densely connected community with very short distances between different authors. Together, these previous studies suggest the existence of common patterns in how scientific communities assem- ble over time. However, they rely on manual annotation of their data, which requires a great deal of labor in order to assemble a co-authorship network. This in turn limits the number of examples studied and reported on, making it difficult to justify the claim that the patterns observed for a few examples are universal across all scientific fields. In the present study, we propose a framework for an- alyzing a large population of example topics in order to verify that the development of co-authorship networks, as characterized by earlier studies, is robust across many scientific fields. Specifically, we use techniques from nat- ural language processing and machine learning to gen- erate a larger set of example co-authorship networks from the arXiv, a large scientific corpus. We use topic modeling to cluster articles together based on their se- mantic content, and interpret the clusters of articles as representing different fields of science. We measure the algorithmically-generated co-authorship networks to de- termine whether they develop in a manner similar to the manually-annotated co-authorship networks studied previously. We aim to facilitate a larger survey of co- authorship networks across scientific fields first by testing the efficacy of topic modeling as a way to rapidly detect a large number of fields, and then by comparing the as- sembly behavior of each field's co-authorship network for the purposes of testing whether their growth patterns re- main consistent for a large set of fields of varying size and specificity. II. DATA SET The arXiv is an open-access repository of scientific preprints accessible online at www.arxiv.org. The site was founded in 1991 and, as of the end of 2016, hosts over 1.1 million articles, primarily in the areas of Physics, Mathematics, and Computer Science [14]. Here, we take as our data set the 189,000 articles categorized as Con- densed Matter Physics ("cond-mat" on the arXiv) by the submitting author (or by the arXiv's administrators) dur- ing the period starting in April of 1992 and ending in June 2015. The arXiv data have several important advantages for the purposes of the present study. The articles' full texts and relevant metadata are available to the public. Addi- tionally, arXiv has been well studied from a scientometric perspective [15], and has been used to test techniques for algorithmically categorizing scientific articles according to their content [8]. The set of arXiv articles is only a sample of all pub- lished works, and, due to differences in the site's adop- tion across communities, arXiv's coverage varies from one subfield to the next. We therefore test that our results obtained by measuring the arXiv actually represent real- world co-authorship networks and not an artifact of the arXiv's incompleteness. Specifically, to validate our re- sults, we also analyze a subset of the condensed mat- ter articles found on the Web of Science (WoS). WoS is a database of scientific articles maintained by Clarivate Analytics. We use the 660,000 articles classified as Con- densed Matter Physics published between April 1992 and June 2015, requiring that all have titles, abstracts, and 2 author names available in the database [16]. The set of articles from Web of Science partially overlaps with the arXiv data set and represents a complementary data set with non-uniform coverage of the subfields contained on arXiv [15]. Using the WoS as a secondary data set makes it possible to verify whether the arXiv contains a truly representative sample of Condensed Matter Physics arti- cles, as well as to check whether the results obtained us- ing the articles from the arXiv are not merely an artifact of the arXiv's incomplete coverage of certain scientific subfields. To track the contributions of individual authors, we adopt the convention of labeling each author with their uppercase full names as reported in the publication meta- data. In the context of co-authorship network measure- ment, this author naming convention errs on the side of splitting individual authors into multiple entities. That is to say, authors who inconsistently report their names in publications will be counted as multiple separate nodes for the purposes of this study. This convention also de- creases the possibility of many different entities becoming combined into a single composite node, which would ar- tificially collapse together many different nodes in our co-authorship networks. We verify that our results are robust to changing the author labeling convention by re- peating all subsequent analysis using "[First Initial] [Last Name]" in Appendix C. Larger-scale analyses involving a broader reach of disciplines will require additional steps to disambiguate author identities (such as the tools de- scribed in [17, 18]). After preprocessing author names in this way, the arXiv data set includes 96,000 unique authors. For the purposes of text mining and topic modeling we focus on each article's title and abstract under the assumption that authors write titles and abstracts with the intention of concisely summarizing an article's con- tents. Past studies have argued that focusing on ar- ticle abstracts has the additional benefit of minimizing the amount of "structural" text processed by the topic model, allowing the inferred topic structures to focus on field-specific content, rather than commonalities in pre- sentation of the English language [8, 19]. III. METHODS A. Topic Model Past studies exploring the formation of co-authorship networks have relied on manual annotation to determine which authors contribute to and are therefore considered part of a scientific field [10, 11, 13]. This approach, how- ever, requires a great deal of human effort and, conse- quently, has been applied to only a few disciplines and with somewhat arbitrary definitions of which publica- tions and authors belong to the community in question. It therefore remains unclear how robust past results are to varying the criteria for selecting communities, and for varying levels of specificity governing the breadth and size of such communities. To address these limitations, we introduce an approach that uses topic modeling to automate the process of identifying groups of semantically-related documents and partitioning their authors into fields corresponding to their areas of expertise [20]. As a consequence of the number of documents belonging to a given subfield and the commonality of its language, the topics and thus the fields extracted by this technique will vary in terms of size and specificity, yielding a population of corresponding co- authorship networks. That is, we can test whether the reported structural patterns are robust to varying defi- nitions of sub-community. At the same time, we explore the usefulness of topic modeling as an automated, scal- able means for partitioning the global network of all re- searchers into co-authorship networks organized around specific fields. Topic modeling is an unsupervised machine learn- ing technique that characterizes the underlying the- matic content of a given corpus by identifying groups of semantically-related, co-occurring words-the "topics"- while simultaneously identifying the proportion of each topic present in each document in the corpus. Here, we use latent Dirichlet allocation (LDA) [21, 22], a popular topic model that produces static definitions for topics, formalized as probability distributions over all words in a given vocabulary. Accordingly, for each document the model infers a distribution over these topics. Prior to applying topic modeling, we utilize several common natural language processing techniques to pre- process the corpus text. In particular, we combine the text from each article's title and abstract into a sin- gle document, remove all non-alphabetic characters, and convert all letters to lowercase. Common English stop words ("the," "and," "of," etc.) are also removed, as well as certain words that appear very commonly in the arXiv data set but that contain no scientific content (numbers, names of publishers, "thank you," etc.). The document text is also lemmatized in order to increase the likelihood of discovering overlaps in the word usage within and be- tween documents After preprocessing all articles, we use MALLET [23] , an open-source implementation of LDA, to train a series of topic models, varying the number of topics between k = 25 and k = 100. As expected, for small k, LDA produces broadly-defined topics, and for large k, more narrowly-defined topics. For our purposes, k = 50 pro- vides sufficient resolution for the model to recover top- ics that resemble established subfields within condensed matter physics. We emphasize that we do not intend to use this topic model to represent the optimal or definitive partition of arXiv according to subject matter. Rather, our model provides a large set of readily-interpretable topics, varying in both size and specificity, allowing us to test the robustness of past claims against a heterogeneous population of fields and their corresponding authors. We present our analysis of the k = 50 topic model below and 3 note that our results are robust to small changes in k. That is, the results that we report below do not change significantly if we repeat our subsequent analyses using a model with k = 45 or k = 55 topics. After training our topic model, we manually inspect each topic to determine whether it resembles a field of condensed matter physics. As an example, the most probable words associated with Topic 5 include key- words such as "quantum," "state," "qubit," "entangle- ment," and "decoherence." Looking at the set of arti- cles to which the topic model assigns a high probability (P (Topic = 5) > 0.6), we find articles such as "Demon- stration of Two-Qubit Algorithms with a Superconduct- ing Quantum Processor" (0903.2030) and "Controllable coupling between flux qubits" (cond-mat/0507496). To- gether, these observations suggest that articles strongly associated with Topic 5 are related to quantum comput- ing and quantum information. We also check that the ar- ticles identified by the topic model do not merely reflect clusters of articles specific to arXiv by inferring topics on the articles belonging to the Web of Science (WoS) data set. In the case of Topic 5, we find articles such as "Flexible two-qubit controlled phase gate in a hybrid solid-state system" and "Two-electron coherence and its measurement in electron quantum optics," which con- firms that articles associated with Topic 5 appear to be related to quantum computing. In addition to quantum computing, LDA recovers topics resembling other established subfields of con- densed matter physics, including spin glasses (Topic 1); Bose-Einstein condensates (Topic 3); magnetic materi- als (Topic 19); glassy physics (Topic 28); topological phases (Topic 30); and cuprate superconductors (Topic 43). (Refer to Appendix A to see each topic's interpre- tation.) B. Co-authorship Network Generation We use our topic model to construct a set of co- authorship networks, where each network represents the set of authors that produced the articles strongly as- sociated with one of the topics discovered by the topic model. We emphasize that the topic modeling algorithm is only given information related to the textual content of the articles and receives no information about author- ship, authors' collaborative relationships, or publication dates. While there are topic modeling algorithms that do take into account other links between documents (e.g. [24, 25]), we want to determine whether textual content is sufficient to reproduce patterns in how groups of re- searchers in the same related form a collaborative com- munity. We find the articles that are primarily associated with each topic t by selecting the subset of articles assigned a probability weight P (t) > 0.6. The cutoff at 0.6 selects articles that are strongly associated with one particular topic, but is not so strict that it excludes too many ar- 4 FIG. 1. Examples of different network behaviors. Each row shows how a topic's co-authorship network develops over time, with network snapshots labeled by the year observed. Each node represents an author, and each edge represents a collaboration between the two authors. Disconnected single nodes are not pictured. The top two rows (Topics 5 and 19) illustrate three stages of network assembly: disjointed group of cliques; treelike connected cluster of cliques; densely connected giant component. The third row (Topic 12) is an example of a network that only forms a treelike largest component. The bottom row (Topic 41) is an example of a network that forms no single giant component. ticles. With P (t) > 0.6, we associate between 100 and 3000 arXiv articles with each topic. We also use an alter- native thresholding criterion to check whether the choice of thresholding biases our results. We repeat all sub- sequent analysis using a second method of categorizing articles whereby each article is assigned to the smallest set of topics that account for 50% of its subject matter. All reported results are robust to varying the threshold- ing scheme. We construct a co-authorship network by identifying the authors of each topic's associated articles. Each au- thor is represented in the topic's network as a node. Two author nodes are linked by an edge if they have written an article together. [26, 27]. Hence, a group of authors who collaborated on an article together appears in the network as a fully connected clique, and two articles with multiple authors in common will appear in the network as overlapping cliques that share nodes. (We also use a modularity score to measure the extent to which authors associated with different topics connect to one another. We find that our topic model does tend to sort authors into distinct communities in D) We reconstruct each co-authorship network's assembly and growth over time using each month of arXiv's oper- ation from April 1992 through June 2015 as a discrete time step. At each time step we include in the network all author nodes that have written articles at or prior to the current time step. We also connect all pairs of author nodes that have collaborated on one or more articles at or prior to the current time step. IV. RESULTS A. Co-Authorship Network Measurements Figure 1 shows the network growth for four different example topics: quantum computing (Topic 5), magnetic material properties (Topic 19), transport measurements (Topic 12), and mechanical properties of materials (Topic 41). For the first two topics in Figure 1 there appear to be three separate stages through which the giant compo- nent develops. Each network begins as a disjointed set of cliques, as the authors who share a field publish in separate groups. Next, a few of the cliques join together, forming a loosely connected, almost tree-like backbone of connected cliques. In the final stage, enough cliques overlap with one another such that the largest connected component becomes densely connected. This character- istic three-stage pattern is consistent with what has been reported previously [13]. By contrast, the largest com- ponent of Topic 12's network only grows to reach the treelike stage, and Topic 41's network has no giant com- ponent. We confirm this interpretation of the network visual- izations by measuring various properties of each topic's co-authorship network. We measure the fraction of nodes belonging to the largest connected component ("giant component size"). We also measure the giant com- ponent's mean geodesic path length between all pairs of nodes belonging to the giant connected component ("mean path length"). The mean path length ranges between a minimum for fully connected networks and a maximum for treelike networks, and so serves as a mea- sure of how closely connected the individuals belonging to the giant component are to one another [11, 12, 28] Figure 2 shows measurements of the size and mean path length of the giant component for each of the topics shown in Figure 1. For Topics 5 and 19 (two leftmost columns), the giant component's size increases steadily as more and more nodes are added to the network. At the same time, the mean path length first increases as the giant component grows initially and then peaks and de- creases [28]. This non-monotonic behavior suggests two 5 stages in the development of the giant component: ini- tial growth as cliques first start to overlap with one an- other, and densification when enough "long-range" edges form to reduce the average distance between authors [12, 13, 29] These two growth stages are consistent with a treelike cluster of cliques that becomes a densely con- nected cluster. As a point of comparison, the largest component in Topic 12 does grow to include a large frac- tion of the nodes in the network, but its mean path length increases steadily over time. The co-authorship network development patterns are not merely the result of sampling a large number of ar- ticles that join together by chance. For comparison, we consider a null model in which articles are grouped to- gether at random, rather than grouped together accord- ing to topic modeling, to test whether the topic model- ing is responsible for identifying the clusters of authors. For each instance of the null model, thousands of arti- cles are selected from the arXiv cond-mat data set at random. The co-authorship network of this randomly- selected group of articles is then constructed, and the properties of the largest connected component are mea- sured. The results of this null model are plotted in gray in Figure 2, where the vertical height of the gray region represents the mean ± one standard deviation across 100 instances of the null model. The null model's average behavior contrasts dramatically with the measurements of the scientific co-authorship networks identified using the topic model. These results strongly suggest that the aggregation of authors to form a giant, densely connected component is not merely the result of sampling an arbi- trary subset of arXiv. Rather, it appears that the topic model, which was given no information about authorship or other such links between documents, was able to iden- tify clusters of researchers based on their textual content alone. The nonrandom grouping of authors further vali- dates the topic model's meaningful clustering of articles: the articles represent the output of an association of re- searchers with similar interests. The example topics shown in Figure 1 and Figure 2 exemplify three general types of network assembly ob- served for the other topics. Out of the 50 topics, 22 have co-authorship networks that undergo the transition from a scattered collection of cliques; to an extended, tree- like connected group of cliques; to a densely connected giant component. These results are qualitatively consis- tent with those obtained earlier for groups of articles an- notated by human experts [10, 11]. From the remaining topics, 17 form a single large component that occupies a small fraction of nodes in the network, but have not yet formed enough long-range ties that the network mean path length stops growing monotonically. The remain- ing 9 topics show little or no sign that they form any giant connected component. (Refer to Appendix B for a summary of all co-authorship networks' behavior.) Finding that a topic's corresponding co-authorship network does not form a densely connected GCC does not necessarily suggest that the research field is not well- 6 FIG. 2. Quantitative measurements of co-authorship networks. The top row shows the fraction of nodes belonging to the largest component as a measure of network size, plotted vs. the total number of nodes in the network. The bottom row shows the mean geodesic path length of the largest component ("mean path length") vs. the total number of nodes in the network. For Topics 5 and 19, the largest component grows to dominate the network. As the largest component grows, its mean path length increases quickly at first and then begins to decrease. For Topic 12, a single large component grows, but remains treelike and its mean path length only continues to increase. For Topic 41, no giant component forms. established. There are several possible reasons why a dense giant component does not form in all cases. The existence of a giant component only indicates that there are a great many researchers that have collaborated with one another. Inter-group collaborations may be more fre- quent in some fields than in others, and a giant compo- nent is only likely to form when there are many collabo- rations between research groups. Additionally, the arXiv does not necessarily represent a comprehensive sampling of articles from all subfields of science. The arXiv's cover- age of some fields may be incomplete, such as microscopy (Topic 15) and surface chemistry (Topic 47). B. Validation Across Corpora The characteristic growth patterns seen for the co- authorship networks of authors from the arXiv remain consistent when we repeat the same analysis using an- other corpus. We use the topic model trained on the arXiv data to infer topics for the condensed matter physics articles from the Web of Science (WoS). The same procedures for generating and measuring the co- authorship networks for the WoS articles reveals that the topic model trained on the arXiv is still able to identify large connected clusters of articles in the WoS. Figure 3 compares the behavior of the co-authorship networks that occur within both the arXiv and WoS. In the majority of cases, the co-authorship networks identified from the WoS articles behave similarly to the ones identified on arXiv. For example, the co-authorship networks for research on quantum computing and mag- netic material properties (Topics 5 and 19, the two left- most columns of Figure 3) form a dense giant component for both arXiv and for WoS. There is also a group of top- ics whose networks form only a treelike giant component or no giant component in the arXiv data but do form a dense component with a shrinking mean path length in the WoS data. Topics that do this include transport mea- surements and mechanical material properties (Topics 12 and 41, shown in the two rightmost columns of Figure 3), as well as nanoscale devices (Topic 16) and inelastic scat- tering experiments (Topic 33). We note that these topics have an experimental focus. Experimental research sub- jects are known to have less coverage on arXiv, but are covered more comprehensively in the WoS [15]. There are also a few topics with decreased coverage on WoS because the WoS does not categorize them as condensed matter. For example, articles on ultracold atoms (Topics 3 and 20) may be categorized separately as "atomic, molecu- lar, and optical physics" and articles on soft condensed matter (Topics 25 and 50) may be categorized separately as "fluids." Consequently, these topics' decreased inclu- sion in the WoS data set leads to smaller and less densely 50010001500200025000.00.20.40.60.81.0Giant Component SizeTopic 5: Quantum ComputingMeasurementNull Model5001000150020002500Nodes (Authors)0246810Mean Path LengthMeasurementNull Model50010001500200025000.00.20.40.60.81.0Topic 19: Magnetic Materials5001000150020002500Nodes (Authors)0246810200400600800100012000.00.20.40.60.81.0Topic 12: Transport Measurements20040060080010001200Nodes (Authors)0246810200400600800100012000.00.20.40.60.81.0Topic 41: Mechanical Properties20040060080010001200Nodes (Authors)0246810 7 FIG. 3. Comparison between co-authorship networks generated from arXiv and Web of Science. Each column corresponds to a different topic. The top row shows the fraction of nodes belonging to the largest component as a measure of network size vs. the total number of nodes in the network. The bottom row shows the mean geodesic path length of the largest component ("mean path length") vs. the total number of nodes in the network. Each plot shows the measurements made of the co-authorship network from the Web of Science (in red), from arXiv (in blue), as well as co-authorship networks generated from randomly chosen articles from Web of Science (null model, in gray). connected co-authorship networks. Overall,27 out of 50 topics have co-authorship net- works that develop similarly for both the WoS data and the arXiv data (Appendix B). Additionally, 10 experimentally-focused topics have co-authorship net- works that grow to form large giant components on on account of having better coverage on the WoS compared to the arXiv. Another three topics (Topics 9, 10, and 42) have very low coverage on the arXiv (fewer than 100 associated articles) and do not form giant connected com- ponents with either the arXiv or the WoS. Given that, across both corpora, none of these three topics has many strongly associated articles, it is likely that Topics 9, 10, and 42 are actually "junk topics," meaning that they do not reflect coherent themes and so are not useful for the purposes of the present study. The consistency of the be- havior of these co-authorship networks measured across different corpora suggests that the collaborative commu- nities identified using the model are reflected in multiple data sets. C. Robustness to Edge Removal Finally, we address the question of whether the co- authorship network development patterns seen in our data and in previous studies are robust to relaxing the as- sumption that all edges in the co-authorship network are maintained indefinitely after they are established. Pre- vious studies have constructed co-authorship networks wherein that collaborative link, once established, are maintained forever [10, 11, 13]. In practice, when such a collaborative relationship requires significant efforts to maintain, this assumption is not necessarily valid. We re-assemble the co-authorship networks for each of the topics, this time allowing edges to expire after a fixed number of months. That is to say, if two authors do not repeat a collaboration after a certain amount of time, the edge representing their relationship is removed from the network. The results are plotted in Figure 4, where the uppermost curve (gray; "no limit") shows how the giant component grows if edges survive indefinitely, while the other curves show how those measurements change if the edges are removed after 2 (blue), 5 (green), or 10 (red) years. Limiting the lifetime of edges to a few years causes giant components to develop much more slowly, or to not develop at all. For Topics 5 and 19, the network measurements for 5 and 10 years are very close to the indefinite lifetime limit. This suggests that these net- works are particularly robust to edge removal, reflecting a very densely connected giant component where edges are frequently renewed [13]. For Topic 38, the giant com- ponent forms much more slowly, and actually begins to disassemble for edge lifetimes of 2 or 5 years. For Topic 12, finite edge lifetime only suppresses the component 5001000150020000.00.20.40.60.81.0Giant Component SizeTopic 5:Quantum ComputingWeb of Science ArticlesArXiv ArticlesNull Model500100015002000Nodes (authors)12345678910Mean Path LengthWeb of Science ArticlesArXiv ArticlesNull Model50010001500200025000.00.20.40.60.81.0Topic 19: Magnetic Materials5001000150020002500Nodes (authors)123456789101000200030000.00.20.40.60.81.0Topic 12: Transport Measurements100020003000Nodes (authors)2468101210002000300040000.00.20.40.60.81.0Topic 41: Mechanical Properties1000200030004000Nodes (authors)12345678910 8 FIG. 4. Network Robustness to Edge Removal. For four topics, we show how the network assembly changes when edges only remain in the network for a limited amount of time. Each plot shows the network's giant component size over time for four different edge lifetimes. For short edge lifetimes (2 years in blue; 5 years in green), the giant connected component fails to develop or develops much more slowly compared to the permanent edge ("no limit," gray) case. For longer edge lifetimes (10 years, red), the giant component approaches the no limit case. formation of a large component. (Appendix E contains additional visualizations of these graphs, comparable to those appearing in Figure 1.) Currently, it is unknown what criteria for including and excluding nodes and edges from co-authorship net- work models best reflect the reality of authors entering and exiting different fields. What is clear, however, is that the assumption that the relationships represented by edges between authors last forever is important for ob- taining the quantitative results that reflect a topological transition in the co-authorship network. Shortening the lifetime of edges can dramatically change a co-authorship network's evolution over time. V. DISCUSSION This study expands upon previous research explor- ing the growth and development of co-authorship net- works using topic modeling to algorithmically identify and study a large population of scientific fields, along with their associated articles and authors. Our results show that, for the topics determined using LDA, a large majority of co-authorship networks undergo a topologi- cal transition to form a densely-connected giant compo- nent characterized by three stages of development. These patterns corroborate findings from earlier studies that fo- cused on small numbers of (often manually assembled) co-authorship networks. Our results demonstrate that the characteristic topological transition is robust to vari- ations in the definition of a scientific field, both in terms of size and specificity. Additionally, our methods em- ploy algorithmic clustering and require no input from hu- man experts, yet the results are largely consistent with previous studies. We also found that the patterns in co-authorship network development are consistent across corpora, which we demonstrate by repeating our analysis using data from both the arXiv and the Web of Science. One notable difference between the two corpora is re- flected in how arXiv's selections of articles related to cer- tain experimentally-focused topics are under-populated: in these cases, the co-authorship networks constructed using the larger WoS data set undergo a topological tran- sition, while the corresponding networks drawn from the arXiv data do not. Topic modeling is a rich and actively growing area of research within the statistical modeling and natural lan- guage processing communities. In our study, we used latent Dirichlet allocation, one of the most popular yet simplest forms of topic modeling. This model assumes a static definition for topics and thus scientific communi- ties, which are known evolve with time. Additionally, the model does not directly incorporate other, non-semantic relationships between documents (such as co-authorship or citations), which may signal alternate forms of cohe- sion within a scientific community. For our purposes, 199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 5: Quantum Computing19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 19: Magnetic Materials19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 12: Transport Measurements19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 38: Mott Insulators19992003200720112015Time (years)0246810Mean Path Length we consider the assembly and development co-authorship networks over relatively short periods of time and thus favor LDA's straightforward approach. Future work in this area, however, should explore more sophisticated algorithms that consider topic dynamics (e.g. [30, 31]) and additional measures of community cohesion in order to more thoroughly address the co-evolution of scientific fields. Our method for algorithmically generating and analyz- ing a large number of fields can also be used as a frame- work for further exploring the claims made in a wide variety of bibliometric contexts. For example, one could also perform a comparison of the micro-scale dynamics of individual authors many different fields. Recent studies have used agent-based models of author behavior to ex- plain the patterns in publishing behavior that one sees in different fields of science (e.g. [20, 32]). Once again, most of these studies have relied on manually annotated data sets, and as such, they have historically been limited to only a handful of fields. The approach that we develop in this study, however, enables future work, in conjunction 9 with comprehensive data sets like the arXiv or Web of Science, to further test the accuracy of these models of author behavior across a large and diverse population of scientific fields. VI. ACKNOWLEDGMENTS This material is based upon work supported by the Na- tional Science Foundation Graduate Research Fellowship under Grant No. DGE-1144153, and NSF award SMA 1633747. Any opinion, findings, and conclusions or rec- ommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. The authors would also like to acknowledge Michael W. Macy, Paul H. Ginsparg, Alexandra Schofield, and Haofei Wei, as well as Brent Schneeman, Laurence Brandenberger, Richard Barnes, and the other attendees of the Santa Fe Institute's 2015 Complex Systems Summer School for helpful discussions. [1] K. Borner, N. Contractor, H. J. Falk-Krzesinski, S. M. Fiore, K. L. Hall, J. Keyton, B. Spring, and B. Uzzi, Sci- D. Stokols, W. Trochim, ence Translational Medicine 2, (2010), http://stm.sciencemag.org/content/2/49/49cm24.full.pdf. 49cm24 [2] D. J. de Solla Price, Little Science, Big Science... and Beyond (Columbia University Press, 1986). [15] V. Larivi`ere, C. R. Sugimoto, B. Macaluso, S. Milojevi´c, B. Cronin, and M. Thelwall, Journal of the Association for Information Science and Technology 65, 1157 (2014). [16] "Certain data included herein are derived from Clarivate Analytics Web of Science TM. c(cid:13)Copyright Clarivate An- alytics 2017. All rights reserved.". [17] I. Bhattacharya and L. Getoor, ACM Transactions on [3] R. Guimera, B. Uzzi, J. Spiro, and L. A. N. Amaral, Knowledge Discovery from Data (TKDD) 1, 5 (2007). Science 308, 697 (2005). [4] D. Kaiser, Drawing Theories Apart: The Dispersion of Feynman Diagrams in Postwar Physics (University of Chicago Press, 2005). [5] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan, in Proceedings of the 12th ACM SIGKDD in- ternational conference on Knowledge discovery and data mining (ACM, 2006) pp. 44–54. [6] A. Z. Jacobs, S. F. Way, J. Ugander, and A. Clauset, in Proceedings of the ACM Web Science Conference (ACM, 2015) p. 18. [18] Y. Song, J. Huang, I. G. Councill, J. Li, and C. L. Giles, in Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries (ACM, 2007) pp. 342–351. [19] T. Joachims, Learning to Classify Text Using Sup- port Vector Machines: Methods, Theory and Algorithms (Kluwer Academic Publishers, 2002). [20] K. W. Boyack, R. Klavans, and K. Borner, Scientomet- rics 64, 351 (2005). [21] D. M. Blei, A. Y. Ng, and M. I. Jordan, Journal of Machine Learning Research 3, 993 (2003). [22] T. L. Griffiths and M. Steyvers, Proceedings of the Na- [7] K. Borner and R. M. Shiffrin, Proceedings of the National tional Academy of Sciences 101, 5228 (2004). Academy of Sciences 101, 5183 (2004). [8] P. Ginsparg, P. Houle, T. Joachims, and J. H. Sul, Pro- ceedings of the National Academy of Sciences 101, 5236 (2004). [9] A. N. Tabah, Annual Review of Information Science and Technology 34, 249 (1999). [10] L. M. A. Bettencourt and D. I. Kaiser, arXiv.org (2015), 1504.00319v1. [11] L. M. A. Bettencourt, D. I. Kaiser, and J. Kaur, Journal [23] A. K. McCallum, "Mallet: A machine learning for lan- guage toolkit," (2002), http://mallet.cs.umass.edu. [24] Z. Guo, S. Zhu, Y. Chi, Z. Zhang, and Y. Gong, in Proceedings of the 32nd international ACM SIGIR con- ference on Research and development in information re- trieval (ACM, 2009) pp. 720–721. [25] M. Rosen-Zvi, T. Griffiths, M. Steyvers, and P. Smyth, in Proceedings of the 20th Conference on Uncertainty in Artificial Intelligence (AUAI Press, 2004) pp. 487–494. of Informetrics 3, 210 (2009). [26] M. E. [12] M. E. J. Newman, Networks: An Introduction (Oxford University Press, 2010). J. Newman, Proceedings 98, tional Academy http://www.pnas.org/content/98/2/404.full.pdf. Sciences of of 404 the Na- (2001), [13] D. Lee, K.-I. Goh, B. Kahng, and D. Kim, Physical [27] M. E. J. Newman, Proceedings of the National Academy Review E 82, 026112 (2010). submission "arXiv [14] arXiv, rate statistics, 2016. http://arxiv.org/help/stats/2016 by area/index," (2016). of Sciences 101, 5200 (2004). [28] J. Leskovec, J. Kleinberg, and C. Faloutsos, in Proceed- ings of the eleventh ACM SIGKDD international con- ference on Knowledge discovery in data mining (ACM, 1 2005) pp. 177–187. [29] D. J. Watts and S. H. Strogatz, Nature 393, 440 (1998). [30] D. M. Blei and J. D. Lafferty, in Proceedings of the 23rd international conference on Machine learning (ACM, 2006) pp. 113–120. [31] X. Wang and A. McCallum, in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, 2006) pp. 424–433. [32] X. Sun, J. Kaur, S. Milojevi´c, A. Flammini, and F. Menczer, Scientific Reports 3 (2013). Appendix A: Interpreting Topic Model Output This table lists the properties of each of the k = 50 topics identified using LDA trained on the condensed matter physics (cond-mat) articles on arXiv. Keywords represent a few of the words most strongly associated with a topic. The Example Article is the reference number of an article with a high probability assigned to a topic. We interpret each topic as representing a research field, and the Interpretation is the name that we use to refer to that research field. # 1 2 3 4 5 6 7 8 9 Keywords critical scaling ising transition temperature spin glass dimen- sion random order phase correlation lattice network node distribution degree random graph complex dy- namic population scalefree market pattern condensate boseeinstein atom trap gas bose interaction poten- tial condensation trapped atomic bec pressure phase alloy compound gpa temperature transition structural crystal lattice diffraction xray superconductivity quantum state qubit entanglement spin dot decoherence cou- pling single control gate coupled information dynamic noise quantum state oscillator dynamical regime frequency nonequilibrium driven coupled evolution fluctuation spin magnetic ferromagnetic magnetization effect current anisotropy polarization exchange layer interaction coupling experimental recent theoretical physic experiment phenomenon present review work physical discus understanding coupling interaction spinorbit phonon electronphonon effect phonons electron strong mode rashba polaron Article Interpretation cond-mat/9709165 Spin Glasses; Magnetic Frustration cond-mat/9709165 Complex Networks; Population 0812.0499 0712.2955 0903.2030 1411.2637 Dynamics Bose-Einstein Condensates Superconducting Phases; High Pres- sure Phases Quantum Computing; Quantum Information Quantum Oscillators 1205.2835 Spins in Materials; Spintronics 1306.1774 Review Articles cond-mat/9911404 Polarons 10 phase transition diagram order critical temperature point state cond-mat/0602237 Phase Transitions; Quantum Phase quantum region firstorder behavior 11 quantum optical dot exciton semiconductor emission electron 0906.3260 energy excitons hole laser excitation Transitions Quantum Dots; Mesoscale Physics 12 temperature conductivity thermal transport dependence low cond-mat/0210047 Transport Measurements effect resistivity heat coefficient scattering thermoelectric 13 wave soliton nonlinear periodic lattice potential instability 0904.4417 Solitons; Stationary States velocity oscillation mode dynamic propagation 14 vortex magnetic pinning lattice superfluid flux core supercon- cond-mat/9908317 Superconductor Vortices ductors current critical superconducting defect 15 scanning microscopy measurement tunneling image force local 1009.2393 Microscopy tip surface imaging probe atomic resolution 16 device material application design control cell efficiency perfor- 0804.1389 Electronic Devices mance memory potential power circuit technology 17 approximation density potential energy calculation solution cond-mat/0007282 Mathematical Physics effective functional exact expression expansion order 18 spin lattice chain magnetic quantum heisenberg state interac- 1404.0194 tion antiferromagnetic phase order exchange 19 magnetic temperature heat measurement magnetization susceptibility transition specific crystal single compound ferromagnetic 1411.2135 Magnetic Frustration; Spin Chains & Lattices Magnetic Material Properties 20 gas lattice atom interaction fermi superfluid optical boson 0806.4310 Ultracold Atoms Dynamics fermion ultracold state quantum 21 film thin layer substrate temperature sample surface growth 1502.07223 Oxide Thin Films thickness grown deposition nanoparticles 22 spin relaxation magnetic nuclear electron temperature rate 1501.02897 Nuclear Magnetic Resonance resonance nmr dynamic frequency hyperfine Continued on next page 2 # 23 quantum hall electron magnetic state effect landau level frac- Keywords Article Interpretation 1109.6219 Quantum Hall Effect TABLE I – continued from previous page tional twodimensional edge filling 24 nanotube carbon nanowires transistor device gate channel 1112.4397 effect voltage nanowire tube contact transport Electronic Devices; Nanoscale Devices 25 polymer chain protein interaction dna solution simulation cond-mat/0504108 Soft Condensed Matter; Polymer length charge molecule force charged concentration 26 impurity disorder interaction kondo liquid localization effect 1209.1606 Physics Disordered Systems disordered electron quantum fermi anderson 27 frequency optical cavity mode light microwave wave resonance 1212.0237 Optics; Metamaterials resonator dielectric radiation photonic 28 dynamic glass liquid temperature simulation relaxation transi- 1209.3401 Glasses tion molecular water density fluid correlation glassy 29 graphene layer edge bilayer electronic dirac gap band mono- 1309.5398 Graphene layer graphite sheet nanoribbons 30 topological symmetry state insulator phase quantum fermion cond-mat/0506581 Topological Phases gauge dirac chiral majorana breaking edge 31 simulation monte carlo algorithm problem numerical quantum 0705.4173 Simulation Methods; Monte Carlo present efficient technique scheme calculation 32 quantum dot transport conductance tunneling electron current 0706.2950 Mesoscale Transport effect voltage charge lead contact junction 33 scattering mode spectrum excitation peak frequency energy cond-mat/0308170 Inelastic Scattering Experiments optical raman neutron inelastic phonon 34 distribution random correlation matrix statistic fluctuation cond-mat/9704191 Condensed Matter Theory; Random probability gaussian ensemble large statistical density Matrices 35 flow particle granular fluid velocity shear force dynamic simu- cond-mat/9511105 Soft Condensed Matter; Granular lation friction hydrodynamic viscosity Physics 36 current junction josephson superconducting ring magnetic flux cond-mat/9811017 Superconducting Devices; Josephson critical effect array wire temperature tunnel 37 entropy equilibrium energy nonequilibrium fluctuation statisti- cal heat thermodynamic distribution relation thermodynamics theorem temperature 1111.7014 Junctions Thermodynamics 38 hubbard interaction electron correlation charge mott state cond-mat/0508385 Mott-Hubbard Model lattice insulator correlated phase coulomb band hopping 39 band surface fermi state electronic gap electron energy photoe- 1101.5615 Electronic Spectra; ARPES mission calculation level spectroscopy 40 scaling exponent percolation size cluster dimension critical cond-mat/0608223 Critical Phenomena alpha lattice law fractal distribution 41 stress elastic strain material deformation dislocation shear cond-mat/0410642 Mechanical Properties of Materials modulus mechanical crack solid response fracture 42 state energy ground bound number spectrum density excited cond-mat/9712133 Quantum States level particle potential excitation 43 superconducting superconductivity doping superconductors 1504.06972 Cuprate Superconductors cuprates temperature order state pseudogap magnetic charge 44 magnetic ferroelectric phase transition orbital ordering polar- ization temperature order manganite state charge 1309.0291 Ferroelectrics 45 matrix quantum entanglement operator boundary lattice chain cond-mat/0211081 Condensed Matter Theory entropy exact group solution spin representation 46 superconducting state superconductors superconductivity su- perconductor gap pairing symmetry dwave temperature order pair cond-mat/0307345 Superconductivity 47 surface interface domain wall growth boundary force nucle- 0809.1779 Surface Physics; Surface Chemistry ation droplet bulk substrate layer 48 calculation atom energy density molecule electronic surface 1312.4272 Density Functional Theory functional molecular cluster defect hydrogen 49 particle diffusion process motion dynamic brownian rate reac- 1207.6190 tion random stochastic transport probability 50 crystal membrane nematic liquid surface curvature defect 1304.0575 order rod orientation elastic phase Nonequlibrium Stat Mech; Stochastic Processes Soft Condensed Matter; Structured Fluids Appendix B: Network Assembly Results for All Topics This table summarizes the behavior of each topic's corresponding co-authorship network. For each topic (denoted by # and Interpretation), we show the number of articles for both the arXiv and Web of Science data sets (# Articles arXiv and # Articles WoS, respectively). Also shown is the assembly behavior of the co-authorship network for each topic (GC Transition). Referring back to Figures 1 and 2, "No GC" refers to no giant component formation, where cliques of authors remain disjointed. "Treelike GC" refers to cases where cliques of authors join together to form an extended, treelike giant component that has a mean path length that continues to grow. "Dense GC" refers to cases where cliques join together to form a densely connected giant component with many overlapping cliques and a mean path length that increases and then decreases. 3 # Interpretation Spin Glasses; Magnetic Frustration 1 2 Complex Networks; Population Dynamics 3 Bose-Einstein Condensates 4 Superconducting Phases; High Pressure Phases # Articles arXiv 1558 2677 1020 695 GC Transition arXiv Dense GC Dense GC Dense GC Dense GC # Articles WoS 1765 731 105 3780 GC Transition WoS Treelike GC No GC No GC Dense GC Spins in Materials; Spintronics 5 Quantum Computing 6 Quantum Oscillators 7 8 Review Articles 9 Polarons 10 Phase Transitions; Quantum Phase Transitions 11 Quantum Dots; Mesoscale Physics 12 Transport Measurements 13 Solitons; Stationary States 14 Superconductor Vortices 15 Microscopy 16 Electronic Devices 17 Mathematical Physics 18 Spin Chains & Lattices 19 Magnetic Material Properties 20 Ultracold Atoms Dynamics 21 Oxide Thin Films 22 Nuclear Magnetic Resonance 23 Quantum Hall Effect 24 Electronic Devices; Nanoscale Devices 25 Soft Condensed Matter; Polymer Physics 26 Disordered Systems 27 Optics; Metamaterials 28 Glasses 29 Graphene 30 Topological Phases 31 Simulation Methods; Monte Carlo 32 Mesoscale Transport 33 Inelastic Scattering Experiments 34 Condensed Matter Theory 35 Soft Condensed Matter; Granular Physics 36 Superconducting Devices 37 Thermodynamics 38 Mott-Hubbard Model 39 Electronic Spectra; ARPES 40 Critical Phenomena 41 Mechanical Material Properties 42 Quantum States 43 Cuprate Superconductors 44 Ferroelectrics 1135 523 840 369 60 60 821 366 280 450 122 324 752 1539 1087 1300 1116 196 742 422 1276 444 676 1187 402 913 754 1416 220 641 1375 596 1574 798 457 786 525 62 1030 1043 Dense GC No GC Dense GC No GC No GC No GC Dense GC Treelike GC Treelike GC Dense GC No GC No GC Dense GC Dense GC Dense GC Dense GC Treelike GC Treelike GC Dense GC Treelike GC Treelike GC No GC Treelike GC Dense GC Treelike GC Dense GC No GC Dense GC Treelike GC Treelike GC Dense GC Dense GC Treelike GC Treelike GC Dense GC Treelike GC No GC No GC Dense GC Dense GC 677 238 1461 429 85 52 6489 1189 233 756 439 5375 786 1623 5714 104 54823 620 799 3663 993 285 2125 844 392 433 356 1774 756 100 421 1191 140 901 1451 109 2345 29 858 2591 Dense GC No GC Dense GC No GC No GC No GC Dense GC Treelike GC No GC Dense GC No GC Dense GC Treelike GC Dense GC Dense GC No GC Dense GC Dense GC Dense GC Dense GC No GC No GC Dense GC Dense GC Treelike GC Dense GC Treelike GC Dense GC Dense GC No GC No GC Dense GC No GC Dense GC Dense GC No GC Dense GC No GC Dense GC Dense GC Continued on next page TABLE II – continued from previous page # Interpretation 45 Condensed Matter Theory 46 Superconductivity 47 Surface Physics; Surface Chemistry 48 Density Functional Theory 49 Nonequlibrium Stat Mech 50 Soft Condensed Matter; Structured Fluids # Articles arXiv 1595 576 467 1002 993 432 GC Transition arXiv Treelike GC Dense GC No GC Treelike GC Treelike GC Treelike GC # Articles WoS 467 528 938 8439 130 139 GC Transition WoS No GC Dense GC Dense GC Dense GC No GC No GC 4 Appendix C: Author Name Disambiguation Determining the identities of document authors in publication data sets like the arXiv and Web of Science is a complex open problem in information science (Cf. [17, 18]). The analysis in the main text is conducted by labeling each article's author using their their full names as reported in the metadata. Punctuation is removed and all letters are set to the same case, such that "Lindsay M. Barnes" becomes "lindsay m barnes" for the purposes of labeling an author. We adopt this convention because it avoids artificially combining multiple authors with the same name into a single node. At the same time, this convention is more likely to split single authors across multiple labels. For example, "H. Eugene Stanley," "H. E. Stanley," and "H. Stanley" would all be treated as separate entities in our co-authorship networks. To test whether the results reported above are robust to the choice of naming convention, we repeat our analysis by naming authors according to their first initials and last names. With this convention, "Lindsay M. Barnes" becomes "l barnes." Examining the distribution of articles produced by each author, the new convention does appear to create a large number of entities with common names (e.g. "h kim," "y lee") with a far above average publications count. These entities appear to be composites of many different authors with similar names. We reconstruct and measure the co-authorship networks using both author labeling conventions. The plots in Figure S1 show measurements of each co-authorship network, similar to the measurements plotted in Figure 2 above. Measurements of the co-authorship networks generated using the first initials and last names are plotted in red, while the measurements of the co-authorship networks generated using full names are plotted in blue. The qualitative behavior of the co-authorship network assembly is largely consistent across all topics, with the full author name co-authorship graphs' giant components tending to be smaller and slower to develop. Despite these quantitative differences, the qualitative behavior seen for each topic's network assembly remains consistent between the two naming conventions. For Topic 5 and Topic 19, each case's respective co-authorship network forms a giant component whose mean path length grows and then shrinks. For Topic 12, each case's co-authorship network forms a treelike largest connected component. For Topic 41, each case's network fails to form a connected component. Overall, the results reported in the main text are robust to changing how author nodes are labeled, but the full name convention is more conservative about artificially creating composite author nodes. 5 FIG. S1. Comparison between co-authorship networks drawn using two different naming conventions. Each panel shows measurements of co-authorship networks using two different node labeling conventions. Measurements of the co-authorship networks generated using the first initials and last names are plotted in red, while the measurements of the co-authorship networks generated using full names are plotted in blue. The top row shows the fraction of nodes belonging to the largest component as a measure of network size, plotted vs. the total number of nodes in the network. The bottom row shows the mean geodesic path length of the largest component ("mean path length") vs. the total number of nodes in the network. 50010001500200025000.00.20.40.60.81.0Giant Component SizeTopic 5:Quantum Computing5001000150020002500Nodes(Authors)012345678Giant Component Diameter"F Lastname""Full Name"500100015002000250030000.00.20.40.60.81.0Topic 19:Magnetic Materials50010001500200025003000Nodes (Authors)012345678200400600800100012000.00.20.40.60.81.0Topic 12:Transport Measurements20040060080010001200Nodes (Authors)01234567820040060080010000.00.20.40.60.81.0Topic 41:Mechanical Properties2004006008001000Nodes (Authors)012345678199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 5:Quantum Computing19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 19:Magnetic Materials19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 48:DFT19992003200720112015Time (years)0246810Mean Path Length199920032007201120150.00.20.40.60.81.0Giant Component SizeTopic 38:Mott Insulators19992003200720112015Time (years)0246810Mean Path Length Appendix D: Modularity 6 We evaluate the extent to which topic modeling is effective at detecting distinct communities of authors using a modularity score. The modularity score, as defined in [12] measures the extent to which nodes of a given type (for example, associated with a particular topic) tend to form links with other nodes of the same type vs. nodes of a different type. For a pair of topics X and Y , we calculate the modularity by first identifying the authors who have written articles associated with either or both topics. Based on co-authorship, we then identify all edges between authors belonging to the same topic. If the two connected authors are both only associated with topic X or only with topic Y , then this edge connects like with like. (We consider cases where an author in topic X connected to an author in both topics X and Y to be "unlike" edges.) After identifying these edges, we can then calculate the standard normalized modularity score (cid:80) 2m −(cid:80) (S1) Q Qmax = ij (Aij − kikj/2m) δ (ci, cj) ij (kikj/2m) δ (ci, cj) where m is the total number of edges, A is the adjacency matrix, ki is the degree of the ith author, ci is the community that the ith author belongs to, and the sum is performed over all authors [12]. A modularity score close to one means that there are relatively few links between nodes of different types. A modularity score of less than one means that the different types of nodes are mixed. A network consisting of nodes of only a single type has modularity 0. In the case of our co-authorship networks, we label our author nodes according to whether they have written one or more articles that is strongly associated with one of the topics detected using LDA. The modularity scores for each pair of topics is shown in Figure S2, and a histogram of values is shown in Figure S3. For the majority of pairs of topics, the modularity scores are close to 1, meaning that the communities of authors associated with different topic are only sparsely connected to one another. There are a few exceptions where the modularity score is lower (in the left tail of Figure S3), but these are cases where the topics are closely related to one another and one expects there to be a lot of overlap between the two topics. For example, Topics 3 and 20 are both related to ultracold atoms, while Topics 43 and 46 are both related to superconductors and superconductivity. FIG. S2. Modularity scores for the co-authorship networks of each pair of topics. 11020304050110203040500.00.20.40.60.81.0 7 FIG. S3. Histogram of modularity scores for all pairs of topics. A modularity score close to one means that two topics are mostly separated from one another. The left tail includes pairs of topics that are more closely related to one another, meaning that one expects the two communities to overlap more in those cases. 0.00.20.40.60.81.0Modularity0.00.050.1Modularity Histogram 8 Appendix E: Robustness to Edge Removal, Visualizations Figure 4 in the main text shows how the quantitative measurements of four topics change if an edge is removed from the network if a collaboration is not repeated after a finite amount of time. Figures S4-S7 show the network visualizations that accompany those quantitative measurements. In each figure, each row shows how the co-authorship network evolves over time for a given edge survival lifetime (that is to say, the four rows in each of these diagrams correspond to the four lines in each of the panels in Figure 4). Disconnected single nodes are not pictured. The co-authorship networks for both Topic 5 (Figure S4) and Topic 19 (Figure S5) robustly grow to form large connected components for survival times of 5 years. By contrast, the co-authorship networks for Topic 38 (Figure S7) are less robust to edge removal, and only for survival times of longer than 10 years does the giant component appear to form. The co-authorship network for Topic 12 (Figure S6) only contains a treelike connected component if edges are allowed to survive indefinitely. Allowing edges to be removed only breaks up this largest component. 9 FIG. S4. Topic 5 Network Visualizations with Edge Removal: The giant component formation is somewhat suppressed for short survival times (2 years, top row), although a single large connected component does form. The dense giant component forms robustly for survival times longer than 5 years (bottom three rows). 10 FIG. S5. Topic 19 Network Visualizations with Edge Removal: Similar to the network for Topic 5 shown in Figure S4 above, the giant component is somewhat suppressed for short survival times (2 years, top row), although large connected components do form. The dense giant component forms robustly for survival times longer than 5 years (bottom three rows). 11 FIG. S6. Topic 12 Network Visualizations with Edge Removal: The co-authorship network only forms relatively small treelike connected component if edges are allowed to survive indefinitely. Allowing edges to be removed only breaks up this largest component. 12 FIG. S7. Topic 38 Network Visualizations with Edge Removal: For short survival times (2 years and 5 years, top 2 rows), no component develops. For longer survival times (10 years, third row), a sparse, treelike large component does form. Only for very long survival times (bottom row) does the largest component appear to densify. The co-authorship network for Topic 38 is less robust to removal than those of Topic 5 (Figure S4) and Topic 19 (Figure S5). Appendix F: Review Articles 13 The topic model also appears to identify a set of articles as review articles that are distinguished according to their stylistic content. In addition to reflecting standard research terminology, Topic 8 has keywords such as "review," "comment," and "discuss." The articles strongly associated with Topic 8 are often also associated with other Topics. Topic 8 is different from a "junk topic" in that it contains an interpretable stylistic theme without having a coherent scientific theme. The articles associated with Topic 8 have lots of terms in common, but those terms lack the specificity of the scientific terminology detected in some of the other topics. As such, one cannot expect that the authors who contributed to the articles associated with Topic 8 have common research interests, and so no giant component of collaborators should form in the co-authorship network. Figures S8 and S9 show how the cliques in Topic 8's co- authorship network fail to join together. Even though Topic 8's articles share a common set of terminology, the co-authorship network does not form a giant component. Only when a topic's keywords reflect a coherent scientific theme does a giant component form. FIG. S8. Topic 8 Network Visualizations: The co-authorship network remains a disjointed collection of cliques. FIG. S9. Topic 8 Network Measurements: In contrast to Topic 5 and Topic 19 seen in Figure 2, no giant component forms. 2004006008000.00.20.40.60.81.0Giant Component SizeMeasurementNull Model200400600800Nodes (Authors)0246810Mean Path LengthMeasurementNull Model
1308.1160
1
1308
2013-08-06T02:55:11
Coolhunting for the World's Thought Leaders
[ "cs.SI", "eess.SY", "physics.soc-ph" ]
Which thinkers are we guided by? A novel "Thought Leader Map" shows the select group of people with real influence who are setting the trends in the market for ideas. The influencers in philosophy, sociology, economics, and the "hard sciences" have been identified by a Delphi process, asking 50 thought leaders to name their peers. The importance of the influencers is calculated by constructing a co-occurrence network in the Blogosphere. Our main insight is that the era of the great authorities seems to be over. Major thought leaders are rare - the picture is composed of many specialists.
cs.SI
cs
PROCEEDINGS COINs13 MIT  CCI   COOLHUNTING FOR THE WORLD’S THOUGHT LEADERS 5  Cambridge  Center   Cambridge  MA  02138   Peter A. Gloor [email protected]   Karin Frick, Detlef Guertler, GDI Gottlieb Duttweiler Institute Langhaldenstrasse 21 CH-8803 Rüschlikon/Zurich Switzerland {karin.frick, detlef.guertler}@gdi.ch ABSTRACT Which thinkers are we guided by? A novel “Thought Leader Map” shows the select group of people with real influence who are setting the trends in the market for ideas. The influencers in philosophy, sociology, economics, and the “hard sciences” have been identified by a Delphi process, asking 50 thought leaders to name their peers. The importance of the influencers is calculated by constructing a co- occurrence network in the Blogosphere. Our main insight is that the era of the great authorities seems to be over. Major thought leaders are rare – the picture is composed of many specialists.1 MOTIVATION Who are the thought leaders shaping current discourse on the future of business and society? What are the new global perspectives and theories helping to drive social change and innovation? Every year, numerous lists are published about the world’s largest companies, the most promising start- ups, the strongest consumer brands, the richest individuals, the most successful sports stars, the top chefs and the most important trends in technology. Unlike these lists of business or technology leaders and trends, the most important thought leaders and trends shaping our society have not been subjected so far to any truly systematic analysis and regular publication – nothing remotely comparable to the analysis behind Gartner’s technology trends, for example. And yet the market of “big” ideas also yields both innovators and trends, which guide the decisions made within politics and business, which influence public opinion and which inspire further research or attract investors – and which are therefore well worth monitoring. As a rule, the importance of individual thinkers is measured on the basis of frequency of citation (citation index), sales figures from non-fiction and reference works, and academic 1 This paper is an extended version of (Frick 2012) published in German in the GDI Impuls Magazine. accolades (e.g. the Nobel Prize). Magazines such as Foreign Policy and Time publish annual lists of leading personalities from business, politics, research, art and culture, based on the results of polling experts for their opinions. And the TED.com website beautifully showcases the current leaders in the market for ideas, showing which talks with ideas for the future have had the most views and recommendations. While such rankings can give a rough idea of the popularity of individual thought leaders, they say little about the size of their actual influence, nor about the trendsetters in the market of ideas and how these ideas propagate. Nor do they show how the various thinkers and doctrines are interconnected – and who is influencing whom. New ideas are not created in a vacuum but in the act of engagement with a range of separate doctrines: accordingly, one must also consider these ideas in their juxtaposition to views held by other academics and researchers. A thinker gains influence only if his or her ideas attract attention, are taken on board by others and are then discussed in depth. This not only means discussions held within an inner circle or research group but also the wider, subsequent debate with a broader public, which also includes laypeople. Today, the most important marketplace for new ideas is the Internet, where they are first presented, disseminated and most vigorously debated. If we want to gauge the actual influence thinkers possess, we therefore need to assess their status on the net and the intensity of debate in the virtual infosphere about these people and their ideas. OUR APPROACH To analyze the status and the popularity of selected thought leaders in the infosphere/blogosphere, we have been using the network analysis tool Condor (Gloor & Zhao 2004). The same method has been used for analyzing product brands, or measuring stocks, for example. We have been working with this approach since 2005 to compare the positioning of brands, companies, concepts or individuals in the infosphere and to produce graphics of this kind. The 2 software itself doesn’t care whether the subject is Pepsi vs. Coke, Obama vs. Romney or Krugman vs. Kahneman. We started our list by manually selecting a list of over 100 thinkers in the fields of philosophy, sociology, economics, and the “hard sciences” based on the assessment of three researchers based on extensive literature research. These thinkers were then ranked using the following process: To find the most significant pages about a certain thought leader involves the application of a subject-driven betweenness algorithm similar to Google’s page rank. Condor collects the most important Blogs mentioning say “Daniel Kahnemann”, and then plugs these URLs into a Web search engine to see which other blogs link back to them. While Google’s page rank is fixed with each website having a predetermined value, our page rank is topic-based: for debates about ideas, the “Huffington Post” has very high relevance, for example – but very low relevance for conversations about dog food. Figure 1. Most important blogs for thought leaders (sorted by betweenness centrality) important Websites the most Figure 1 shows collected through this process, listing the Web sites from figure 2 by their betweenness in the network. While the search was run on the entire Web, the top scoring blogs were all English-language blogs. For the resulting visualization (figure 2) Condor is using a graph-layout algorithm based on force-directed spring layout, where two people are connected if they appear on the same Web page. To put it in other words: the more often two thinkers are named together in the infosphere, the closer together they are shown here in the graph. The size itself is determined by betweenness centrality, which is influenced by the citation frequency and by the relevance of the pages on which they are featured. Our Coolhunting tool Condor then generates this image by aggregating the links between the individuals analyzed. Making use of the fact that – other than general Web sites – blogs are continuously updated, this method is very sensitive to the time when the blog queries have been conducted. When this analysis was carried out (August/September 2012), for example, Thilo Sarrazin had just published his most recent book “Europe doesn't need the euro” – and this had a positive effect on his ranking. Re-evaluating his position six months later, his position will certainly be quite different – and thinkers who are then being hotly debated will have a higher relevance. Comparisons over extended periods of time will let us distinguish between “one-hit thinkers” and long- term thought leaders. A FRAGMENTATION OF IDEAS The results of this network analysis present a highly fragmented picture. There are no thinkers who really dominate the landscape: the distance between the «stars» and the less significant and less well-known researchers is relatively small and presumably only temporary. Other analyses will reveal the degree to which the relative social network positions change over time. The era of the great authorities seems to be over. Instead of a handful of key thinkers, we see a broad spectrum of specialists, who focus on niche topics, who remain generally unknown outside their specialist field and whose work is not discussed (figure 2 and table 1 in the appendix). As with the market for books and films, the market for ideas also seems increasingly a niche market, where major ideas and their creators are now losing ground to minor ideas and unknown researchers. Attention is no longer focused on the next big idea or the next Einstein, but is now increasingly divided up among many small-scale ideas – the “long tail of ideas”. This picture – namely the absence of authoritative thinkers and key concepts that influence whole generations of intellectuals – seemed so extraordinary that we tested it by means of a different assessment technique: we surveyed contributing authors to the journal GDI Impuls, a German knowledge and ideas magazine published by GDI. We asked these former authors for GDI Impuls (experts from both research 3 and practice) to name the thinkers who have most strongly influenced their own work and also the persons who will be the thought leaders of the 21st century. Receiving no prior briefing, fifty experts from home and abroad (including such luminaries as were already ranked in our Thought Leader list) generated a list of around 300 different names. On this long list of the major thinkers of yesterday and tomorrow, multiple mentions are rare. Karl Marx (5), Niklas Luhmann (4) and Michel Foucault (3) are the most-cited thinkers from the past, whose ideas have most strongly influenced the work of our experts. Figure 2. Thought leader map (3), (5), Anthony Giddens Daniel Kahneman Malcolm Gladwell (3) and Paul Krugman (3) top the list of the most important thinkers for the 21st century. All in all, then, this survey gives us the same picture as that from the network analysis: it’s not about altitude, but latitude. Economists rule A thought leader’s importance depends on the one hand on whom you ask and on the other, on how one measures it. If we take the citation frequency in academic journals as our benchmark, we find the behavioral economist and Nobel Prize winner Daniel Kahneman also among the leaders (table 1 in the appendix), but the remaining positions in the Thought Leader map now look very different: Thilo Sarrazin, author and former Berlin Finance Senator, would no longer be ranked first, for example, but would be bringing up the rear. This seems to indicate that individuals who carry little weight in research circles may be ideas market trendsetters, however, and can – for a certain period of time – set the agenda of public debate. If we take Google search hits as our benchmark then our rankings once again change completely. Of the thinkers we consider, the physicist Stephan Hawking now has the most Google hits – although he is a mid-fielder in terms of network status. Only Daniel Kahneman achieves consistently high rankings. It appears, therefore, that a strong online presence does not automatically lead to the actual discussion of an idea – and thus to a greater influence on the zeitgeist – than ideas whose creators have fewer Google hits. The field of influential thinkers is broad and too large to present in its entirety on the Thought Leader map. If we consider our thought leaders’ disciplines, however, and the universities at which they work, then the field contracts once again. The categories have been determined based on the thought leaders’ Wikipedia pages and home pages. Discussions about the future are clearly dominated by economists (24), followed by political theorists (8), social theorists (7) and philosophers (5). Scientists, in in represented less are contrast, discussions about the future in purely quantitative terms. Yet these few individuals – biologists (5), computer scientists (4), physicists (3) and chemists 4 (2) – are nonetheless all ranked in the upper half of the thought leader list, i.e. they enjoy above-average popularity in the blogosphere. Individual thinkers are not the only constituent parts of the network. Their environment – friends, research partners, students, sponsors and institutions where they work – also plays a part. Here, we note that the traditional elite universities continue to exert a powerful influence: Harvard (12) leads New York (6), Princeton, London (4 each), Yale and Columbia (3 each). While knowledge creation continues to become more and more open, and operates much like a bazaar – where many thinkers develop and exchange a wide variety of new ideas – the universities, as “cathedrals of learning”, have clearly not their central lost importance (Raymond 1999). today, still write a book that gets one noticed and triggers a debate is clearly necessary for that disseminating one’s ideas. A book makes the idea tangible and durable, ensuring that people’s engagement with the idea can develop and grow, both online and offline. The US social theorist Randall Collins (1998) has written what is probably the most comprehensive work on the formation of intellectual standpoints. One core aspect of his theory is that new ideas are always generated by the rivalry between contemporary thinkers, and that creativity is at its highest when there is an especially high level of friction between competing ideas. If one therefore assumes that new ideas are generated by engagement and debate, it is interesting to track the viewpoints between which these lines of conflict are drawn up Figure 3. Key terms in Blog posts about thinkers today. Writing a Book is key Figure 3 shows a tag cloud generated with Condor based on the text nearest to the names of the thinkers on the blog posts, illustrating the big role Harvard, Facebook, and the US President play in launching new ideas. At the same time we also notice a spillover effect from the banking crises, leading to a discussion of new social models and ethics. Thinkers who generate a strong response from the blogosphere and occupy a central position in the thought leader network are also successful authors in their own right and have produced one or more bestsellers in recent years. Out of the 76 thought leaders we surveyed, 74 have written at least one book. It seems, therefore, that the book continues to be the medium of choice for making one’s ideas heard and achieving a central role in the knowledge market. Accordingly, it seems that anyone wishing to change the world must, even WIKIPEDIA ADDS A MULTICULTURAL DIMENSION Our thinker short-list seems to favor the West. Viewed from India, the Middle East or China, the Thought Leader map might look quite different. To compare key leaders across different cultures, we use a completely different set of sources. We therefore also applied another method (Kleeb et al. 2012) where we constructed a global link network using Wikipedia as the source. Articles about people in Wikipedia include many social cues about a particular person. In the English Wikipedia there is a category called “Living People” which includes articles of people currently alive. To construct the social network of living people, we collected each article’s contents and extracted the internal links to other living people articles. Similarly to the Google page rank algorithm, this linking structure gives us a 5 clue about which person is more prominent from the Wikipedians’ perspective. As metric of importance we took the ratio between in-degree and out-degree because having a higher in-degree might be a proxy for the power or importance of the person described in the article. Because the size of the original map was too huge, we only included articles having more than a predefined number of incoming links and those peripheral articles that have a direct link to the most prominent articles. Figure 4.World leaders according to the 2011 English Wikipedia (Kleeb 2011) Figure 5. World leaders according to the Spanish 2011 Wikipedia (Kleeb 2011) To draw a temporal map of the “living people network”, we collected snapshots of the contents of the living people articles at different points in time. We also visualized living people networks in seven different-language Wikipedias (English, German, Spanish, French, Chinese, Arabic, Korean, Japanese) collecting the articles of people who were born after 1880 and not dead until 2010. Figure 4 shows the key leaders in the English Wikipedia, figure 5 the same for the Spanish Wikipedia. Obviously the world view of Spanish speakers is rather different from native English speakers, with former Chilean president Michele Bachelet, and movie dirctor Pedro Almovodar occupying central positions. CONCLUSIONS The new ideas show great diversity: the question of whether the field will continue to differentiate or consolidate can be answered only in the long term. The diversity of ideas and thinkers also reflects the complexity of the world itself, which is “too big to know” (Weinberger, 2012). Knowledge volume and rate of growth are now too great for the market to be dominated by just a few ideas. Never have there been so many researchers as today – nor has academic output ever been so diverse. We can no longer rely on the old measurement systems as a means of orienting ourselves and finding relevant, new ideas. Our Thought Leader map is an attempt to establish a new approach for classifying the most influential thinkers and trends in published research. We will continue to develop this ranking system and will conduct further network analyses at regular time intervals, combining our system with blog-ranking polling-based autogenerated maps from Wikipedia. REFERENCES Collins, R. (1998) The Sociology of Philosophies. A Global Theory of Intellectual Change”, Belknap Press of Harvard University Press. Frick, K. (2012) The Megatrendsetters. GDI Impuls, issue 4. Gloor, P. Zhao, Y. (2004) TeCFlow - A Temporal Communication Flow Visualizer for Social Networks Analysis , ACM CSCW Workshop on Social Networks. ACM CSCW Conference, Chicago, Nov. 6. Kleeb, Reto, Peter A. Gloor, Keiichi Nemoto, and Michael Henninger. (2012) "Wikimaps: dynamic maps of knowledge." International Journal of Organisational Design and Engineering 2, no. 2: 204-224. Raymond, E. (1999). The cathedral and the bazaar. Knowledge, Technology & Policy, 12(3), 23-49. Weinberger, D. (2012) Too Big to Know: Rethinking Knowledge Now That the Facts Aren't the Facts, 6 Experts Are Everywhere, and the Smartest Person in the Room Is the Room. Basic Books Table 1. (Frick 2012) Top 41 key thinkers (out of 76) ranked by our approach, compared against citation index and search hits
1702.00048
1
1702
2017-01-31T20:37:04
When Follow is Just One Click Away: Understanding Twitter Follow Behavior in the 2016 U.S. Presidential Election
[ "cs.SI" ]
Motivated by the two paradoxical facts that the marginal cost of following one extra candidate is close to zero and that the majority of Twitter users choose to follow only one or two candidates, we study the Twitter follow behaviors observed in the 2016 U.S. presidential election. Specifically, we complete the following tasks: (1) analyze Twitter follow patterns of the presidential election on Twitter, (2) use negative binomial regression to study the effects of gender and occupation on the number of candidates that one follows, and (3) use multinomial logistic regression to investigate the effects of gender, occupation and celebrities on the choice of candidates to follow.
cs.SI
cs
When Follow is Just One Click Away: Understanding Twitter Follow Behavior in the 2016 U.S. Presidential Election Yu Wang Computer Science University of Rochester Rochester, NY 14627 [email protected] Xiyang Zhang Psychology Beijing Normal University Beijing 100875 [email protected] Jiebo Luo Computer Science University of Rochester Rochester, NY 14627 [email protected] Abstract Motivated by the two paradoxical facts that the marginal cost of following one extra candidate is close to zero and that the majority of Twitter users choose to follow only one or two candidates, we study the Twitter follow behaviors observed in the 2016 U.S. presidential election. Specifically, we complete the following tasks: (1) analyze Twitter follow patterns of the presidential election on Twitter, (2) use negative binomial re- gression to study the effects of gender and occupation on the number of candidates that one follows, and (3) use multino- mial logistic regression to investigate the effects of gender, occupation and celebrities on the choice of candidates to fol- low. Introduction President Obama is often credited as the first to extend his political campaign onto social media during his first presi- dential run in 2008 (Tumasjan et al. 2010). Eight years later in the 2016 presidential election, social media was consid- ered to be Donald Trump's most powerful weapon (Alaimo 2016; Lockhart 2016). After winning the election, Donald Trump himself commented that tweeting "is a great way of communication" (Stahl 2016). In his book Our Revo- lution, which reflects on the 2016 presidential campaign, Bernie Sanders suggests that one of the reasons why his campaign did well is the campaign team's success with social media (Sanders 2016). One opinion shared by both Trump and Sanders is that having a large number of follow- ers on Twitter is an invaluable campaign asset (Stahl 2016; Sanders 2016). Given the prominent role that Twitter played in the presidential election, a systematic study of how individuals behave on Twitter and the informing factors underlying the observed behavior is warranted. Our work is motivated (1) by the paradoxical observation that most individuals choose to follow only one or two presidential candidates, when the marginal cost of following the fifteen others is just one click away and therefore technically close to zero, and (2) by the common criticism that Twitter follow is not a strong signal of support. We started by compiling the entire universe of the 2016 U.S. presidential election on Twitter. Copyright c(cid:13) 2017, Yu Wang, Xiyang Zhang and Jiebo Luo. All rights reserved. Figure 1: We use first names, profile images and family roles to identify gender, and we extract from self-descriptions individuals' occupations. We recorded all the 15.5 million individuals who were following one or more of the 16 candidates in early April, 2016. With such a rich dataset, we are able to (1) explore the most frequent follow patterns among these 15.5 million in- dividuals, (2) explore the correlation between following two different candidates and examine the question of electorate polarity, (3) study the effects of gender and occupation on the number of candidates that one chooses to follow with negative binomial regression, and (4) study the effects of gender, occupation and the endorsement of celebrities on the choice of candidates. When coding the variable gender, we integrate information from first names, profile images and self descriptions (Figure 1) and we show in the paper that the effect of gender is consistent across all the three chan- nels. The contributions of our paper are as follows: (1) we demonstrate to what extent the leading presidential candi- dates have dominated the Twitter sphere using a weighted follower metric, (2) we quantitatively measure how polar- ized Twitter followers are when it comes to choosing pres- idential candidates across party lines, (3) we show that women tend to follow fewer candidates than men and that journalists are more likely to follow a large number of can- didates, (4) we find that women tend to follow Democratic candidates, which supports the idea that women vote fol- lowing party lines (Miller 2016), and (5) we find that peo- ple who follow celebrities such Beyonc´e, Lebron James and Lady Gaga are more likely to be following candidates of both parties and that when choosing between Hillary Clin- ton and Bernie Sanders, endorsements by these celebrities favor Clinton. Related Literature Our paper builds on previous literature on electoral studies, data mining and computer vision. Previous work has studied the increasing polarization of American politics at both the elite level (Hare and Poole 2014; McCarty, Poole, and Rosenthal 2009) and the mass level (Campbell 2016; Doherty 2014). Druckman et al., in particular, study how elite partisan polarization affects pub- lic opinion formation and find that party polarization de- creases the impact of substantive information (Druckman, Peterson, and Slothuus 2013). Social clustering, on the other hand, is analyzed in (McPherson, Smith-Lovin, and Cook 2001; Barber´a 2015). In our work, we contribute to analyz- ing political polarization at the public level on Twitter. Gender plays an important role in the forming and dis- solving of relationships (Burt 2000), in online behavior (Ot- toni et al. 2013) and in political voting (King and Mat- land 2003; Dolan 2008; Brians 2005; Wang et al. 2016). One common observation is that women tend to vote for women, which is usually referred to as gender affinity ef- fect. In this paper we will analyze specifically the effects of gender on the number of presidential candidates that an individual chooses to follow and on which party that one chooses to follow. Given the importance of gender in real applications, a large number of studies have attempted to classify gender based on user names (Mislove et al. 2011; Nilizadeh et al. 2016), tweets, screen name and description (Burger et al. 2011) and friends (Zamal, Liu, and Ruths 2012). Following this line of research, our study will take advantage of in- formation from both user names and user-provided descrip- tions. Recent advances in computer vision (Krizhevsky, Sutskever, and Hinton 2012; Simonyan and Zisserman 2015; Srivastava, Greff, and Schmidhuber 2015; He et al. 2016), on the other hand, have made object detection and classi- fication increasingly accurate. In particular, face detection and gender classification (Farfade, Saberian, and Li 2015; Jia and Cristianini 2015; Levi and Hassner 2015) have both achieved very high accuracy, largely thanks to the adop- tion of deep learning (LeCun, Bengio, and Hinton 2015) and the availability of large datasets (Huang et al. 2007; Jr. and Tesafaye 2006; Phillips et al. 1998) and more re- cently (Guo et al. 2016). Our paper extracts gender-related information based on Twitter profile images and is related to gender classification using facial features (Levi and Has- sner 2015; Ginosar et al. 2015; Wang, Li, and Luo 2016; Wang et al. 2016; Nilizadeh et al. 2016). Data Our dataset includes two components, both of which come from Twitter. The first component consists of the followers' Twitter ID information for all the presidential candidates in Table 1: The Number of Followers (April, 2016) # Followers Candidate 23,282 Clinton (D) 130,119 Sanders (D) 25,731 Bush Candidate Chafee (D) O'Malley (D) Webb (D) Carson (R) Cruz (R) Kasich (R) Paul (R) Trump (R) Note: Sorted by party affiliation and alphabetically. 266,534 Huckabee (R) 841,663 Rubio (R) 7,386,778 Walker (R) 1,248,240 Christie (R) 1,012,955 Fiorina (R) # Followers 5,855,286 1,859,856 25,731 120,934 672,863 460,693 1,329,098 226,282 April, 2016. This component is exhaustive in the sense that we have recorded all the followers' IDs. In total, there are 15,455,122 individuals following the 16 presidential candi- dates and some of them are following more than 1 candi- date. We transform this component into a 15.5 million by 16 matrix of 1's and 0's, with each row representing an indi- vidual and each column a presidential candidate. We report the summary statistics in Table 11. It can be easily observed that Donald Trump and Marco Rubio have the largest num- bers of followers among the Republican candidates and that Hillary Clinton and Bernie Sanders have the largest numbers of followers among the Democratic candidates. The second component of our dataset has 1 million indi- viduals, randomly sampled from the first component.2 Based on these individuals, we extract user name, user-provided description, the starting year of using Twitter, social capital (Wang et al. 2016), and the profile image (Wang, Li, and Luo 2016). The third component comprises follower information of Beyonc´e, Lady Gaga, Lebron James, three media celebrities all of whom have explicitly endorsed Hillary Clinton. These three celebrities constitute a significant presence among in- dividuals who follow the presidentail candidates: 5.65% of the individuals in the dataset follow Beyonc´e, 15.9% follow Lebron James and 19.58% follow Lady Gaga. In the book Our Revolution, Bernie Sanders also emphasizes the impor- tance of celebrity support (Sanders 2016). Donald Trump, by contrast, contended that he does not need celebrities to fill up rallies, when Jay Z and Beyonc´e held public events to rally votes for Clinton.3. This data component then en- ables us to analyze the celebrity effect in a quantitative man- ner: whether individuals who follow these celebrities are also more likely to follow the candidates who have won the celebrities' endorsement. We summarize the variables used in this work and their definitions in Table 2. 1The number of followers is changing every minute. To make sure the statistics are comparable across candidates, we decided to collect the data exclusively between April 1st and April 7th, 2016. 2To faciliate replication of our results, we have set the random seed (Python) to 11. 3https://www.washingtonpost.com/video/politics/trump-we- dont-need-jay-z-to-fill-up-arenas/2016/11/05/25d536e2-a365- 11e6-8864-6f892cad0865 video.html. Name Independent variables: Tweets Social Capital Journalist Name Image Description Female Beyonc´e Lady Gaga Lebron James Celebrity Dependent variables: # Candidates Count, number of tweets posted Count, number of followers Binary, a journalist Binary, female based on first names Binary, female based on profile images Binary, female based on self-provided descriptions Binary, female by first name or image or description. Binary, follow Beyonc´e Binary, follow Lady Gaga Binary, follow Lebron James Binary, follow Beyonc´e or Lady Gaga or Lebron James Count, number of candidates that one follows Table 2: Variable Definitions Definition Democrat follower Binary, follow Democrats only Republican follower Binary, follow Republicans only Independent follower Binary, follow both Democrats and Republicans Binary, follow Bernie Sanders Binary, follow Hillary Clinton Bernie Sanders Hillary Clinton Note: (1) Following previous studies (Wang et al. 2016), we define social capital on Twitter as the raw number of followers. (2) By con- struction, Democrat follower, Republican follower and Independent follower always sum up to 1. Methodology Gender classification We employ three methods to extract information on gender. As in several prior studies (Mislove et al. 2011; Nilizadeh et al. 2016), we first compile a list of 800 names, based on appearance frequency on Twitter, that are gender-revealing, such as Mike, Jake, Emily, Isabella and Sarah.4 This con- stitutes our first channel. We then use this list to classify individuals whose names are contained in this list. As one would expect, a large number of individuals can not be clas- sified with this list. Our second channel is the profile image. We train a con- volutional neural network using 42,554 weakly labeled im- ages, with a gender ratio of 1:1. These images come from Trump's and Clinton's followers. We infer their labels using the followers' names (channel 1). For validation, we use a manually labeled data set of 1,965 profile images for gen- der classification. The validation images come from Twitter as well so we can avoid the cross-domain problem. More- over, they do not intersect with the training samples as they come exclusively from individuals who unfollowed Hillary Clinton before March 2016. 4The complete name list is available for download on the first author's website. The architecture of our convolutional neural network is reported in Figure 2, and we are able to achieve an accuracy of 90.18%, which is adequate for our task (Table 3).5 Table 3: Summary Statistics of CNN Performance (Gender) Architecture 2CONV-1FC 91.36 Precision Recall 90.05 F1 90.70 Accuracy 90.18 Third, we extract gender-revealing keywords from user- provided descriptions. These keywords are papa, mama, mom, father , mother, wife and husband. We prioritize the first channel (first names) most and the third channel (self description) the least. Only when the more prioritized channels are missing do we use the less prioritized channels: first names > profile images > self descriptions Based on this ranking, we are able to label 38.7% of the observations from first names, another 17.2% with profile images and 0.7% with self descriptions. In total, we are able to classify 56.6% of the 1 million individuals. We summarize the number of labeled individuals and the net contribution of each channel in Table 4. Table 4: 3-Channel Classification of Gender First Name Profile Image Self Description 1 Channel Priority Identification 387,148 Contribution 38.7% Note: Partly as a result of our priority ranking, the net contri- bution of profile images is significantly smaller than first names. The net contribution of self descriptions (3rd channel) is about 1 percent. 2 304,278 17.2% 3 30,786 0.7% Negative binomial regression Our work is motivated by the observation that the majority of individuals choose to follow only one or two candidates when the marginal cost of "following" other candidates is just one click away. In order to understand this phenomenon, especially the role that gender plays, we apply the negative binomial regression (Greene 2008) and link the number of candidates that one follows, which is count data, to the ex- planatory gender variable. In this regression, the conditional likelihood of the number of candidates that individual j fol- lows, yj, is formulated as f (yjvj) = (vjµj)yj e−vj µj Γ(yj + 1) where µj = exp(xjβββ) is the link function that con- nects our explanatory variables to the number of candi- dates that one chooses to follow and vi is a hidden variable 5The trained model has been deployed at our demo website. Figure 2: The CNN model consists of 2 convolutional layers, 2 max-pool layers, and a fully connected layer. with a Gamma( 1 α, α) distribution. After plugging in the ex- planatory variables, the unconditional log-likelihood func- tion takes the form: N X j=1 lnL = [ln(Γ(m + yj) − ln(Γ(yj + 1)) − ln(Γ(m)) + mln(pj) + yjln(1 − pj)] p = 1/(1 + αµ) m = 1/α µ = exp(β0 + β1Tweets Posted + β2Follower Count + β3Journalist + β4Year Fixed Effects + β5β5β5 · Name + β6β6β6 · Image + β7β7β7 · Description + β8β8β8 · Female) where α is the over-dispersion parameter and will be estimated as well. Multinomial Logistic Regression Besides the number of candidates, another question we try to answer is which candidates one chooses to follow. For this purpose, we identify three classes: (1) follow Democratic candidates only, (2) follow candidates from both parties, and (3) follow Republican candidates only. We use the class c as the dependent variable and formulate the probability of each observation in a multinomial logistic setting (Maddala 1983): P 1 = P r(c = 1) = P 2 = P r(c = 2) = P 3 = P r(c = 3) = exβ1 exβ1 + 1 + exβ3 1 exβ1 + 1 + exβ3 exβ3 exβ1 + 1 + exβ3 where x is the vector of explanatory variables: number of posted tweets, number of followers, being a journalist (bi- nary), gender, following a celebrity and year controls. No- tice that the coefficients for the second class (following can- didates from both parties) have been normalized to 0 to solve the identification problem. The log-likelihood function then takes the form: lnL = [δ1iln(P1) + δ2iln(P2) + δ3iln(P3)] n X i=1 where δij=1 if i=j and 0 otherwise. Note that logistic re- gression, which we will use to differentiate the celebrity ef- fects on Hillary Clinton and Bernie Sanders, is a special case of the multinomial logistic regression with β3 set to zero. Results In this section, we report on (1) election follow patterns ob- served on Twitter (2) negative binomial regression analysis of the number of candidates that one follows (3) multinomial logistic regression analysis of gender affinity effects on the choice of candidates and (4) logistic regression analysis of celebrity effects. Election F ollow Patterns on Twitter In Table 5, we report on how committed each candidate's followers are. By commitment, we mean how many of the followers follow only that one specific candidate. It can be seen that Clinton, Trump and Sanders have highest percent- ages of 'committed' followers in the Twitter sphere, whereas only 9 percent of Bush's 529,820 followers follow him alone and 89 percent of Cruz's 1,012,955 followers follow other candidates besides Cruz. This suggests that while having a large number of followers is always beneficial, not all fol- lowers are equally committed. To overcome this problem, we propose a simple and intu- itive method to weight each follower by the reciprocal of the total number of candidates that he or she is following. For example, an individual who follows Bernie Sanders, Don- 3 , and an ald Trump and Ted Cruz will receive a weight of 1 individual who follows Hillary Clinton only will receive a weight of 1. Mathematically, the Twitter share of candidate j is then calculated as: i=1 δijweighti i=1 δikweighti sharej = Pn Pm k=1Pn Pm k=1 δik 1 weighti = 28 1 5 5 28 3 Max-pooling(2x2) 5 5 14 7 7 64 Max-pooling(2x2) 14 32 2 1024 Table 5: Follower Engagement for Each Candidate (in Dec- imals) Candidate Chafee Clinton O'Malley Sanders Webb Bush Carson Christie Cruz Fiorina Kasich Huckabee Paul Rubio Trump Walker # 1 0.39 0.75 0.29 0.6 0.15 0.09 0.24 0.11 0.11 0.41 0.25 0.28 0.2 0.25 0.72 0.14 # 2 0.13 0.16 0.23 0.23 0.13 0.16 0.19 0.13 0.17 0.15 0.13 0.15 0.16 0.16 0.14 0.08 # 3 0.08 0.04 0.17 0.07 0.1 0.14 0.14 0.12 0.18 0.08 0.1 0.11 0.14 0.15 0.05 0.08 # 4 0.06 0.02 0.07 0.03 0.09 0.11 0.12 0.09 0.15 0.07 0.08 0.09 0.12 0.13 0.03 0.08 # 5+ 0.34 0.04 0.24 0.07 0.52 0.51 0.3 0.56 0.39 0.29 0.44 0.37 0.38 0.32 0.06 0.62 Note: '#5+' stands for 'following five or more presidential candi- dates. For example, six percent of Trump followers follow five or more candidates. where n is the total number of followers (15,455,122), m is the total number of candidates (16), δik is 1 if individual i follows candidate k and 0 otherwise. After applying this weighting mechanism, we find the Twitter share of the leading candidates, such as Donald Trump, Hillary Clinton and Bernie Sanders, further in- creases. Their aggregated share of Twitter followers rises from 68.7% to 80.1% (Figure 3). Figure 3: Share of the three leading candidates Trump, Clinton and Sanders further increases after weighting the followers. We further analyze the top 15 most frequent patterns present in the Twitter sphere (Table 6). One immediate ob- servation is that Trump, Clinton and Sanders are the three dominant forces in the Twitter sphere. 34.5% of the individ- uals recorded in our exhaustive dataset are following Don- ald Trump alone. 28.4% are following Hillary Clinton alone. 7.2% are following Sanders alone. These three groups ac- count for 69.9% of the entire recorded population in our dataset. Individuals who follow only Marco Rubio or Car- son or Fiorina make up no more than 2 percent of the popu- lation. Individuals who follow both Clinton and Trump con- stitute 3 percent of the entire recorded population.6 Other frequent 2-itemsets (Han, Kamber, and Pei 2011) include Carson and Trump (1%), Sanders and Trump 0.6/% and Ru- bio and Trump (1%). The only 3-itemset among the top 15 frequent pattern is Clinton, Sanders and Trump (0.5%). Table 6: Top 15 Most Frequent Items in the Election's Twit- ter Sphere 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0.345 Trump 0.284 Clinton 0.072 Sanders 0.030 Clinton Trump [2-itemset] 0.021 Rubio 0.021 Clinton Sanders [2-itemset] 0.020 Carson Fiorina 0.018 0.011 Paul 0.010 Carson Trump [2-itemset] 0.008 Kuckabee 0.007 Cruz 0.006 0.006 Rubio Trump [2-itemset] 0.005 Clinton Sanders Trump [3-itemset] Sanders Trump [2-itemset] We further examine how the decision of following one candidate correlates with that of following another candi- date using the Pearson correlation coefficient. One imme- diate observation is that correlation between following can- didates from the same party tends to be positive and corre- lation between following candidates from different parties tends to be negative (Figure 4). In particular, the correla- tion is -0.51 between Clinton and Trump and -0.22 between Sanders and Trump. By contrast, Marco Rubio and Ted Cruz have a strong and positive correlation coefficient of 0.43. This constitutes our first piece of evidence that individuals on Twitter are also polarized (Campbell 2016). Motivated by the fact that Twitter follow behavior appears to cluster around the two parties, we refer to individuals who follow Democratic candidates exclusively as Democrat fol- lowers and refer to individuals who follow Republican can- didates exclusively as Republican followers and lastly we refer to those who follow candidates from both parties as In- dependent followers.7 It turns out that 92% of the 15.5 mil- lion followers are either Democrat followers or Republican followers, i.e., they are following candidates from only one party not both parties, which lends further support to the idea that the public are polarized on Twitter (Campbell 2016). 6This number is surprisingly low and suggests that Twitter 'fol- low' behavior is more of a signal of support/interest than commu- nication as far as the presidential campaign is concerned. 7Note that this definition is based on Twitter follow behavior not on real party affiliation. Candidate Chafee Clinton O'Malley Sanders Webb Bush Carson Chris Cruz Fiorina Kasich Kuckabee Paul Rubio Trump Walker Unweighted Weighted 0.4 0.3 0.2 0.1 0.0 Share of Followers (April, 2016) The coefficient on journalist measures whether journalists tend to follow a larger number of the presidential candi- dates (and we expect the answer to be yes). gender mea- sures the effects of being female. Following (Burt 2000; Wang et al. 2016), we expect the coefficient on gender to be negative, i.e., women tend to follow fewer candidates. We report our regression results in Table 7. Across all the four specifications, we find that tweets, social capital and journalist are all positively correlated with the number of candidates that one chooses to follow. With respect to gen- der, we find that regardless of the channel that we use (name in Column 1, image in Column 2, description in Column 3, all the three in Column 4), the coefficient on female is con- sistently negative, suggesting that women are more likely to follow fewer candidates. 8 Table 7: Negative Binomial: the Number of Candidates Name Image Descr. All # Candidates Tweets 2.906∗∗∗ (0.146) Social Capital 2.168∗∗∗ (0.482) 0.249∗∗∗ (0.0234) -0.0817∗∗∗ (0.00270) Journalist Name 2.180∗∗∗ 3.543∗∗∗ 2.427∗∗∗ (0.105) (0.134) 1.153∗∗∗ 1.282∗∗∗ (0.298) (0.329) 0.201∗∗∗ 0.223∗∗∗ (0.0208) (0.0181) (0.418) 0.753 (0.920) 0.0444 (0.0646) -3.804∗∗∗ -4.327∗∗∗ -2.046∗∗∗ -4.320∗∗∗ (0.0600) (0.0441) 387148 557777 (0.0330) 30786 (0.0826) 294987 Observations Standard errors in parentheses ∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001 Multinomial Logistic Regression: Gender Affinity Effect Having demonstrated that women behave differently from men in the number of candidates that they choose to fol- low, in this subsection we analyze whether women also dif- fer from men in choosing which candidates to follow. We summarize the gender ratio of each candidates' followers in Figure 6.9 It can be seen that Clinton has the highest female to male ratio, followed closely by Bernie Sanders. Rand Paul 8In all the specifications, we have controlled for the year fixed 9We used all the three channels to extract gender-related infor- effects. mation. -0.0286∗∗∗ (0.00340) -0.150∗∗∗ (0.00936) Yes 0.257∗ (0.129) Yes 0.268∗ (0.134) Yes 0.546 (0.319) -0.0536∗∗∗ (0.00230) Yes 0.299∗∗ (0.108) Image Description Female Year F.E. Constant ln(α) Constant Figure 4: Party clustering observed in Twitter following behavior. Individuals who follow Trump are more likely to follow Ted Cruz and Marco Rubio and less likely to follow Hillary Clinton or Bernie Sanders. Negative Binomial: Follow the Candidates Having summarized the election f ollow patterns as a whole, we are now ready to analyze the factors behind an individ- ual's decision to follow a certain number of candidates. In particular, while the marginal cost of following an extra can- didate is close to zero, most individuals choose to follow only 1 or 2 candidates (Figure 5). Figure 5: This figure is generated using all 15.5 million observa- tions. In spite of the low marginal cost of following extra people on Twitter, most individuals chose to follow no more than 2 candidates during the 2016 U.S. presidential election. In the regression, we use the number of candidates that one follows (# candidates) as the dependent variable. so- cial capital, journalist and gender are the three variables that we are particularly interested in. The coefficient on so- cial capital would enable us to learn whether more promi- nent individuals tend to follow more candidates or not. (R) and Jim Webb (D) on the other hand have the lowest fe- male to male ratio. In general, the Democratic candidates mostly have a gender ratio close to or over 40%, while the Republican candidates tend to have a gender ratio well be- low 40%. Carly Fiorina, the only female candidate in the Republican party, is the only Republican to reach 40%. Independent follower, suggesting that individuals who are following these celebrities are more likely to follow candi- dates from both parties. This result is also consistent across all the four specifications (5-8). Figure 6: In percentage, the leading Democratic candidates have more female followers than the leading Republican candidates. Building from previous studies (King and Matland 2003; Dolan 2008; Brians 2005; Wang et al. 2016), we construct a multinomial logistic regression model to test whether women are more likely to follow Democratic candidates. In addition, we examine whether followers of Beyonc´e, Lady Gaga and Lebron James, all of whom have explicitly en- dorsed Hillary Clinton, thus revealing support for Demo- cratic causes, are more likely to follow Democratic candi- dates exclusively. We report our results in Table 7. Using Independent as the baseline for comparison, we examine the role of social capital, occupation, gender and celebrities. Across all spec- ifications, we find that people with higher social capital and people working as a journalist are more likely to be Indepen- dent followers, i.e., following candidates from both parties. From Columns 1 to 4, we examine the role of gender in determining whom to follow. The coefficient on gender is negative for Republican, positive for Democrat and 0 for In- dependent, suggesting that women are more likely to follow Democrats and less likely to follow Republicans (Figure 7). This result is consistent across all the four specifications. From Columns 5 to 8, we examine the role of celebrities in determining whom to follow. The coefficient on celebrity (Beyonc´e, Lebron James and Lady Gaga) is negative for both Democratic follower and Republican follower and 0 for Figure 7: As indicated by the slope, the effects of being female are positive on Democrat, negative on Republican and slightly negative on Independent. Logistic Regression: Celebrity Effects When comparing between Democratic followers, Republi- can followers and Independent followers, we find that in- dividuals who follow celebrities are more likely to be In- dependent followers, i.e., they follow candidates from both parties. In this subsection, we restrict our comparison to the two dominant classes, Democratic followers and Republican followers, which constitute 92% of our observations. In par- ticular, we will analyze whether following celebrities who have explicitly endorsed Hillary Clinton can affect (1) the probability of being a Democratic follower over a Repub- lican follower and (2) the probability of following Hillary Clinton instead of Bernie Sanders. We report our results in Table 8. When comparing between Democrat followers and Republican followers (Columns 1-5), we find that individuals who follow Beyonc´e and Lady Gaga are more likely to be Democratic followers. By contrast, those who follow Lebron James are more likely to be Republican followers, which suggests that celebrities and celebrity followers do not necessarily share the same political opinion. In addition, we show in Column 3 that the interaction variable James # Female has a positive and significant coefficient, suggesting that effect of following Lebron James is significantly smaller for females than for males with regards to following the presidential candidates. When restricting our observation to only Sanders follow- ers and Clinton followers, we find that all the celebrity ef- fects to be positive, suggesting that endorsements by these celebrities are giving Hillary Clinton an edge over Sanders for individuals who follow these celebrities. 0 Female Independent 1 Democrat 0.6 Republican 0.4 Probability 0.2 -0.909 (0.605) -5.104∗ (2.568) -0.749∗∗∗ (0.0801) 0.644∗∗∗ (0.0128) Yes 1.924∗∗∗ (0.534) -25.61∗∗∗ (0.842) -38.05∗∗∗ (7.154) -1.838∗∗∗ (0.0911) -0.130∗∗∗ (0.0123) -0.856 (0.543) -6.716∗ (3.038) -0.677∗∗∗ (0.0686) 0.316∗∗∗ (0.0149) 1.561 (1.707) -1.351 (2.537) -0.536∗∗ (0.206) 0.732∗∗∗ (0.0426) Yes 1.767∗∗ (0.540) -18.03∗∗∗ (0.741) -22.61∗∗∗ (5.235) -1.804∗∗∗ (0.0834) -0.0207 (0.0148) Yes 1.172 (1.125) -14.99∗∗∗ (2.059) -59.30∗∗ (18.91) -1.506∗∗∗ (0.222) -0.0888∗ (0.0393) Social Capital Journalist Name Image Description Female Beyonc´e Lebron James Lady Gaga Celebrity Year F.E. Constant Social Capital Journalist Name Image Description Female Beyonc´e Lebron James Lady Gaga Celebrity -0.149 -0.384 (0.452) (0.446) -6.521∗∗ -7.334∗∗ (2.579) (2.515) -0.640∗∗∗ -0.646∗∗∗ (0.0609) (0.0608) -0.296 (0.450) -7.145∗∗ (2.593) -0.668∗∗∗ (0.0610) -0.333 (0.447) -6.831∗∗ (2.543) -0.651∗∗∗ (0.0609) -0.180 (0.451) -6.757∗∗ (2.525) -0.664∗∗∗ (0.0610) 0.490∗∗∗ 0.516∗∗∗ (0.0106) (0.0107) -0.424∗∗∗ (0.0179) Yes Yes 1.588∗∗∗ 1.595∗∗∗ (0.413) (0.413) 0.438∗∗∗ (0.0107) 0.506∗∗∗ (0.0106) 0.490∗∗∗ (0.0106) -0.594∗∗∗ (0.0131) -0.302∗∗∗ (0.0121) Yes 1.619∗∗∗ (0.413) Yes 1.627∗∗∗ (0.413) -0.391∗∗∗ (0.0107) Yes 1.654∗∗∗ (0.414) -22.70∗∗∗ -21.87∗∗∗ (0.618) (0.619) -29.51∗∗∗ -27.58∗∗∗ (4.992) (4.937) -1.838∗∗∗ -1.851∗∗∗ (0.0716) (0.0718) -22.62∗∗∗ (0.619) -29.51∗∗∗ (5.000) -1.859∗∗∗ (0.0717) -22.66∗∗∗ (0.619) -27.82∗∗∗ (4.918) -1.858∗∗∗ (0.0717) -22.22∗∗∗ (0.619) -28.07∗∗∗ (4.924) -1.871∗∗∗ (0.0718) -0.0518∗∗∗ -0.00658 (0.0104) (0.0104) -0.895∗∗∗ (0.0180) -0.0895∗∗∗ (0.0104) -0.0237∗ -0.0525∗∗∗ (0.0104) (0.0104) -0.406∗∗∗ (0.0123) -0.577∗∗∗ (0.0118) Table 8: Multinomial Logistic Analysis of the Choice of Candidates to Follow Names Only Images Only Description Only All Beyonc´e Lebron James Lady Gaga Celebrity Democratic Follower Tweets Independent Follower (baseline) Republican Follower Tweets Year F.E. Constant Yes 1.393∗ (0.582) Observations 387148 Standard errors in parentheses ∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001 Yes 1.422∗ (0.575) 294987 Yes 0.859 (1.226) 30786 Yes 1.203∗∗ (0.449) 557777 Yes 1.215∗∗ (0.449) 557777 Yes 1.226∗∗ (0.449) 557777 Yes 1.265∗∗ (0.450) 557777 -0.545∗∗∗ (0.0103) Yes 1.286∗∗ (0.450) 557777 Table 9: Celebrity Effects: A Logistic Regresssion Democrat Democrat Democrat Democrat Democrat Clinton Clinton Clinton 36.23∗∗∗ 37.99∗∗∗ 5.404 5.946 (4.887) (5.194) (4.833) (5.273) 1.057∗∗∗ 1.081∗∗∗ 1.084∗∗∗ 1.242∗∗∗ 1.230∗∗∗ (0.0620) (0.0619) (0.103) (0.103) 0.525∗∗∗ 0.531∗∗∗ (0.00597) (0.00598) (0.00636) (0.00595) (0.00594) 0.489∗∗∗ (0.0126) Clinton 5.356 36.74∗∗∗ 36.81∗∗∗ (4.705) (5.209) (5.211) 1.100∗∗∗ 1.245∗∗∗ 1.245∗∗∗ (0.0620) (0.103) (0.0619) 0.534∗∗∗ 0.546∗∗∗ 0.0484∗∗∗ 0.123∗∗∗ 0.0534∗∗∗ 0.0753∗∗∗ (0.0105) 37.96∗∗∗ (5.272) 1.230∗∗∗ (0.0619) 0.523∗∗∗ (0.0105) 0.578∗∗∗ (0.0226) (0.0105) (0.0105) 6.922 (4.866) (0.103) 0.865∗∗∗ (0.0185) Social Capital Journalist Female Beyonc´e Lebron James Female # James Lady Gaga Celebrity -0.183∗∗∗ -0.202∗∗∗ (0.00855) (0.0102) 0.0654∗∗∗ (0.0185) 0.283∗∗∗ (0.00766) Year F.E. Constant Yes 0.578∗ (0.289) Observations 509810 Standard errors in parentheses ∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001 Yes 0.595∗ (0.289) 509810 Yes 0.597∗ (0.289) 509810 Yes 0.562 (0.289) 509810 Figure 8: While Lebron James has endorsed Hillary Clinton, his followers are less likely to follow Democrats than individuals who do not follow him. Conclusion This paper studies the paradoxical observation that while technically the marginal cost of following one extra pres- idential candidate is just a click a way, most individuals choose to follow only 1 or 2 candidates. Building from an exhaustive dataset that includes 15.5 million records, taking advantage of three information channels (name, image, de- scription), and applying various regression models, we (1) explored the frequent patterns of the 2016 U.S. presidential 1.012∗∗∗ (0.0159) Yes 0.606 (0.357) 227525 Yes 0.593 (0.357) 227525 Yes 0.513 (0.360) 227525 0.783∗∗∗ (0.0126) Yes 0.509 (0.359) 227525 0.163∗∗∗ (0.00653) Yes 0.565 (0.289) 509810 campaign on Twitter, calculated the weighted presence for each candidate, and measured the extent to which individu- als on Twitter are polarized, (2) studied how gender has had an effect on the number of candidates that one chooses to follow, (3) found that females are more likely to be follow- ing Democratic candidates exclusively and that followers of celebrities tend to be following candidates from both parties, (4) found that when considering Democrats and Republicans only, followers of Beyonc´e and Lady Gaga are more likely to follow the Democratic candidates, that followers of Lebron James are more likely to follow the Republican candidates and that all of these tend to favor Hillary Clinton over Bernie Sanders. Acknowledgments We gratefully acknowledge the generous financial support from the University and from our corporate sponsors. References Alaimo, K. 2016. Where donald trump got his real power. CNN. Barber´a, P. 2015. Birds of the same feather tweet together. bayesian ideal point estimation using twitter data. Political Analysis 23(1). Brians, C. L. 2005. Women for Women? Gender and Party Bias in Voting for Female Candidates. American Politics Research. Burger, J. D.; Henderson, J.; Kim, G.; and Zarrella, G. 2011. Discriminating gender on twitter. Proceedings of 0 Female 1 James Follower 0.45 Non−James Follower 0.40 0.35 Pr(Democrat Follower) the 2011 Conference on Empirical Methods in Natural Lan- guage Processing. Burt, R. S. 2000. Decay functions. Social Networks 22:1– 28. Campbell, J. E. 2016. Polarized: Making Sense of a Divided America. Princeton University Press. Doherty, C. 2014. 7 things to know about polarization in america. Pew Research Center. Dolan, K. 2008. Is There a "Gender Affinity Effect" in American Politics? Information, Affect, and Candidate Sex in U.S. House Elections. Political Research Quarterly. Druckman, J. N.; Peterson, E.; and Slothuus, R. 2013. How elite partisan polarization affects public opinion formation. American Political Science Review 107(1):57–79. Farfade, S. S.; Saberian, M.; and Li, L.-J. 2015. Multi-view face detection using deep convolutional neural networks. In ICMR. Ginosar, S.; Rakelly, K.; Sachs, S.; Yin, B.; and Efros, A. A. 2015. A Century of Portraits: A Visual Historical Record of American High School Yearbooks. In ICCV 2015 Extreme Imaging Workshop Proceedings. Greene, W. 2008. Functional forms for the negative bino- mial model for count data. Economic Letters (99):585–590. Guo, Y.; Zhang, L.; Hu, Y.; He, X.; and Gao, J. 2016. Ms-celeb-1m: A dataset and benchmark for large-scale face recognition. ECCV. Han, J.; Kamber, M.; and Pei, J. 2011. Data Mining: Con- cepts and Techniques. Morgan Kaufmann. Hare, C., and Poole, K. T. 2014. The polarization of con- temporary american politics. Polity 46(3):411–429. He, K.; Zhang, X.; Ren, S.; and Sun, J. 2016. Deep residual learning for image recognition. CVPR. Huang, G. B.; Ramesh, M.; Berg, T.; and Learned-Miller, E. 2007. Labeled faces in the wild: A database for studying face recognition in unconstrained environments. Technical report, University of Massachusetts. Jia, S., and Cristianini, N. 2015. Learning to classify gender from four million images. Pattern Recognition Letters. Jr., K. R., and Tesafaye, T. 2006. Morph: a longitudinal image database of normal adult age-progression. 7th Inter- national Conference on Automatic Face and Gesture Recog- nition (FGR06). King, D. C., and Matland, R. E. Sex and the Grand Old Party: An Experimental Investigation of the Ef- fect of Candidate Sex on Support for a Republican Candi- date. American Politics Research. 2012. Krizhevsky, A.; Sutskever, I.; and Hinton, G. E. Imagenet classification with deep convolutional neural net- works. In NIPS. LeCun, Y.; Bengio, Y.; and Hinton, G. 2015. Deep learning. Nature. Levi, G., and Hassner, T. 2015. Age and Gender Classifi- cation using Deep Convolutional Neural Networks. In Pro- ceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 34–42. 2003. Lockhart, K. 2016. Watch: Why social media is donald trump's most powerful weapon. The Telegraph. Maddala, G. S. 1983. Limited-Dependent and Qualitative Variables in Econometrics. Cambridge University Press. McCarty, N.; Poole, K. T.; and Rosenthal, H. 2009. Does gerrymandering cause polarization? American Journal of Political Science 53(3):666. McPherson, M.; Smith-Lovin, L.; and Cook, J. M. 2001. Birds of a feather: Homophily in social networks. Annual Review of Sociology. Miller, C. C. 2016. Why women did not unite to vote against donald trump. The New York Times. Mislove, A.; Lehmann, S.; Ahn, Y.-Y.; Onnela, J.-P.; and Rosenquist, J. N. 2011. Understanding the demographics of twitter users. Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. Nilizadeh, S.; Groggel, A.; Lista, P.; Das, S.; Ahn, Y.-Y.; ; Kapadia, A.; and Rojas, F. 2016. Twitter's glass ceiling: The effect of perceived gender on online visibility. Proceed- ings of the Tenth International AAAI Conference on Web and Social Media. Ottoni, R.; Pesce, J. P.; Casas, D. L.; Jr., G. F.; Jr., W. M.; Kumaraguru, P.; and Almeida, V. 2013. Ladies first: Ana- lyzing gender roles and behaviors in pinterest. Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media. Phillips, P. J.; Wechslerb, H.; Huangb, J.; and Raussa, P. J. 1998. The feret database and evaluation procedure for face- recognition algorithms. Image and Vision Computing 295– 306. Sanders, B. 2016. Our Revolution: A Future to Believe In. Thomas Dunne Books. Simonyan, K., and Zisserman, A. 2015. Very Deep Convo- lutional Networks for Large-Scale Image Recognition. In In- ternational Conference on Learning Representations 2015. Srivastava, R. K.; Greff, K.; and Schmidhuber, J. 2015. Highway network. arXiv:1505.00387v2. Stahl, L. 2016. President-elect trump speaks to a divided country on 60 minutes. CBS. Tumasjan, A.; Sprenger, T. O.; Sandner, P. G.; and Welpe, I. M. 2010. Predicting Elections with Twitter: What 140 Characters Reveal about Political Sentiment. In Proceed- ings of the Fourth International AAAI Conference on We- blogs and Social Media. Wang, Y.; Feng, Y.; Zhang, X.; and Luo, J. 2016. Voting with Feet: Who are Leaving Hillary Clinton and Donald Trump? In Proceedings of the IEEE Symposium on Multimedia. Wang, Y.; Li, Y.; and Luo, J. 2016. Deciphering the 2016 U.S. Presidential Campaign in the Twitter Sphere: A Com- parison of the Trumpists and Clintonists. In Tenth Interna- tional AAAI Conference on Web and Social Media. Zamal, F. A.; Liu, W.; and Ruths, D. 2012. Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors. Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media.
1103.0784
1
1103
2011-03-03T21:05:17
Happiness is assortative in online social networks
[ "cs.SI", "cs.CL", "physics.soc-ph" ]
Social networks tend to disproportionally favor connections between individuals with either similar or dissimilar characteristics. This propensity, referred to as assortative mixing or homophily, is expressed as the correlation between attribute values of nearest neighbour vertices in a graph. Recent results indicate that beyond demographic features such as age, sex and race, even psychological states such as "loneliness" can be assortative in a social network. In spite of the increasing societal importance of online social networks it is unknown whether assortative mixing of psychological states takes place in situations where social ties are mediated solely by online networking services in the absence of physical contact. Here, we show that general happiness or Subjective Well-Being (SWB) of Twitter users, as measured from a 6 month record of their individual tweets, is indeed assortative across the Twitter social network. To our knowledge this is the first result that shows assortative mixing in online networks at the level of SWB. Our results imply that online social networks may be equally subject to the social mechanisms that cause assortative mixing in real social networks and that such assortative mixing takes place at the level of SWB. Given the increasing prevalence of online social networks, their propensity to connect users with similar levels of SWB may be an important instrument in better understanding how both positive and negative sentiments spread through online social ties. Future research may focus on how event-specific mood states can propagate and influence user behavior in "real life".
cs.SI
cs
Happiness is assortative in online social networks. Johan Bollen, Bruno Gonçalves, Guangchen Ruan, & Huina Mao January 13, 2013 Abstract Social networks tend to disproportionally favor connections between individuals with either similar or dissimilar characteristics. This propensity, referred to as assortative mixing or homophily, is expressed as the correlation between attribute values of nearest neighbour vertices in a graph. Recent results indicate that beyond demographic features such as age, sex and race, even psychological states such as “loneliness” can be assortative in a social network. In spite of the increasing societal importance of online social networks it is unknown whether assortative mixing of psychological states takes place in situations where social ties are mediated solely by online networking services in the absence of physical contact. Here, we show that general happiness or Subjective Well-Being (SWB) of Twitter users, as measured from a 6 month record of their individual tweets, is indeed assortative across the Twitter social network. To our knowledge this is the first result that shows assortative mixing in online networks at the level of SWB. Our results imply that online social networks may be equally subject to the social mechanisms that cause assortative mixing in real social networks and that such assortative mixing takes place at the level of SWB. Given the increasing prevalence of online social networks, their propensity to connect users with similar levels of SWB may be an important instrument in better understanding how both positive and negative sentiments spread through online social ties. Future research may focus on how event-specific mood states can propagate and influence user behavior in “real life”. 1 Introduction As the old adage goes, “Birds of a feather flock together”. In network theory, this effect is known as homophily [1] or assortative mixing [2, 3, 4], occurs in a network when it disproportionally favors connections between vertices with similar characteristics. The opposite trend, that of favouring connections between nodes with different char- acteristics, is known as disassortative mixing. For example, a friendship network [1] may be highly assortative if it connects individuals who are at similar locations or have similar musical tastes. A heterosexual network [5] on the other hand will be highly disassortative since partners will tend to be of the opposite sex. However, few networks are entirely assortative or disassortative: most will exhibit both properties to some degree depending on the particular characteristic. Social networks can exhibit significant degrees of assortative mixing with respect to a variety of demographic attributes such as sex, race, age, religion and education, including behavioral and health attributes [6, 7, 8, 9] and even genotypes [10]. Surprisingly, this is also the case for certain psychological states such as loneliness [1]. In the latter case individuals preferentially share relations with individuals who report equally elevated levels of 1 loneliness and this homophilic tendency increases over time. Although it is clear that psychological states affect behaviour both online [11] and offline, the mechanisms through which such states exhibit assortativity and contagion across social bonds are not yet fully understood. However, two different processes are conceiveable: that individuals seek homophilic social relations to share subjective experiences (homophilic attachment), or that the emotional state of an individual can influence that of the people with which he or she interacts (contagion) [12]. While both possibilities are clearly in play in real-world social interactions, it is not clear whether or not they are present in online social systems which do not necessarily emerge from physical contact or in-person communication [13, 14]. The Twitter1 microblogging service is a case in point. Twitter users can post brief personal updates of less than 140 characters at any time. These updates, known as “tweets”, are distributed to a limited group of “followers”, i.e. other Twitter users who have elected to “follow” the particular user’s tweets [15]. These follower relations are of a fundamentally different nature than their off-line counterparts [16]; they are not necessarily reciprocated, i.e. directed, nor modulated and are mostly focused on the exchange of information. In effect, a Twitter Follower relation simply represents the fact that one individual is interested in the content produced by another, without the requirement that the interest be reciprocated. As a simple example, consider the case of celebrities that attract the attention and interest of a large number of people without reciprocating it. This arrangement results in a so- cial network in the form of a directed, unweighted graph which is quite different from naturally occurring social networks in which friendship ties are generally symmetric and vary in strength. As a consequence, one would expect homophily and assortative mixing of emotional states to be absent or fundamentally altered in online social networking environments, in particular those with asymmetric, unweighted connections such as Twitter. However, in spite of the expectation that online environments fundamentally alter social interaction, recent re- sults indicate that personal preferences do indeed exhibit homophilic properties in online environments such as BlogCatalog and Last.fm [17]. Tantalizingly this has also been found the case for sentiment [18] in LiveJournal2 . Given the increasing importance of social networking environments in coordinating social unrest [19] and mod- ulating the public’s response to large-scale disasters [20], it has become a matter of tremendous interest whether and how online social networking environments exhibit homophily or even contagion on the level of sentiment and mood and how online tools can be leveraged to gain understanding about social behaviour [21, 22]. Here we investigate whether and to which degree the general happiness or Subjective Well-Being (SWB) [23] of individual Twitter users exhibits assortative mixing. Several previous works have focused on aggregate [24, 25, 26, 27, 28] measurements of mood or emotion in entire communities or systems, but we analyse individual mood state in an online social network. On the basis of a collection of 129 million tweets, we track the SWB levels of 102,009 Twitter users over a 6 months period from the content of their tweets. Each is rated on an emotional scale using a standard sentiment analysis tool. A subsequent assortativity analysis of the Twitter social network then reveals its degree of SWB assortative mixing. Our results indicate that the overall SWB of Twitter users is positive, and highly assortative. In other words, Twitter users are preferentially connected to those with whom they share the same level of general happiness or SWB. Furthermore, tie strength seems to play a significant role in modulating the degree of SWB assortativity. 1Twitter – http://www.twitter.com 2LiveJournal: http://www.livejournal.com/ 2 2 Data and methods We collected a large set of Tweets submitted to Twitter in the period from November 28, 2008 to May 2009. The data set consisted of 129 million tweets submitted by several million Twitter users. Each Tweet contained a unique identifier, date-time of submission (GMT+0), submission type, and textual content, among other informa- tion. Some examples are shown below in Table 1. ID date-time 1 2008-11-28 02:35:48 2 2008-11-28 02:35:48 type text web Getting ready for Black Friday. Sleeping out at Circuit City or Walmart not sure which. So cold out. web @dane I didn’t know I had an uncle named Bob :-P I am going to be checking out the new Flip sometime soon · · · Table 1: Examples of Tweet data collected from November 28, 2008 to May 2009 for 4, 844, 430 users We complemented this cross-section sample of twitter activity by retrieving the complete history of over 4 million users, as well as the identity of all of their followers. The final Twitter Follower network contained 4, 844, 430 users (including followers of our users for which we did not collect timeline information). Armed with the social connections and activity of these users we were able to measure the way in which the emotional content of each users varied in time and how it spread across links. 2.1 Creating a Twitter “Friend” network The “Follower” network we collected consists of a directed graph G = (V , E ) in which V represents the set of all 4, 844, 430 Twitter users in our collection, and the set of edges E ⊆ V 2 in which each directional edge v ∈ E consist of the 2-tuplet (vi , vj ) that indicates that user vi follows user vj . By design the Twitter social network is based on “Follower” relations which are uni-directional and very easy to establish. As such they form a very min- imal representation of possible interaction between those who follow and those who are being followed. In fact, it is quite common for a user vi to follow a user vj , but for vj not to follow vi back. As such, follower relations are not necessarily indicative of any personal relation which may de facto preclude the establishment of assortative mixing and homophily. We therefore distinguish between mere Twitter “Followers” and actual “Friends” [29, 30] by applying the following transformations to the Twitter follower graph G: First, we create a network of Twitter Friend relations from the Follower relations in G by only retaining edges (vi , vj ) ∈ E for which we can find a reciprocal relation (vj , vi ), i.e. the set of Friend connections E (cid:48) = {(vi , vj ) : ∃(vj , vi ) ∈ E }, i.e. two users only share a Friendship tie if they are both following each other. Second, to exclude occasional users that are not truly involved in the Twitter social network, we only retained those users in our Twitter Friend network that posted more than 1 tweet per day on average over the course of 6 months. 3 Figure 1: Converting the original Follower network of Twitter into a Friend network by only taking into account reciprocal connections. Third, we assign a weight wi,j to each edge (vi , vj ) that serves as an indication of the degree to which users vi and vj have similar sets of friends: wi,j = Ci ∩ Cj Ci ∪ Cj where Ci denotes the neighbourhood of friends surrounding user vi . Note that this approach does not take into account the number of tweets exchanged between two users, but simply the degree to which two Twitter users have similar friends. (1) Figure 2: Example of Twitter Friend similarity as calculated according to Eq. 1. Users vi and vj share 1 friend out of three total. Therefore their connection is assigned a weight wi,j = 1 3 . Finally, we extracted the largest Connected Component (GCC ) from the resulting network, thereby obtaining a Twitter Friend network of 102, 009 users and 2, 361, 547 edges. The reduction in nodes from our original Twitter Follower network (4, 844, 430) to the resulting Friend network (102, 009) indicates that in Twitter only a small fraction of users are involved in the type of reciprocated Follower type that we considere indicative of actual social relationships. However, once this reduction has occurred, we 4 FriendFollowerFollower networkFriend networkvivjcontentofeachusersvariedintimeandhowitspreadacrosslinks.2.1CreatingaTwitter“Friend”networkThe“Follower”networkwecollectedconsistsofadirectedgraphG=(V,E)inwhichVrepresentsthesetofall4,844,430Twitterusersinourcollection,andthesetofedgesE⊆V2inwhicheachdirectionaledgev∈Econ-sistofthe2-tuplet(vi,vj)thatindicatesthatuservifollowsuservj.BydesigntheTwittersocialnetworkisbasedon“Follower”relationswhichareunidirectionalandveryeasytoestablish.Assuchtheyformaveryminimalrepresentationofpossibleinteractionbetweenthosewhofollowandthosewhoarebeingfollowed.Infact,itisquitecommonforauservitofollowauservj,butforvjnottofollowviback.Assuch,followerrelationsarenotindicativeofanypersonalrelationanddefactoprecludetheestablishmentofassortativemixingandhomophily.Sinceweareinterestedinmutualinfluenceofclosecontacts,asmeasuredbytheirSWB,wedistinguishbetweenmereTwitter“Followers”andactual“Friends”[12,6]byapplyingthefollowingtransformationstotheTwitterfollowergraphG:First,wecreateanetworkofTwitterFriendrelationsfromtheFollowerrelationsinGbyonlyretainingedges(vi,vj)∈Eforwhichwecanfindareciprocalrelation(vj,vi),i.e.thesetofFriendconnectionsE!={(vi,vj):∃(vj,vi)∈E},i.e.twousersonlyshareaFriendshiptieiftheyarebothfollowingeachother.FriendFollowerFollower networkFriend networkFigure1:ConvertingtheoriginalFollowernetworkofTwitterintoaFriendnetworkbyonlytakingintoaccountreciprocalconnections.Second,toexcludeoccasionalusersthatarenottrulyinvolvedintheTwittersocialnetwork,weonlyretainedthoseusersinourTwitterFriendnetworkthatpostedmorethan1tweetperdayonaverageoverthecourseof6months.Third,weassignaweightwi,jtoeachedge(vi,vj)thatservesasanindicationofthedegreetowhichusersviandvjhavesimilarsetsoffriends:wi,j=Ci∩Cj=1Ci∪Cj=3=13(1)whereCidenotestheneighbourhoodoffriendssurroundinguservi.Notethatthisapproachdoesnottakeintoaccountthenumberoftweetsexchangedbetweentwousers,butsimplythedegreetowhichtwoTwitterusers3contentofeachusersvariedintimeandhowitspreadacrosslinks.2.1CreatingaTwitter“Friend”networkThe“Follower”networkwecollectedconsistsofadirectedgraphG=(V,E)inwhichVrepresentsthesetofall4,844,430Twitterusersinourcollection,andthesetofedgesE⊆V2inwhicheachdirectionaledgev∈Econ-sistofthe2-tuplet(vi,vj)thatindicatesthatuservifollowsuservj.BydesigntheTwittersocialnetworkisbasedon“Follower”relationswhichareunidirectionalandveryeasytoestablish.Assuchtheyformaveryminimalrepresentationofpossibleinteractionbetweenthosewhofollowandthosewhoarebeingfollowed.Infact,itisquitecommonforauservitofollowauservj,butforvjnottofollowviback.Assuch,followerrelationsarenotindicativeofanypersonalrelationanddefactoprecludetheestablishmentofassortativemixingandhomophily.Sinceweareinterestedinmutualinfluenceofclosecontacts,asmeasuredbytheirSWB,wedistinguishbetweenmereTwitter“Followers”andactual“Friends”[12,6]byapplyingthefollowingtransformationstotheTwitterfollowergraphG:First,wecreateanetworkofTwitterFriendrelationsfromtheFollowerrelationsinGbyonlyretainingedges(vi,vj)∈Eforwhichwecanfindareciprocalrelation(vj,vi),i.e.thesetofFriendconnectionsE!={(vi,vj):∃(vj,vi)∈E},i.e.twousersonlyshareaFriendshiptieiftheyarebothfollowingeachother.FriendFollowerFollower networkFriend networkFigure1:ConvertingtheoriginalFollowernetworkofTwitterintoaFriendnetworkbyonlytakingintoaccountreciprocalconnections.Second,toexcludeoccasionalusersthatarenottrulyinvolvedintheTwittersocialnetwork,weonlyretainedthoseusersinourTwitterFriendnetworkthatpostedmorethan1tweetperdayonaverageoverthecourseof6months.Third,weassignaweightwi,jtoeachedge(vi,vj)thatservesasanindicationofthedegreetowhichusersviandvjhavesimilarsetsoffriends:wi,j=Ci∩Cj=1Ci∪Cj=3=13(1)whereCidenotestheneighbourhoodoffriendssurroundinguservi.Notethatthisapproachdoesnottakeintoaccountthenumberoftweetsexchangedbetweentwousers,butsimplythedegreetowhichtwoTwitterusers3contentofeachusersvariedintimeandhowitspreadacrosslinks.2.1CreatingaTwitter“Friend”networkThe“Follower”networkwecollectedconsistsofadirectedgraphG=(V,E)inwhichVrepresentsthesetofall4,844,430Twitterusersinourcollection,andthesetofedgesE⊆V2inwhicheachdirectionaledgev∈Econ-sistofthe2-tuplet(vi,vj)thatindicatesthatuservifollowsuservj.BydesigntheTwittersocialnetworkisbasedon“Follower”relationswhichareunidirectionalandveryeasytoestablish.Assuchtheyformaveryminimalrepresentationofpossibleinteractionbetweenthosewhofollowandthosewhoarebeingfollowed.Infact,itisquitecommonforauservitofollowauservj,butforvjnottofollowviback.Assuch,followerrelationsarenotindicativeofanypersonalrelationanddefactoprecludetheestablishmentofassortativemixingandhomophily.Sinceweareinterestedinmutualinfluenceofclosecontacts,asmeasuredbytheirSWB,wedistinguishbetweenmereTwitter“Followers”andactual“Friends”[12,6]byapplyingthefollowingtransformationstotheTwitterfollowergraphG:First,wecreateanetworkofTwitterFriendrelationsfromtheFollowerrelationsinGbyonlyretainingedges(vi,vj)∈Eforwhichwecanfindareciprocalrelation(vj,vi),i.e.thesetofFriendconnectionsE!={(vi,vj):∃(vj,vi)∈E},i.e.twousersonlyshareaFriendshiptieiftheyarebothfollowingeachother.FriendFollowerFollower networkFriend networkFigure1:ConvertingtheoriginalFollowernetworkofTwitterintoaFriendnetworkbyonlytakingintoaccountreciprocalconnections.Second,toexcludeoccasionalusersthatarenottrulyinvolvedintheTwittersocialnetwork,weonlyretainedthoseusersinourTwitterFriendnetworkthatpostedmorethan1tweetperdayonaverageoverthecourseof6months.Third,weassignaweightwi,jtoeachedge(vi,vj)thatservesasanindicationofthedegreetowhichusersviandvjhavesimilarsetsoffriends:wi,j=Ci∩Cj=1Ci∪Cj=3=13(1)whereCidenotestheneighbourhoodoffriendssurroundinguservi.Notethatthisapproachdoesnottakeintoaccountthenumberoftweetsexchangedbetweentwousers,butsimplythedegreetowhichtwoTwitterusers3 Values Network parameter 102, 009 users Nodes 2, 361, 547 edges Edges 0.000454 Density 14 Diameter 46.300 Average Degree Average Clustering Coefficient 0.262 Table 2: Network parameters for largest Connected Component of Twitter Friend network. find that the largest Connected Component of the Friend network, GCC , retains 97.9% of users in the original Twitter Friend network. This indicates a high degree of connectivity across all users in the final Friend graph. This is further confirmed by the diameter of GCC which was found to be only 14 in spite of its low density. Other relevant network parameters for GCC are provided in Table 2. Figure 3: A sub-graph of 3, 587 users extracted from the generated Twitter social network (102, 009 users and 2, 361, 547 edges). 5 Figure 4: Twitter Friend network edge weight and degree distributions. Examining the edge weight distribution as shown in Fig. 4 we observe a strongly skewed frequency distribution indicating very many connections in the GCC with low edge weights (wi,j < 0.3) and few connections with very high edge weights (wi,j > 0.6). The degree frequency distribution reveals a similar pattern with most users connected to only a few users and a small minority of users connected to thousands of users. 2.2 User-level measurements of Subjective Well-Being We can not directly interrogate Twitter users about their Subjective Well-Being (SWB) [23], but we can infer users’ SWB from the aggregate emotional content of their tweets over a period of 6 months. To do so we apply the following procedure. To reduce noise we only include Twitters users in GCC that posted at least 1 tweet per day. This guarantees at least 180 tweets for every individual user from which to assess their SWB. We then analyze the emotional content of each user’s 6 month record of tweets using OpinionFinder (OF)3 which is a publicly available software package for sentiment analysis that can be applied to determine sentence-level subjectivity [31]. OF has been successfully used to analyze the emotional content of large collections of tweets [32] by using its lexicon to determine the dominance of positive or negative tweets on a given day. Here we select both positive and negative words that are marked as either “weak” and “strong” from the OF sentiment lexicon resulting in a list of 2718 positive and 4912 negative words. For each tweet in an individual user’s 6 month record we count the number of negative and positive terms from the OF lexicon that it contains, and increase the individual user’s score of either negative or positive tweets by 1 for each occurrence. The Subjective Well-Being (S (u)) of user u is then defined as the fractional difference between the number of tweets that contain positive OF terms and those that contain negative terms: Np (u) − Nn (u) Np (u) + Nn (u) S (u) = 3http://www.cs.pitt.edu/mpqa/opinionfinderrelease/ 6 0.00.20.40.60.81.0weight100101102103104105freq(weight=k)edge weight distribution102103104degree100101102103104freq(degree=k)degree distribution where Np (u) and Nn (u) represent respectively the number of positive and negative tweets for user u. A number of examples is shown in Table 3. Tweets submitted by high SWB users (> 0.5). So...nothing quite feels like a good shower, shave and haircut...love it My beautiful friend. i love you sweet smile and your amazing soul i am very happy. People in Chicago loved my conference. Love you, my sweet friends @anonymous thanks for your follow I am following you back, great group amazing people Tweets submitted by low SWB users (< 0.0). She doesn’t deserve the tears but i cry them anyway I’m sick and my body decides to attack my face and make me break out!! WTF :( I think my headphones are electrocuting me. My mom almost killed me this morning. I don’t know how much longer i can be here. Table 3: Examples of Tweets posted by users with very high and very low SWB values. 2.3 Defining SWB assortativity Having calculated the SWB values of each users, we can now proceed to measure the degree to which the SWB of connected users is correlated. Intuitively, a person can be emotionally influenced by their friends in two, com- plementary, ways: influence can come from interacting with specific individuals to which one may attribute more importance [33]. We refer to this first type as “pairwise node assortativity" since it assesses the degree to which every two pairwise-connected users have similar SWB values. Another possibility is that each individual is in- fluenced by the overall SWB of all of the people it interacts with. We refer to this second type as “neighborhood assortativity". Fig. 5 illustrates this distinction; it shows the actual neighborhood Friend network of an individual in GCC who has very high SWB values. Nodes are colored according to their SWB values with red indicating high SWB val- ues, blue indicating low SWB values and white indicating neutral or zero SWB values. The particular individual with high SWB values is connected to a local network of equally high SWB individuals (red). The individual could thus be said to be neighborhood assortative within this cluster. However, the individual is also connected to several individuals with low SWB values (blue). For each individual connection this is a case of pairwise disassortativity. The cluster of low SWB individuals on the other hand exhibits neighborhood assortativity for low SWB values, and the network in its entirety, including both low and high SWB clusters, exhibits strong SWB assortativity; nodes with similar low or high SWB values tend to be connected (blue and red clusters). We formally define Pairwise SWB assortativity as follows: For each edge (vi , vj ) in the GCC of our social network, we extract the corresponding two SWB values, one for the source node and one for the target node. These values are then aggregated into two vectors, S (S ) and S (T ) for sources and targets respectively. The value 7 Figure 5: Neighborhood network of a very high SWB individual (center). Blue, white, and red node colors correspond respectively to low, neutral and high SWB values. of the pairwise assortativity, denoted AP (GCC ), is then given by the Pearson correlation coefficient ρ of these two (cid:19)(cid:21) (cid:19) (cid:18) (cid:20)(cid:18) (cid:88) vectors. S (Ti ) − (cid:104)S (T )(cid:105) S (Si ) − (cid:104)S (S )(cid:105) 1 AP (GCC ) ≡ ρ(S (S ), S (T )) = σ (S (T )) σ (S (S )) n − 1 i The pairwise assortativity is then defined in the [−1, +1] interval, with −1 indicating perfect disassortativity, 0 indicates a lack of any assortativity, and +1 meaning perfect assortativity. (2) The neighborhood assortativity of GCC with regards to SWB, denoted AN (GCC ) can be calculated as follows. For each user u ∈ V , we define its neighborhood: (3) κ(u) = {∀v : ∃(u, v) ∈ E } so that κ(u) or κu represents the set of users that user u is connected to. We then calculate an average SWB value (cid:88) for κ(v) which we denote v∈κ(u) 1 κ(u) (4) S (κu ) = S (v) 8 low SWBhigh SWB We can now define two vectors, one for the SWB values of every unique user and one for the average SWB values of their neighborhoods, denoted by S (U ) and S (κ). The neighborhood assortativity of the network GCC with regards to SWB, denoted Aκ , is then given by the correlation function ρ computed over these two vectors as (cid:18) (cid:19)  S (κu ) − (cid:104)S (κ)(cid:105)  follows: (cid:88) (cid:16) (cid:17) S (u) − (cid:104)S (U )(cid:105) 1 σ (S (U )) n − 1 S (κ) σ u with the sum to be taken over every user, u. AK (GCC ) then represents the correlation between the SWB values of user vi and the mean SWB values of its Friends. Similarly to the pairwise version, Aκi is expressed in the range [−1, +1] where −1 indicates perfect neighborhood disassortativity and where +1 indicates perfect neighborhood assortativity. AK (GCC ) ≡ ρ(S (U ), S (κ)) = (5) 3 Results and discussion 3.1 SWB distribution In Figure 6 we plot the probability distribution of Subjective Well-Being values across all Twitter users in our sample. The distribution seems bimodal with two peaks: one in the range [−0.1, 0.1] and another in the range [0.2, 0.4]. Excluding users whose SWB=0 (due to a lack of emotional content in their Tweets) we find that a majority of Twitter users in our sample have positive SWB values in a rather narrow range [0.1, 0.4] with a peak at SWB=0.16. This is confirmed by the cumulative distribution shown on the left-bottom of Fig. 6; 50% of users have SWB values ≤ 0.1, and 95% of users have SWB values ≤ 0.285. Figure 6: Probability distribution (%) and cumulative distribution (%) of Subjective Well-Being (SWB) and Emotionality values for our sample of Twitter users. 9 3.2 Pairwise and neighborhood SWB assortativity In Eq. 2 we defined pairwise SWB as the correlation between the SBW values of connected users in our Twitter Friends networks, whereas Eq. 5 defined neighborhood assortativity was defined as the correlation between the SWB values of individual users and the mean SWB values of their neighbors in the graph GCC . The assortativity values were found to be 0.443(cid:63)(cid:63)(cid:63) (N=2,062,714 edges) for the pairwise SBW assortativity and 0.689(cid:63)(cid:63)(cid:63) (N=102,009)4 for the neighborhood assortativity. Both correlations are highly statistically significant (p-values < 0.001) for the sample sizes. Regarding pairwise SWB assortativity, the scatterplots on the left of Fig. 7 and Fig. 8 show the distribution of SWB values across the sample of all edges and nodes in GCC and confirm the observed correlation between the SWB values of connected or neighboring users in GCC . Figure 7: Scatterplot of SWB values for user connected in Twitter Friends network. Left: all edges in- cluded. SWB assortativity=0.443(cid:63)(cid:63)(cid:63) , N=2,062,714 edges. Right: scatterplot includes edges wi,j ≥ 0.1, SBW assortativity=0.712(cid:63)(cid:63)(cid:63) , N=479,401 The pairwise assortativity scatterplot (Fig. 7-left) indicates a significant amount of scatter, commensurate to the lower correlation value of 0.443(cid:63)(cid:63)(cid:63) which is nevertheless statistically highly significant. The observed relation is not obviously linear. The distribution of values is affected by the bimodal distribution of SWB values as shown in Fig. 6; large numbers of observations cluster at SWB values within the ranges of either [−0.05, 0.05] and [0.1, 0.3]. The clustering pattern of Fig. 7 however indicates that users with SWB values in a particular range are preferentially connected to users within that same range, thereby confirming the observed positive pairwise SWB assortativity. The neighborhood assortativity scatterplot (Fig. 8-left) indicates a similar effect but here the clustering of users is less pronounced and the amount of scatter is lower than that observed for the pairwise assortativity scatterplot, 4The sample sizes for pairwise assortativity and neighborhood assortativity) are expressed in edges and nodes respectively, since the former correlation is calculated on the basis of a sample of edges that connect pairs of nodes whereas the other is calculated on the basis of a sample of nodes and their neighborhood 10 Figure 8: Scatterplot of SWB values for users (x) and their neighborhood (y) connected in Twitter Friends net- work. Left: all edges included. SWB assortativity=0.689(cid:63)(cid:63)(cid:63) , N=102,009 nodes. Right: scatterplot includes edges wi,j ≥ 0.1, SBW assortativity=0.746(cid:63)(cid:63)(cid:63) , N=59,952 commensurate to the higher neighborhood assortativity value of 0.689(cid:63)(cid:63)(cid:63) . Although less pronounced the bimodal distribution of SWB values is apparent and leads to a clustering of user and neighborhood SWB values in the ranges of [−0.05, 0.05] and [0.1, 0.3]. Nevertheless it is again the case that users with SWB values in either range are most likely to be connected to users or neighborhoods with SWB values in the same range. The distribution of user and neighborhood SWB value is furthermore in line with a positive, linear relationship. 3.3 Edge weight and SWB assortativity Pairwise SWB assortativity and neighborhood SWB assortativity diverge significantly (0.443(cid:63)(cid:63)(cid:63) < 0.689(cid:63)(cid:63)(cid:63) ) . The former is based on the pairwise comparison of SWB values across all connection in GCC many of which may be weak or irrelevant connections from the perspective of indicating actual Friend ties. To measure the effect of edge weights, we calculate pairwise and neighborhood assortativity values under different edge thresholds, i.e. we only take into account edges in GCC whose weight as defined in Eq. 1 is wi,j ≥  where  ∈ [0, 1] represents a given edge threshold. The consequent assortativity calculations will therefore more strongly reflect only those connections between users that are indicative of stronger Friend relations (higher wi,j ). In other words we are verifying whether stronger user relations lead to higher or lower assortativity. The results of the calculation of pairwise and neighborhood SWB assortativity under various edge thresholds are shown in Table 4 and visualized in Fig. 9. Values for  > 0.8 are excluded since the correlation coefficients were not statistically significant (p-value < 0.1). The graph in Fig. 9 overlays the different pairwise and neighborhood SWB assortativity values along with the number of remaining edges and nodes under the given edge threshold, i.e. the sample size for the given assortativity calculation. Both pairwise and neighborhood assortativity values increase as the edge threshold  increases, but not in a linear manner. Pairwise SWB assortativity values increase sharply as  increases from 0 to 0.10 and afterwards stabilizes at a value of approximately 0.750 which is maintained in the interval  ∈ [0.15, 0.85]. In other words, removing 11 Edge threshold () A(SWB) 0.0 0.443(cid:63)(cid:63)(cid:63) 0.712(cid:63)(cid:63)(cid:63) 0.10 0.754(cid:63)(cid:63)(cid:63) 0.20 0.30 0.755(cid:63)(cid:63)(cid:63) 0.743(cid:63)(cid:63)(cid:63) 0.40 0.757(cid:63)(cid:63)(cid:63) 0.50 0.798(cid:63)(cid:63)(cid:63) 0.60 0.70 0.755(cid:63)(cid:63)(cid:63) 0.434(cid:63)(cid:63)(cid:63) 0.80 0.90 - Pairwise Neighborhood N edges A(SWB) N nodes 2,062,714 0.689(cid:63)(cid:63)(cid:63) 102,009 59,952 0.746(cid:63)(cid:63)(cid:63) 479,401 33,693 0.769(cid:63)(cid:63)(cid:63) 128,261 36,255 0.780(cid:63)(cid:63)(cid:63) 16,334 7,699 0.779(cid:63)(cid:63)(cid:63) 10,355 3,793 0.781(cid:63)(cid:63)(cid:63) 3,255 1,439 0.805(cid:63)(cid:63)(cid:63) 1,375 689 0.816(cid:63)(cid:63)(cid:63) 502 149 0.768(cid:63)(cid:63)(cid:63) 301 - - - Table 4: Pairwise and Neighborhood Subjective Well-Being assortativity values A(SW B ) vs. edge threshold . (cid:63)(cid:63)(cid:63) : p-value < 0.001. Figure 9: Pairwise Subjective Well-Being assortativity and log(number of edges) values vs. edge weight thresh- olds. edges with wi,j < 0.1 increases pairwise SWB assortativity considerably, but the removal of edges with higher wi,j values has little to no additional effect. We observe that  = 0.1 reduces the number of edges by a fifth, 12 0.050.100.150.200.250.300.35Edge threshold [0,1]0.40.50.60.70.8assortativity(SWB: pairwise and neighborhoodA(SWB pairwise)A(SWB neighborhood)104105106log(number of edges)N edges(pairwise)N edges(neighborhood) namely from 2,062,714 to 479,401 indicating that a large number of edges are characterized by low similarity values which when included lead to lower pairwise SWB assortativity. The neighborhood SWB assortativity increases with higher  values but in a less pronounced manner. At  = 0 we find a neighborhood SWB assortativity value of 0.689 which increases to approximately 0.760 for  ∈ [0.10, 0.90]. We observe significant declines in the number of nodes that remain under increasing  values as was the case for pairwise assortativity. At a value of  = 0.1 we find the highest pairwise and neighborhood SWB assortativity values combined with the largest sample sizes, excluding no threshold i.e.  = 0. We therefore generate new scatterplots of SWB values for pairwise and neighborhood SWB assortativity at  = 0.1 as shown in Fig. 7 (right) and Fig. 8 (right). The re- spective scatterplots reflect higher assortativity values; we find less scatter, a stronger positive and linear relation between SWB value of connected users, and a less pronounced clustering caused by the bimodal distribution of SWB values. 3.4 Discussion The above outlined results indicate the following. First, Twitter users in general exhibit a low to moderate SWB, with very few users being characterized by low SWB values. The Twitter population in our sample can therefore in the mean be considered moderately happy. This observation is most likely an underestimation given the relative preponderance of negative terms in the OF lexicon. However, the SWB distribution is bi-modal showing a group of Twitter users with zero to very low SWB values, i.e. those that are on the average somewhat happy, and another group with more pronounced, higher SWB values. This may result from socio-cultural differences in how emotions and mood are expressed on Twitter. Some users may infrequently express their emotional states whereas other are more prone to do so. Second, we find statistically significant levels of pairwise and neighborhood SWB assortativity indicating that Twitter users either prefer the company of users with similar SWB values (homophilic attachment) or converge on their Friends’ SWB values (contagion). The relation between user SWB values is not linear and biased by the bi-modal distributions of SBW values causing users to be clustered in two groups with equally low or high SWB values. In other words, low SWB users are connected to low SWB and high SWB users are connected to high SWB users. Again, this may confirm the notion that distinct socio-cultural factors affect the expression of emotion and mood on Twitter, and cause users to cluster according to their degree of expressiveness as well as SWB. The results of measuring pairwise and neighborhood assortativity under different edge weights indicate that we find a stronger and more significant relation between the SWB values of connected users when we only take into account connections with higher wi,j weights, i.e. those that are deemed more reliable indicators of actual Friend ties. A possible mechanism to explain the difference in magnitude between pairwise and neighborhood assorta- tivity might be that users’ neighborhoods contain individuals that they are indeed strongly assortative with, and whose SWB values affect mean neighborhood SWB values and thus neighborhood assortativity overall, whereas 13 they are “drowned out” in the process of making pairwise comparisons between all individuals that a user is con- nected to in the process of calculating pairwise SWB assortativity. For example, users might generally have 10 neighbors, but are generally highly SWB assortative with only 1 Friend. In the calculation of pairwise assortativity, this leads to 10 pairwise comparisons between SBW values only one of which contributes to the overall observed pairwise SWB assortativity in the graph. However, the neighborhood assortativity relies on a mean SWB value calculated for the entire neighborhood, including the 1 highly assortative individual. The latter thus influences the average SBW value for the entire neighborhood caus- ing an increased neighborhood assortativity value. The greatest improvement in assortativity values indeed occurs for pairwise SWB assortativity which is most affected by the preponderance of weakly weighted connections since it is defined at the level of all individual user to user connections. Both pairwise and neighborhood SWB assortativity converge on a value of approximately 0.750 which indicates a significant degree of SWB assortativity in our Twitter Friend graph GCC . 4 Conclusion Recent findings show that assortative mixing can occur in a variety of social contexts and personal attributes. Here we show that Subjective Well-Being is equally assortative in the Twitter social network, i.e. the SWB of individuals that have reciprocal Twitter follower links are strongly related. Happy users tend to connect to happy users whereas unhappy users tend to be predominantly connected to unhappy users. The convergence of pair- wise and neighborhood assortativity under increasing edge weight thresholds indicates that users tend to be most assortative with a limited number of individuals that they have strong social ties to and that weaker ties fulfill a different social role possibly as outlined by Centola et al (2007)[34]. We do not not address the social or cognitive mechanisms that cause the observed SWB assortativity. Two differ- ent mechanisms may be at work[35]. The first is based on the notion of “homophily”, i.e. users and connections tend to preferentially connect to users with similar SWB values. As an online social network grows, new con- nections are thus biased towards connecting individuals with similar SWB values. This process may be modeled in terms of “preferential attachment” theory. The second mechanism that may cause SWB assortativity is that of “mood contagion”, namely that connected users converge to similar SWB values over time. In other words, being connected to unhappy users can make one unhappier and vice versa. The latter suggests that users may control their own level of SWB by choosing the right set of online friends and influence their Friends’ SWB by creating strong social ties and hoping for some form of SBW contagion to take place. A third possibility is that users asses or express their SWB relative to that of their friends. As a user’s neighborhood becomes happier, this may affect their own expression of SWB-related sentiment. This phenomenon may occur at the level of entire cultures which may be comparatively more or less prone to open expressions of individual sentiment. At this point our research does not offer any information on which of these mechanisms cause the observed SWB assortativity or in fact whether both may be occurring. Future research will therefore focus on analyzing user connections and SWB values over time, and relating these changes in the framework of homophily and preferential attachment[36]. Twitter has now become a major international phenomenon, and this investigation must therefore include linguistic, cultural and geographic factors. 14 Acknowledgements We are grateful to Eliot Smith, Peter Todd and Ishani Banerji for their very useful feedback and input throughout the research that led to this paper. This research was supported by NSF Grant BCS #1032101. References [1] Miller McPherson, Lynn Smith-Lovin, and James M Cook. Birds of a Feather: Homophily in Social Net- works. Annual Review of Sociology, 27(1):415–444, August 2001. [2] Mark E J Newman. Assortative mixing in networks. Phys. Rev. Lett., 89:208701/1–4, 2002. [3] Mark E J Newman. The structure and function of complex networks. SIAM Review, 45:167, 2003. [4] Mark E J Newman. Mixing patterns in networks. Physical Review E, 67(2):26126, 2003. [5] Luis E. C. Rocha, Fredrik Liljeros, and Petter Holme. Information dynamics shape the sexual networks of internet-mediated prostitution. PNAS, 107:5706, 2010. [6] Herminia Ibarra. Homophily and Differential Returns: Sex Differences in Network Structure and Access in an Advertising Firm. Administrative Science Quarterly, 37(3):422, September 1992. [7] Kelly a. Mollica, Barbara Gray, and Linda K. Trevino. Racial Homophily and Its Persistence in Newcomers’ Social Networks. Organization Science, 14(2):123–136, March 2003. [8] Nicholas a Christakis and James H Fowler. The spread of obesity in a large social network over 32 years. The New England journal of medicine, 357(4):370–9, July 2007. [9] John T Cacioppo, James H Fowler, and Nicholas A Christakis. Alone in the Crowd: The Structure and Spread of Loneliness in a Large Social Network. Journal of personality and social psychology, 97(6):977– 991, 2010. [10] James H. Fowler, Jaime E. Settle, and Nicholas A. Christakis. Correlated genotypes in friendship networks. PNAS, 108:1993, 2011. [11] Anna Chmiel, Julian Sienkiewicz, Georgios Paltoglou, Kevan Buckley, Mike Thelwall, and Janusz A. Holyst. Negative emotions boost users activity at bbc forum. Technical Report 1011.5459, arXiv, 2010. [12] Brian Parkinson and Gwenda Simons. Affecting others: social appraisal and emotion contagion in everyday decision making. Personality and social psychology bulletin, 35(8):1071–84, August 2009. [13] Winter a Mason, Frederica R Conrey, and Eliot R Smith. Situating social influence processes: dynamic, multidirectional flows of influence within social networks. Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc, 11(3):279–300, August 2007. 15 [14] Jeffrey R Huntsinger, Janetta Lun, Stacey Sinclair, and Gerald L Clore. Contagion without contact: an- ticipatory mood matching in response to affiliative motivation. Personality and social psychology bulletin, 35(7):909–22, July 2009. [15] Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. Why we twitter: understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web mining and Social Network Analysis, pages 56–65, New York, NY, USA, 2007. ACM. [16] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. What is Twitter, a social network or a news media? In WWW ’10: Proceedings of the 19th international conference on World wide web, pages 591—-600, Raleigh, North Carolina, USA, 2010. ACM. [17] Halil Bisgin, Nitin Agarwal, and Xiaowei Xu. Investigating Homophily in Online Social Networks. In 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pages 533–536, Toronto, Canada, August 2010. IEEE. [18] Reza Zafarani, William D Cole, and Huan Liu. Sentiment Propagation in Social Networks : A Case Study in LiveJournal. In Patricia Chai, Sun-Ki And Salerno, John And Mabry, editor, SBP 2010 - Advances in Social Computing, Lecture Notes in Computer Science (6007), pages 413–420. Springer Berlin, 2010. [19] Alina Mungiu-Pippidi and Igor Muntean. Moldova’s “Twitter” Revolution. Journal of Democracy, 20(3), 2009. [20] Onook Oh, Kyounghee Hazel Kwon, and H. Raghav Rao. An exploration of social media in extreme events: rumor theory and twitter during the Haiti earthquake. In International Conference on Information Systems (ICIS), page Paper 231, St. Louis, Missouri, USA, 2010. [21] David Lazer, Alex Pentland, Lada Adamic, Sinan Aral, Albert-László Barabási, Devon Brewer, Nicholas Christakis, Noshir Contractor, James Fowler, Myron Gutmann, Tony Jebara, Gary King, Michael Macy, Deb Roy, and Marshall Van Alstyne. Computational social science. Science, 323:5915, 2009. [22] Sang Hoon Lee, Pan-Jun Kim, Yong-Yeol Ahn, and Hawoong Jeong. Googling social interactions: Web search engine based social network construction. PLoS One, 5:e11233, 2010. [23] Ed Diener. Subjective Well-Being, pages 11–58. Springer Netherlands, 2009. [24] K. Balog, G. Mishne, and M. de Rijke. Why are they excited? identifying and explaining spikes in blog mood levels. In 11th Conference of the European Chapter of the Association for Computational Linguistics. Trento, Italy, 2006. [25] Peter Sheridan Dodds and Christopher M Danforth. Measuring the Happiness of Large-Scale Written Ex- pression: Songs, Blogs, and Presidents. Journal of Happiness, 11(4), July 2009. [26] A. Mislove, S. Lehmann, Y.-Y. Ahn, J.-P. Onnela, and J. N. Rosenquist. Pulse of the nation: visualizing the mood of twitter. http://www.ccs.neu.edu/home/amislove/twittermood/, 2010. [27] Johan Bollen, Huina Mao, and Alberto Pepe. Determining the public mood state by analysis of microblog- ging posts. In Proceedings of the Proc. of the Alife XII Conference, Odense, Denmark, 2010. MIT Press. 16 [28] Johan Bollen, Huina Mao, and Xiaojun Zeng. Twitter mood predicts the stock market. Journal of Compu- tational Science, In press, 2011. [29] M. Szell, R. Lambiotte, and S. Thurner. Multirelational organization of large-scale social networks in an online world. Proceedings of the National Academy of Sciences, 107(31), July 2010. [30] B A Huberman, D M Romero, and F Wu. Social networks that matter: Twitter under the microscope. First Monday, 14:1, 2008. [31] Theresa Wilson, Janyce Wiebe, and Paul Hoffmann. Recognizing contextual polarity in phrase-level senti- ment analysis. Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing - HLT05, (October):347–354, 2005. [32] Brendan O’Connor, Ramnath Balasubramanyan, Bryan R Routledge, and Noah A Smith. From Tweets to Polls: Linking Text Sentiment to Public Opinion Time Series. In Proceedings of the International AAAI Conference on Weblogs and Social Media, Washington DC, USA, 2010. AAAI Press. [33] Jukka-Pekka Onnela and Felix Reed-Tsochas. Spontaneous emergence of social influence in online systems. PNAS, 107:18375, 2010. [34] Damon Centola and Michael Macy. Complex Contagion and the weakness of long ties. American Journal of Sociology, 113(3):702–734, 2007. [35] Sinan Aral, Lev Muchnik, and Arun Sundararajan. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences of the United States of America, 106(51):21544–9, December 2009. [36] Cosma Rohilla Shalizi and Andrew C. Thomas. Homophily and Contagion Are Generically Confounded in Observational Social Network Studies. Sociological Methods and Research (arXiv:1004.4704v3), 2011. 17
1312.2237
1
1312
2013-12-08T17:37:24
Clustering online social network communities using genetic algorithms
[ "cs.SI", "physics.soc-ph" ]
To analyze the activities in an Online Social network (OSN), we introduce the concept of "Node of Attraction" (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where the main objective is to determine clusters of network communities in a given OSN dataset. This approach is efficient in handling different type of discussion topics in our studied OSN - comments, emails, chat expressions, etc. and can form clusters according to one or more topics. We believe that this work can be useful in finding the source for spread of this GA-based clustering of online interactions and reports some results of experiments with real-world data and demonstrates the performance of proposed approach.
cs.SI
cs
Clustering online social network communities using genetic algorithms Dipankar Dasgupta* Mustafa H. Hajeer* Sugata Sanyal# Alka Singh* #School of Technology & Computer Science *Center for Information Assurance Tata Institute of Fundamental Research Department of Computer Science The University of Memphis Homi Bhabha Road, Mumbai-400005, INDIA Memphis, TN 38138, USA ABSTRACT To analyze the activities in an Online Social Network (OSN), we introduce the concept of “Node of Attraction” (NoA) which represents the most active node in a network community. This NoA is identified as the origin/initiator of a post/communication which attracted other nodes and formed a cluster at any point in time. In this research, a genetic algorithm (GA) is used as a data mining method where the main objective is to determine clusters of network communities in a given OSN dataset. This approach is efficient in handling different type of discussion topics in our studied OSN –comments, emails, chat sessions, etc. and can form clusters according to one or more topics. We believe that this work can be useful in finding the source for spread of rumors/misinformation, help law enforcement in resource allocation in crowd management, etc. The paper presents this GA- based clustering of online interactions and reports some results of experiments with real-world data and demonstrates the performance of proposed approach. Keywords: Online Social Network, Node of Attraction, GA- Based clustering. 1. INTRODUCTION Blogging, twitting and online social networking have become an integral part of modern-day life. Studies have shown that people spend a lot of their time in online media such as Facebook, MySpace, Twitter, YouTube, Google+ and in other blogosphere. These web-based services/applications are designed to assist people and businesses alike to stay in touch, communicate and collaborate more effectively, and socialize across borders and in general, maintain a second avatar in cyberspace. The way blog sites (nodes) attract people for participating in discussion, share information and/or spread rumor is very interesting and to study. The dynamic fascinating interaction among these nodes and the period of increased interaction and manner in which such interaction get decreased can provide useful information about the current events, topics of discussion, and human behavior. In the analysis of online social network (OSN) data, the basic problem lies in the detection of groups of closely connected nodes which are called ‘network communities’. In this work, we consider the relation among the nodes in OSN, and group their the strength of to them according relations/interactions. The work is motivated by the need to understand how the interactions in virtual-world can manifest real-world security concerns or law and order situations. Such a clustering of online social communities may also help to detect insider threats, employee behavior, or recognizing competitor interests in social activities as possible motivators. In this research, a genetic algorithm (GA) is used as a data mining method where the main objective of clustering is to find network communities from a given OSN dataset. There exist some works which addresses different aspects of online social behavior and used un-weighted social network data for clustering [2], i.e. every edge in the network has equal value/weight and distributed community detection in delay tolerant networks [3, 9-10]. 2. GA-BASED APPROACH An OSN community can be defined as a set of users who are frequently interacting with each other and participating in some discussion e.g. group, subgroup, module, and cluster. A Genetic algorithm (GA) is an optimization method which uses biological process as a model to find solutions in the search problem. We used a GA here for finding the clusters in OSN data having multiple values for each edge indicating individual node participating in more than one discussion groups or activities. The goal is to improve the processing and efficient interpretation of real-world OSN data, relevant knowledge, and subsequent information processing and representation. The underlying approach tries to find dense clusters using an edge removal strategy in an intelligent way based on the context of discussions. The reasons for using GA-based approach are • Huge search space and non-linearity in search space. • The dynamic nature of network topology and the need of adaptive multi-fitness function. • GAs perform global search in problem space GAs are easy to interface to existing simulations and • models GAs are extensible and easy to hybridize • GAs are remarkably noise tolerant • The implementation details of the GA approach for OSN data clustering is explained in the next section, the section 4 provides some experiments and results. The last section gives some concluding remarks. 2.1 Node of Attraction: As we know, nodes in a social network are not physical nodes rather web sites, postings, user blogs, pages with some news, etc. For example, the documentary on Invisible Children (Kony 2012) was posted at a video- sharing website, YouTube.com on 5th March 2012. In two weeks time, over 78 million viewers visited the site; another website vimeo.com also posted the same video and attracted over 16.6 million viewers during the same time. This indicates that the sites which hosted the video attracted significant number of viewers forming clusters with the posted page as the focal point. We introduced the concept of Node of Attraction (NoA) which represents the most active node in a network community. This NoA is identified as the origin of a post/communication which attracts other nodes to form a cluster. The need of finding such nodes and to keep track of these nodes in social networks has many real-world applications such as detection of spreading news or rumor in the society. 3. IMPLEMENTATION DETAILS to find In this work, a genetic algorithm is used clusters/groups in online network data by removing minimum number of edges while the clusters have maximum number of ties. 3.1 Encoding schemes We have used two encoding schemes where each chromosome represents groups or clusters. In the first scheme, each chromosome is variable in size, composed of edge list as shown in Figure 1 (top left). These edges are derived from nodes in each row of the table (right). The genetic process will remove edges from the chromosome to form clusters as illustrated in Figure 1 (bottom left). Figure 1: First encoding scheme showing edge removal from the OSN data The real-valued second encoding scheme uses a representation, where the first number denotes the number of groups and the rest fields denote the points of separation between nodes to form groups as shown in Figure 2. Figure 2: The second encoding scheme 3.2 The fitness function Two properties of clustering such as high intra-cluster similarity and low inter-cluster similarity are considered for fitness measure of each chromosome. Accordingly, the number of edges connected to a node form a group are considered for fitness, where we calculate the clossness of groups/clusters and penalize the chromosome with smaller groups with same fitness. The fitness function uses the most updated edge values rather than old values in order to adapt to the changes in the interactions. 3.3 Setting of GA control parameters To create diversity in the candidate solution list, the initial population is generated with random edges, and the fitness for each chromosome is calculated. We run a steady-state GA with two different datasets. A single-point crossover with probability of 0.85, population size 100, maximum evaluations 10,000, and the binary tournament selection operator are used. The high rate of mutation is used so that the genetic search can adapt to dynamic user interactions (as reflected in data) over time. After crossover and mutations are performed, each chromosome is repaired (if necessary) in order to remove repeated edges in the chromosome. For the second encoding scheme, we used a different type of crossover where each chromosome uses the swap operator where some genes are exchanged, and the mutations are restricted to the second and first parts of the chromosome. 4. EXPERIMENTS AND RESULTS In order to determine the correct NoA for an attribute, the chromosome exhibiting the best fitness is searched and then it is decoded/ mapped to form groups. After the mapping operation, these groups are sent to a function which finds the NoA (the node with maximum number of edges) and is saved in a file to keep track of all NOAs over a period of time. the GA-based the performance of To demonstrate clustering approach, we first experiment with a hand- crafted synthetic datasets and then we use some real-world OSN data. 4.1 Synthetic (small) dataset Table 1 shows the small dataset containing 15 edges each with 3 attributes as different type of interactions between a pair of nodes. Such interactions represent multi-valued edges among the nodes. Here the interactions/edges represent number of emails, number of comments and the number of posts between nodes. Figure 3 the is corresponding network diagram (of Table 1) with some multi-valued edge. If there is no edge between any two nodes which indicates that attribute values between these two nodes are zero. Table 1: A small synthetic dataset Number of Number Node A Node B Number comments of posts of emails 4 4 4 3 3 3 4 4 4 5 5 4 4 4 3 4 3 3 3 3 3 3 3 3 1 29 1 30 1 2 1 39 1 3 4 5 3 5 4 4 4 4 5 3 4 3 4 4 5 5 4 35 1 1 3 4 4 3 3 3 4 3 4 5 4 2 3 3 4 5 4 5 4 5 4 5 4 3 4 3 4 5 4 3 1 1 1 1 5 5 2 2 4 8 5 6 6 6 7 7 8 6 10 10 10 11 11 11 12 13 12 14 After running the program, we observed that the GA is able to form clusters corresponding to each discussion groups (attributes) as shown in Figure 4. 2 3 4 5 4 3 3 4 7 14 6 7 8 9 8 9 9 10 11 12 14 12 13 14 13 14 14 15 Figure 3: A graphical representation of the small dataset. Figure 4(a) graphically represents results of a GA run which contains edges list forming network clusters according to the first attribute of the synthetic dataset (Table 1). Figure 4(a): GA-based clustering according to number of Emails. Similarly, Figure 4(b) and Figure 4(c) show the clusters formed based on other two attributes: number of comments and number of posts. exchanged among nodes. Other attributes should be selected in conjunction. Now, let us take a look at figure 5(a) and Figure 5(b) below, where inter-group interactions and overlapping are demonstrated. If the OSN data are clustered according the first and the second attributes as per the dataset (Table 1), the overlapped groups are formed. Figure 4(b): Clustering according to number of comments. Figure 5 (a): Groups formed according multi-valued edges Figure 5(b): Groups formed according multi-valued edges If we consider multiple attributes, it is observed that some nodes connect two or more separate clusters; such a node is identified as the “linkage node”. These nodes help to analyze the interactions between two different discussion groups or topics (figure 5). To illustrate the dynamic interactions in social networks and to demonstrate the performance of our GA-based clustering approach, we changed some attribute values during the run. At time T0 during the execution of the algorithm, clusters started to form, based on the dataset as shown in figure 6, and after that some changes are made in the first attribute. This process is illustrated through the following example: Here the second group is formed with the nodes {6, 7, 8, 9} before changes were made and NoA was the node number {9}. Sometime after T0, node X is added to the second Figure 4(c): Clustering according to number of posts. As per definition, the NoA for different attribute can be observed in each figure above. Accordingly, in figure 4(a) NoAs are {1, 9 and 14}, in figure 4(b) NoA nodes are {14 and 1} and in figure 4(c) these nodes are {6 and 14}. However, this provides a simplest analysis of real online social network interactions. Only one attribute is not sufficient to classify the entire social network. In particular, groups should not be clustered only on the basis of email group and it was connected to all group members. Since it was connected with all group members, and it was observed that the system immediately considers X as the new node of attraction. So after initial clustering, the groups’ formation adapts to changes made to the network interaction. Table 2 shows the results of these dynamic changes, where the changes take place between time period T0 and T1 as follows: • Node X was added to the data set. • Edges were connected from X to nodes {6,7,8,9} and the changes which take place between time T1 and T2 are: • Node Y added to the dataset. • Edge from X to node 6 and node 7 is removed to reduce its value. • Edges from Y added to nodes {6, 7, 8, 9, X}. Hence node Y becomes the new node of attraction. Table2: second group dynamics Node of attraction Group members 6,7,8,9 9 X 6,7,8,9,X 6,7,8,9,X,Y Y Time T0 T1 T2 Figure 6 illustrates these changes where the blue edges represent the regular nodes which are added to the dataset and red edges show new Node of Attraction. Gnutella peer to peer network. This dataset contains 20,777 edges and random value is assigned to each edge (Figure 7), Figure 7: An example network dataset with 1000 edges [5] Our solutions contain the groups which start to form slowly with smaller groups with strong ties. Hence after each (100) iterations we extracted the solution and observed more groups being formed in the solution set. The GA-based system responds slowly especially in the beginning (takeoff time) because of the huge solution space, but after forming the initial groups, it could quickly reflect changes to the groups, and produce better and reliable results as the time passes. Figure 6: Cluster results with dynamic changes in the synthetic dataset 4.2 Experiments with real-world dataset The real-world dataset considered here is taken from Stanford Large Network Dataset Collection [5], it is called Figure 8: Clusters formed in 1000 edges network data after running GA for 1000 iterations The clustering results obtained after 1000 iteration of a GA run is visualized in Figure 8. It shows that some small groups and a big group are formed. If we keep running the program, the big group would have further divided into smaller groups. It was observed that the groups which are already formed are adaptable to any change in the input dataset. The differences between Figure 7 and Figure 8 are clearly visible; the original data representation in Figure 7 contains all nodes which are connected to each other in some manner (these figures are a presentation of clusters). The size of the groups varies based on the complexity of interactions. Again, to illustrate the dynamism, some nodes are added to the dataset (Blue); the nodes with high value and high connectivity (shown in red) are the new nodes of attraction (Red) which are shown in Figure 9 below. It shows that updated clusters are formed in the social network interactions. Figure 9: Changes on the dataset during running the system causes restructuring of groups or clusters. Because of multi-attribute clustering technique used, this work provides the power to observe the points of connections nodes, indicating the nodes that connect more than one group, and it’s considered as linkage nodes. 5. DATA AVAILABILITY In the first test case (Table 1 -Synthetic dataset), we assumed that the user has access to data that have multiple weights for each connection, like weight for messages exchange and weights for discussions, but in real-world we may not have such information. So for the second set of experiments (real-world dataset), we considered equal values for all connections (i.e. either there is a connection or no connection) since we have only edge-list in the datasets [5]. 6. CONCLUDING REMARKS An OSN community can be defined as a set of users who are frequently interacting with each other and participate in some discussions. Determining such communities in an OSN has a wide verity of applications, such as • Understanding the interactions among group of people • Visualizing and navigating huge networks of NoAs Forming a basis for other tasks such as data mining • • Marketing, handling law and order situations This approach allows us to form clusters based on interactions among group members in OSNs; we introduced the term NoA (Node of Attraction) which represents a node that attracts most of other nodes in the same group at a given time. The Node of Attraction in a social network, captures interaction dynamics “subsets of actors among whom there are relatively strong, direct, intense, frequent or positive ties”[1]. This NoA can help to predict the forming and merging of groups and subgroups. For example, if nodes from one sub group starts to interact with NoA of another sub group, there is a high probability that these sub groups may merge soon to form a larger group. Another benefit of NoA is that it helps to identify the source of a post/news and also may help in community detection in blogsphere. .Because of the huge size of the solution space, we chose to use a GA approach to solve this problem, the main idea is to cluster the whole network into groups and at the same time keep track of NoAs in dynamic interactions. The experimental run takes some time in producing reliable results but results seems to be persistent even with the dynamic changes. In case of a snapshot of the best individual (best so far) solution is desired from the population, the software is capable of producing such a result at any given time. 7. References: [1] Stanley Wasserman and Katherine Faust, Social Network Analysis, Methods and Applications (Book), November 25, 1994. [2] Santo Fortunato. Community detection in graphs, Complex Networks and Systems Lagrange Laboratory, ISI Foundation, Viale S. Severo 65, 10133, Torino, ITALY. [3] Pan Hui, Eiko Yoneki, Shu-Yan Chan, Jon Crowcroft. Distributed Community Detection in Delay Tolerant Networks, University of Cambridge, Computer Laboratory Cambridge CB3 0FD United Kingdom [4] Jorg Reichardt and Stefan Bornholdt. Statistical Mechanics of Community Detection, Institute for Theoretical Physics, University of Bremen, Otto-Hahn-Allee, D-28359 Bremen, Germany, February 3, 2008 [5] Collection Dataset Network Large Stanford http://snap.stanford.edu/data/ , Collaboration network of Arxiv General Relativity. [6] M. E. J. Newman, 'Modularity and community structure in networks', PNAS103 (23), pages 8577-8582, June 6, 2006. [7] Scott White and Padhraic Smyth, A spectral Clustering Approaches To Finding Communities in Graphs, in 'SDM', 2005. [8] KONY 2012: Invisible Children http://www.youtube.com/watch?v=Y4MnpzG5Sqc [9] Shihua Zhanga, Rui-Sheng Wangb, Xiang-Sun Zhang. Identification of overlapping community structure in complex networks using fuzzy c-means clustering. Physica A, 2007. [10] Lei Tang and Huan Liu. Graph Mining Applications to social network analysis. Book chapter C.C. Aggarwal and H. Wang (eds.), Managing and Mining Graph Data, Advances in Database Systems 40, Springer Science+Business Media, LLC 2010.
1908.02591
1
1908
2019-07-31T22:10:01
Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics
[ "cs.SI", "cs.CY", "cs.LG", "q-fin.GN" ]
Anti-money laundering (AML) regulations play a critical role in safeguarding financial systems, but bear high costs for institutions and drive financial exclusion for those on the socioeconomic and international margins. The advent of cryptocurrency has introduced an intriguing paradox: pseudonymity allows criminals to hide in plain sight, but open data gives more power to investigators and enables the crowdsourcing of forensic analysis. Meanwhile advances in learning algorithms show great promise for the AML toolkit. In this workshop tutorial, we motivate the opportunity to reconcile the cause of safety with that of financial inclusion. We contribute the Elliptic Data Set, a time series graph of over 200K Bitcoin transactions (nodes), 234K directed payment flows (edges), and 166 node features, including ones based on non-public data; to our knowledge, this is the largest labelled transaction data set publicly available in any cryptocurrency. We share results from a binary classification task predicting illicit transactions using variations of Logistic Regression (LR), Random Forest (RF), Multilayer Perceptrons (MLP), and Graph Convolutional Networks (GCN), with GCN being of special interest as an emergent new method for capturing relational information. The results show the superiority of Random Forest (RF), but also invite algorithmic work to combine the respective powers of RF and graph methods. Lastly, we consider visualization for analysis and explainability, which is difficult given the size and dynamism of real-world transaction graphs, and we offer a simple prototype capable of navigating the graph and observing model performance on illicit activity over time. With this tutorial and data set, we hope to a) invite feedback in support of our ongoing inquiry, and b) inspire others to work on this societally important challenge.
cs.SI
cs
Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics Mark Weber∗ Jie Chen Giacomo Domeniconi∗ MIT-IBM Watson AI Lab [email protected] Tom Robinson Elliptic [email protected] MIT-IBM Watson AI Lab [email protected] IBM Research [email protected] Daniel Karl I. Weidele IBM Research AI [email protected] Claudio Bellei Elliptic [email protected] 9 1 0 2 l u J 1 3 ] I S . s c [ 1 v 1 9 5 2 0 . 8 0 9 1 : v i X r a Charles E. Leiserson MIT CSAIL [email protected] ABSTRACT Anti-money laundering (AML) regulations play a critical role in safeguarding financial systems, but bear high costs for institutions and drive financial exclusion for those on the socioeconomic and international margins. The advent of cryptocurrency has intro- duced an intriguing paradox: pseudonymity allows criminals to hide in plain sight, but open data gives more power to investigators and enables the crowdsourcing of forensic analysis. Meanwhile advances in learning algorithms show great promise for the AML toolkit. In this workshop tutorial, we motivate the opportunity to reconcile the cause of safety with that of financial inclusion. We contribute the Elliptic Data Set, a time series graph of over 200K Bitcoin transactions (nodes), 234K directed payment flows (edges), and 166 node features, including ones based on non-public data; to our knowledge, this is the largest labelled transaction data set publicly available in any cryptocurrency. We share results from a binary classification task predicting illicit transactions using varia- tions of Logistic Regression (LR), Random Forest (RF), Multilayer Perceptrons (MLP), and Graph Convolutional Networks (GCN), with GCN being of special interest as an emergent new method for capturing relational information. The results show the superiority of Random Forest (RF), but also invite algorithmic work to combine the respective powers of RF and graph methods. Lastly, we consider visualization for analysis and explainability, which is difficult given the size and dynamism of real-world transaction graphs, and we offer a simple prototype capable of navigating the graph and ob- serving model performance on illicit activity over time. With this tutorial and data set, we hope to a) invite feedback in support of our ongoing inquiry, and b) inspire others to work on this societally important challenge. ∗Both authors contributed equally to this research. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA © 2019 Association for Computing Machinery. CCS CONCEPTS • Security and privacy → Database activity monitoring; • Com- puting methodologies → Machine learning; • Applied com- puting → Network forensics. KEYWORDS Graph Convolutional Networks, Anomaly Detection, Financial Forensics, Cryptocurrency, Anti-Money Laundering, Visualization ACM Reference Format: Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-Money Laun- dering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. In Proceedings of ACM Conference (KDD '19 Workshop on Anomaly Detection in Finance). ACM, New York, NY, USA, 7 pages. 1 TOWARD FINANCIAL INCLUSION "It's expensive to be poor." This is a common credo among advocates for financial inclusion. It speaks to the fact that those on the margins of society suffer from restricted access to the financial system and higher relative costs of participation. The problem of restricted access (e.g. the ability to sign up for a bank account) is, in part, an unintended consequence of increas- ingly stringent anti-money laundering (AML) regulations, which, while essential for safeguarding the financial system, have a dis- proportionately negative effect on low-income people, immigrants, and refugees [16]. Approximately 1.7 billion adults are unbanked [7]. The problem of higher relative costs is also, in part, a function of AML policy, which enforces high fixed costs of compliance on money service businesses (MSBs) along with the fear of criminal and monetary penalties for noncompliance -- "low value" customers just aren't worth the risk. Consider global remittances to low-and- middle-income countries, which reached a record high $529 billion in 2018, far outpacing the global aid contribution of $153 billion. The current average cost of sending $200 is an expensive 7 per- cent, with some countries suffering rates of over 10 percent. The United Nations Sustainable Development Goal number 10.7 targets a reduction to 3 percent by 2030.[12] And yet AML regulations cannot be summarily dismissed as over burdensome. Multi-billion dollar illicit industries like drug cartels, human trafficking, and terrorist organizations cause intense human KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA Weber and Domeniconi, et al. suffering around the world. The recent 1Malaysia Development Berhad (1MDB) money laundering scandal robbed the Malaysian people of over $11 billion in taxpayer funds earmarked for the na- tion's development [22], with mega-fines and criminal indictments for Goldman Sachs among others implicated in the wrongdoing. The even more recent Danske Bank money laundering scandal in Estonia, which served as a hub for an estimated $200 billion in illicit money flows from Russia and Azerbaijan, similarly extracted an incalculable toll on innocent citizens of these countries and served implicated institutions like Danske Bank and Deutsche Bank with billions of dollars in losses [23]. Money laundering is not a victimless crime, and current methods for the traditional financial system are doing a poor job of stopping it. Without reducing this complex challenge to data analysis alone, we pose the question: with the right tools and open data, can we help reconcile the need for safety with the cause of financial inclusion? 1.1 AML in a cryptocurrency world The advent of cryptocurrency introduced by Bitcoin [17] ignited an explosion of technological and entrepreneurial interest in payment processing. Around the world, money transfer startups spun up to compete with legacy banks and MSBs like Western Union. They focused on enabling low-cost, peer-to-peer transfers of cash within and across borders using Bitcoin and other cryptocurrencies as the "rails" (a commonly used term in this space). Many explicitly tar- geted remittances and championed the cause of financial inclusion. Alongside these entrepreneurs grew a community of academics and policy advocates supporting updated regulatory considerations for cryptocurrency. Dampening this excitement was Bitcoin's bad reputation. Many criminals used Bitcoin's pseudonymity to hide in plain sight, con- ducting ransomware attacks and operating dark marketplaces for the exchange of illegal goods and services. In May 2019, the Financial Crimes Enforcement Network (Fin- CEN) of the United States issued new guidance on how the Bank Secrecy Act (BSA) of 1970 applies to cryptocurrency, or what Fin- CEN calls convertible virtual currencies (CVC) [18]. Consistent with the BSA, the guidance calls for MSBs to generate individual- ized risk assessments measuring exposure to money laundering, terrorism finance, and other financial crime. These assessments are based on customer composition, geographies served, and financial products or services offered. The assessments must inform the man- agement of customer relationships, including the implementation of controls commensurate with risk; in other words, MSBs must not only report suspicious accounts, but must also take action against them (e.g. freeze them or shut them down). The guidance defines a "well-developed risk assessment" as "assisting MSBs in identifying and providing a comprehensive analysis of their individual risk profile." Reinforcing the Know Your Customer (KYC) requirements of the BSA, the guidance requires MSBs to "know enough about their customers to be able to determine the risk level they represent to the institution." What it means to "know enough" about one's customer is the subject of much debate in compliance and policy circles. In practice, one of the most challenging aspects of this is an implicit but effec- tively enforced requirement to not only know your customer, but to know your customer's customer. In the fragmented data ecosystem of traditional finance, this aspect of compliance is often executed by phone calls between MSBs. But in the open system of Bitcoin, the full graph transaction network data is publicly available, albeit in pseudonymous and unlabelled form. To meet the opportunity this public data presents, cryptocur- rency intelligence companies have emerged to provide AML solu- tions tailored to the cryptocurrency domain. Whereas the pseudonymity of Bitcoin is an advantage for criminals, the public availability of data is a key advantage for investigators. 2 THE ELLIPTIC DATA SET Elliptic is a cryptocurrency intelligence company focused on safe- guarding cryptocurrency ecosystems from criminal activity. For this tutorial and as a contribution to the research community, we present The Elliptic Data Set, a graph network of Bitcoin transac- tions with handcrafted features. As a contribution to the research and AML communities, Elliptic has agreed to share this data set pub- licly. To our knowledge, it constitutes the world's largest labelled transaction data set publicly available in any cryptocurrency. 2.1 Graph Construction The Elliptic Data Set maps Bitcoin transactions to real entities belonging to licit categories (exchanges, wallet providers, miners, licit services, etc.) versus illicit ones (scams, malware, terrorist organizations, ransomware, Ponzi schemes, etc.). From the raw Bitcoin data, a graph is constructed and labelled such that the nodes represent transactions and the edges represent the flow of Bitcoin currency (BTC) going from one transaction to the next one. A given transaction is deemed licit (versus illicit) if the entity initiating the transaction (i.e., the entity controlling the private keys associated with the input addresses of a specific transaction) belongs to a licit (illicit) category1. Importantly, all features are constructed using only publicly available information. 2.1.1 Nodes and Edges. There are 203,769 node transactions and 234,355 directed edge payments flows. For perspective, using the same graph representation the full Bitcoin network has approxi- mately 438M nodes and 1.1B edges as of this writing. In the Elliptic Data Set, two percent (4,545) are labelled class1 (illicit). Twenty-one percent (42,019) are labelled class2 (licit). The remaining transac- tions are not labelled with regard to licit versus illicit, but have other features. Features. Each node has associated 166 features. The first 94 2.1.2 features represent local information about the transaction -- includ- ing the time step, number of inputs/outputs, transaction fee, output volume and aggregated figures such as average BTC received (spent) by the inputs/outputs and average number of incoming (outgoing) transactions associated with the inputs/outputs. The remaining 72 features, called aggregated features, are obtained by aggregating transaction information one-hop backward/forward from the cen- ter node - giving the maximum, minimum, standard deviation and correlation coefficients of the neighbour transactions for the same information data (number of inputs/outputs, transaction fee, etc.). 1Note that for simplicity, this argument ignores mixer transactions where the inputs are controlled by multiple entities. Anti-Money Laundering in Bitcoin KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA Figure 1: (Top) Fraction of illicit vs. licit nodes at different time steps in the data set. (Bottom) Number of nodes vs. time step. 2.1.3 Temporal Information. A time stamp is associated with each node, representing an estimate of the time when the transaction is confirmed by the Bitcoin network. There are 49 distinct time steps, evenly spaced with an interval of about two weeks. Each time step contains a single connected component of transactions that appeared on the blockchain within less than three hours between each other; there are no edges connecting different time steps. Clearly the nodes in a specific time step have associated time stamps very close to each other, so effectively each one of them can be thought of as an instantaneous "snapshot" in time. The number of nodes for each time step is reasonably uniform over time (ranging from 1,000 to 8,000 nodes). See Figure 1. 2.2 Notes on Feature Construction The licit versus illicit labelling process is informed by a heuristics- based reasoning process. For example, a higher number of in- puts and the reuse of the same address is commonly associated with higher address-clustering [10], which results in a degrade of anonymity for the entity signing the transaction. On the other hand, consolidating funds controlled by multiple addresses in one single transaction provides benefits in terms of transaction costs (fee). It follows that entities eschewing anonymity-preserving measures for large volumes of user requests are likely to be licit (e.g. exchanges). In contrast, illicit activity may tend to favor transactions with a lower number of inputs to reduce the impact of de-anonymizing address-clustering techniques. Additionally, there are two major challenges in building features for Bitcoin transactions. The first is rooted in the size of the Bitcoin blockchain amounting to 200GB of compressed data and about 400 million addressed transactions. Though not all transactions are included in the subset used in this study, it is still necessary to access the complete blockchain in order to observe the full history of wallets participating in the selected transactions. To overcome this, Elliptic uses a high-performance all-in-memory graph engine for the computation of features. The second challenge arises from the underlying graph structure of the data and the heterogeneity in the number of neighbors a transaction can have. In building the 72 aggregated features, the problem of heterogeneous neighborhoods is addressed by naively constructing statistical aggregates (minimum, maximum, etc.) of the local features of a neighbor transaction. In general, this solution is sub-optimal because it carries a significant loss of information. We address this in our forthcoming discussion of graph deep learning methods, which may better account for the local graph topology. 3 TASK AND METHODS At a high level, AML analytics is an anomaly detection challenge of accurately classifying a small number of illicit transactions in mas- sive, ever-growing data sets. Industry standard high false positive rates of upwards of 90% inhibit this effort. We want to reduce false positive rates without increasing false negative rates, i.e. include more innocent people without allowing more criminals. Logistic Regression and Random Forest are among the benchmark methods for this task. Graph deep learning has also emerged as potential tool for AML [21]. In the case of the Elliptic Data Set, the task to be performed on this data is transaction screening for assessing the risk associ- ated with a given transaction to-and-from cryptocurrency wallets. Specifically, each unlabelled Bitcoin transaction is to be classified illicit or licit. KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA Weber and Domeniconi, et al. 3.1 Benchmark Methods Given the features previously described, benchmark machine learn- ing methods use the first 94 features in supervised learning for binary classification. Such techniques include Logistic Regression [1], Multilayer Perceptron (MLP) (ibid), and Random Forest [2]. In MLP, each input neuron takes in a data feature and the output is a softmax with a probability vector for each class. Logistic Regression and Random Forest are popular for AML, especially when used in concert with one another for their respective advantages -- Random Forest for accuracy and Logistic Regression for explainability. These methods, however, do not leverage any graph information. In the Elliptic Data Set, the local features are enhanced with a set of 72 features that contain information about the immediate neigh- bourhood. We will see the utilization of these features improves performance. While this approach shows the graph structure carries in the binary classification problem, and that this can be used with standard machine learning techniques, it is challenging to extend the purely feature-based method beyond the immediate neighbour- hood. This drawback motivates the use of Graph Convolutional Networks. 3.2 Graph Convolutional Networks (GCN) Deep learning on graph structured data is a subject of rapidly in- creasing interest [3, 6, 8, 9, 14]. Dealing with combinatorial com- plexity inherent to graph structures poses scalability challenges for practical applications, and significant strides have been made in addressing these challenges [5, 11, 24]. Specifically, we consider Graph Convolutional Networks (GCNs). A GCN consists of multiple layers of graph convolution, which is similar to a perceptron but additionally uses a neighborhood aggregation step motivated by spectral convolution. Consider the Bitcoin transaction graph from the Elliptic Data Set as G = (N , E), where N is the set of node transactions and E is the set of edges representing the flow of BTC. The l-th layer of the GCN takes the adjacency matrix A and the node embedding matrix H(l) as input, and uses a weight matrix W (l) to update the node embedding matrix to H(l +1) as output. Mathematically, we write (1) (l +1) = σ((cid:98)AH where(cid:98)A is a normalization of A defined as: 2 , (cid:101)A = A + I , (cid:101)D = diag (cid:98)A =(cid:101)D (cid:32) 2(cid:101)A(cid:101)D (cid:101)Aij (l)), (cid:33) (l) W − 1 − 1 H , j and σ is the activation function (typically ReLU) for all but the output layer. The initial embedding matrix comes from the node features; i.e., H(0) = X. Let there be L layers of graph convolutions. In the case of node classification, the output layer is the softmax, where H(L) consists of prediction probabilities. layer, except for the multiplication with(cid:98)A in the front. This matrix the other hand, one may also interpret the multiplication with(cid:98)A as is motivated by spectral graph filtering on the graph Laplacian matrix and it results from a linear functional of the Laplacian. On One sees a graph convolution layer is similar to a feed forward an aggregation of the transformed embeddings of the neighboring nodes. The parameters of the GCN are the weight matrices W (l), for different layers l. H (1)). (0)) · W A 2-layer GCN, as often used, can be neatly written as A "skip" variant, which we find practically useful, inserts a skip con- (2) = softmax((cid:98)A · ReLU((cid:98)AXW (cid:101)H (2) = softmax((cid:98)A · ReLU((cid:98)AXW nection between the intermediate embedding H(1) = ReLU((cid:98)AXW (0)) where(cid:101)W (1) is a weight matrix for the skip connection. We call this and the input node features X, resulting in the architecture (1)), architecture Skip-GCN. When W (0) and W (1) are zero, Skip-GCN is equivalent to Logistic Regression. Hence, Skip-GCN should be at least as powerful as Logistic Regression. (1) + X(cid:101)W (0)) · W 3.3 Temporal Modeling Financial data are inherently temporal as transactions are time stamped. It is reasonable to assume there exists certain dynamics, albeit hidden, that drive the evolution of the system. A prediction model will be more useful if it is designed in a manner to capture the dynamism. This way, a model trained on a given time period may better generalize to subsequent time steps. The better the model captures system dynamics, which are also evolving, the longer horizon it can forest into. A temporal model that extends GCN is EvolveGCN [19], which computes a separate GCN model for each time step. These GCNs are then connected through a recurrent neural network (RNN) to capture the system dynamics. Hence, the GCN model for a future time step is evolved from those in the past, where the evolution captures the dynamism. In EvolveGCN, the GCN weights are collectively treated as the system state. The model is updated upon an input to the system every time, by using an RNN (e.g., GRU). The input is the graph information at the current time step. The graph information may be instantiated in many ways; in EvolveGCN, it is represented by the embeddings of the top-k influential nodes in the graph. 4 EXPERIMENTS Here we show experimental results obtained on the Elliptic Data Set. We performed a 70:30 temporal split of training and test data, respectively. That is, the first 34 time steps are used for training the model and the last 15 for test. We use a temporal split because it reflects the nature of the task. As such, GCN is trained in an inductive setting. We first tested standard classification models for the licit/illicit prediction using three standard approaches: Logistic Regression (with default parameters from the scikit-learn Python package [4]), Random Forest (also from scikit-learn, with 50 estimators and 50 max features), and Multilayer Perceptron (implemented in PyTorch). Our MLP had one hidden layer of 50 neurons and was trained for 200 epochs by using the Adam optimizer and a learning rate of 0.001. We evaluated these models by using all the 166 features (referred to as AF), as well as only the local ones, i.e., the first 94 (referred to as LF). The results are summarized in the top part of Table 1. The bottom part of Table 1 reports the results achieved when we leveraged the graph structure of the data. We trained the GCN model for 1000 epochs using the Adam optimizer with a learning Anti-Money Laundering in Bitcoin KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA Figure 2: Illicit F1 results over test time span. Table 1: Illicit classification results. Top part of the table shows results without the leverage of the graph information, for each model are shown results with different input: AF refers to all features, LF refers to the local features, i.e. the first 94, and N E refers to the node embeddings computed by GCN. Bottom part of the table shows results with GCN. Method Logistic RegrAF Logistic RegrAF +N E Logistic RegrLF Logistic RegrLF +N E RandomForestAF RandomForestAF +N E RandomForestLF RandomForestLF +N E MLPAF MLPAF +N E MLPLF MLPLF +N E GCN Skip-GCN Illicit Precision Recall 0.593 0.528 0.668 0.571 0.670 0.675 0.611 0.668 0.617 0.617 0.662 0.5782 0.512 0.623 0.404 0.537 0.348 0.518 0.956 0.971 0.803 0.878 0.694 0.780 0.637 0.6819 0.812 0.812 MicroAVG F1 0.481 0.533 0.457 0.543 0.788 0.796 0.694 0.759 0.653 0.689 0.649 0.6258 0.628 0.705 F1 0.931 0.945 0.920 0.945 0.977 0.978 0.966 0.973 0.962 0.967 0.958 0.986 0.961 0.966 rate of 0.001. In our experiment we used a 2-layer GCN and, after hyper-parameter tuning, we set the size of the node embeddings to be 100. The task is a binary classification and the two classes are im- balanced (see Figure 1). For AML, more important is the minority class (i.e., the illicit class). Hence, we trained the GCN model using a weighted cross entropy loss to provide higher importance to the illicit samples. After hyperparameter tuning, we opted for a 0.3/0.7 ratio for the licit and illicit classes. Table 1 shows the testing results in term of precision, recall, and F1 score for the illicit class. For the sake of completeness, we also show the micro-averaged F1 score. Note that GCN and the variant Skip-GCN outperform Logistic Regression, indicating the usefulness of the graph-based method compared to one agnostic to graph information. On the other hand, in this case, the input features are quite informative already. Using these features alone, Random Forest achieves the best F1 score. The representation power of the input features is also reflected by the gain of Skip-GCN over GCN. Another insight from Table 1 is obtained from the comparison between methods trained on all the features (AF) and those on only the 94 local features (LF). For all the three evaluated mod- els, the aggregated information led to higher accuracy, indicating the importance of the graph structure in this context. With this observation, we further evaluated the methods with an enhanced input feature set. The goal of this experiment was to show that graph information was useful to enhance the representation of a transaction. In this setting, we concatenated the node embeddings obtained from GCN with the original features X. Results show that with the enhanced feature set the accuracy of the model improves, for both full features (AF + N E) and local features (LF + N E). Table 2 compares the prediction performance between the non- temporal GCN and the temporal EvolveGCN. EvolveGCN consis- tently outperforms GCN, although the improvement is not substan- tial for this data set. One avenue of further investigation is the use of alternative forms of system input to drive the recurrent update inside GRU. Table 2: GCN v.s. EvolveGCN GCN Precis. Recall 0.623 0.812 0.966 0.966 F1 0.705 0.966 EvolveGCN Precis. Recall 0.624 0.850 0.968 0.968 F1 0.720 0.968 Illicit MicroAVG The Dark Market Shutdown. An important consideration for AML is the robustness of a prediction model with respect to emerg- ing events. One interesting aspect of this data set is the sudden closure of a dark market occurring during the time span of the data (at time step 43). As seen in Figure 2, this event causes all methods to perform poorly after the shutdown. Even a Random Forest model re-trained after every test time step, assuming the availability of ground truth after each time, is not able to reliably capture new illicit transactions after the dark market shutdown. The robustness of methods to such events emerges as a major challenge to address. KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA Weber and Domeniconi, et al. 5 DISCUSSION We have seen Random Forest significantly outperforms Logistic Regression; in fact, it also outperforms GCN even though the latter is empowered by the graph structure information. Random Forest uses a voting mechanism to ensemble the prediction results from a number of decision trees, each trained by using a subsample of the data set. GCN, in contrast, like most deep learning models, uses Logistic Regression as the final output layer; hence, it can be considered a nontrivial generalization of Logistic Regression. The question arises: Is it possible to combine a Random Forest with a graph neural network? One simple idea is to augment the node features with the embeddings computed from GCN before running Random Forest. This idea helps only marginally according to prior experimentation. Another idea, as proposed by [13], is to parameterize every node in the decision tree(s) by using a feed- forward neural network. This idea organically combines Random Forest with neural networks, but it does not suggest how graph in- formation can be incorporated. One possible approach is to replace the Logistic Regression output layer in GCN by this differentiable version of the decision tree, so that end-to-end training is enabled. We leave the execution of this idea as future investigation. 6 GRAPH VISUALIZATION Lastly, in support of analysis and explainability, which are impor- tant for AML compliance, we have created a visualization prototype called Chronograph. Visualizing a high-dimensional graph imposes a layer of complexity on top of plain feature vectors with respect to explaining model performance. Chronograph aims to address this by supporting the human analyst with an integrated representation of the model. 6.1 Visual Investigation of the Elliptic Data Set In Chronograph, transactions are visualized as nodes of a graph with edges representing the flow of BTC from one transaction to the next. Node coordinates are computed simultaneously across all time steps using the projection technique UMAP [15]. This global computation makes layouts comparable across time. The time step slider control at the top of the interface allows the user to navigate through time by rendering only nodes in the selected time step. Illicit transactions are dyed red; licit ones are blue. Unclassified transactions are not colored. When clicking a transaction node, or entering a transaction ID in the control on the left (filters as substring) the visualization highlights the selected transaction(s) in orange, and all neighboring transactions (in-or-out-flowing) in green. On the left of the interface, the user can see general statistics on the graph and a table about transfer numbers between different transaction classes. In this simple prototype, Chronograph enables simple explo- ration scenarios to visually inspect clusters and their existence over time, observe conspicuous transfer patterns, or detect other deviations like single outliers. As a more involved use case we addi- tionally facilitate the degree of freedom of the input to the UMAP computation: raw transaction feature data (Figure 4a), as well as neuron activations of the last layer of the network (Figure 4b) seem to be two interesting alternatives; similar approaches have been proposed for general neural networks Rauber et al. [20]. Differences in the resulting visualizations would then hint towards peculiarities of the model, i.e. we postulate shifts in similarities among the data can be indicative to explain which underlying features matter to the model. Figure 4 shows the results from the two alternative inputs for a single time step, with raw feature data in the top and model activations in the bottom row. We further dye the nodes using actual labels in the left column, and GCN-predicted labels in the right column, and obtain a total of 4 network visualizations. In the model-based layout illicit nodes are less scattered but more concentrated, which seems to be a desirable property: illicit nodes should share some important characteristics, and similarity of nodes yields closer proximity in the layout. However, since they are not perfectly collapsing in one location it is quite plausible there are qualitative differences within the set of illicit nodes. The visualizations further reveals where exactly the model is unable to detect illicit nodes. In case of multiple erroneous predictions in a nearby area this could further hint to a systemic underperformance of the the model. Studying the characteristics of such transactions in detail could inspire the discussion from new angles and lead to further model improvements. a) Projection of raw transaction feature vectors b) Projection of last GCN layer activations Figure 3: Two alternative inputs to UMAP projection. Left: colored by input labels; right: colored by GCN prediction. 7 SUMMARY In summary, we have set forth cryptocurrency forensics, and specif- ically Bitcoin, as a unique ecosystem for crowdsourcing the develop- ment of new methods to fight criminal activity. We have contributed a large, labelled transaction data set to the AML community, the likes of which has never before been publicly available. We have Anti-Money Laundering in Bitcoin KDD '19 Workshop on Anomaly Detection in Finance, August 2019, Anchorage, AK, USA [10] Martin Harrigan and Christoph Fretter. 2016. The unreasonable effectiveness of address clustering. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Commu- nications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld). IEEE, 368 -- 373. [11] Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR. [12] Knomad and World Bank Group. 2019. Migration and Remittances: Recent Developments and Outlook. Migration and Development Brief 31. [13] Peter Kontschieder, Madalina Fiterau, Antonio Criminisi, and Samuel Rota Bulo. 2015. Deep Neural Decision Forests. In ICCV. [14] Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard Zemel. 2016. Gated Graph Sequence Neural Networks. In ICLR. [15] Leland McInnes, John Healy, and James Melville. 2018. Umap: Uniform man- ifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018). [16] Daniel J. Mitchell. 2012. World Bank Study Shows How Anti-Money Laundering Rules Hurt the Poor. Forbes. [17] Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). [18] Financial Crimes Enforcement Network. 2019. Application of FinCENâĂŹs Regulations to Certain Business Models Involving Convertible Virtual Currencies. FIN-2019-G001 (May 2019). [19] Aldo Pareja, Giacomo Domeniconi, Jie Chen, Tengfei Ma, Toyotaro Suzumura, Hi- roki Kanezashi, Tim Kaler, and Charles E. Leiserson. 2019. EvolveGCN: Evolving Graph Convolutional Networks for Dynamic Graphs. Preprint arXiv:1902.10191. [20] Paulo E Rauber, Samuel G Fadel, Alexandre X Falcao, and Alexandru C Telea. 2016. Visualizing the hidden activity of artificial neural networks. IEEE transactions on visualization and computer graphics 23, 1 (2016), 101 -- 110. [21] Mark Weber, Jie Chen, Toyotaro Suzumura, Aldo Pareja, Tengfei Ma, Hiroki Kanezashi, Tim Kaler, Charles E. Leiserson, and Tao B. Schardl. 2018. Scalable Graph Learning for Anti-Money Laundering: A First Look. CoRR abs/1812.00076 (2018). arXiv:1812.00076 http://arxiv.org/abs/1812.00076 [22] Wikipedia. [n. d.]. 1Malaysia Development Berhad scandal. [23] Wikipedia. [n. d.]. Danske Bank money laundering scandal. [24] Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L. Hamilton, and Jure Leskovec. 2018. Graph Convolutional Neural Networks for Web-Scale Recommender Systems. In KDD. Figure 4: Chronograph User Interface: User can navigate through time-sliced transaction data and observe transac- tion patterns and patterns of change. Illicit transactions are dyed red. Further statistics are displayed on the left. shared early experimental results using a variety of methods includ- ing Graph Convolutional Networks, and discussed possible next steps for algorithmic advances. We have provided a prototype for visualization of such data and models for augmenting human anal- ysis and explainability. Most important, we hope to have inspired others to work on this societally important challenge of making our financial systems safer and more inclusive. ACKNOWLEDGMENTS This work was funded by the MIT-IBM Watson AI Lab (mitibm.mit.edu), a joint research initiative between the Massachusetts Institute of Technology and IBM Research. Data and domain expertise were provided by Elliptic (www.elliptic.co). REFERENCES [1] Christopher Bishop. 2006. Pattern Recognition and Machine Learning. Springer- Verlag. [2] Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5 -- 32. [3] Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. 2014. Spectral Networks and Locally Connected Networks on Graphs. In ICLR. [4] Lars Buitinck, Gilles Louppe, Mathieu Blondel, Fabian Pedregosa, Andreas Mueller, Olivier Grisel, Vlad Niculae, Peter Prettenhofer, Alexandre Gramfort, Jaques Grobler, Robert Layton, Jake VanderPlas, Arnaud Joly, Brian Holt, and Gaël Varoquaux. 2013. API design for machine learning software: experiences from the scikit-learn project. In ECML PKDD Workshop: Languages for Data Mining and Machine Learning. 108 -- 122. [5] Jie Chen, Tengfei Ma, and Cao Xiao. 2018. FastGCN: Fast Learning with Graph Convolutional Networks via Importance Sampling. In ICLR. [6] Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. 2016. Convo- lutional Neural Networks on Graphs with Fast Localized Spectral Filtering. In NIPS. [7] Demirguc-Kunt, Leora Klapper, Dorothe Singer, Sinya Ansar, and Jake Hess. 2017. The Global Findex Database 2017: Measuring Financial Inclusion and the Fintech Revolution. [8] Justin Gilmer, Samuel S. Schoenholz, Patrick F. Riley, Oriol Vinyals, and George E. Dahl. 2017. Neural Message Passing for Quantum Chemistry. In ICML. [9] William L. Hamilton, Rex Ying, and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS.
1807.09561
1
1807
2018-07-25T12:56:25
Enhancing keyword correlation for event detection in social networks using SVD and k-means: Twitter case study
[ "cs.SI", "cs.CL", "cs.LG" ]
Extracting textual features from tweets is a challenging process due to the noisy nature of the content and the weak signal of most of the words used. In this paper, we propose using singular value decomposition (SVD) with clustering to enhance the signals of the textual features in the tweets to improve the correlation with events. The proposed technique applies SVD to the time series vector for each feature to factorize the matrix of feature/day counts, in order to ensure the independence of the feature vectors. Afterwards, the k-means clustering is applied to build a look-up table that maps members of each cluster to the cluster-centroid. The lookup table is used to map each feature in the original data to the centroid of its cluster, then we calculate the sum of the term frequency vectors of all features in each cluster to the term-frequency-vector of the cluster centroid. To test the technique we calculated the correlations of the cluster centroids with the golden standard record (GSR) vector before and after summing the vectors of the cluster members to the centroid-vector. The proposed method is applied to multiple correlation techniques including the Pearson, Spearman, distance correlation and Kendal Tao. The experiments have also considered the different word forms and lengths of the features including keywords, n-grams, skip-grams and bags-of-words. The correlation results are enhanced significantly as the highest correlation scores have increased from 0.3 to 0.6, and the average correlation scores have increased from 0.3 to 0.4.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) Enhancing Keyword Correlation for Event Detection in Social Networks using SVD and K-Means: Twitter Case Study Ahmad Hany Hossny · Terry Moschou · Grant Osborne · Lewis Mitchell · Nick Lothian · 8 1 0 2 l u J 5 2 ] I S . s c [ 1 v 1 6 5 9 0 . 7 0 8 1 : v i X r a Received: date / Accepted: date Abstract Extracting textual features from tweets is a challenging process due to the noisy nature of the content and the weak signal of most of the words used. In this paper, we propose using singular value decomposition (SVD) with clustering to enhance the signals of the textual features in the tweets to improve the correlation with events. The proposed technique applies SVD to the time series vector for each feature to factorize the matrix of feature/day counts, in order to ensure the independence of the feature vectors. Afterwards, the K-means clustering is applied to build a look-up table that maps members of each cluster to the cluster-centroid. The lookup table is used to map each feature in the original data to the centroid of its cluster, then we calculate the sum of the term frequency vectors of all features in each cluster to the term-frequency-vector of the cluster centroid. To test the technique we calculated the correlations of the cluster centroids with the golden standard record (GSR) vector before and after summing the vectors of the cluster members to the centroid-vector. The proposed method is applied to multiple correlation techniques including the Pearson, Spearman, distance correlation and Kendal Tao. The experiments have also considered the different word forms and lengths of the features including keywords, n-grams, skip-grams and bags-of-words. The correlation results are enhanced significantly as the highest correlation scores have increased from 0.3 to 0.6, and the average correlation scores have increased from 0.3 to 0.4. Keywords Social Network · Event Detection · Feature Extraction · Correlation · SVD 1 Introduction Social networks such as Twitter and Facebook are frequently used to organize protests, rallies, and revolu- tions. Social events such as protests can be organized through the follower-followee scheme or through the spontaneous propagation scheme [16, 28]. The follower-followee scheme has a leader that calls his followers to a specific protest at a specific place and time. This pattern is easy to detect by tracking the effective leaders, those with a large number of followers, assuming their identities are known in advance. On the other hand, the spontaneous propagation scheme is initiated by multiple standard users with limited followers and impact, who speak out for their cause. The initial messages are propagated through close friends and followers to spread the word at an exponentially growing rate [43, 2, 44]. Identifying these events requires tracking the growth in usage rate for one or more keywords that are sufficiently associated with protests and rallies. Using Twitter text as features is challenging for multiple reasons such as the limited length of each tweet, the informal nature of the tweets and the multilingual nature of Twitter [14, 33, 34]. Tackling twitter A. Hossny School of Mathematical Sciences, Univeristy of Adelaide, Australia E-mail: [email protected] T. Moschou, G. Osborne, N. Lothian Data to Decisions Cooperative Research Centre (D2D CRC), Adelaide, Australia E-mail: [email protected], [email protected], [email protected] L. Mitchell School of Mathematical Sciences, Univeristy of Adelaide, Australia D2D CRC Stream Lead E-mail: [email protected] Fig. 1 The count vector for each word of 'protest', 'rally', 'strike' and 'march' shows few spikes matching the days of the events (vertical dashed lines). The summed signal of the four words can match the event days with spikes more than any of the individual words, and also has fewer mismatching spikes than any of the individual words challenges can be performed via NLP preprocessing steps such as lemmatization, stemming, lexical analysis, morphological analysis, syntactic analysis and Parts-Of-Speech tagging[19]. These tasks can be performed using rule-based techniques or machine learning techniques such as Inductive logic programming or deep neural networks depending on the amount of data to be processed[20, 3]. The main challenges affecting text mining in twitter are listed below: -- The tweet length of 140 characters makes topic modelling and sentiment analysis very challenging for individual tweets. -- The frequent usage of acronyms, misspelled words and non-standard abbreviations make many words difficult to detect. -- Using Roman script to write non-English language distorts the feature signals due to similar words from other languages (e.g. the term "boss" means "look" in Arabic, while in English it means "manager") -- Semantic ambiguity: Many words have multiple meanings (e.g. "strike" may refer to a protest, a lightning strike or a football strike). -- Synonyms: Conversely, the same meaning can be expressed by multiple words (e.g. the terms "protest" and "rally" are used interchangeably). The correlation between the social events vector and the time series of the keyword frequency is affected by three factors. The first factor is the word-form, whether single words, n-grams, skip-grams or bags-of- words (BOWs) [13]. The second factor is the number of words used as a feature in the n-gram, skip-gram and the BOWs [29, 32]. The third factor is the correlation technique used, such as Pearson, Spearman, distance- correlation, or mutual information [12, 37]. The combination of word-forms, word-counts and correlation techniques selects different sets of words as the best features to identify civil unrest events. In this paper, we apply the proposed technique in experiments involving all of the mentioned word forms, word counts and correlation techniques. Correlation scores were improved for most of the experiments with different ratios. This research aims to improve the correlation between textual features and events by calculating the sum of the time series vectors of multiple features having similar meanings, to form a single feature that represents all of its constituent time series vectors. This representative feature is selected by clustering the features and finding the one with the minimum distance to all others, which is known as the cluster centroid. So, we transform the features using SVD and cluster the transformed features to build the lookup table mapping the features labels (e.g. Bags-of-Words) to the centroid feature label. Then we use the lookup table to know which vectors of time series raw counts (not-transformed) should be summed up. Adding the related features to the centroid feature improves the correlation score for the centroid feature significantly without affecting the correlation score of the other features within the cluster. Enhancing the correlation will give us more informative features with stronger signals that will allow us to perform live detection of ongoing events as soon as it occurs. In this paper, we use civil unrest 2 events in Melbourne as a case study for correlating keywords with social events, then use these keywords to detect protest immideatley as soon it occur, once the keywords of interest occur more than a specific threshold. Here, we consider the golden standard records as a count vector describing how many civil unrest events happened in a specific day within the time-frame, which manually curated from news article along the timeframe of the experiment. We also consider the features as the vectors describing the daily counts of each of keywords, n-grams, skip-grams or bags-of-words(BOWs) along the time-frame. In the proposed method, we aim to combine the vectors of related BOWs having similar meaning in the context of event (civil unrest) such as the BOWs of ("Melbourne" , "protest"), ("Melbourne","rally"), ("Melbourne","strike") and ("Melbourne","march"), as each of them has a relatively weak signal, which means a small magnitude for the daily counts within each vector . Then, Combine the signals of the four BOWs into one BOw gives a stronger signal that has the same meaning and higher matching scores with events, as indicated in Figure 1. The proposed technique is to use singular value decomposition (SVD) to factorize the feature/day matrix into a feature matrix, the daily event matrix and the singular matrix mapping the features to the events [15, 24, 27]. SVD is important to ensure that features' locations in the space are mapped to orthogonal dimensions, as K-means uses Euclidean distance and requires an orthogonal relation among the features. This orthogonality is not guaranteed in the original matrix, as the textual features are not guaranteed to be independent of each other and neither are the days. Once the SVD is applied, the resulting matrices are guaranteed to represent the features (BOWs) as orthogonal vectors in the features matrix and the days are represented as orthogonal vectors in the observation matrix. After decomposition, the feature matrix is clustered using k-means and the centroids of the clusters are used as the master feature for correlation with the event vector. In section 2 we describe the most recognized feature extraction techniques. Section 3 explains the proposed technique including the SVD and how it is applied to our problem. Section 4 will explain the experiments and the results. Section 5 will state our conclusion and directions for future work. 2 Feature Extraction Techniques Feature extraction is the process of preparing the features selected from data to be used for training the learning model. Feature extraction aims to reduce computational complexity, eliminate misleading features and strengthen weak signals. Computational complexity is reduced through dimensionality reduction. Mis- leading features can be eliminated through filtration according to the frequency range, the variance or the signal-to-noise-ratio. Weak signals are improved by combining multiple features into one via clustering. The feature extraction process can be performed in geometric space using PCA or SVD by transforming the feature vectors into orthogonal vectors that can be projected, eliminated or clustered as needed. Latent Semantic Indexing (LSI) is an example of feature reduction via projection [10], and K-SVD is an example of improving the signal via clustering [23]. Many techniques have been proposed for feature reduction includ- ing Principal Component Analysis (PCA), Singular-Value-Decomposition (SVD), Independent Component Analysis (ICA), Common-Spatial-Patterns (CSP), and Latent Dirichlet Allocation (LDA). We will describe these briefly in the following subsections. 2.1 Principal Component Analysis Principal Component Analysis (PCA) is the process of finding the best linear subspace, where the first component is a straight line with smallest orthogonal distance to all points. PCA ranks the features ac- cording to their variance in descending order, where the new components are orthogonal to each other. PCA is performed using eigenvalue decomposition of the covariance matrix for the feature/observation matrix. This process results in two matrices, the first is the set of eigenvectors and the other matrix is diagonal with eigenvalues λi in decreasing order along the diagonal [47, 1]. The goal of PCA is to ensure that each of the feature vectors (eigenvectors in the first matrix) is independent and orthogonal to the other features. This makes the process of projecting higher dimensions onto lower dimensions applicable. Meanwhile, sorting eigenvalues in the second matrix in a descending order simplifies the feature reduction process, as the smallest eigenvalues indicate the least significant features, which can be eliminated. PCA is also described as rotation, scaling, and projection of the original matrix to match the reduced matrix where all the vectors are orthogonal [39]. The applicability of PCA is limited by the assumption of linearity, as it simplifies the problem by limiting the basis and by formalizing the continuity assumption. This assumption limits PCA to representing the 3 data as a linear combination of its features [41]. PCA has been used frequently to enhance signals or to increase the signal to noise ratio in fields such as image processing [35], medical imaging (fMRI and XRAY) [40, 6], control theory [17], remote sensing [25] and neuro-computing [48, 42]. 2.2 Singular Value Decomposition Singular value decomposition is the process of factorizing the feature/document matrix into three matrices. The first matrix represents the features, the third matrix represents the documents and the matrix in between is a diagonal matrix that maps the features to the documents [11, 15]. The two matrices resulting from the SVD consist of orthonormal vectors, which makes distance measurement between vectors in the same matrix possible using Euclidean distance or cosine similarity. This concept is applied in Latent Semantic Indexing (LSI) that is used in recommender systems, and we apply the same concept to clustering as well. SVD is considered an extended version of PCA, as the feature matrix resulting from SVD is exactly the same eigenvector matrix that results from PCA, enabling SVD to be used for feature reduction similarly to PCA [45]. 2.3 Latent Semantic Indexing Latent Semantic Indexing (LSI) or Latent Semantic Analysis (LSA) is a method to analyze the relationships between documents and their word contents using a set of mapping concepts. LSA assumes that text follows the distributional hypothesis, where words with similar meanings will appear in similar contexts with similar distribution [26]. So, LSA formulates the term frequency per document as a matrix with rows representing words and columns representing documents. LSI uses SVD to decompose the term-frequency matrix into the orthonormal term matrix, the orthonormal document matrix and the concept-mapping matrix. LSA can be used to reduce the number of terms used as features in the first matrix [9], or to evaluate two documents' similarity by calculating the cosine similarity of any two vectors in the document matrix. 2.4 Indepenedent Component Analysis Independent Component Analysis (ICA) is a statistical technique that utilizes a mix of PCA and factor analysis to find the latent variables controlling a set of observations. This technique assumes the observations are linear mixtures of non-Gaussian and mutually independent latent variables [21], and finds statistically independent features regardless of their influence on the response variable [22]. ICA transforms the feature space linearly into a new feature space, where each of the new features is statistically independent of any other transformed features. This transformation makes the mutual information of any two vectors equal to zero and the mutual information of the two-feature matrix as high as possible [7]. 2.5 Common Spatial Pattern Common spatial pattern (CSP) is a feature extraction technique that learns spatial filters from the data by maximizing the variance of filtered signals in the first class and minimizing the variance of the other class [36, 4]. CSP is similar to ICA as it decomposes the multivariate signal into multiple additive sub-signals with maximum differences in variance between two classes [31]. CSP is usually used in binary classification, and it can be extended for multiple classifications by following the one-vs-rest scheme. CSP is sensitive to noise and can overfit easily with small sets of training data. The objective of CSP is to achieve the optimal classification for the signal using the band power features [8]. 2.6 Latent Dirichlet allocation Latent Dirichlet Allocation (LDA) is a generative probabilistic model that is used frequently in topic modelling. It represents the documents as a random mix of latent topics [5], with each topic identified by the distribution of the used words. LDA is formulated as a Bayesian model of three levels, where each document is modelled as a mix of underlying topics and each topic is also modelled as a mix of underlying probabilities of words [18]. LDA is used frequently for feature extraction, as [46] used it to reduce the 4 Fig. 2 The pipeline to extract the textual features, correlate them with events then use SVD and K-means to enhance the correlation by merging the related weak features. features for crime prediction using twitter. It has also been used for tracking user interests in Twitter by [38]. 3 The Proposed Technique: Decompose-Cluster-Map The proposed model extracts words, n-grams, skip-grams or bags-of-words of each tweet and uses them as features to determine whether an event will occur on a specific day. The features are counted on a daily basis into vectors representing the times series of the keyword volume. The feature-vectors are then correlated with the vector of daily events. The total number of words extracted as features exceeds 10 million per day, rendering most data processing techniques computationally infeasible. To solve this issue, the features are filtered to exclude those with very low correlations, which comprise the majority of the features processed. We retain only the 10,000 features with the highest correlations for further processing. The challenge in dealing with the remaining data is that individual features have relatively low correlation scores, which implies a low association between features and events. Enhancing the correlation between the textual features and the events requires finding new features with time-series highly associated with the event-time-series. To accomplish this, we propose grouping semantically similar features into a combined feature, and calculate the sum of the similar features' vectors into a single vector representing them all. Here we use the idea of matrix factorization that is used in LSI, but for the purpose of clustering rather than finding the most similar documents (or days in this case). We analyze the relation between events (i.e. protests) and the features used (words, BOWs, etc) on each day to produce a set of concepts relating the features used to the events of the day. We assume that words with similar meaning are more likely to occur in similar contexts (i.e. days) with similar variability according to the distributional hypothesis. So, we formulate the feature-count-per-day relation as a matrix, where features are represented as rows and days are represented as columns. Then, we use singular value decomposition (SVD) to decompose the matrix into a features matrix, a day matrix and a singular matrix mapping the two matrices to each other. After decomposition, instead of measuring the distance with the daily vectors to cope with LSI, we will cluster the feature matrix to create a look-up table mapping the features within each cluster to its centroid. The proposed technique consists of five steps to be applied after the initial selection of features. The first step is ensuring feature independence using singular value decomposition (SVD). SVD factorizes the feature/day matrix into a feature matrix (U ) and observation matrix (V ) and a singular matrix mapping the features to observations according to the equation 1 X = U ΣV T (1) where, -- m is the number of features and n is the number of days. 5 -- A is an m × n matrix representing the feature/day vectors. -- U is an m × m matrix representing the feature vectors. This matrix is unitary and orthogonal. -- Σ is a diagonal m n matrix of non-negative real numbers. -- V T is the transpose of the n × n unitary matrix (V ), representing the days. The values of the diagonal matrix Σ are the singular values of the original matrix A. These singular σi values are usually listed in a descending order. The singular values determine the strength of its related vector in U as a feature, as formulated in equation 2.  x1,1 . . . x1,n ... ... xm,1 . . . xm,n . . .  = u1  . . . um  σ1,1 . . . 0 ... ... 0 . . . σm,n . . .  (cid:2)  (cid:2) v1 ... vn (cid:3)  (cid:3) (2) Since U and V T are unitary, the columns of each of them form a set of orthogonal vectors, which can be considered as basis dimensions. The matrix Σ maps the basis dimensions of vi to the vector ui after being stretched using σi. Since U , U T , V are unitary matrices and their columns are orthogonal, we can measure the distance between any two features using Euclidean distance. This measures the similarity between any two words considering the context of the original matrix. The second step is to cluster the independent features using k-means in order to partition the orthog- onalized features into a set of clusters S = {S1, S2, S3, . . . , Sk}, with size k. The objective is to minimize the pairwise distance of points within the same cluster, by minimizing the sum of squares in each cluster. The objective function is formulated by equation 3: k(cid:88) (cid:88) i=1 u∈S arg min S k(cid:88) S i=1 u − µ2 = arg min SiV arSi (3) where S is the set of k clusters and µi is the mean of points in Si. The clusters are initialized using multiple random partitioning and the distance between any two points is calculated using the Euclidean distance. The Lloyd algorithm is used for k-means, consisting of the two steps for assignment and update as described below. Assignment step: To assign each data item to the cluster that has the closest mean value. i = { up : S(t) up − m(t) i 2 < up − m(t) j 2 ∀ j, 1 < j < k } (4) Update step: To find the new cluster centroid that achieves the minimum distance with all other data items within the cluster. m(t+1) i = 1 S(t) i (cid:88) uj∈S(t) i uj (5) Although the algorithm achieves relatively good clustering results, it does not guarantee to achieve the optimum solution, as it is an NP-Hard problem. The clusters resulting from the k-means are used to build a look-up table mapping the features in each cluster to the cluster centroid that represents the contents of the whole cluster. The third step is to apply this mapping to the original data, where all the signals of all the words in each cluster are summed to the cluster centroid using equation 6. ci = xj,1...n (6) (cid:88) xj∈Ci where i ∈ {1, . . . k} and Ci is the set of the original raw non-orthogonal vectors associated with the keywords that belong to the cluster Si resulting from k-means, and ci is the sum of all vectors in Ci. The last step is to recalculate the correlation scores after the aforementioned summation. This process increases the correlation scores for the cluster centroids, which promises better results for classification or prediction purposes. 6 4 Experiment and Results The experiments are designed to calculate the correlations between the term frequency vector of the features and the frequency vector of the civil unrest events within a specific time-frame. In our experiments, we will consider words of different forms and counts as our features and the count of the civil unrest events as our golden standard record (GSR). Afterwards, the proposed technique is applied by decomposing the feature/day matrix X to extract the feature matrix U . The feature matrix U is clustered using k-means to build the lookup table. The look-up table is used to merge the features within each cluster by adding the sum of the vectors of all features within a cluster to the vector of the centroid BOW of the cluster. The data used in this experiment consist of the tweets used as a predictor for the future events and the news used as a descriptor for the events already happened along the same timeframe. The tweets are collected from Twitter using the GNIP service where we bought all the tweets issued by any user within Australia for the studied time frame. These tweets are furtherly processed to extract the most informative features that can be used to classify the day as event/non-event days. The news articles reporting the events occurred are automatically collected using RSS feeds and manually labelled using a set of field experts from police and intelligence that identified the civil unrest events of interest. This news are used as our golden truth to compare our classification results with. The collected data can be described as follows: -- The time frame is 640 days of tweets that are mapped to 640 days of news articles reporting civil unrest events -- Each day has 3 million tweets on average in Melbourne, 3.5 million tweets in Sydney, 2 million tweets in Brisbane, 1 million tweets in Perth and 500 thousands tweets in Adelaide. -- Each tweet has 10 words on average, which forms 90 BOWs per tweet, which form 270 million BOWs per day in Melbourne -- Aggregating similar BOWs by summing the counts of similar bows will reduce the total number of BOWs to less than 50 -- Filtering out all Bows with small counts can eliminate more than 90% of the BOWs according to the filter threshold, in our experiment we eliminate any bow occurred for less than 5 times per day. -- The resulting total number of BOWs is to be used as features is around 10 million BOWs per day. -- The total number of BOWs used along the whole time frame is 6400 million BOW. The experiment has been performed on a time frame of 640 days within the geographical area of Melbourne. The location of the tweets is determined using (1) tweet location, (2) the longitude and latitude, (3) the time zone and (4) the profile location. The first step is preprocessing, where we clean and prepare the data and extract the BOWs for correlation. Data preparation is a multi-step process that includes data cleaning, NLP analysis, word counts and GSR preparation. Example 1 shows how the tweet is cleaned, prepared and vectorized to be used in correlation. These steps are explained as follows: 1. The data is cleaned by excluding all tweets in any language other than English and all tweets with any URLs; and removing non-Latin characters, hashtags, HTML tags, punctuation, and stopping words (using the NLTK list [30]) from the remainder. 2. Each tweet is split into a list of features with different lengths varying between one and three as follows: (a) Keywords: Each individual word within the tweet . (b) N-Grams: Any N contiguous words in the tweet. (c) Skip-Grams: Any N non-contiguous words within the same tweet in the same order (e.g. ["march", "melbourne"] is a different feature than ["melbourne","march"]). (d) Bags-of-Words: Any non-contiguous N words within the same tweet irrespective of order (e.g. 3. All words in each BOW are lemmatized using the NLTK lemmatizer in order to return each word to ["march", "melbourne"] is exactly the same feature as ["melbourne","march"]). its origin, to avoid grammatical effects on the word shape (e.g. "Went" → "Go"). return similar words to their dictionary origin (e.g. "Australian" → "Austral"). 4. After lemmatization, all words in each BOW are stemmed using the Lancaster stemmer in order to 5. Each BOW is counted in the tweets of Melbourne for each day to prepare the term frequency vectors. 6. Load the press events as GSR and count them per day for the whole time-frame. Example 1: Tweet: Highlight sign from #KeepSydneyOpen march:"My Friends Have Gone To Melbourne" Tweet after cleaning and stemming: highlight sign march friend go melbourn 7 Table 1 The correlation scores of the top correlated word before and after applying the proposed technique for each of the five correlation techniques. Pearson Spearman Kendal Tao before 0.302 0.314 0.284 0.308 0.308 0.310 0.327 after 0.751 0.714 0.648 0.645 0.632 0.669 0.515 before 0.215 0.241 0.214 0.241 0.224 0.260 0.274 after 0.425 0.464 0.381 0.650 0.580 0.621 0.720 before 0.205 0.231 0.205 0.231 0.214 0.244 0.261 after 0.376 0.425 0.346 0.542 0.541 0.525 0.683 UniGram Bi-gram Tri-gram Skip-gram-2 Skip-gram-3 BOW-2 BOW-3 after Distance correlation before 0.264 0.291 0.252 0.286 0.258 0.299 0.284 0.808 0.723 0.691 0.744 0.707 0.759 0.814 Mutual Info after 0.863 0.827 0.723 0.854 0.873 0.851 0.850 before 0.811 0.533 0.512 0.705 0.551 0.702 0.699 Table 2 The average correlation scores of the top 100 correlated words before and after applying the proposed technique for each of the five correlation techniques. Pearson Spearman Kendal Tao before 0.228 0.244 0.230 0.269 0.268 0.270 0.286 after 0.221 0.285 0.188 0.433 0.374 0.434 0.457 before 0.182 0.183 0.172 0.206 0.200 0.210 0.219 after 0.207 0.310 0.246 0.437 0.439 0.414 0.593 before 0.173 0.175 0.164 0.197 0.192 0.200 0.209 after 0.189 0.292 0.221 0.411 0.411 0.394 0.563 UniGram Bi-gram Tri-gram Skip-gram-2 Skip-gram-3 BOW-2 BOW-3 after Distance correlation before 0.1993 0.205 0.197 0.228 0.223 0.231 0.247 0.213 0.383 0.269 0.537 0.425 0.520 0.590 Mutual Info after 0.732 0.420 0.249 0.620 0.293 0.659 0.643 before 0.687 0.314 0.178 0.445 0.496 0.472 0.490 List of BOWs: [highlight, sign], [highlight, march], [highlight, all], ], [highlight, go], [highlight, melbourn],[sign, march], [sign, all], [highlight, friend [sign, friend], [sign, go], [sign, melbourn], [march, all], [march, friend], [march, go], [march, melbourn], ], [go, melbourn] [all, friend], [all, go], [all, melbourn], [friend, go], [friend, melbourn [x2,1,x2,2,x2,3,. . .,x2,640] [x3,1,x3,2,x3,3,. . .,x3,640] [highlight, sign]: [x1,1,x1,2,x1,3,. . .,x1,640] [highlight, march]: [highlight, all]: . . . [sign, march]: [x4,1,x4,2,x4,3,. . .,x4,640] [sign, all]: [x5,1,x5,2,x5,3,. . .,x5,640] [sign, friend]: [x6,1,x6,2,x6,3,. . .,x6,640] [sign, go]: [x7,1,x7,2,x7,3,. . .,x7,640] GSR (Event Count per day) : [e1,e2,e3,. . .,e640] The second step is to correlate the vectors of each word with the GSR vector and select the 10,000 words with highest correlation. The correlation process is described in equation 7, where v is the term frequency for a specific word in a specific feature, e is the number of civil unrest events that took place in a single day, and c are the correlation scores between each word's frequency row and the vector of the event count. The top 10,000 words are selected to reduce the computational complexity of the matrix decomposition in the next step.  x1,1 . . . x1,n ... ... xm,1 . . . xm,n . . .  ⊗ e1 ... en  =  c1 ... cn (7) where x is the feature count per day. Rows represent the features and columns represent the day. e is the number of civil unrest events that happened in each day, c is the correlation between each word and event vector, and ⊗ is the correlation method used in each experiment, such as the Pearson or Spearman correlation. After selecting the top correlated words from the correlation step, we will decompose the matrix of the selected words/days using SVD and use the feature representation matrix U from equation 1 for clustering in the next step. Although SVD is usually used for feature reduction we will use all the features in the clustering step to build a mapping table. Then we apply the k-means to find 1000 clusters, which gathers 8 each word with 10 other words. A smaller cluster makes the resulting signal weaker, while a larger cluster makes the signal noisy as it will include unrelated component signals that will corrupt each other. The clustering process set the target number of clusters (k) to 2000 in order to have 5 words per cluster on average, though the cluster size is not guaranteed in k-means. The centroids are seeded to the algorithm using random numbers for 50 runs. The maximum number of iterations per each run is set to 35 as most of the runs saturate before the 25th iteration. This technique increased the maximum correlation scores for the selected centroids of the 2000 clusters from an average of 0.3 to 0.65 for Pearson correlation, from 0.23 to 0.54 for Spearman correlation, from 0.22 to 0.49 for Kendal Tao correlation, from 0.27 to 0.74 for distance correlation and from 0.64 to 0.83 for mutual info. The maximum correlation scores for each combination of the correlation-method, word-form and word-count before and after applying the proposed method are stated in table 1. The average correlation scores for the same combinations before and after applying the method are stated in table 2. The same experiment is applied to five cities in Australia, and the correlations are enhanced with various margins, where Sydney achieved the highest marginal in the correlation scores and Adelaide achieved the least enhancement in the correlation scores, we also applied the same experiment using the Indonesian language in the city of Jakarta and the correlation scores are enhanced as well, even though we did not use any Indonesian lemmatizer or stemmer. The top correlated BOWs for the civil unrest are listed below, where the words are lemmatized and stemmed using Lancaster stemmer. Most of the top correlated BOWs are related to protests in Melbourne, or related to some political figure or some cause. But, some other BOWs are not related to civil unrest as they got accidental spurious correlation with the events days because of some statistical bias. For example, Most protesters prefer to act on Mondays, while some TV show is displayed each Monday, this will lead to spurious correlation and fake association. List of top 25 BOWS associated with the civil unrest events in Melbourne ['newsmelb', 'protest'], ['ral', 'tram'], ['park', 'permit'], ['middl', 'typ'], ['fuck', ' jfc'], ['connect', 'wom'], ['bib', 'kam'], ['caulfield', 'look'], ['ral', 'rout'], [' pettifl', 'son'], ['keynot', 'lik'], ['awkward', 'quest'], ['forget', 'land'], ['afl', 'strong'], ['limit', 'step'], ['hono', 'lif'], ['newsmelbourn', 'protest'], ['felt', 'weekend'], ['detail', 'seem'], ['joel', 'say'], ['afraid', 'ground'], ['nya', 'resel '], ['revolv', 'watch'], ['navbl', 'rwy'], ['energy', 'kil'] 5 Discussion The correlation scores for single words as features were too low and were not expressive. The single word data is noisy and misused frequently within the different contexts. Additionally, many words had relatively high correlations due to coincidence. The n-grams produced slightly higher correlations without effective significance. The n-gram vectors had a high number of zeros because of the low probability of the same word-sequence being repeated multiple times with the same pattern. The higher number of n-grams led to a lower probability of re-occurrence, higher frequency of zeros and lower counts per vector. The signal was too weak to use the n-gram as a feature. The skip-gram produced slightly higher correlations than keywords and n-grams. The main advantage is to maintain the context of the word by pairing it with its co-occurring words in the same context. The number of zeros was lower than that of the n-gram method and higher than the keyword method. The counts per day were slightly higher as well, which strengthened the signal without increasing noise. The best correlation scores are achieved for 2-word skip-grams due to the highest counts (resulting in the strongest signal). Increasing the number of words per skip-gram leads to a higher number of zeros and lower counts, which weakens the signal significantly. Bags-of-words are the best contentbased feature so far as they produce the highest correlation scores as well as the highest number of correlated BOWs. The bags-of-words have limited zeros and high counts, which imply a signal stronger than the other word forms. BOWs also consider the words' co-occurrences per tweet, which preserves the contextual meaning of each word. The size of the BOW affects the strength signal as well, where 2-words BOWs achieved higher correlation, stronger signal and lower noise. 3-word and 4-word bags of words are too limited in their data set to be used as predictors or to be correlated with the GSR events. The vector of counts for each BOW has too many zeros and small values. It is highly improbable to have the same exact four words in multiple tweets unless considering retweets and embedded tweets. This causes the daily counts of a 4-word BOW to be low enough that accidental 9 text and spurious data are significant factors. Filtering the data to avoid spurious BOWs leads to filtering most other BOWs as well, causing aggressive limitation of the number of potential predictors. Although it is recommended to use 5-word BOWs in topic modelling problems, it is not practical for Twitter due to the limited number of characters per tweet, as 140 characters make around 16 words after excluding URLs, hash-tags and mentions. 6 Conclusion In this paper, we proposed to enhance the correlation of textual features gathered from Twitter with civil unrest events by combining related features into one. This combination is implemented by finding the sum of the vectors of the related features element-wise. In order to identify which features are related to each other, we proposed to decompose the feature/event matrix using SVD then cluster the feature matrix using k-means. The importance of SVD is that it guarantees the features' locations in the space are mapped to orthogonal dimensions, which isn't always the case in the original matrix as neither the features nor the days are guaranteed to form orthogonal dimensions. As k-means uses Euclidean distance and cannot work without orthogonal dimensions, this is necessary. Each cluster will be represented using one feature that has the minimum distance to all other features within the same cluster. The cluster is used to build a look-up table mapping each feature to the centroid feature of its cluster. This look-up table will be used to determine which vectors to sum together using the raw (not-decomposed) vectors. The experiments and results showed that the proposed technique increased the correlation scores for the centroid of the clusters significantly, with an average increase in correlation score of 0.3. This technique has been tested for multiple correlation techniques including Pearson, Spearman, Kendal Tao, distance correlation and mutual information, and increased correlation scores for all five. The future work is to try a clustering technique that guarantees equally sized clusters, and to try to eliminate any unrelated keywords within the cluster that may have appeared because of the spurious nature of the data. This method can also be tested on other feature selection and data association techniques such as the maximal information coefficient, cosine similarity index and Jaccard similarity index. References 1. Abdi, H., Williams, L.J.: Principal component analysis. Wiley interdisciplinary reviews: computational statistics 2(4), 433 -- 459 (2010) 2. Anduiza, E., Cristancho, C., Sabucedo, J.M.: Mobilization through online social networks: the political protest of the indignados in spain. Information, Communication & Society 17(6), 750 -- 764 (2014) 3. Azzam, A., Tazi, N., Hossny, A.: A question routing technique using deep neural network for communities of question answering. In: International Conference on Database Systems for Advanced Applications, pp. 35 -- 49. Springer (2017) 4. Blankertz, B., Tomioka, R., Lemm, S., Kawanabe, M., Muller, K.R.: Optimizing spatial filters for robust eeg single-trial analysis. IEEE Signal processing magazine 25(1), 41 -- 56 (2008) 5. Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. Journal of machine Learning research 3(Jan), 993 -- 1022 (2003) 6. Chen, Z.P., Morris, J., Martin, E., Hammond, R.B., Lai, X., Ma, C., Purba, E., Roberts, K.J., Bytheway, R.: Enhancing the signal-to-noise ratio of x-ray diffraction profiles by smoothed principal component analysis. Analytical chemistry 77(20), 6563 -- 6570 (2005) 7. Comon, P.: Independent component analysis, a new concept? Signal processing 36(3), 287 -- 314 (1994) 8. Diggle, P.J.: Statistical analysis of spatial and spatio-temporal point patterns. CRC Press (2013) 9. Dumais, S.T.: Latent semantic analysis. Annual review of information science and technology 38(1), 188 -- 230 (2004) 10. Evangelopoulos, N.E.: Latent semantic analysis. Wiley Interdisciplinary Reviews: Cognitive Science 4(6), 683 -- 692 (2013) 11. Ewerbring, L., Luk, F.T.: Canonical correlations and generalized svd: Applications and new algorithms. Journal of Computational and Applied Mathematics 27(1), 37 -- 52 (1989). DOI http://dx.doi.org/10.1016/0377-0427(89)90360-9. URL http://www.sciencedirect.com/science/article/pii/0377042789903609. Special Issue on Parallel Algorithms for Numerical Linear Algebra 12. Eysenbach, G.: Can tweets predict citations? metrics of social impact based on twitter and correlation with traditional metrics of scientific impact. J Med Internet Res 13(4), e123 (2011). DOI 10.2196/jmir.2012. URL http://www.jmir. org/2011/4/e123/ 13. Fern´andez, J., Guti´errez, Y., G´omez, J.M., Martınez-Barco, P.: Gplsi: Supervised sentiment analysis in twitter using In: Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014), number skipgrams. SemEval, pp. 294 -- 299 (2014) 14. Fung, G.P.C., Yu, J.X., Yu, P.S., Lu, H.: Parameter free bursty events detection in text streams. In: Proceedings of the 31st International Conference on Very Large Data Bases, VLDB '05, pp. 181 -- 192. VLDB Endowment (2005). URL http://dl.acm.org/citation.cfm?id=1083592.1083616 15. Golub, G.H., Reinsch, C.: Singular value decomposition and least squares solutions. Numerische mathematik 14(5), 403 -- 420 (1970) 10 16. Gonzlez-Bailn, S., Wang, N.: Networked discontent: The anatomy of protest campaigns in social media. Social Net- works 44, 95 -- 104 (2016). DOI https://doi.org/10.1016/j.socnet.2015.07.003. URL http://www.sciencedirect.com/ science/article/pii/S0378873315000659 17. Hamadache, M., Lee, D.: Principal component analysis based signal-to-noise ratio improvement for inchoate faulty signals: Application to ball bearing fault detection. International Journal of Control, Automation and Systems 15(2), 506 -- 517 (2017) 18. Hoffman, M., Bach, F.R., Blei, D.M.: Online learning for latent dirichlet allocation. In: advances in neural information processing systems, pp. 856 -- 864 (2010) 19. Hossny, A., Shaalan, K., Fahmy, A.: Automatic morphological rule induction for arabic. In: Proceedings of the LREC08 workshop on HLT & NLP within the Arabic world: Arabic Language and local languages processing: Status Updates and Prospects, pp. 97 -- 101 (2008) 20. Hossny, A., Shaalan, K., Fahmy, A.: Machine translation model using inductive logic programming. In: Natural Language Processing and Knowledge Engineering, 2009. NLP-KE 2009. International Conference on, pp. 1 -- 8. IEEE (2009) 21. Hyvarinen, A., Karhunen, J., Oja, E.: Independent component analysis, vol. 46. John Wiley & Sons (2004) 22. Hyvarinen, A., Oja, E.: Independent component analysis: algorithms and applications. Neural networks 13(4), 411 -- 430 (2000) 23. Jiang, Z., Lin, Z., Davis, L.S.: Label consistent k-svd: Learning a discriminative dictionary for recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence 35(11), 2651 -- 2664 (2013) 24. Klema, V., Laub, A.: The singular value decomposition: Its computation and some applications. IEEE transactions on automatic control 25(2), 164 -- 176 (1980) 25. Koutsias, N., Mallinis, G., Karteris, M.: A forward/backward principal component analysis of landsat-7 etm+ data to enhance the spectral signal of burnt surfaces. ISPRS Journal of Photogrammetry and Remote Sensing 64(1), 37 -- 46 (2009) 26. Landauer, T.K.: Latent semantic analysis. Wiley Online Library (2006) 27. Lange, K.: Singular value decomposition. Numerical Analysis for Statisticians pp. 129 -- 142 (2010) 28. Lee, F.L., Chan, J.M.: Digital media use and participation leadership in social protests: The case of tiananmen com- memoration in hong kong. Telematics and Informatics 32(4), 879 -- 889 (2015). DOI https://doi.org/10.1016/j.tele. 2015.04.013. URL http://www.sciencedirect.com/science/article/pii/S0736585315000441 29. Li, C., Sun, A., Datta, A.: Twevent: segment-based event detection from tweets. In: Proceedings of the 21st ACM international conference on Information and knowledge management, pp. 155 -- 164. ACM (2012) 30. Loper, E., Bird, S.: Nltk: The natural language toolkit. In: Proceedings of the ACL-02 Workshop on Effective Tools and Methodologies for Teaching Natural Language Processing and Computational Linguistics - Volume 1, ETMTNLP '02, pp. 63 -- 70. Association for Computational Linguistics, Stroudsburg, PA, USA (2002). DOI 10.3115/1118108.1118117. URL http://dx.doi.org/10.3115/1118108.1118117 31. Lotte, F., Guan, C.: Regularizing common spatial patterns to improve bci designs: unified theory and new algorithms. IEEE Transactions on biomedical Engineering 58(2), 355 -- 362 (2011) 32. Martınez-C´amara, E., Guti´errez-V´azquez, Y., Fern´andez, J., Montejo-R´aez, A., Munoz-Guillena, R.: Ensemble classifier for twitter sentiment analysis (2015) 33. Mathioudakis, M., Koudas, N.: Twittermonitor: Trend detection over the twitter stream. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD '10, pp. 1155 -- 1158. ACM, New York, NY, USA (2010). DOI 10.1145/1807167.1807306. URL http://doi.acm.org/10.1145/1807167.1807306 34. Petrovi´c, S., Osborne, M., Lavrenko, V.: Streaming first story detection with application to twitter. In: Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, HLT '10, pp. 181 -- 189. Association for Computational Linguistics, Stroudsburg, PA, USA (2010). URL http://dl.acm.org/citation.cfm?id=1857999.1858020 35. Potapov, P., Longo, P., Okunishi, E.: Enhancement of noisy edx hrstem spectrum-images by combination of filtering and pca. Micron 96, 29 -- 37 (2017) 36. Ramoser, H., Muller-Gerking, J., Pfurtscheller, G.: Optimal spatial filtering of single trial eeg during imagined hand movement. IEEE transactions on rehabilitation engineering 8(4), 441 -- 446 (2000) 37. Riquelme, F., Gonzlez-Cantergiani, P.: Measuring user influence on twitter: A survey. Information Processing & Man- agement 52(5), 949 -- 975 (2016). DOI https://doi.org/10.1016/j.ipm.2016.04.003. URL http://www.sciencedirect. com/science/article/pii/S0306457316300589 38. Sasaki, K., Yoshikawa, T., Furuhashi, T.: Online topic model for twitter considering dynamics of user interests and topic trends. In: EMNLP, pp. 1977 -- 1985 (2014) 39. Shlens, J.: A tutorial on principal component analysis. arXiv preprint arXiv:1404.1100 (2014) 40. Soltysik, D.A., Thomasson, D., Rajan, S., Biassou, N.: Improving the use of principal component analysis to reduce physiological noise and motion artifacts to increase the sensitivity of task-based fmri. Journal of Neuroscience Methods 241, 18 -- 29 (2015). DOI https://doi.org/10.1016/j.jneumeth.2014.11.015. URL http://www.sciencedirect.com/ science/article/pii/S0165027014004130 41. Spiegelberg, J., Rusz, J.: Can we use {PCA} to detect small signals in noisy data? Ultramicroscopy 172, 40 -- 46 (2017). DOI https://doi.org/10.1016/j.ultramic.2016.10.008. URL http://www.sciencedirect.com/science/article/ pii/S0304399116302480 42. Sun, S., Zhang, C., Lu, Y.: The random electrode selection ensemble for eeg signal classification. Pattern recognition 41(5), 1663 -- 1675 (2008) 43. Tufekci, Z., Wilson, C.: Social media and the decision to participate in political protest: Observations from tahrir square. Journal of Communication 62(2), 363 -- 379 (2012) 44. Valenzuela, S.: Unpacking the use of social media for protest behavior: The roles of information, opinion expression, and activism. American Behavioral Scientist 57(7), 920 -- 942 (2013) 45. Wall, M.E., Rechtsteiner, A., Rocha, L.M.: Singular Value Decomposition and Principal Component Analysis, pp. 91 -- 109. Springer US, Boston, MA (2003) 11 46. Wang, X., Gerber, M.S., Brown, D.E.: Automatic crime prediction using events extracted from twitter posts. In: International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction, pp. 231 -- 238. Springer (2012) 47. Wold, S., Esbensen, K., Geladi, P.: Principal component analysis. Chemometrics and intelligent laboratory systems 2(1-3), 37 -- 52 (1987) 48. Yu, X., Chum, P., Sim, K.B.: Analysis the effect of pca for feature reduction in non-stationary eeg based motor imagery of bci system. Optik-International Journal for Light and Electron Optics 125(3), 1498 -- 1502 (2014) 12
1606.03386
1
1606
2016-06-10T16:28:52
A Generalized Bass Model for Product Growth in Networks
[ "cs.SI", "physics.soc-ph" ]
Many products and innovations become well-known and widely adopted through the social interactions of individuals in a population. The Bass diffusion model has been widely used to model the temporal evolution of adoption in such social systems. In the model, the likelihood of a new adoption is proportional to the number of previous adopters, implicitly assuming a global (or homogeneous) interaction among all individuals in the network. Such global interactions do not exist in many large social networks, however. Instead, individuals typically interact with a small part of the larger population. To quantify the growth rate (or equivalently the adoption timing) in networks with limited interactions, we study a stochastic adoption process where the likelihood that each individual adopts is proportional to the number of adopters among the small group of persons he/she interacts with (and not the entire population of adopters). When the underlying network of interactions is a random $k$-regular graph, we compute the sample path limit of the fraction of adopters. We show the limit coincides with the solution of a differential equation which can viewed as a generalization of the Bass diffusion model. When the degree $k$ is bounded, we show the adoption curve differs significantly from the one corresponds to the Bass diffusion model. In particular, the adoption grows more slowly than what the Bass model projects. In addition, the adoption curve is asymmetric, unlike that of the Bass diffusion model. Such asymmetry has important consequences for the estimation of market potential. Finally, we calculate the timing of early adoptions at finer scales, e.g., logarithmic in the population size.
cs.SI
cs
A Generalized Bass Model for Product Growth in Networks Vahideh H. Manshadi ∗ Sidhant Misra † July 9, 2018 Abstract Many products and innovations become well-known and widely adopted through the social interactions of individuals in a population. The Bass diffusion model has been widely used to model the temporal evolution of adoption in such social systems. In the model, the likelihood of a new adoption is proportional to the number of previous adopters, implicitly assuming a global (or homogeneous) interaction among all individuals in the network. Such global interactions do not exist in many large social networks, however. Instead, individuals typically interact with a small part of the larger population. To quantify the growth rate (or equivalently the adoption timing) in networks with limited interactions, we study a stochastic adoption process where the likelihood that each individual adopts is proportional to the number of adopters among the small group of persons he/she interacts with (and not the entire population of adopters). When the underlying network of interactions is a random k-regular graph, we compute the sample path limit of the fraction of adopters. We show the limit coincides with the solution of a differential equation which can viewed as a generalization of the Bass diffusion model. When the degree k is bounded, we show the adoption curve differs significantly from the one corresponds to the Bass diffusion model. In particular, the adoption grows more slowly than what the Bass model projects. In addition, the adoption curve is asymmetric, unlike that of the Bass diffusion model. Such asymmetry has important consequences for the estimation of market potential. Finally, we calculate the timing of early adoptions at finer scales, e.g., logarithmic in the population size. 1 Introduction The diffusion of innovations and products via social interactions has long been observed in various social systems Rogers (2003). In this process, a few pioneers adopt an innovation and influence those persons in contact with them. These people, in turn, adopt the innovation and influence their contacts, and the innovation spreads through the network as a result of these social interactions. The impact of social interactions on the spread of innovation has intensified with the rapid growth and popularity of online social interactions. Smartphone applications are a good example of a product whose popularity rests on the social interactions (and word-of-mouth communication) of the users. Understanding the growth rate of the diffusion of a product/innovation in a population is imperative for both marketing and managerial decisions, such as inventory management and pricing. Bass first studied the timing of product adoption using a simple differential equation later known as the Bass diffusion model Bass (1969). In this model, at any time, the growth rate is proportional ∗ † Yale School of Management, CT 06511. Email: [email protected]. Los Alamos National Laboratory, Los Alamos, NM 87545. Email: [email protected]. 1 to the fraction of the population who has adopted it so far. This implicitly relies on the assumption that the population is homogeneously mixing, and thus, a non-adopter can be influenced by all adopters. Such global interactions do not exist in many modern social networks, however. Although the size of an online social network may be massive, each person on that network is usually in contact with a small group of friends and he/she is influenced only by those persons. This raises the following question: How does product adoption evolve in networks with limited interactions? In this paper, we develop a machinery for characterizing product growth in a large population where the structure of the underlying network of interactions belongs to a large class of random graphs. When the underlying network of interactions is a k-regular random graph, we provide a generalization to the Bass model and contrast its adoption curve with the one corresponds to the Bass model. The Bass diffusion model is often presented in the following differential form: ∂s ∂t ∝ s (1 − s), where s(t) is the fraction of adopters at time t. 1We show that when the underlying network is a random k-regular graph, the adoption process grows at the following rate ∝(cid:104) ∂s ∂t (cid:105) 1 − (1 − s)1− 2 k (1 − s) (1) The above differential equation implies, fixing the fraction of non-adopters (1 − s), the growth rate depends sub-linearly on the fraction of adopters (as opposed to linearly in the Bass model). This difference stems from the limited interactions in the network. However, as the degree k grows, converges to s. Thus, the Bass diffusion model can be seen as a special the factor case of differential equation (1). (cid:104) 1 − (1 − s)1− 2 k (cid:105) Comparing the adoption curve resulted from these two differential equations, we show: (i) the adoption grows more slowly than what the Bass model projects, therefore, using the Bass model will over-estimate the adoption growth. (ii) unlike the adoption curve corresponding to the Bass model, the true adoption curve is asymmetric. In particular, the adoption spreads faster in the second half (i.e., after reaching half the population) than the first half (see Figure 1 and Figure 2). Such asymmetry can result in misestimating the future demand based on observations early in the adoption process. In order to establish the above result (and a few others), we study a natural stochastic adoption process which works as follows. Agents are nodes on a graph, and an edge between two nodes means these agents interact which each other. Initially, one random node adopts the product. Later, each node contacts a randomly selected neighbor at an independent Poisson process (with a given rate). If the contacting node is an adopter and the contacted neighbor is not, the latter adopts the product with a given probability. Like Bass (1969), we are mainly concerned with the timing of the adoption in the regime that a fraction of the population has already adopted. We denote this phase the major adoption regime, and we analyze the time it takes to increase the fraction of adopters by a constant (independent of the population size). This is in the same spirit as fluid limits in queueing theory; Whitt (2002); Chen and Yao (2001) 2. In particular, we show that the sample paths of the scaled adoption process (i.e., number of adopters divided by the population size) almost surely converges to a deterministic 1Note that this is a special case of the Bass model where the coefficient of innovation is zero. 2Note here we do not need to scale time, because the contact rate grows proportionally with the number of adopters. 2 function. First, as a sanity check, we find the limit for the complete network (which corresponds to the homogenously mixing population) and confirm the limit of our adoption process coincides with the Bass model (see Theorem 2.1 and Remark 2.2). Next, and far more importantly, we establish the limit for random k-regular graphs (where k is a constant independent of the population size) and show it equates with the solution of (1) (see Theorem 2.5 and Remark 2.6). We note that for similar stochastic diffusion processes, a differential equation approximation (particularly Kurtzs theorem Kurtz (1970)) has been used to re-derive the Bass model when the underlying graph is assumed to be complete (e.g., Massoulie and Draief (2010)). However, such an approach cannot be directly applied to other network structures. In fact, analyzing the scaled sample path of the diffusion process for general graphs is prohibitively difficult. Recent work has used concepts from mean field theory to approximate the growth rate for a certain class of random graphs Jackson and Rogers (2007); Shakkottai and Johari (2010); Dover et al. (2012). The basic idea of these models is to approximate the fraction of adopter neighbors of each agent by the fraction of adopters in the whole population. 3 However, our analysis shows that when the degree is bounded, an adopter is more likely to be connected to adopters. Therefore, the fraction of his adopter neighbors will be higher than the fraction of adopters in the population. Accordingly, the aforementioned method of approximation tends to over-estimate the growth rate in random regular graphs, even though it does improve upon the Bass model. In order to exactly characterize the growth rate, we develop a new technique to incorporate the effect of network structure in the evolution of the adoption process for random regular graphs. In Section 4, we describe how to generalize our analysis to compute the limits for random graphs with more general degree distributions (under certain conditions for the distribution). We also explain how to modify our analysis to accommodate a more general Bass model with innovators and an SIR epidemic model. 4 In addition to finding the limits in the major adoption regime, we find the limit of timing in the early adoption regime which refers to the phase when the number of adopters is logarithmic in the population size. In this regime, we show that the time needed to acquire a logarithmic number of adopters scales double logarithmically in the population size. We also show that compared to complete graphs, the adoption process grows more slowly in random k-regular graphs by a factor of k k−2 (see Theorem 2.8). Besides marketing decisions, several managerial questions arise in the presence of product dif- fusion (sometimes called social learning or word-of-mouth effects), for example, how to manage demand when the supply is constrained Ho et al. (2002); Kumar and Swaminathan (2003); Shen et al. (2011), how to price optimally Shen et al. (2014), 5 and how to facilitate diffusion for the adop- tion of green technologies Alizamir et al. (2014)Diaz-Rainey and Tzavara (2012). The Bass model has been extensively used to study these problems, but in situations where each agent can only influence a limited number of others, it tends to misestimate the adoption growth. Accordingly, our proposed technique for exactly characterizing the product growth can prove useful in developing more accurate managerial insights for product diffusion in networks with limited interactions. 3When dealing with random graphs with general degree distribution, some of these methods approximate the fraction of adopter neighbors with a given degree d by the fraction of adopters with degree d in the whole population. 4These terminologies are used in infectious diseases; S stands for susceptible, I for infectious and R for removed, i.e. immune or dead. 5For pricing in presence of externalities or word-of-mouth effect in social networks, see also Campbell (2013); Ajorlou et al. (2014); Ifrach et al. (2012); Candogan et al. (2012); Cohen and Harsha (2016). 3 1.1 Related Work The adoption model we study in this paper has counterparts in many other areas, ranging from epidemiology to economics. It is a stochastic version of the SI (Susceptible Infected) model used in epidemiology Kermack and McKendrick (1927); Durrett (2006). It is also closely linked to the gossip algorithms used in data aggregation and distributed computing in sensor and peer-to- peer networks Shah (2008); Mosk-Aoyama and Shah (2008), and to the learning models studied in social and economic networks Jackson (2008). Our work complements the earlier studies of epidemic processes by focusing on timing in the major adoption regime (i.e., when a fraction of the population has already adopted). Several papers have shown the growth of epidemics is related to the spectral radius and expansion properties of the underlying graphs Mosk-Aoyama and Shah (2008); Jackson (2008) (for more general epidemic models, see Draief et al. (2008); Ganesh et al. (2005); Banerjee et al. (2014)). It is well known that because random graphs have large expansion factors Kahale (1992); Gkantsidis et al. (2003), epidemics spread fast on them. However, the functional form of the growth has not previously been calculated, nor has the time needed to grow the fraction of nodes in epidemics from a constant α to another constant γ been analyzed. As mentioned above, several papers use approximation methods to develop tractable frameworks to analyze the adoption/epidemic process in networks with a given degree distribution. Jackson and Rogers (2007) use a mean field approach to study an SIS (Susceptible Infected Susceptible) model and relate stochastic dominance properties of the degree distribution to the infection rate. Shakkottai and Johari (2010) employ a mean field approximation to model the temporal evolution of demand for stored content on the Internet. Using this demand model, they examine the delay performance of several content distribution mechanisms. Even though such a mean field approx- imation method provides a tractable framework, our analysis show that it tends to over-estimate the demand growth by neglecting the phenomenon that an adopter is more likely to be connected to adopters and such correlation evolves over time. Several papers in the area of marketing are concerned with adoption processes and the flow of information in networks (see Dover et al. (2012) and references therein). Closest to our work are Dover et al. (2012) who study an adoption process similar to ours on a random graph with a given degree distribution. They use an approximation method similar to that of Shakkottai and Johari (2010) to show the adoption growth rate depends on the mean and variance of the degree distribution. They use this model to uncover the degree distribution based on the observed adoption data. Further, they show when the network degree is significantly skewed, the adoption curve is asymmetrical. This has important consequences for the estimation of market potential. Interestingly, our rigorous analysis also shows the adoption curve is asymmetric, even on random k-regular graphs. From a technical perspective, our work brings the literature on processes on random graphs together with that on stochastic differential equations and fluid limits. To analyze the adoption process on random graphs, we couple the (continuous) adoption process with the (discrete) graph generation process based on a configuration model Wormald (1999b). Abstracting from time, our adoption process spreads on random graphs in the same way as the exploration process defined in Molloy and Reed (1995). The latter process was introduced to find the size of the largest connected component in a random graph with given degree distributions. We use ideas similar to Wormald (1995) to approximate the evolution of the adoption process. When coupling with time, we build on these results Wormald (1995); Molloy and Reed (1995) for random graphs to compute the limit of timing of the adoption process. 4 2 Model and Main Results We represent the social network by graph Gn = (V, E), where V = n. Each node v ∈ V represents an agent in the system; nodes v and u are neighbors if (v, u) ∈ E. At time 0, a randomly selected node adopts a new product Z. The new product spreads through the local contacts between the neighbors. In particular, each node v ∈ V, contacts a randomly selected neighbor at an independent Poisson process with rate β. Suppose node v adopts Z at time t; at any contact after t, if node v contacts a neighbor u that has not yet adopted Z, u will adopt the product with probability p. Given the thinning property of the Poisson process, WLOG, we assume p = 1. graph is connected, after a finite time, all agents will adopt the new product. For any 1 ≤ x ≤ n, let Tn(x) denote the minimum time needed to have x adopted individuals. Our goal is to analyze limits of Tn(x) for different scales of x. In particular, we define two main regimes: an early adoption regime in which x = O(log n) and a major adoption regime where x = Θ(n). In this adoption process, the number of adopters can only increase over time. If the underlying We analyze the adoption process on two classes of graphs: complete graphs and random k-regular graphs where k is a constant. The former class represents a network with global (or homogeneous) interactions, and the latter serves as a model of limited interactions among individuals. In the next section, we focus on the major adoption regime and give almost sure results on how long it takes to grow the fraction of adopters from α to γ, where 0 < α ≤ γ < 1. 2.1 Timing in Major Adoption Regime In the major adoption regime, we assume a constant fraction of the population has already adopted the product, and we are concerned with the time needed to add Θ(n) more adopters. More precisely, for any 0 < α ≤ γ < 1, let ∆n(αn, γn) be Tn(γn) − Tn(αn). In this subsection, we compute the limit of ∆n(αn, γn). We start by analyzing the timing in major adoption when the underlying graph is a complete graph and show that: Theorem 2.1 (Major adoption in a complete graph). Suppose for all n > 1, the underlying graph Gn is the complete graph. Then, for any 0 < α ≤ γ < 1: ∆n(αn, γn) a.s.→ θ(γ) − θ(α), (2) where θ(s) = 1 β log s 1−s , for 0 < s < 1. First note that function θ(s) is centered such that θ(1/2) = 0. Also, note that function θ(s) is 1+eβt , logistic equation a.s.→ s(t), strictly increasing, and, thus, it is an injective function. Its inverse is s(t) = eβt that is a special case of the Bass model. Remark 2.2. Let Sn(t) be the number of adopters at time t. Theorem 2.1 implies that Sn(t) n where s(t) is the solution of the following differential equation: = βs(1 − s) ∂s ∂t 5 (3) Thus, the limit of the scaled sample paths of our probabilistic adoption process coincides with the deterministic logistic function. Further, note that function θ(s) has the following symmetry for any 0 < s < 1, θ(s) = −θ(1 − s). The time it takes to grow the fraction of the property: adopters from α to 1/2 is the same as the time it takes to grow the fraction from 1/2 to 1 − α where 0 < α < 1/2. This symmetry results from having a complete graph (a homogenously mixing population) and is intuitively explained as follows: at any time, the subgraph including the adopters is a complete graph, and so is the subgraph consisting of nodes who have not yet adopted. Now, we can look at the process in a backward way; if node u is a non-adopter, and it contacts node v who is an adopter, then node v will abandon product Z; the abandonment of the product will spread through the network in this way. Because the processes of adoption and discard spread in exactly the same way, the time needed to grow the set of non-adopters from 1− s to 1/2 will be the same as the time required to grow the set of adopters from s to 1/2. The limit result (3) can be proven directly by using stochastic differential equations and Kurtzs theorem (for instance, see Massoulie and Draief (2010), Section 1.3.1). Here, we present an alter- native proof that analyzes the random times between any two consecutive adoptions and directly establishes the time limit (2). i + 1. First note that ∆n(γn, αn) =(cid:80)γn−1 Proof. For any 1 ≤ i ≤ n − 1, let τi be the time it takes to grow the number of adoptions from i to τi. Further, note that conditioned on the set of adopted nodes, τi's are independent exponential random variables. Let λi be the rate of τi. For the complete graph, we compute the rate λi as follows: there are i adopter nodes who can contact non-adopters. When any adopter node v makes a contact, it contacts a neighbor who has not adopted yet with probability (n − i)/(n − 1). Thus, using the thinning property of the Poisson processes, we have: i=αn λi = βi(n − i) n − 1 . (4) First, to prove the theorem, we make the following claim: Claim 2.3. E(cid:2)∆n(γn, αn)(cid:3) → θ(γ) − θ(α). −δn, (5) The claim is proven in Appendix A. Next, we establish the concentration bounds shown in the second claim, given as: Claim 2.4. Suppose  is a fixed small positive number, where δ is a small positive number given in Equation (27). The second claim is proven in Appendix A as well. This implies that P(cid:0)∆n(γn, αn) − E(cid:2)∆n(γn, αn)(cid:3) ≥ (cid:1) ≤ e ∞(cid:88) P(cid:0)∆n(γn, αn) − E(cid:2)∆n(γn, αn)(cid:3) ≥ (cid:1) < ∞. Now, applying the Borel-Cantelli lemma, we have: ∆n(αn, γn) a.s.→ E(cid:2)∆n(αn, γn)(cid:3) which completes n=1 the proof. (cid:3) 6 Next, we analyze the adoption process on random k-regular graphs, where k is a constant. To ensure all nodes eventually adopt, we limit the sample space of the graphs to only include connected ones. Theorem 2.5 (Major adoption in random k-regular graphs). Suppose for all n > 1, the underlying graph Gn is sampled uniformly at random from the set of all connected k-regular graphs with n nodes, where k ≥ 3 is bounded. For any 0 < α ≤ γ < 1, the following limit holds: (cid:16) (cid:104) log 1 − (1 − s) 2 k where θ(s) = k β(k−2) ∆n(γn, αn) a.s.→ θ(γ) − θ(α), (cid:17)(cid:105) . 1 − 21− 2 k (cid:16) −1(cid:17) − log = β(cid:104) ∂s ∂t (6) a.s.→ s(t), Sn(t) n (7) Remark 2.6. Let Sn(t) be the number of adopters at time t. Theorem 2.5 implies where s(t) is the solution of the following differential equation: (1 − s) 1 − (1 − s)1− 2 (cid:105) k Figure 1 compares the solution of differential equations (3) and (7) for initial value s(0) = 0.01, and k = 5. As we can see, the adoption grows much more slowly on a random 5-regular graph than on a complete graph. The same can be observed in the left plot of Figure 2 which basically shows the inverse function. (Note: the left plot of Figure 2 shows the limit results of the time it takes to grow the fraction of adopters from 0.01 to s ∈ [0.01, 0.99] on the complete graph and the random 5-regular graph.) The high level intuition behind this observation is as follows: suppose we reach the time that i nodes have already adopted, where i = Θ(n); the rate of contact of adopters is βi regardless of the underlying graph. However, the probability that an adopter contacts a non- adopter is higher on a complete graph for two reasons. First, on a k-regular graph, the subgraph induced by the adopters is connected; therefore, each adopter has k − 1 neighbors who are likely to be non-adopters. Second, those k − 1 neighbors are not uniform samples among the remaining n − 2 nodes. In fact, we show it is more likely that the neighbor of an adopter belongs to the set of adopters itself. This is a result of the connectivity properties of the subgraph induced by the adopters. To further highlight the effect of connectivity among the adopters, let us compute the rate of τi on a random graph using a mean field approximation (in the same spirit of approximation as Jackson and Rogers (2007); Shakkottai and Johari (2010); Dover et al. (2012)). We denote this approximate rate as λM i . As explained above, the rate of contact by adopters is βi; each adopter has at least one adopter neighbor with probability 1. For adopter node v, let v be the neighbor (cid:48) who adopted before v and was the first adopter who contacted v. Clearly, if v contacts node v , this will not result in a new adoption. Now suppose node v selects a random neighbor other than ; this happens with probability (k − 1)/k. In a mean field approximation, we assume the rest of (cid:48) v the neighbors of v are uniformly sampled among the other n− 2 nodes. Thus, the probability node v will contact a non-adopter is n−i (cid:48) n−2 . This implies λM i = i(n − i) n − 2 . β(k − 1) k 7 (8) Figure 1: Evolution of the fraction of adopters (s(t)); comparing a complete and a 5-regular random graph. Time is normalized such that at time 0 the fraction of adopters is 0.01. The approximation rate of (8) has the same form as (4) and is only scaled by (k − 1)/k. The time limit resulting from this mean field approximation is plotted in Figure 2. As we can see, it significantly differs from the actual limit, and, in particular, it underestimates the adoption time. Further, on the right plot of Figure 2, we observe that unlike the complete graph, the normalized process for the random regular graph (such that θ(1/2) = 0) is not symmetric around 1/2, and the time it takes to grow the process from α < 1/2 to 1/2 is larger than the time it take to grow it from 1/2 to 1 − α. This is again related to the connectivity properties of random graphs. If we look at the backward process, we see the subgraph of non-adopters is not necessarily connected; thus, the backward process grows faster. Proof sketch of Theorem 2.5: Similar to the proof for the complete graph, we compute the rate of the exponential time between any two consecutive adoptions. Recall that we denote the time it takes to grow the number of adoptions from i to i + 1 as τi and its rate by λi. Unlike the complete graph, we cannot compute the rate λi only based on the number of adopters: suppose node v is an adopter, and it samples one of its k neighbors to contact. Knowing only i, we cannot determine how many of v's neighbors have not yet adopted. To overcome this problem, we first note that the random graph can be generated using an iterative pairing process called the configuration model Wormald (1999b). A configuration model works as follows: we start with n isolated nodes. Each node has k clones (or half edges). At each step, a new edge is formed by pairing two randomly chosen clones; the process ends after nk/2 steps, when all the clones are paired. Given this observation, we couple the graph generation and the adoption process in the following manner.: We assume the graph has not been realized before the adoption process. Thus, at time 0, we have n isolated nodes, each with k unpaired clones. Any time an adopter makes a contact, it chooses one of its clones uniformly at random. If the clone has already been paired, this means 8 Figure 2: Left: The time it takes to grow the fraction of adopters from 0.01 to s ∈ [0.01, 0.99] (functions θ(s)− θ(0.01), θ(s)− θ(0.01), and k/(k− 1) (θ(s) − θ(0.01)) for s ∈ [0.01, 0.99]). Right: The normalized timing functions in major adoption regime (functions θ(s) and θ(s) for s ∈ [0.01, 0.99]). both ends of this edge have already adopted. In this case, neither the adoption process nor the set of formed edges will grow. If the clone has not been paired, we perform a new iteration of the configuration model and form a new edge by sampling a clone at random among all unpaired ones. If the sampled clone belongs to a non-adopter node, then the adoption process grows by one; otherwise, the adoption set remains the same. Abstracting away from the time, we first analyze the evolution of the number of adopted nodes and their unpaired clones in terms of the number of iterations (which are discrete time random processes). For the analysis, we use the differential equation method proposed by Wormald (1999a, 1995) to approximate discrete random processes using a deterministic function. The same approach has been used to find the size of the giant connected components in random graphs by Molloy and Reed (1995, 1998). the result, we compute E(cid:2)∆n(γn, αn)(cid:3). At the end, similar to the proof of Theorem 2.1, we use Next, we compute the exponential times between any two consecutive iterations, and based on some concentration bound and the Borel-Cantelli lemma to establish almost sure convergence. The proof also deals with some technical subtleties; for example, it obtains a bound in a de- terministic approximation stronger than the bound established in Wormald (1999a, 1995). It also confirms the concentration results hold when we limit the sample space to simple and connected graphs (rather than all possible pairings of the clones.). The detailed proof of Theorem 2.5 is presented in Section 3. In Section 4, we explain how to generalize the above proof ideas to analyze the adoption process on a random graph with more general degree distributions. We also describe how to modify our analysis to more general Bass model with innovators and an SIR (Susceptible-Infected-Remove) epidemic model. Finally, note that for k = 2, the only connected regular graph is a cycle of length n. The 9 following proposition asserts the different time scalings of the major adoption regimes for such graphs: Proposition 2.7. For all n > 1, let the underlying graph be a cycle of length n. Then, for any 0 < α ≤ γ < 1, ∆n(γn, αn) n a.s.→ γ − α β . Proof. For any i ≥ 1, the set of adopters forms a path of length i. For any 1 < i < n, there are only two nodes at the two ends of the path that can contact non-adopters. Suppose node v is an end point, and it makes a contact. With probability 1/2, it contacts a non-adopter neighbor. Thus, λi = β for any 1 < i < n, implying that τi's are i.i.d. By the strong law of large numbers, the above limit holds. (cid:3) 2.2 Timing in Early Adoption Regime In a major adoption regime, the rate of contacts grows linearly with n; 6 therefore, the adoption process spreads very quickly. Further, as Theorem 2.1 and 2.5 assert, the time to grow from fraction α to fraction γ is constant. However, in the early adoption regime, the growth rate is much slower, as there are only a few adopters. In this section, we analyze the timing in this slower regime; more specifically, we find the limit of the time it takes to get Θ(log n) adopters. We establish the limit for both the complete graphs and the random k-regular graphs. For both graphs, we establish that the time needed to have Θ(log n) adopter scales as log log n. Further, we show the process grows faster on the complete graph (compared to the random k-regular graph). Theorem 2.8 (Early adoption). For any constant C > 0 the following hold: (a) If for all n > 1, graph Gn is a complete graph, then: Tn(C log n) log log n p→ 1 β . (9) (b) If for all n > 1, graph Gn is a uniformly random sample from the set of all connected k-regular graphs, where k ≥ 3 is bounded, then: Tn(C log n) log log n p→ k β(k − 2) . (10) The proof of part (a) follows the same line of the proof of Theorem 2.1; note that the rate given by (4) holds for any 1 ≤ i < n. Using this rate, we first show that β , and then Tn(C log n) log log n converges to its mean (in probability) by proving its variance converges to zero. The E[Tn(C log n)] log log n → 1 show details are given in Appendix B. 6Except for the special case of a single cycle. 10 Proof sketch of part (b) As in the previous proofs, we aim to compute λi, for 1 ≤ i ≤ C log n. First note that we can view the adoption process as the following: each edge (v, u) makes contacts at an independent Poisson rate β/k from v to u and similarly from u to v. Given i adopters, the total number of contacts (along edges) that can result in a new adoption is the total number of edges between the set of adopters and non-adopters. Observe that in our coupled process (defined in proof sketch of Theorem 2.5), at each iteration, the sub-graph of the adopters formed so far is connected; thus, the total number of edges that can result in a new adoption is, at most, (k−2)i+2. To compute the exact number of these edges, we use the locally tree-like property of random k-regular graphs Dembo and Montanari (2010) which confirms that, with high probability, on the final realized graph (i.e., after the formation of all edges), the subgraph containing these i nodes is a tree and does not contain a cycle. Thus, the remaining (k − 2)i + 2 edges are all between an adopter node and a non-adopter one. This implies that with high probability, λi ≈ β/k[(k − 2)i] for 1 ≤ i ≤ C log n. Once we have the rates, the rest of the proof handles the convergence of random variable Tn(C log n) to its mean. The detailed proof is given in Appendix B. The locally tree-like property of the random graph carries over to a subgraph of size o( thus, we can use similar techniques to prove the following: Remark 2.9. Similar limit results hold for Tn(σ(n)) log σ(n) for any σ(n) = o( √ n). √ n); 3 Proof of Theorem 2.5 In this section we formally prove Theorem 2.5. For the sake of brevity, the proof of all technical lemmas of this section is deferred to Appendix C. As explained in the proof sketch, we first study the (edge formation) iteration process and analyze the evolution of the number of adopters in terms of the iterations. Similar to Molloy and Reed (1995, 1998), we call this the exploration process. In this process every node is associated with k clones. For clone c of node v, all other clones belonging to node v are considered as c's siblings. We start at iteration j = 0. At any iteration j in the exploration process, there are three kinds of clones: 'sleeping' clones, 'active' clones, and 'dead' clones. At the beginning, all clones are sleeping. If all clones of a node are sleeping the node is said to be a sleeping node; if all its clones are dead, the node is considered dead; otherwise, it is considered active. Given this terminology, the exploration process works as follows. Exploration Process 1. Initialization: Pick a node uniformly at random from the set of all sleeping nodes and set the status of all its clones to active. 2. Repeat the following two steps as long as there are active clones: (a). Sample a clone c uniformly at random from the set of active clones and kill it. (cid:48) (b). Pair the clone c with clone c that is chosen uniformly at random from the set of all (cid:48) remaining unpaired (active or sleeping) clones. Kill c and make all its siblings active. The set of active clones at iteration j is denoted by A(j). The union of the set of sleeping and active clones is denoted by L(j); they are called 'living' clones. Finally, we denote the number of sleeping nodes by N(j). 11 3.1 Evolution of Exploration Process In a second paper, Molloy and Reed (1998) used results by Wormald (1995) to track the evolution of the exploration process. We employ a similar technique, but do not directly use Wormald's result. Instead, we use insights from the proof technique and tighten the probability of error needed to get almost sure convergence. When coupling with the adoption process, we introduce an additional variable which tracks the (random) re-scaled time in the adoption process. At every iteration of the exploration process, the number of living clones reduces by two; i.e., we have L(j + 1) = L(j)− 2. Hence we have L(j) = nk− 2j. At each iteration, the number of sleeping nodes, N(j), reduces by one, if in step 2(b) of the exploration process, the clone neighbor chosen (cid:48) (c ) is a sleeping one. Otherwise, N(j) remains the same. After initialization, all nodes are sleeping except the one we have awakened for the initiation (note that when coupling with the adoption process, this will be the first node to adopt the product). Therefore, at j = 0, we have A(0) = k. At every iteration, the evolution of the number of sleeping nodes and the number of active clones is as follows: 1. With probability kN(j) kn−2j , we have (cid:16) 1 − kN(j) kn−2j (cid:17) 2. With probability N(j + 1) = N(j) − 1 A(j + 1) = A(j) + (k − 2). , we have N(j + 1) = N(j) A(j + 1) = A(j) − 2. (11) (12) (13) (14) Note that the above equations (for the evolution of sleeping nodes and active clones) only hold when the graph is connected. Later, in Lemma 3.7, we show a random k-regular graph is connected with probability 1−Θ(n −2). We further show that our limit result holds when conditioning on being connected. For now, we assume the graph is connected and find the limits of the scaled random variables, N(j)/n and A(j)/n, evolving according to (11)-(14). At any iteration j in the exploration process, we have A(j) = L(j) − kN(j) = k[n − N(j)] − 2j. So it suffices to characterize the evolution of only one of these parameters, e.g., N(j). Let H(j) denote the history of the exploration process until iteration j. By the equations (11) - (14), we have E(cid:2)N(j + 1) − N(j)H(j)(cid:3) = − kN(j) kn − 2j = −kN(j)/n k − jt/n . (15) From the above, using Wormald's result (Theorem 1 in Wormald (1995)), it follows that for any 0 < j < (k − 0)n/2, with high probability N(j) = n f (j/n) + o(n), (16) uniformly over j, where 12 (cid:18) 1 − 2x k (cid:19) k 2 , f (x) = which is the unique solution to the differential equation (cid:48) (x) = − k f (x) k − 2x , f with initial condition f (0) = 1. Here 0 > 0 is a fixed constant. (17) (18) The result in Wormald (1995) is for a fairly general setting, but the bound given for the proba- bility of convergence is not strong enough for us to prove a.s. convergence. Thus, in the following lemma, we specialize the result of Wormald (Theorem 1 in Wormald (1995)) to our case so we can obtain a stronger bound on the probability of event (16). Lemma 3.1. Fix a constant 0 > 0. For any iteration 0 ≤ j < (k/2−0)n, with probability 1−o(n −3), N(j) − n f (j/n) ≤ δ1(n), uniformly over j, where the function f (x) is defined in (17) and δ1(n) = o(n). Next we find an approximation for A(j): define g(x) (cid:44) k(1 − f (x)) − 2x. The following corollary is an immediate corollary of Lemma 3.1. Corollary 3.2. With probability 1 − o(n −3), for any 0 < j < (k − 0)n/2, we have A(j) − ng(j/n) ≤ δ2(n), (19) uniformly over j, for some δ2(n) = o(n). We now find an approximation for the number of iterations needed to have αn active or dead nodes. Note that when coupled with the adoption process, these are the adopter nodes. Let δ(n) = max{δ1(n), δ2(n)} for δ1(n) and δ2(n), as defined in Lemma 3.1 and Corollary 3.2. Let A (cid:44) (A(j), 0 ≤ j ≤ (k − 0)n/2) be the vector of the random number of active clones and let a be a particular realization of this random vector. Also, let S (cid:44) {a : a(j) − ng(j/n) ≤ δ(n)}. In the next auxiliary lemma, we show the number of iterations needed to have αn active or dead nodes, denoted by Jα, is close to f −1(1 − α). Lemma 3.3. Let jα (cid:44) f −1(1 − α) and c = f (cid:17). If A ∈ S, for any α (cid:48)(cid:16) k−0 Jα − njα ≤ 2 c 2 δ(n). 3.2 Coupling Exploration and Adoption Processes We now couple the exploration and adoption processes. At any time, the set of active and dead nodes correspond to the set of adopters. At a random time, one of these nodes "times-out" and decides to use one of its outgoing edges (or one of its clones, say clone c) to contact a neighbor at the other end of this outgoing edge. Then, one of the following happens: 13 (cid:48) Case 1: Clone c has already been paired with clone c . (cid:48) (a) Clones c and c (cid:48) (b) The node to which clone c are dead clones. belongs has already adopted. (cid:48) Case 2: Clone c has not been paired yet. It chooses clone c uniformly at random among all living clones. (a) Clone c is an active clone. (cid:48) (b) If clone c (cid:48) is a sleeping clone, the node to which it belongs will adopt; if clone c is an active clone, the node to which it belongs has adopted before this contact. This implies only contacts made through active clones will ensure the exploration process pro- ceeds. Further, only these contacts may result in the growth of the adoption set. As mentioned, we can view the adoption process in the following way: each clone (or half edge) makes contact at an independent Poisson process at rate β/k. Therefore, at any iteration j, the time it takes to add β k A(j). We denote this one edge (go to iteration (j+1)) is an exponential random variable with rate random variable by τ(j). Using the notation defined in Section 2 and in the previous subsection, it follows that Jγ(cid:88) ∆n(αn, γn) = τ(j). Remark 3.4. Conditioned on {A = a}, the random variables τ(j) for 0 < j < (k − 0)n/2 are First, we compute E(cid:2)∆n(αn, γn)A = a ∈ S(cid:3) . By Lemma 3.3, for a ∈ S, we have ∆ ≤ ∆n(αn, γn) ≤ independent exponentially distributed random variables with mean k βA(j) . j=Jα ∆, where ∆ (cid:44) δ(n)(cid:88) c njγ− 2 njα+ 2 c δ(n) τ(j), and ∆ (cid:44) δ(n)(cid:88) njγ+ 2 c njα− 2 c δ(n) τ(j) Next, we compute E[∆A = a ∈ S] = δ(n)(cid:88) (cid:90) jγ δ(n) c njγ+ 2 c njα− 2 = k β 1 g(x) jα δ(n)(cid:88) njγ+ 2 c 1 k βA(t) ≥ k β njα− 2 ng(t/n) + δ(n) dx + o(1) = θ(γ) − θ(α) + o(1), δ(n) c where the inequality holds by Corollary 3.2. In a similar way, we can prove an upper bound for E[∆A = a ∈ S]. These bounds prove that E[∆A = a ∈ S] → θ(γ) − θ(α). (20) 14 Now, we are in a position to prove Theorem 2.5. Let E (cid:44) ∆ − E (cid:104) ∆ (cid:105) . Fix  > 0. We start with P(E ≥ ) ≤(cid:88) a∈S P(E ≥ A = a)P(A = a) + P(A (cid:60) S) −3). To bound the first term, we first notice that for any (21) By Corollary 3.2, the second term is o(n 0n ≤ j ≤ kn/2 − 0n and any p > 0, conditioned on a ∈ S, we have: −p, τ(j) ≥ kp log n (cid:12)(cid:12)(cid:12)(cid:12)A = a  ≤ n P βgn (22) 2n minx∈[0,k/2−0] g(x), and we use the following remark: where g (cid:44) 1 Remark 3.5. If A ∈ S, then A(j) ≥ n minx∈[0,k/2−0] g(x) + o(n) ≥ 1 (cid:26) 0n ≤ j ≤ (k/2 − 0)n and large enough n. τ(j) ≤ kp log n 2n minx∈[0,k/2−0] g(x), for all for all 0n ≤ j ≤ kn/2 − 0n and conditioned on a ∈ S. Let B be the event that (cid:27) βgn By (22) and the union bound, we have P (B) ≥ 1 − n1−p, or equivalently, P to bounding the first term of (21), for any a ∈ S it follows that (cid:16) (cid:17) ≤ n1−p. Going back B P(E ≥ A = a) ≤ P(E ≥ A = a, B) + n1−p. Applying the Hoeffding bounding to the first term, we get P(E ≥ A = a) ≤ 2 exp − 2n log n  + O(n1−p). Using (20), for a large enough n, we have: P(∆ − [ θ(γ) − θ(α)] ≥ 2A = a) ≤ 2 exp 2β2g2 k2p2 − 2n log n  + O(n1−p). 2β2g2 k2p2 We can prove a similar bound for ∆ − [ θ(γ) − θ(α)]. Since ∆ ≤ ∆n(αn, γn) ≤ ∆, the same bound holds for ∆n(αn, γn) − [ θ(γ) − θ(α)]. Let p = 4. So far we have proved that P(∆n(αn, γn) − [ θ(γ) − θ(α)] ≥ 2) = O(n −3). (23) The last step of the proof is to show that when conditioning on the event that the graph obtained as a result of matching random clones is a simple and connected graph, the same order of error −3)) holds. Let G denote the graph eventually obtained after nk/2 iterations. probability (i.e., O(n Conditioned on being connected and simple, G is a k-regular graph sampled uniformly among all connected simple k-regular graphs. It follows from inequality (23) that (cid:16)(cid:110)∆n(αn, γn) − [ θ(γ) − θ(α)] ≥ 2(cid:111) ∩ {{G is connected} ∩ {G is simple}}(cid:17) P To prove that conditioned on {{G is connected} ∩ {G is simple}}, the error probability is O(n −3), it suffices to show P({Gis connected}∩{G is simple}) = O(1). This follows from the next two lemmas. = O(n −3). (24) 15 Lemma 3.6. P(G is simple) = Θ(1). The above lemma is a well-known result (see for example Wormald (1999b), Bender and Canfield (1978)). It allows us to carry over properties which hold with high probability from the configuration model to the subset of simple random graphs. The next lemma shows a uniform sample among simple graphs is connected with probability 1 − O(n Lemma 3.7. P({G is not connected} ∩ {G is simple}) = O(n −2): −2). Putting (24) and Lemmas 3.6 and 3.7 together implies that for any graph Gn sampled uniformly at random from the set of all connected k-regular graphs with n nodes and a large enough n, (cid:16)∆n(αn, γn) − [ θ(γ) − θ(α)] ≥ 2(cid:17) = O(n −3) < n −2. (25) −2 < ∞, the theorem (the limit (6)) follows by applying the Since  is arbitrary, and (cid:80)∞ P n=1 n Borrel-Cantelli lemma. 4 Discussions The techniques developed here to analyze the adoption process for random k-regular graphs can be generalized to the following settings. Random graphs with given degree distributions: We can analyze the adoption process defined in Section 2 for a more general class of random graphs with a given degree distribution. For these random graphs, we couple the adoption process and the configuration model. We first analyze the exploration process. Let D be the set of all degrees with a nonzero probability in the degree distribution. Let Nd(j) and Ad(j) to be the number of sleeping nodes of degree d and the number of active clones belonging to a node of degree d. We can write equations similar to (11)-(14) for the evolution of the vectors(cid:0)Nd(j), d ∈ D(cid:1) and(cid:0)Ad(j), d ∈ D(cid:1). Again, we prove an approximation for 1/n(cid:0)Nd(j), d ∈ D(cid:1) using Wormald's result Wormald (1995). We connect the exploration process to the adoption process in the same way as in Subsection 3.2. For comparative purposes, see Figure 3. The figure shows simulation results comparing the process on three different random graphs with mean degree 5. The theoretical curve derived in this paper is included for reference and matches very well with the simulation results. Interestingly, when there is more heterogeneity in the degree distribution in the network, the process proceeds more or less at the same rate in the beginning, but slows down towards the end for those with higher disparity. Arguably, towards the end of the process, most of the higher degree nodes have already adopted, and the rate of spread is limited by the remaining lower degree nodes. Adoption process with innovators: We extend our analysis to include "innovators", the agents who adopt without being contacted by an adopter. In particular, suppose each non-adopter adopts at an independent Poisson process with rate β(cid:48) . To include an innovator in the set of adopters, we modify our analysis in the following way. In the exploration process, at iteration j, with probability β(cid:48)N(j)+βA(j)/k , a sleeping node wakes up and all of its k clones become active. Note this is the probability of a non-adopter becoming an innovator before one of the adopters makes a contact through one of its active half-edges. If this event does not occur (with probability β(cid:48)N(j)+βA(j)/k ), steps (a) and (b) are performed as described. All of the analysis for the evolution 1− N(j) N(j) β(cid:48) β(cid:48) 16 Figure 3: Simulated evolution of the fraction of adopters for 5-regular, 4-6 and 3-7 random graphs. Time is normalized such that at time 0 the fraction of adopters is 0.01 for all graphs. of the exploration process and the coupling exploration and adoption process can be modified accordingly. SIR model on random graphs: As mentioned in the introduction, the adoption process studied here is a special case of adoption processes used to describe the transmission of commu- nicable diseases by individuals or the spread of computer viruses in a network, known as the SI (Susceptible-Infected) model. We can use the same ideas to analyze a more general model called SIR that works as follows. The process of infection is the same as that shown in the SI model. Each infected node is removed (they can be interpreted as either dead or immune) at a certain rate. A removed node cannot infect its neighbors. Suppose each infected node is removed at a independent Poisson process with rate β(cid:48) < β. To extend our framework to this model, in the exploration model, we need to keep track of the nodes that are awake (or, equivalently, are infected) but have been removed as well. References Ajorlou, A., A. Jadbabaie, and A. Kakhbod (2014). Dynamic pricing in social networks: The word of mouth effect. Working paper . Alizamir, S., F. de V´ericourt, and P. Sun (2014). Efficient feed-in-tariff policies for renewable energy technologies. Working paper . Banerjee, S., A. Gopalan, A. K. Das, and S. Shakkottai (2014). Epidemic spreading with external agents. IEEE Trans. Information Theory 60 (7), 4125–4138. Bass, F. M. (1969, January). A new product growth for model consumer durables. Management Science 15 (5), 215–227. 17 Bender, E. A. and E. R. Canfield (1978). The asymptotic number of labeled graphs with given degree sequences. Journal of Combinatorial Theory, Series A 24 (3), 296 – 307. Campbell, A. (2013). Word of mouth and percolation in social networks. American Economic Review 103 (6), 2466–2498. Candogan, O., K. Bimpikis, and A. Ozdaglar (2012). Optimal pricing in networks with externalities. Operations Research 60 (4), 883–905. Chen, H. and D. D. Yao (2001). Fundamentals of queueing networks : performance, asymptotics, and optimization. Applications of mathematics. New York: Springer. Cohen, M. C. and P. Harsha (2016). Designing price incentives in a network with social interactions. Working paper . Dembo, A. and A. Montanari (2010). Ising models on locally tree-like graphs. Annals of Applied Probability 20 (2), 565–592. Diaz-Rainey, I. and D. Tzavara (2012). Financing the decarbonized energy system through green electricity tariffs: A diffusion model of an induced consumer environmental market. Technological Forecasting & Social Change, 1693–1704. Dover, Y., J. Goldenberg, and D. Shapira (2012). Network traces on penetration: Uncovering degree distribution from adoption data. Marketing Science 31 (4), 689–712. Draief, M., A. Ganeshand, and L. Massouli (2008, 04). Thresholds for virus spread on networks. Ann. Appl. Probab. 18 (2), 359–378. Durrett, R. (2006). Random Graph Dynamics (Cambridge Series in Statistical and Probabilistic Mathematics). New York, NY, USA: Cambridge University Press. Ganesh, A., L. Massouli, and D. Towsley (2005). The effect of network topology on the spread of epidemics. In IEEE INFOCOM, pp. 1455–1466. Gkantsidis, C., M. Mihail, and A. Saberi (2003). Throughput and congestion in power-law graphs. In SIGMETRICS, pp. 148–159. Ho, T., S. Savin, and C. Terwiesch (2002). Managing demand and sales dynamics in new product diffusion under supply constraint. Management Science 48 (2), 187–206. Ifrach, B., C. Maglaras, and M. Scarsini (2012). Monopoly pricing in the presence of social learning. Working paper . Jackson, M. O. (2008). Social and Economic Networks. Princeton, NJ, USA: Princeton University Press. Jackson, M. O. and B. W. Rogers (2007). Relating network structure to diffusion properties through stochastic dominance. B. E. Journal of Theoretical Economics: Advances in Theoretical Economics 7 (1), 1–13. Kahale, N. (1992). On the second eigenvalue and linear expansion of regular graphs. In FOCS, pp. 296–303. IEEE Computer Society. 18 Kermack, W. O. and A. G. McKendrick (1927). A Contribution to the Mathematical Theory of Epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character 115 (772), 700–721. Kumar, S. and J. M. Swaminathan (2003). Diffusion of innovations under supply constraints. Operations Research 51 (6), 866–879. Kurtz, T. (1970). Solutions of ordinary differential equations as limits of pure markov jump pro- cesses. J. Appl. Probab. 7, 49–58. Massoulie, L. and M. Draief (2010). Networks and epidemics. Molloy, M. and B. Reed (1995). A critical point for random graphs with a given degree sequence. Random Structures and Algorithms 6, 161–180. Molloy, M. and B. Reed (1998). The size of the largest component of a random graph on a fixed degree sequence. Combinatorics, Probability and Computing 7, 295–306. Mosk-Aoyama, D. and D. Shah (2008). Fast distributed algorithms for computing separable func- tions. IEEE Trans. Inform. Theory, 2997–3007. Rogers, E. M. (2003, August). Diffusion of Innovations, 5th Edition (5th ed.). Free Press. Shah, D. (2008). Gossip algorithms. Foundations and Trends in Networking 3 (1), 1–125. Shakkottai, S. and R. Johari (2010, April). Demand-aware content distribution on the internet. IEEE/ACM Trans. Netw. 18 (2), 476–489. Shen, W., I. Duenyas, and R. Kapuscinski (2011). New product diffusion decisions under supply constraints. Management Science 57 (10), 1802–1810. Shen, W., I. Duenyas, and R. Kapuscinski (2014). Optimal pricing, production, and inventory for new product diffusion under supply constraints. Manufacturing & Service Operations Manage- ment, 28–45. Whitt, W. (2002). Stochastic-Process Limits : An Introduction to Stochastic-Process Limits and Their Application to Queues. Springer. Wormald, N. (1995). Differential equations for random processes and random graphs. Annals of Applied Probability 5, 1217–1235. Wormald, N. (1999a). The differential equation method for random graph processes and greedy algorithms. In Lectures on Approximation and Randomized Algorithms (eds. M. Karonski and H.J. Proemel), pp. 73–155. PWN. Wormald, N. C. (1999b). Models of random regular graphs. In Surveys in combinatorics, pp. 239–298. Cambridge University Press. 19 APPENDIX A Missing proofs of Theorem 2.1 Proof of Claim 2.3. The proof of this claim is mainly algebraic and is given for the sake of com- pleteness. E(cid:2)∆n(γn, αn)(cid:3) = (cid:19) (cid:35) + 1 n − i dx + En + E(cid:48) i (cid:35) 1 1 − x i=αn i=αn (cid:18)1 γn−1(cid:88) (cid:90) γ = n − 1 (cid:34)(cid:90) γ βn 1 x 1 − γ γn−1(cid:88) 1 λi = n − 1 (cid:34) βn xdx. Further,(cid:80)γn−1 dx + − log (cid:82) γ = 1 β log α γ α α where En and E(cid:48) n, n represent the error terms. We are left to show that E(cid:48) 1 − α n → 0. Note that(cid:80)γn−1 1 1 i 1 i+1 gives an lower-bound for it. Now gives an upper-bound for the integral the difference between these two sums is Θ(1/n). Similarly we can show the error contribution of (cid:3) the second sum is also order Θ(1/n) which completes the proof. Proof of Claim 2.4. In the following proof, to simplify the notation, we present ∆n(γn, αn) by ∆n. By the Chernoff's bound, for any s ≥ 0: P (∆n − E [∆n] ≥ ) ≤ e −s(+E[∆n])E (cid:105) . es∆n = e i=αn i=αn (cid:104) (cid:104) α (26) Note that ∆n is sum of independent exponential random variables, thus we can compute E follows: es(∆n−E[∆n])(cid:105) −sE (cid:18) γn−1(cid:89) For any real number z, we have (1 + z) ≤ ez. Therefore, (cid:105) ≤ e (cid:80)γn−1 es∆n i=αn (cid:105) (cid:104) (cid:104) i=αn E = E s 1 + s λi − s (cid:110)λαn, λγn−1 (cid:111) , and define s es∆n ∗ = λ∗  2E[∆n] 1+  2E[∆n] λi−s . Because for any αn ≤ i ≤ γn − 1, λi ≥ λ∗ , (cid:104) (cid:105) es∆n as (cid:19) . (cid:33) . Let λ∗ be min it follows that: ∗ Setting s to be s (cid:32) 1 λi − s∗ ≤ 1 λi 1 +  2E [∆n] in the Chernoff's bound, we have: P (∆n − E [∆n] ≥ ) ≤ e ∗ − s 2 20 Similarly, we can show that: Define P (−(∆n − E [∆n]) ≥ ) ≤ e ∗ − s 2 .  δ = 2 2E[∆n] 1 +  2E[∆n]  λ∗/n. Note that λ∗/n is a constant bounded away from zero. More precisely, (cid:41) , (γn − 1)(n − γn + 1) (cid:40) αn − αn n − 1 Thus the inequality (5) holds with the above δ. λ∗/n = min n(n − 1) B Proof of Theorem 2.8 (27) (cid:3) . Proof of part (a). To prove this part, we show that Thus the statement follows by applying Chebyshev's inequality. Using (4), we have: log log n β and Var(Tn(C log n)) is bounded. E[Tn(C log n)] → 1 E(cid:2)Tn(C log n)(cid:3) = 1 β C log n(cid:88) i=1 n − 1 i(n − i) = 1 β log log n + o(log log n). The steps of the above calculation are similar to the ones presented in (26), thus we remove the details. Further, note that Tn(C log n) is the sum of independent exponential random variables, thus: C log n(cid:88) i=1 = 1 β2 1 λ2 i (cid:32) n − 1 i(n − i) (cid:33)2 ≤ 1 β2 C log n(cid:88) i=1 (cid:32) n − 1 i(n − i) (cid:33)2 ≤ M, ∞(cid:88) i=1 Var(Tn(C log n)) = for some constant M. This completes the proof. (cid:3) E[Tn(C log n)] → k β(k−2) and Var(Tn(C log n)) is Proof of part (b). Similar to part (a), we show that bounded. Following the proof sketch, we use the known fact that, w.h.p., a random k-regular graph is locally tree like (for instance see Dembo and Montanari (2010)). For the sake of completeness, in the following lemma, we state this using the terminology for the exploration process described in Section 3. Lemma B.1. For j = O(log n), w.h.p., the component of the configuration model revealed until j iterations is a tree. 7 log log n 7Note that the result in the literature is stronger than this statement, and it asserts that even after forming the whole graph, the subgraph formed by these nodes is a tree w.h.p. 21 Proof of Lemma B.1. For iteration j ≤ C log n in the exploration process, the number of active clones satisfies A(j) ≤ kC log n. Thus the probability that there are no cycles in the multigraph = 1 − o(1). This implies (cid:3) formed so far by the configuration model is at least that w.h.p., the mutli-graph formed so far, is a tree. 1 − kC log n k(n−C log n) (cid:17)C log n (cid:16) Lemma B.1 implies that in this early adoption regime, at each step of the exploration process, one sleeping node is awakened and using our coupling with the adoption process, this means one extra node adopts Z. Also, at any time step j ≤ C log n, the number of active clones is given by A(j) = k + j(k − 2). This gives E(cid:2)Tn(C log n)(cid:3) = k β C log n(cid:88) Var(Tn(C log n)) = k2 β2 1 i=1 k + i(k − 2) (cid:32) C log n(cid:88) 1 k + i(k − 2) i=1 Similar to part (a), the variance of Tn(C log n) can be calculated as: = 1 β k k − 2 log log n + o(log log n). (cid:33)2 ≤ k2 β2 (cid:32) ∞(cid:88) i=1 1 k + i(k − 2) (cid:33)2 ≤ M, for some constant M. Part (b) of Theorem 2.8 then follows by using the Chebyshev's inequality. (cid:3) C Missing proofs of Section 3 Proof of Lemma 3.1. The proof is a simple modification of Wormald's original proof, where the modification is mainly in how we choose the various asymptotic functions involved in the proof. Let F(x, y) = ky k−2x defined for 0 ≤ x ≤ k/2 − 0 and 0 ≤ y ≤ 1. Then + k 20 2ky (k − 2x)2 (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∂F (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∂F (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) = k k − 2x (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) + ∂y ∂x + ≤ k 22 0 (cid:44) Φ. So, F is Lipschitz with Lipschitz constant Φ. Also note that for any 0 < j < n, we have F(j/n, N(j)/n) = f (j/n) (defined in (18)). Let λ = log n . We first show that: (log n)2 and δ = 1 (cid:48) n Claim C.1. P(N(j + λ) − N(j) − λF(j/n, N(j)/n) ≥ 4δλ) ≤ 2e − δ2λ 2 . (28) Proof of Claim C.1. For each 0 ≤ l ≤ λ, we have E[N(j + l + 1) − N(j + l)H(j + l)] = F((j + l)/n, N((j + l)/n)) ≤ F(j/n, N(j)/n) + Φλ/n. Thus there exists a function ∆(n) = Φλ/n such that conditional on H(j), the sequence Z(l) = N(j + l) − N(j) − lF(j/n, N(j)/n) − l∆(n) for 0 ≤ l ≤ λ is a supermartingale w.r.t. the sigma fields generated by H(j), H(j + 1), . . . , H(j + λ). Further Z(l), 0 ≤ l ≤ λ has bounded increment: Z(l + 1) − Z(l) ≤ N(j + l + 1) − N(j + l) + 22 F(j/n, N(j)/n) + ∆(n) ≤ 3. Thus using concentration results for supermartingales from Wormald (1999a) (Lemma 4.2), we have P(N(j + λ) − N(j) − λF(j/n, N(j)/n) ≥ λ∆(n) + 3δλ) ≤ e − δ2λ 2 . (29) The following two observations complete the proof: (i) λ∆(n) ≤ δλ (ii) A similar inequality can be obtained for the lower tail of Z(λ). (cid:3) (cid:20) Next, for i = 0, 1, ..., (k/2 − 0)n/λ, by induction we prove that: Claim C.2. P(N(iλ) − f (iλ/n) ≥ i) ≤ ie 2 , where i = 5δλ − δ2λ (1+∆(n))i−1 ∆(n) (cid:21) . (cid:48) We have Proof of Claim C.2. The base case follows from Claim C.1 (inequality (28)), and the fact that f (λ) − λ f (0) ≤ δλ. Assuming that the claim holds for 1, 2, . . . , i, we now prove it for case i + 1. N((i + 1)λ) − n f ((i + 1)λ/n) ≤ N(iλ) − n f (iλ/n) + N((i + 1)λ) − N(iλ) + n f (iλ/n) − n f ((i + 1)λ/n). 2 , we have N(iλ) − n f (iλ/n) ≤ i. Further, we By induction hypothesis, with probability 1 − ie − δ2λ N((i + 1)λ) − N(iλ) + n f (iλ/n) − n f ((i + 1)λ/n) ≤ N((i + 1)λ) − N(iλ) − λF(iλ/n, N(iλ)/n) write: From (28), we have with probability 1− e + λF(iλ/n, N(iλ)/n) + n f (iλ/n) − n f ((i + 1)λ/n). 2 , N((i + 1)λ)− N(iλ)− λF(iλ/n, N(iλ)/n) ≤ 4δλ. Also, − δ2λ n f (iλ/n) − n f ((i + 1)λ/n) = −λ f (cid:48) (iλ/n) + O(λ2/n) = −λF(iλ/n, f (iλ/n)) + O(λ2/n). Hence, λF(iλ/n, N(iλ)/n) + n f (iλ/n) − n f ((i + 1)λ/n) ≤ λF(iλ/n, N(iλ)/n) − λF(iλ/n, f (iλ/n)) + O(λ2/n) ≤ ∆(n)i + O(λ2/n). where in the inequality holds because F(x, y) is Lipschitz. Note that λ2/n = o(δλ). Putting all these together, we have with probability at least 1 − (i + 1)e − δ2λ 2 , N((i + 1)λ) − n f ((i + 1)λ/n) ≤ (1 + ∆(n))i + 5δλ = i+1. This complete the induction and the proof. (cid:3) To complete the proof of the Lemma, first note that i = O(n/λ), so i = O(nδ) = o(n). Now for ∗λ is the nearest integer to j among all λi's, i = 0, 1, . . . , (k/2−0)n/w. such that i ∗ any general j, find i We have: N(j) − n f (j/n) ≤ N(j) − N(i ∗λ) + N(i ∗λ) − n f (i ∗λ/n) + n f (i = N(i ∗λ) − n f (i ∗λ/n) + O(λ). Noting that n λe 2 = o(n − δ2λ −3) completes the proof. ∗λ/n) − f (j/n) (cid:3) 23 Proof of Lemma 3.3. First note that for any 0 ≤ x ≤ k−0 the mean value theorem we have: n f (jα + 2 c N(njα + 2 N(Tα) = n(1− α), and N(·) is decreasing in the number if iterations. Thus, Jα ≤ njα + 2 c a similar argument, we can prove Jα ≥ njα − 2 δ(n)/n) ≤ n f (jα) + 2δ(n). From Lemma 3.1, we have δ(n)/n) + δ(n) ≤ n f (tα) − δ(n) = n(1 − α) − δ(n). By definition, δ(n). Using δ(n) and the proof is complete. δ(n)) ≤ n f (jα + 2 2 , we have f (cid:48) (x) ≤ − f 2 c c c (cid:48)(cid:16) k−0 (cid:17) = −c. Using (cid:3) Proof of Lemma 3.7. Let E be the event that the configuration model is not connected and let Es be the event that there exists a subgraph H of size s which is isolated in the configuration model. For any positive even integer m, the number of possible pairings of m clones is (m/2)!2(m/2) . Using this fact we can bound the probability of Es by simply counting the number of pairings as follows. m! (cid:33)(cid:0)nk/2 (cid:1) (cid:0)nk (cid:1) . sk/2 (cid:32)n s sk P(Es) ≤ The above bound is asymptotically largest when s is a constant with respect to n. See Wormald (1999b) for similar proof techniques. In this case for any 1 > 0, we can obtain: P(E) = O(n −s(k/2−1)+1). (30) Since k ≥ 3, when G is simple, it cannot have an isolated component of size less than 4 nodes. The (cid:3) worst case in (30) is when k = 3 and s = 4 which gives the required bound. 24
1804.07354
1
1804
2018-04-19T19:56:38
The Aftermath of Disbanding an Online Hateful Community
[ "cs.SI" ]
Harassing and hateful speech in online spaces has become a common problem for platform maintainers and their users. The toxicity created by such content can discourage user participation and engagement. Therefore, it is crucial for and a common goal of platform managers to diminish hateful and harmful content. Over the last year, Reddit, a major online platform, enacted a policy of banning sub-communities (subreddits) that they deem harassing, with the goal of diminishing such activities. We studied the effects of banning the largest hateful subreddit (r/fatpeoplehate or FPH) on the users and other subreddits that were associated with it. We found that, while a number of outcomes were possible --- in this case the subreddit ban led to a sustained reduced interaction of its members (FPH users) with the Reddit platform. We also found that the many counter-actions taken by FPH users were short-lived and promptly neutralized by both Reddit administrators and the admins of individual subreddits. Our findings show that forum-banning can be an effective means by which to diminish objectionable content. Moreover, our detailed analysis of the post-banning behavior of FPH users highlights a number of the behavioral patterns that banning can create.
cs.SI
cs
The Aftermath of Disbanding an Online Hateful Community Haji Mohammad Saleem and Derek Ruths [email protected] and [email protected] School of Computer Science McGill University Montreal, Canada 8 1 0 2 r p A 9 1 ] I S . s c [ 1 v 4 5 3 7 0 . 4 0 8 1 : v i X r a Abstract Harassing and hateful speech in online spaces has become a common problem for platform maintainers and their users. The toxicity created by such content can discourage user par- ticipation and engagement. Therefore, it is crucial for and a common goal of platform managers to diminish hateful and harmful content. Over the last year, Reddit, a major online platform, enacted a policy of banning sub-communities (sub- reddits) that they deem harassing, with the goal of dimin- ishing such activities. We studied the effects of banning the largest hateful subreddit (r/fatpeoplehate or FPH) on the users and other subreddits that were associated with it. We found that, while a number of outcomes were possible - in this case the subreddit ban led to a sustained reduced interaction of its members (FPH users) with the Reddit platform. We also found that the many counter-actions taken by FPH users were short-lived and promptly neutralized by both Reddit admin- istrators and the admins of individual subreddits. Our find- ings show that forum-banning can be an effective means by which to diminish objectionable content. Moreover, our de- tailed analysis of the post-banning behavior of FPH users highlights a number of the behavioral patterns that banning can create. Introduction Hate speech, generally defined as disparaging speech against minorities based on their race, ethnicity, sexual orientation, gender and religion (Mendel 2012), has become endemic to online platforms with user-generated content(Bartlett et al. 2014). Comprehensively, hate speech is an "expression of hatred against a person based on their group identity" (Saleem et al. 2016). Online hate speech can take sev- eral forms: for example, a microblog that verbally abuses a black actor based on her race(Woolf 2016), comments under news articles(Hughey and Daniels 2013) or in-game chat rooms of major MMOGs (Massively Multiplayer On- line Games)(Powers 2003). From the perspective of platform managers, hateful speech creates negative user experiences, which can im- pact the civility of their platform(Santana 2014)(Newell et al. 2016). At the user level, the effects of online hateful speech can extend far beyond the virtual world, causing serious psychological distress(Boeckmann 2002)(Leets and Giles 1997). In extreme cases, hate speech can lead to phys- ical harm through violence incited against the targets of the hate(Museum 2010). As a result, diminishing hateful speech in online social spaces has become a major objective of both platform maintainers and many of the users who use them. To combat such objectionable content, platforms employ several strategies ranging from community-based flagging to platform-level banning (Grimmelmann 2015)(Chancellor et al. 2016). Despite the widespread use of such techniques, lit- tle is known about the implications of these policies: in other words, even though platforms routinely deploy countermea- sures against hate speech and their producers, very little is known about the direct and indirect effects of such actions - on the hateful content and on the communities affected by it. In this study, we aim to understand one common practice among online forums: community banning. We specifically consider this in the context of Reddit and its policy, enacted in 2015, of banning "subreddits that allow their communities to use the subreddit as a platform to harass individuals when moderators don't take action"(u/reddit 2015). Reddit is a social media content aggregation and discus- sion website, which works on the model of multiple sub- communities called "subreddits". Subreddits cover a wide variety of topics, and users can subscribe to the subreddits that interest them or create their own subreddits to person- alize their Reddit experience. Up until the summer of 2015, Reddit allowed users to create subreddits dedicated to hate- ful themes. r/fatpeoplehate (FPH), for example, was one such subreddit that focused on body shaming. The FPH subreddit was highly popular, with approxi- mately 150,000 subscribers at its peak (Figure 1). In 2015, Reddit introduced a new policy to ban harassing subreddits. r/fatpeopelhate was the most prominent subreddit banned under this policy. This study investigates the after- effects of banning this large self-identifying hateful subred- dit on the users that participated in it (FPH users) and other subreddits that are related to it. Our analysis is restricted to FPH since it was the only example of a large-scale active subreddit disbanded by the policy update. A priori banning a subreddit hardly guarantees that the kind of hateful content produced by the community will go away. Several outcomes are possible. One outcome involves the community simply creating a new subreddit under a dif- ferent name. Another outcome can be that hateful speakers post their content in other subreddits, making the hateful content much harder to expunge and possibly directly ex- posing target users to the hateful content. Our work in this study produced strong evidence that all of these negative outcomes happened - but were very short- lived. Ultimately, we found that the banning of the FPH subreddit reduced the engagement of active FPH contrib- utors with the Reddit platform and dramatically decreased the volume of their overall comments. Not only did the FPH users comment less after the ban, a larger portion of the users stopped their commenting activity entirely. Furthermore, the initial response of the banned users (creating new subred- dits and posting their hateful content to other platforms) was quickly neutralized (within 1-2 days) by the combined ac- tions of Reddit administrators and the moderators of specific subreddits. The fact that FPH users were denied the oppor- tunity to create a new community and were not welcomed, en mass, into existing communities, can explain their disen- gagement with the platform. It is not possible to definitively conclude that banning of the subreddit reduced the presence of body-shaming re- lated hateful content on Reddit. However, our overall find- ings strongly suggest that banning of an objectionable com- munity significantly decreased the future participation of the active members of the community with the Reddit platform. Notably, achieving this end involves swift, independent, and decisive action on the part of both administrators and mod- erators. Background Hate speech At the outset, establishing precisely what constitutes hate speech is an unsolved and important problem. In order to ad- dress often-contested definitions of hate speech and remove ambiguity, Saleem et al.(Saleem et al. 2016) introduced the term "hateful speech" which they define as "speech which contains an expression of hatred on the part of the speaker/author, against a person or people, based on their group identity". This definition removes the ambiguity in the term "hate" itself, which might refer to the speaker/author's hatred, or his/her desire to make the targets of the speech feel hated, or their desire to make others hate the target(s), or the apparent capacity of their speech to increase hatred. Therefore, in this article we use the term "hate speech" in a general sense and the term "hateful speech" specifically as defined above. Furthermore, body-shaming speech adheres to the definition of hateful speech as it constitutes disparag- ing a group of people based on their appearance. The harmful effects of body-shaming speech Like other forms of hate speech, body shaming can have severe adverse effects on its victims. In adolescents, body- shaming was associated with lower body satisfaction, lower self-esteem, higher depressive symptoms, and thinking about and attempting suicide, even after controlling for ac- tual body weight(Eisenberg, Neumark-Sztainer, and Story 2003). Furthermore, it was found that over-weight women significantly increase their calorie intake on exposure to weight-related stigma(Schvey, Puhl, and Brownell 2011), causing stress, reducing self-control and ultimately resulting in further weight gain(Major et al. 2014)(Tomiyama 2014). Therefore, body-shaming can lead to significant negative ef- fect on the physical and mental well-being of plus-sized in- dividuals. Banning of /r/FatPeopleHate /r/FatPeopleHate (FPH) was a subreddit created to mock and denigrate plus-sized people. The users would of- ten post pictures of plus-sized individuals and ridicule them along with the usage of slurs, such as "hamplanet", "land- whale", "beetus". One of the rules for contributing to the subreddit included having "absolutely no fat sympathy". While the community admitted that it may seem that "all we do is aimlessly bully and ridicule people", they maintained that their actions have a deeper meaning. They go on to state that obesity is a choice that indicates selfishness, lack of dis- cipline and causes disproportionate burdens on health care systems. The subreddit grew to become very popular and had al- most 150,000 subscribers at its peak. A screen shot of the subreddit is provided in Figure 1, obtained through Way- Back Machine1. On June 10, 2015, Reddit admins an- nounced that they were going to remove harassing subred- dits (u/reddit 2015). They clarified that "we will ban subred- dits that allow their communities to use the subreddit as a platform to harass individuals when moderators don't take action. We're banning behavior, not ideas.". This announce- ment marked the implementation of new community policy that allowed Reddit to ban or quarantine objectionable sub- reddits. While some people supported the decision, others saw it as against free speech. In this paper, we present the reaction of the users affected by this ban and try to gauge the success of Reddit's com- munity policy in controlling FPH-specific hateful speech on their platform. Data Reddit user Jason Baumgartner, under the Reddit user name Stuck In the Matrix2, has made available large data dumps that contain a majority of the content (posts and com- ments) generated on Reddit3. The data dumps, collected us- ing the Reddit API, are organized by month and year dating back to 2006. This resource is regularly updated with new monthly content. For our research, we focused on June 10, 2015 as the pivot point since it was on this day that Red- dit announced the banning of harassing subreddits, the most prominent of which was /r/fatpeoplehate. Since we were interested in understanding the effects of banning such 1https://web.archive.org/web/ 20150607141552/http://www.reddit.com/r/ fatpeoplehate/ 2https://www.reddit.com/user/Stuck_In_the_ Matrix/ 3http://files.pushshift.io/reddit/ Figure 1: A screen shot of /r/fatpeoplehate obtained through WayBack Machine dated June 7, 2015. It shows how users would link images of plus-sized individuals accompanied with mocking titles. It also shows the number of subscribers at that moment: 149,504. a large community, we studied the activity of users primar- ily associated with the FPH subreddit, over a four-month pe- riod, two months before and two months after it was banned. Thus, we restricted our analysis to the time period between the days of April 10, 2015 and August 10, 2015. An im- portant note, the data dumps miss about 0.03% of the pub- lic comments due to data crawling errors. Our analysis of macro-level trends should remain unaffected by the data- loss. FPH users. For this time period, we collected all users that commented in /r/fatpeoplehate. This provided us with a list of 42,354 users. From this list we removed common bot accounts, such as /u/AutoModerator, /u/autotldr, /u/Mentioned Videos, etc. When users delete their accounts or the moderators remove com- ments, the authors of such comments would be displayed as [deleted]. We removed these from our list as well, since there is no way to link such comments to their original au- thors. In addition, this initial sample presumably included some (small) population of users who do not condone the FPH community's views but still comment in the subreddit for the sake of discussion or argument. In order to remove such accounts, we only considered users who had FPH as their most commented subreddit. This left us with 13,916 users, whom we refer to as "FPH users" in this paper. For each FPH user, we collected all the comments associated with them in the period of interest and call it the "FPH sam- ple". Random users. We sought to compare the activity of FPH users with an equal-sized systematic random sample of Red- dit users. To this end, we curated a list of all the Reddit users that posted a comment during the period of interest. After re- moving the major bot accounts and FPH participants, we had a list of 4,677,759 users. To obtain an equally sized subset Sample FPH Random loseit fatlogic fatpeoplestories # of users 13,916 13,916 - - - # of comments 878,276 585,632 159,250 266,456 45,484 Table 1: Details on each of our data sample. Note that the three communities we investigate also differ in size, which can induce different behaviours. we perform systematic sampling. To do so, we first sort our list of users by the number of comments they made during this period. We selected an initial user randomly from the list and the remaining users at regular interval from the last one, to obtain a sample of 13,916 users ("random users"). Again, for each random user, we collected all the associated comments in the relevant time period and call it the "ran- dom sample". The details on the two samples are provided in Table 1. Subreddit-specific comments. We were also interested in studying the effects of the ban on other communities, espe- cially the ones with themes related to the banned commu- nity. Accordingly, we collected all the comments generated in: r/loseit: a subreddit that supports people who want to lose weight. r/fatlogic: a subreddit that presents itself as against the "fat way" of thinking and not being a hate sub. They add "r/fatpeoplehate is the place for that." r/fatpeoplestories: a subreddit to share the stories about fat people. They clarify that "We are NOT FatPeo- pleHate". Further details are provided in Table 1. Study Design At a high-level, we sought to characterize the effects of ban- ning a prominent community on Reddit in two ways: 1. at the user level, we wish to study the effects on the active members of the banned community, and 2. at the community level, we want to study if the ban cre- ated any counter effects on other communities, specifi- cally those that operate in a similar sphere as the banned community. Banning and users. We analyzed multiple aspects of FPH user population behavior, contrasting it with behavior exhib- ited by the random user group: 1. the difference in overall commenting behaviour between the two samples over our period of analysis; 2. the difference in the commenting behaviour of the two user groups before and after the ban; 3. the retention of users by the platform after the banning of the subreddit; 4. the effect on bad user behaviour in the form of downvoted content; 5. the change in user exploration patterns of new subreddits; and 6. the search for a an alternative subreddit for the disbanded community. to the topic of Banning and other communities. We also studied the the ban on other communities that direct effects of are relevant the banned subreddit. Specifically, we studied r/loseit, r/fatlogic and r/fatpeoplestories. For each of these subreddits, we studied the downvoted comment volume, the deleted com- ment volume, and the overall comment volume during our four-month period of interest. As will be discussed later, these metrics were chosen as proxies for the presence of FPH-specific negative content in other subreddits before and after the ban. Results The overall commenting behaviour of the FPH sample is significantly different from that of the random sam- ple. Figure 2 presents the difference in overall comment- ing behaviour between the two samples during the period of analysis. The two samples follow each other very closely, which is backed by the Pearson's correlation coefficient of 0.97. Comparing the two distributions by the Kolmogorov- Smirnov goodness-of-fit test returns a p-value of ¡0.0001. This indicates that the null hypothesis that the two indepen- dent samples are drawn from the same continuous distribu- tion can be rejected, and that there is a significant difference in the overall behaviour of users in our two samples. The comment activity of the FPH users declined after the ban, when compared to the random users. Figure 3 presents the effect of the community ban on the two samples individually through scatter plots and their respective regres- sion lines. Figure 3c presents the regression lines together to emphasize the difference in the proportion of comment ac- tivity before and after the ban between the two user groups. From this figure we can infer that the FPH users commented more before the ban, than after, when compared to the ran- dom users. This shows that the ban caused a decrease in the Reddit interaction of FPH users. To check the significance of this claim, we compare the difference in activity of the two samples. The distribution of the difference in depicted in Figure 4. Since the distribu- tion is normal, we can perform a paired t-test. For the ran- dom sample, the t-test returns a p-value of 0.7, and we fail to reject the null hypothesis that the two samples (pre-ban and post-ban comment activity) are similar. However, for the FPH sample, the paired t-test returns a p-value of 8.7e-197, suggesting that we can reject the null hypothesis and that there is a significant difference in the comment activity be- fore and after the ban for FPH users. A higher proportion of FPH users completely stopped comment engagement in the post-ban period. Figure 5 shows the overall trend of Reddit comment activity in the two samples after the ban. We can clearly observe that al- most 1.75 times more FPH users became inactive after the banning of the subreddit, when compared to the random sample. Therefore, banning of the subreddit led to higher than average number of accounts with no direct comment engagement. To delve deeper into this result, we can study the user- engagement of the FPH sample in their subreddit. In Fig- ure 6, we present the distribution of overall engagement in r/fatpeoplehate by the FPH sample. It is the dis- tribution of users with x% of their overall comments hav- Figure 2: Z-normalized comment activity of the two sam- ples. FPH and random users are ranked based on their total comment activity. Then the Z-normalized comment activity is plotted at each rank with FPH users indicated in blue and random users in orange. This figure contains the first 12,000 users for a clearer representation. (a) (b) (c) Figure 3: The comment activity of FPH and random users before and after the ban. Scatter plots of pre-ban vs post-ban comment activity of the two user groups with a linear model regression line. A 45 degree regression line indicates equal activity before and after the ban. Figure 4: Distributions of differences in user comment ac- tivity before and after the ban. Notice the normal-shape of the distribution. The yaxis has been limited to 5,000 for clear depiction of smaller values. ing been generated in r/fatpeoplehate. From the cu- mulative distribution, we can assert that more than half the user base made at least half of their comments in r/fatpeoplehate. This shows that our sample of FPH users were highly engaged in r/fatpeoplehate before the ban. Consequently, the ban led to a negative feedback towards this engagement. Hence, we see a steeper decline in the FPH user group, with more FPH users showing no comment engagement than random users. This effect is also presented in Figure 3b. Many FPH users have high pre-ban comment activity and almost null post- ban activity. The scattered data points at the bottom of the Figure 5: Percentage of total comment activity after the ban. FPH and random users are ranked based on their total comment activity after the ban. At each rank the percentage of post-ban comment activity account out of the total activ- ity is depicted. FPH users are indicated in blue and random users in orange. y-axis and along the length of the x-axis are reflective of the portion of high-activity FPH users who stopped commenting after the ban. Notice a lack of similar pattern of data points in Figure 3a. A smaller portion of FPH users exhibited negative user behaviour. Before we present these results, let us preface this by understanding negative user behaviour in context of FatPeopleHate. In this subreddit, users indulged in mocking plus-sized people. While malicious, this behaviour was ap- Figure 7 depicts a histogram of downvoted user activity by FPH users, before and after the ban. It represents that y% of the users had x% of their comments downvoted by others. We can make two meaningful observations from this plot: 1. For a vast majority of the FPH users, only a small portion of their comments are downvoted. 2. After the ban, the portion of users with less than 5% of downvoted comments further increases. Assuming that had the FPH users exhibited similar be- haviour outside of the community, their comments would have been downvoted, the first observation suggests that ma- jority of the FPH users indulged in fat-shaming behaviour, largely within the FPH subreddit. Therefore, we can assert that the r/fatpeoplehate was rather self-contained. The second observation may stem from the fact that a de- crease in user comment activity after the ban would also reduce the number of downvoted comments and, therefore, increase the portion of users with low downvoted comment percentage. Since downvoted comments do not directly suggest ha- rassing / hateful speech, we manually labelled 100 down- voted FPH user comments from before and after the ban. 100 FPH users were randomly selected for this purpose. We found that while 13 of the 100 comments exhibited FatPeopleHate-like behaviour before the ban, the number rose to 25 after the ban. It should be noted that both samples contained comments from subreddits other than r/fatpeoplehate and were manually labelled by an ex- pert. Therefore, while the overall negative behaviour declined, the hateful behaviour of FPH users was spilling more in other subreddits after the ban. Reddit users explored other subreddits more post-ban, compared to the random sample. As we have dis- cussed users in the FPH sample were highly engaged in r/fatpeoplehate. This high level of engagement brings with it a high level of association with the subred- dit. Banning of the subreddit breaks this association, which can cause users to look for other venues to continue being engaged with the theme of the subreddit. It can also cause users to completely disengage if the subreddit was one of the primary reasons for their use of the platform or continue the engagement with the rest of the platform as before, if they are still interested in rest of the content. We wanted to study if the ban on their primary subred- dit affected multi-subreddit participation of FPH users. Fig- ure 8 presents how many subreddits users participated in, before and after banning of r/fatpeoplehate, for both samples. The general trends in the form of linear regression lines are presented together in Figure 8c. The behaviour for the two samples is quite similar. Therefore, the banning of r/fatpeoplehate did not produce a major difference in how many subreddits FPH users participated in. While the FPH users continued to participate in an aver- age number of subreddits, we investigated if they were ex- ploring Reddit by participating in subreddits they were not participating in, before the ban, or were they less likely to participate in newer subreddits due to the loss of a subred- Figure 6: Distribution of user engagement in FPH. Both individual and cumulative distributions are provided. preciated and promoted within the subreddit. However, same behaviour would be considered negative outside of the sub- reddit. Reddit introduced the banning of the subreddits, on the grounds of user harassment, to control such negative be- haviour. While we do not have a measure for gauging hate speech across the entire platform, we can however, study the users that engaged in the harassing subreddit and observe if they continued their actions in other subreddits. For this experiment, we use a Reddit feature called 'down- vote'. Reddit is community-centric and the content gen- erated in the community is monitored by the community as well. Positive user-behaviour is upvoted by the mem- bers while negative user behaviour is downvoted. Unfortu- nately, the downvotes are not reserved solely for harassing behaviour, but can also contain irrelevant or wrong content. Because it is difficult to separate these sub-categories, we in- evitably study the overall negative behaviour by FPH users. Figure 7: Distribution of proportion of downvoted com- ments in the FPH sample. It represents that y% of the users had x% of their comments downvoted by others. (a) (b) (c) Figure 8: User subreddit participation. The number of subreddits that users commented in before and after the ban. A liner fit is also generated. A 45 degree line indicates equal number of subreddits before and after the ban. dit they strongly associated with. In Figure 9, we observe that 80% of FPH users were now participating in at least 50% new subreddits after the ban, as compared to 40% for the random sample. Further more, the FPH sample had a larger portion of users with high subreddit exploration than the random sample. Therefore, FPH users were participating in more new subreddits after the ban. Pre-ban fatpeoplehate WTF AdviceAnimals fatlogic TalesofFatHate TumblrInAction pcmasterrace BlackPeopleTwitter trashy trees ImGoingToHellForThis cringepics 4chan fatpeoplestories punchablefaces thebutton FitshionVSFatshion atheism AdiposeAmigos relationships Post-ban AdviceAnimals WTF fatlogic TumblrInAction pcmasterrace BlackPeopleTwitter trashy punchablefaces trees technology ImGoingToHellForThis cringepics KotakuInAction relationships fatpeoplestories 4chan politics conspiracy SubredditDrama Tinder Figure 9: Cumulative new subreddit exploration. The plot shows the percentage of users with atmost x% of new sub- reddits after the ban. FPH sample continued to be interested in the subred- dits it was previously active in. In Table 2, we present the subreddits that were popular amongst the users of FPH user sample. From the two lists, we can ascertain that FPH users were still highly interested in the subreddits they used to fre- quent before. So, even through they were exploring new sub- reddits, the group as a whole was still actively participating in the subreddits they used to frequent before the ban. How- ever, it is important to adress the fact that these subreddits are popular across Reddit and therefore remain popular after Table 2: Popular subreddits amongst the FPH users be- fore and after the ban. The subreddits that are shared by the two lists are in bold font. the ban as well. FPH users tried to actively create alternative subred- dits for their banned community. The FatPeopleHate community did not readily accept the banning of their subreddit. They actively tried to circumvent the banning by creating new subreddits to act as an alternative to r/fatpeoplehate. We were able to find 99 such subred- dits created in the wake of the ban. Due to limited space we can only provide a few examples: r/FatpeoplehateX, r/CandidDietPolice, r/ObesePeopleDislike, etc. Reddit admins were able to control this surge and banned a majority of these alternatives as well. The ones that were not banned did not get much traffic, most likely due to not being known to the community. Therefore, while FatePeopleHate community reacted by creating a multitude of alternatives, Reddit administration was comprehensive in their policy and banned a majority of them. It is important to note that it is likely that other alternatives were also cre- ated and are not present in the list. In case it did happen, the created subreddit is not common knowledge. Effect on weight-related communities From the list of subreddits popular with FPH users, we notice r/fatlogic and r/fatpeoplestories to have themes similar to r/fatpeoplehate. While both subreddits make it clear that they are not associated with r/fatpeoplehate, both of them have content that mocks plus-sized individuals. For each subreddit, we study the volume of downvoted comments, deleted/removed comments and all comments, made in the respective subreddits during the period of anal- ysis. For r/fatlogic (Figure 10), we notice zero activity following the ban of r/fatpeoplehate. On further in- vestigation, we found that moderators of the subreddit made it private (u/maybesaydie 2015). In a post made by the mod- erators, they explain how in wake of the banning, the subred- dit was flooded with FatPeopleHate. Being overwhelmed by the traffic, and not wanting to be banned if mistakenly per- ceived as the new home for FatPeopleHate, the mods tem- porarily made the subreddit inaccessible. An excerpt from the post is provided below: surged post-ban, FPH users "And then, on the morning of June 10, 2015, /r/fatpeoplehate was banned by reddit, We were given no warning and we immediately were overcome with posts from indignant fph subscribers, posts worrying if we were next and it became way too much work for a our small mod team to handle so we went private for a few days. " Therefore, into r/fatlogic, who were able to check this migration by using their moderator privileges to private the subreddit. r/fatpeoplestories (Figure 11), however, kept their subreddit public. Although, we do witness a spike in the total number of comments posted on the subreddit, fol- lowing the ban, it is short-lived and normal traffic patterns resume soon after. We see a spike in both the number of downvoted comments and the number of deleted comments. We can assert that the community actively checked the surge in traffic by downvoting more than usual. Similarly, moder- ators also actively kept the migration in check by deleting comments that went against the subreddit. Finally, we also study a subreddit, which while being about weight, is on the other end of the spectrum as FPH. r/loseit is a supportive subreddit for users who want to lose weight. In Figure 12 we observe that a higher than normal number of comments were posted on the subreddit following the FPH ban. However, since the demographic of the community is plus-sized people, these comments also in- clude the discussion on the banning of a subreddit that was abusive to them. Nonetheless, we also notice that a higher than average number of comments were deleted and that there is a major spike in the volume of downvoted com- ments. Therefore, we can say that r/loseit did face in- creased negative user behaviour following the ban of Fat- PeopleHate. Yet, in this case too, the community and the moderators were actively checking for such behaviour and soon after, normal characteristics resumed. Discussion In this project, we studied the after-effects of banning of the Reddit community r/FatPeopleHate on (1) its active mem- bers and (2) other relevant subreddits. We discovered that the banning had an adverse effect on the members of the FPH community. Not only did we observe a significant de- crease in the user comment activity from FPH users after the ban, we also found that a larger portion of the users had completely ceased commenting on Reddit in any way. It is important to note that while Reddit was able to sus- tain this disengagement, it is not necessarily a positive out- come in every scenario. For new platforms or niche plat- forms with limited user base, user disengagement, if in large enough numbers, can lead to the demise of the platform. While we cannot directly state whether the overall FPH- related hate speech decreased after the ban, we can say that the members of the FPH community were less active on Reddit following the ban The FPH community did try to actively counteract the ban by creating alternative subred- dits for their disbanded community. However, Reddit ad- ministration was persistent and banned many these subred- dits offshoots. Even though some of these alternatives man- aged to escape the ban, they failed to grow. Therefore, FPH users were unable to recreate their confined space of FPH- replated activities. Furthermore, we observed that apart from continued interest in major subreddits, in the days follow- ing the ban, FPH users started visiting r/fatlogic. Pre- sumably this happened because, among active subreddits it is most closely related to the theme of FatPeopleHate. However, the moderators of fatlogic were not keen on this surge and made the subreddit private. Other relevant sub- reddits, namely r/fatpeopelstories and r/loseit also witnessed a spike in former FPH user activity after the ban was enacted. This spike was accompanied with spikes in the number of comments that were downvoted by the com- munity and the number of comments that were deleted, in part, by moderators. In short, FPH users, unable to recre- ate their community, were also unable to co-opt established communities. Their surge in such communities was miti- gated by a combined action by other users and moderators. For the users that were still engaged, fewer of their post- ban comments were downvoted by other members of the platform. However, a higher portion of the downvoted com- ments contained FPH-related content. In other words, while fewer comments by the FPH members were getting down- voted, more of these comments contained hateful speech. Overall, our findings strongly suggest that banning a com- munity to counter generation of hateful content can succeed in situations where such content is mostly confined within (a) (b) (c) Figure 10: Analysis of fatlogic. There is a dip in volume right after the ban. (a) (b) (c) Figure 11: Analysis of fatpeoplestories. The volume parameters resume normal values after the surge. (a) (b) (c) Figure 12: Analysis of loseit. There is a higher than usual count of downvoted and deleted comments right after the ban. that community and other communities are appropriately empowered with means to curate their content and member- ship. Of course, the story might be quite different for harass- ing communities whose negative behavior has already infil- trated other communities. The latter can prove more difficult to curb at the administrative level but might be restrained at the user/moderator level through regular action, in view to the fact that other subreddits demonstrated a remarkable re- sistance to the incursion of FPH content. This suggests a banning strategy needs to be accompanied by strong mod- eration of other communities and negative reinforcement of hateful-content by other users for it to be a success. Conclusion In this article, we studied the outcome of a common practice among online forums of banning unsavory activities. While it is more common for group moderators to ban unwanted users, we specifically studied the banning on a larger scale, that of an entire sub-community. Banning of a large and pop- ular sub-group is not a risk-free endeavor. A priori banning hardly guarantees that the content produced by the commu- nity will go away. Nevertheless, in this case, we found that Reddit employed a strategy in combination with a suite of user and administrator moderation and curation tools that made the banning effort successful. We observed that ban- ning discouraged users from interacting with the platform, especially when accompanied with appropriate measures are to persist negative reinforcement. Presumably, banning of a community removes an association that users had with the platform, leading to future dis-engagement. We believe that this suggests a concrete approach which could help other platform maintainers build and manage civil and construc- tive online spaces. In this case, Reddit was successful in banning FatPeople- Hate. However, there are factors that other platform main- tainers should be mindful of before enacting similar poli- cies. Notably, the resulting user disengagement can prove to be critical to the platform itself. Furthermore, depend- ing on the scale of the platform, it is going to be harder for the platform maintainers to control the creation of offspring sub-communities. For example, Facebook deals with a much larger user base and banning a popular page would result in the creation of many more alternative pages. It would also be harder to control groups that have off-platform / real-life connections since they can persist. Nevertheless, banning the community can provide significant control to platform main- tainers. References [Bartlett et al. 2014] Bartlett, J.; Reffin, J.; Rumball, N.; and Williamson, S. 2014. Anti-social media. Demos 1–51. [Boeckmann 2002] Boeckmann, Robert J & Liew, J. 2002. Hate speech: Asian american students justice judgments and psychological responses. Journal of Social Issues. [Chancellor et al. 2016] Chancellor, S.; Pater, J. A.; Clear, T.; Gilbert, E.; and De Choudhury, M. 2016. # thyghgapp: Instagram content moderation and lexical variation in pro- In Proceedings of the 19th eating disorder communities. CSCW, 1201–1213. ACM. [Eisenberg, Neumark-Sztainer, and Story 2003] Eisenberg, M. E.; Neumark-Sztainer, D.; and Story, M. 2003. Asso- ciations of weight-based teasing and emotional well-being among adolescents. Archives of pediatrics & adolescent medicine 157(8):733–738. [Grimmelmann 2015] Grimmelmann, J. 2015. Virtues of moderation, the. Yale JL & Tech. 17:42. [Hughey and Daniels 2013] Hughey, M. W., and Daniels, J. 2013. Racist comments at online news sites: a methodologi- cal dilemma for discourse analysis. Media, Culture & Soci- ety 35(3):332–347. [Leets and Giles 1997] Leets, L., and Giles, H. 1997. Words as weaponswhen do they wound? investigations of harmful speech. Human Communication Research 24(2):260–301. [Major et al. 2014] Major, B.; Hunger, J. M.; Bunyan, D. P.; and Miller, C. T. 2014. The ironic effects of weight stigma. Journal of Experimental Social Psychology 51:74–80. [Mendel 2012] Mendel, T. 2012. Does international law pro- vide for consistent rules on hate speech? The content and context of hate speech: Rethinking regulation and responses. [Museum 2010] Museum, U. S. H. M. 2010. Hate speech and group-targeted violence the role of speech in violent conflicts. USHMM: Washington DC. [Newell et al. 2016] Newell, E.; Jurgens, D.; Saleem, H. M.; Vala, H.; Sassine, J.; Armstrong, C.; and Ruths, D. 2016. User migration in online social networks: A case study on reddit during a period of community unrest. In 10th ICWSM. [Powers 2003] Powers, T. M. 2003. Real wrongs in virtual communities. Ethics & information technology 5(4). [Saleem et al. 2016] Saleem, H. M.; Dillon, K. P.; Benesch, S.; and Ruths, D. 2016. A web of hate: Tackling hateful In First Workshop on Text speech in online social spaces. Analytics for Cybersecurity and Online Safety, LREC 2016. [Santana 2014] Santana, A. D. 2014. Virtuous or vitriolic: The effect of anonymity on civility in online newspaper reader comment boards. Journalism Practice 8(1):18–33. [Schvey, Puhl, and Brownell 2011] Schvey, N. A.; Puhl, R. M.; and Brownell, K. D. 2011. The impact of weight stigma on caloric consumption. Obesity 19(10):1957–1962. [Tomiyama 2014] Tomiyama, A. J. 2014. Weight stigma is stressful. a review of evidence for the cyclic obesity/weight- based stigma model. Appetite 82:8–15. [u/maybesaydie 2015] u/maybesaydie. 2015. A very belated introduction to the entire /t/fatlogic mod team. Reddit. Ac- cessed 13-Jan-2017; https://redd.it/3mt2w4. [u/reddit 2015] u/reddit. 2015. Removing harassing subred- dits. Reddit. Accessed 13-Jan-2017; https://redd. it/39bpam. Leslie jones bom- [Woolf 2016] Woolf, N. the- barded with racist tweets after ghostbusters opens. guardian.com. Accessed 13-Jan-2017; https://www. theguardian.com/culture/2016/jul/18/ leslie-jones-racist-tweets-ghostbusters. 2016.
1810.00132
1
1810
2018-09-29T01:33:02
A Framework to Support the Trust Process in News and Social Media
[ "cs.SI" ]
Current society is heavily influenced by the spread of online information, containing all sorts of claims, commonly found in news stories, tweets, and social media postings. Depending on the user, they may be considered "true" or "false", according to the agent's trust on the claim. In this paper, we discuss the concept of content trust and trust process, and propose a framework to describe the trust process, which can support various possible models of content trust.
cs.SI
cs
A Framework to Support the Trust Process in News and Social Media Carlos Laufer1[+552135271500] and Daniel Schwabe1 [+552135271500] 1 Dept. of Informatics, PUC-Rio R. M. de S. Vicente, 225, Rio de Janeiro, RJ 22453-900, Brazil [email protected], [email protected] Abstract. Current society is heavily influenced by the spread of online infor- mation, containing all sorts of claims, commonly found in news stories, tweets, and social media postings. Depending on each user, they may be considered "true" or "false", depending on the agent's trust on the claim. In this paper, we discuss the concept of content trust and trust process, and propose a framework to describe the trust process, which can support various possible models of con- tent trust.. Keywords: trust, provenance, linked data, social networks, news. 1 Introduction The issue of trust has been present in the Internet shortly after its popularization in the early 90s (see [13] for a survey). The focus has been on lower level of the Internet Architecture, with an emphasis on authentication. More recently, with the advent of the Web and social networks, the cybersphere, and society as a whole, has become heavily influenced by information (and misinformation) that flows in news sites and social networks in the Internet. There are many studies carried out in several disciplines attempting to characterize and understand the spread of information in the cybersphere, and how this affects society (see [18] for an overview). A more visible aspect has been the spread of "fake news", actually a term used to refer to several different misuses of information, as postulated by Wardle in [24]. This has also been the focus of much research and many initiatives (e.g. [8, 9, 3]). The advent of user-contributed data has raised the issue of "data quality", as evidenced for example in case of online reviews and social media, often with direct effects on commercial success (e.g. [4]). This highlights the fact that data, in reality, expresses a belief or opinion of some agent. The original vision for the Semantic Web included a "Trust" layer, although its emphasis was more on authentication and validation, and static trust measures for data. There have been many efforts towards representing trust, including computational models - a general survey can be found in [20]; [5] presents an excellent earlier survey for the Semantic Web; and [23] surveys trust in social networks. In the Linked Data world, it is clear that facts on the Semantic Web should be regarded as claims rather than hard facts (e.g., [6]). Most if not all research surveyed in [20], present what Gerck calls "Trust Models", as op- posed to "Models of Trust" [10], i.e. a model of what is the trust process that is being adopted or assumed, where the former presumes the latter. In this paper, we propose a framework to describe 2 the trust process, which can incorporate various alternative models of content trust (using the terminology proposed in [11]). From a more global perspective, the ability to support a trust process over the information available in the cybersphere is directly related to at least two of the UN's Sustainable Develop- ment Goals1 -- Peace, Justice and Strong Institutions, and Reduced Inequalities. At the very least, a well-supported trust process can improve Transparency with respect to the actions undertaken by political agents, by allowing members of society to rely on information about these actions to make decisions and eventually take further actions in response. The remainder of this paper is organized as follows. Section 2 discusses the concept of trust; Section 3 presents a model of the trust process; Section 4 discusses trust regarding information flow in news media and social networks. 2 The Concept of Trust Whereas there are many definitions of trust (e.g. [19]), we base ourselves in the work of Gerck [10] and Castelfranchi et al. [7], taking the view that trust is "knowledge-based reliance on received information", that is, an agent decides to trust (or not) based solely on his knowledge, and the decision to trust implies the decision to rely on the truth of received or known information to perform some action. Castelfranchi et al. define trust in the context of multi-agent systems, where agents have goals, asserting that trust is "a mental state, a complex attitude of an agent x towards another agent y about the behavior/action relevant for the result (goal) g. This attitude leads the agent x to the decision of relying on y having the behavior/action, in order to achieve the goal g". Gerck presents a definition of trust as "what an observer knows about an entity and can rely upon to a qualified extent". The two definitions have close parallels: the observer is the agent who trusts; the entity is the trusted agent; the qualified extent is the behavior/action. Both associate trust with reliance. However, the former definition mentions explicitly the goal-oriented nature of trust. From both definitions, we observe that trust implies reliance: when an agent trusts something, it relies on its truth to achieve some goal without further analysis -- even if it is running the risk of taking an inappropriate or even damaging action if the object of trust is false. 3 A Framework for the Trust Process Given the considerations above, we present a model for the trust process that underlies the use or consumption of data/information on the web, represented diagrammatically in Figure 1.2 We focus here on the cases where an Agent needs to act, i.e., do some computation, to de- cide, or take some Action. The agent must act based on some Data/Information items which, clearly, it must trust -- the Trusted Data. The Data/Information items to be used by the agent may come from several sources, and it is not always clear (to the Agent) what is the quality of this Data, or the trustworthiness of the Information it contains. Therefore, the Agent must apply a Trust Process to filter the incoming Data/Information items and extract the Trusted Data items to be used by the Action. From this point of view, an item is considered as the smallest indivisible element that can be used in the Trust Process and may have an internal structure when used by the Action. 1 https://www.un.org/sustainabledevelopment/sustainable-development-goals/ 2 This section has been extracted with some adaptation from [16] 3 This Trust Process can be based on a multitude of different signals, some of which we have singled out in the diagram in Figure 1, namely, the Metadata which describes various properties of the Data/Information items, and the Context in which the Action will take place. The criteria used in the Trust Process are expressed by Policies determined by the Agent. Notice that in this framework, the Context contains any arbitrary information items used by the Policies, in addition to Metadata and the Data/Information items themselves. Data/Information Metadata Context Policies Trust Process Trusted Data Agent Action Figure 1 -- A Framework of the Trust Process. Continuous lines represent "consume/produce"; dashed lines represent "executes". Many, if not most, of the trust models discussed in the surveys mentioned in Section 1 [5, 23] can be regarded as providing models or representations for one or more of the elements of this trust framework, such as different representations for the metadata, or specification language for the policies, or particular types of context information that can be added to the data. Regard- less of these models, it should be clear that, as far as the Action is concerned, the whole process is binary: An incoming Data/Information item is either accepted and added to the Trusted Data, or it is not -- there are no "half filters". In other words, when time comes to Act, either the Agent uses that Data/Information item, or it does not, it cannot "use it partially" -- an element is con- sidered indivisible from the point of view of the Trust Process [2]. Thus, the actual trusting process ("Model of Trust") should not be confused with models which may attribute non-discrete or continuous values to the trustworthiness assigned to data/in- formation items that are used to determine if the incoming data/information items should be fil- tered or not ("Trust Models"). To further illustrate this difference, the earlier approaches such as [12, 21] propose to com- pute measures of trust by treating the RDF graph of the statements about the relations between resources a social network graph. The trust process is implicit in the subset of RDF properties (relations) considered. For instance, in [12], for trust between persons, an additional relation in- dicating the trust level of one person on another person, for a given "subject" (topic). Given one such graph, it is possible to extract a sub-graph with respect to a subject of interest, and then compute the proposed measures over this graph. This model does not explicitly deal with the notion of claims and how the "trusted graph" is actually built. Furthermore, it does not discuss how trust policies, including automated ones, could be integrated, and does not directly identify who the trusting agent is. The work reported in [6] introduces the notion of information filtering, in the broader con- text of information quality, one of which is trustworthiness. In this respect, it is similar to the general schema proposed here, but does not directly identify the specific components to enable 4 trust, as outlined here. Within this view of a filtering process, trust policies can be expressed in suitable languages, such as the ones proposed in [2, 15], which would be consistent with our proposed approach, but requiring extensions to represent the elements of the model proposed here, such as the trusting agent and the action to be performed. Another point to notice is that, in this framework, only the Agent determines the policies it wishes to apply to incoming Data/Information. The metadata associated with the incoming Data/Information may contain Data/Information about the publisher or provider of a Data/Infor- mation item, and the Policies may take this into account in the filtering process. In contrast, privacy issues would require adding a similar set of metadata and policies to the published Data/Information that will be consumed by the Agent, which would act as an additional filter, applied before the Data/Information is made available to the Agent. The privacy Policies of a Publisher may use information about the (requesting) Agent, the Action and the Context. In this work, we will focus on specific types of Data/Information -- those pertaining to Po- litical Systems, and one specific type of metadata, Provenance, in the context of news media. In the next section, we discuss the trust process in this context, and propose a model for information and metadata to support it. 4 News Media, Social Networks and Provenance The nature of information in news and social media must, necessarily, be seen as containing claims made by someone about some "fact" (or "statement"), i.e., someone (an agent, i.e. a person or organization) claims a certain fact to be true. It is up to the reader to accept the truth of these claimed facts. For an agent A to accept the truth of a certain claim about a hitherto unknown fact F entails either establishing the truth of F through direct observation3, (or a chain of interdependent obser- vations), or trusting the source S of the claim. The trust towards S then implies that one expects the claim to be true because S has been consistently (predictably and expectedly) correct in the past. If, however, S is not trusted, one may require some evidence to serve as the basis to establish the truth of the claim. Such evidence is, in turn, another (possibly a set of) fact(s) F1 in a claim made by some third-party SS, which S believes is more trusted by A than itself (S). In this fashion, a chain of interdependent claims is established, such that the truth of F relies on the trust towards the agent at the end of the chain (SS in this example). In most societies, certain public agents (e.g., Vital Record Office, Notary Public) have, by convention and mutual agreement among its members, the so-called "public faith", meaning that whatever they claim (about specific kinds of facts) is deemed "true". For instance, Obama's na- tionality was determined by a birth certificate which "proved" as far as the law is concerned that he is indeed a US citizen. From the discussion above, it is safe to say that provenance data about information published in the cybersphere is crucial to enable agents to consume this information -- i.e., accept it as true and eventually act based on this. This has been clearly recognized by many researchers and schol- ars studying the "fake news" phenomenon, at least with respect to "fabricated content" as out- lined in [24]. We have been involved with an initiative to publish a database about Political Agents in Brazil in the form of Linked Data, named "Se Liga na Politica"4 (SLNP). The data in this database 3 It is of common sense that a person normally trusts her/himself as a source of information, although s/he may defer on this perception if someone s/he believes to be wiser (with respect to this particular subject matter) contradicts her/him. Furthermore, current technology can success- fully trick human perception. (e.g. Google Duplex - https://goo.gl/mG4E9h). 5 is obtained from several sources, in both automated and non-automated ways. Most of the auto- mated extraction is made from official sources, such as the open data published by the House of Deputies and by the Senate. In addition to such sources, data may also be contributed by individ- uals, in crowdsourced fashion. One of the main usages for this database is to provide context information for news stories, to allow readers to establish trust in the claimed facts based on their own criteria. We present here the rationale and design decisions for the underlying ontologies used in this database, starting first with our motivations. We regard a Political System as sets of agents and organizations that govern a society. Our goal in the SNLP project is to help make the existing relationships between political agents in a Political System explicit and thus subject to analysis. We do so by providing a Linked Data da- tabase where such relationships appear as data items. Given the multiplicity of sources, and the nature of the subject matter, this database is designed so that facts are seen as claims made by some agent, and therefore provenance information becomes a "first class citizen" of the domain. The SLNP database represents claims based on the nanopublication model [14], where a claim, represented by a set of statements, is recorded as a group of three named graphs: • assertion graph - containing the set of statements that compose the claim, using the POLARE family of ontologies [17]; publication info - containing statements that give provenance information about the claim publication activity, using the provHeart PROV-O pattern [16]; provenance - containing statements that give provenance information about the claim itself, using the provHeart pattern. Further details on how Provenance can be used to support the trust process can be found in [16]. • • 5 Conclusions In this paper we have presented and explicit model of the trust process which can be seen as an evolution of a collection of previous work by several authors. It makes explicit the elements of the trust process -- Trusting Agent, Action, Information, Meta-Information, Context and Poli- cies. We have also outlined how this model is well suited to support the use of news and social media information, by representing this information as claims and recording provenance. Ongoing and future work will examine suitable policy languages; how to mine implicit pol- icies employed by humans when consuming online information; how appropriate narratives can be constructed and to better convey trusted information to human beings, and how this can be effectively communicated in human-computer interfaces. 6 References 1. Allcot, H.; Gentskow, M.; Social Media and Fake News in the 2016 Election. Journal of Economic Perspectives 31(2),Spring 2017, pp 211 -- 236 2. Almendra, V. D. S., & Schwabe, D. (2006). Trust policies for semantic web repositories. In Proceedings of 2nd International Semantic Web Policy Workshop (SWPW'06), at the 5th International Semantic Web Conference (ISWC 2006) (pp. 17-31). 3. Ananny, M., The partnership press: Lessons for platform-publisher collaborations as Facebook and news outlets team to fight misinformation, Columbia Journalism Review, https://www.cjr.org/tow_cen- ter_reports/partnership-press-facebook-news-outlets-team-fight-misinformation.php 4. Angella J. ;Kim, K; K.P. Johnson, Power of consumers using social media: Examining the influences of brand-related user-generated content on Facebook, Computers in Human Behavior, Volume 58, 2016, Pages 98-108, ISSN 0747-5632, http://dx.doi.org/10.1016/j.chb.2015.12.047. (http://www.sci- encedirect.com/science/article/pii/S0747563215303186) 6 5. Artz, D; Gil, Y.; A survey of trust in computer science and the Semantic Web, Web Semantics: Science, Services and Agents on the World Wide Web, Volume 5, Issue 2, 2007, Pages 58-71, ISSN 1570-8268, http://dx.doi.org/10.1016/j.websem.2007.03.002.(http://www.sciencedirect.com/science/arti- cle/pii/S1570826807000133) 6. Bizer, C. ; Cyganiak, R.. Quality-Driven Information Filtering Using the WIQA Policy Framework. Web Semantics: Science, Services and Agents on the World Wide Web. 7. 1-10. 10.1016/j.web- sem.2008.02.005. (2009) - http://www.websemanticsjournal.org/index.php/ps/article/view/157/155 7. Castelfranchi, C., Falcone, R. Social Trust: A Cognitive Approach. In: Castelfranchi, C.; Yao-Hua Tan (Eds.): Trust and Deception in Virtual Societies. Springer-Verlag (2001). 8. Ciampaglia, G. L.; Shiralkar, P.; Rocha, L. M.; Bollen, J.; Menczer, F.; Flammini, A.; "Computational e0128193. 2015. from Knowledge Networks", PLoS ONE, 10(6): Fact Checking http://doi.org/10.1371/journal.pone.0128193 9. Conroy, N. J., Rubin, V. L. and Chen, Y. (2015), Automatic deception detection: Methods for finding fake news. Proc. Assoc. Info. Sci. Tech., 52: 1 -- 4. doi:10.1002/pra2.2015.145052010082 10. Gerck, E.; Toward Real-World Models of Trust: Reliance on Received Information. Report MCWG- Jan22-1998, DOI: 10.13140/RG.2.1.2913.6727. http://www.safevote.com/papers/trustdef.htm. 11. Gil, Y.; Artz, D.; Towards content trust of web resources. Web Semant. 5, 4 (December 2007), 227-239. DOI:http://dx.doi.org/10.1016/j.websem.2007.09.005 12. Golbeck J., Parsia B., Hendler J. (2003) Trust Networks on the Semantic Web. In: Klusch M., Omicini A., Ossowski S., Laamanen H. (eds) Cooperative Information Agents VII. CIA 2003. Lecture Notes in Computer Science, vol 2782. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45217- 1_18 13. Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications 14. Groth, Paul, Andrew Gibson, and Jan Velterop. "The anatomy of a nanopublication." Information Ser- Surveys & Tutorials, 3(4), 2-16. vices & Use 30.1-2 (2010): 51-56. 15. Jacobi I., Kagal L., Khandelwal A. (2011) Rule-Based Trust Assessment on the Semantic Web. In: Bassiliades N., Governatori G., Paschke A. (eds) Rule-Based Reasoning, Programming, and Applica- tions. RuleML 2011. Lecture Notes in Computer Science, vol 6826. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22546-8_18 16. Laufer, C. ; Schwabe, D. . On Modeling Political Systems to Support the Trust Process. In: Privacy Online 2017, 2017, Viena. Proceedings of the 5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2017). Aachen: CEUR-WS.org, 2017. v. 1951. p. 1-16. 17. Laufer, C.; Schwabe, D.; Busson, A.; Ontologies for Representing Relations among Political Agents, https://arxiv.org/abs/1804.06015v1 18. Marwick, A., Lewis, R.. "Media Manipulation and Disinformation Online." Data & Society Research - https://datasociety.net/pubs/oh/DataAndSociety_MediaManipula- Institute, New York, 2017 tionAndDisinformationOnline.pdf 19. McKnight, D. H., & Chervany, N. L. (2001). Trust and distrust definitions: One bite at a time. In Trust in Cyber-societies (pp. 27-54). Springer Berlin Heidelberg. 20. Pinyol, I.; Sabater-Mir, J.; Computational trust and reputation models for open multi-agent systems: a review. Artificial Intelligence Review 40:1 -- 25 DOI 10.1007/s10462-011-9277-z (2013) 21. Richardson M., Agrawal R., Domingos P. (2003) Trust Management for the Semantic Web. In: Fensel D., Sycara K., Mylopoulos J. (eds) The Semantic Web - ISWC 2003. ISWC 2003. Lecture Notes in Computer Science, vol 2870. Springer, Berlin, Heidelberg - https://doi.org/10.1007/978-3-540-39718- 2_23 22. Ruchansky, N., Seo, S., & Liu, Y. (2017). CSI: A Hybrid Deep Model for Fake News. arXiv preprint arXiv:1703.06959. 23. Sherchan, W., Nepal, S., and Paris, C. 2013. A Survey of trust in social networks. ACM Comput. Surv. 45, 4, Article 47 (August 2013), 33 pages.
DOI: http://dx.doi.org/10.1145/2501654.2501661 24. Wardle, C., "Fake News. It's Complicated", FirstDraft News, https://firstdraftnews.com/fake-news- complicated/, accessed on May 12, 2017.
1708.05690
3
1708
2017-11-15T21:04:24
Modeling Spread of Preferences in Social Networks for Sampling-based Preference Aggregation
[ "cs.SI", "physics.soc-ph" ]
Given a large population, it is an intensive task to gather individual preferences over a set of alternatives and arrive at an aggregate or collective preference of the population. We show that social network underlying the population can be harnessed to accomplish this task effectively, by sampling preferences of a small subset of representative nodes. We first develop a Facebook app to create a dataset consisting of preferences of nodes and the underlying social network, using which, we develop models that capture how preferences are distributed among nodes in a typical social network. We hence propose an appropriate objective function for the problem of selecting best representative nodes. We devise two algorithms, namely, Greedy-min which provides a performance guarantee for a wide class of popular voting rules, and Greedy-sum which exhibits excellent performance in practice. We compare the performance of these proposed algorithms against random-polling and popular centrality measures, and provide a detailed analysis of the obtained results. Our analysis suggests that selecting representatives using social network information is advantageous for aggregating preferences related to personal topics (e.g., lifestyle), while random polling with a reasonable sample size is good enough for aggregating preferences related to social topics (e.g., government policies).
cs.SI
cs
Modeling Spread of Preferences in Social Networks for Sampling-based Preference Aggregation Swapnil Dhamal, Rohith D. Vallam, and Y. Narahari 1 7 1 0 2 v o N 5 1 ] I S . s c [ 3 v 0 9 6 5 0 . 8 0 7 1 : v i X r a Abstract-Given a large population, it is an intensive task to gather individual preferences over a set of alternatives and arrive at an aggregate or collective preference of the population. We show that social network underlying the population can be harnessed to accomplish this task effectively, by sampling preferences of a small subset of representative nodes. We first develop a Facebook app to create a dataset consisting of preferences of nodes and the underlying social network, using which, we develop models that capture how preferences are distributed among nodes in a typical social network. We hence propose an appropriate objective function for the problem of selecting best representative nodes. We devise two algorithms, namely, Greedy-min which provides a performance guarantee for a wide class of popular voting rules, and Greedy-sum which exhibits excellent performance in practice. We compare the performance of these proposed algorithms against random- polling and popular centrality measures, and provide a detailed analysis of the obtained results. Our analysis suggests that selecting representatives using social network information is advantageous for aggregating preferences related to personal topics (e.g., lifestyle), while random polling with a reasonable sample size is good enough for aggregating preferences related to social topics (e.g., government policies). Index Terms-Social networks, preference aggregation, repre- sentatives selection, sampling, elections. I. INTRODUCTION There are several scenarios such as elections, opinion polls, initiatives, funding decisions, etc., where a public project population (society) faces a number of alternatives. In such scenarios, the population's collective preference over the given alternatives is of importance. Ideally, one would want to obtain the preferences of all the individuals in the population and aggregate them so as to represent the population's preference. These individuals can be termed as 'voters' in this context. This process of computing an aggregate preference over a set of alternatives, given individual preferences, is termed prefer- ence aggregation (a well-studied topic in social choice theory). It is generally assumed that the preferences of all the voters are known. In real-world scenarios, however, it may not be feasible to gather the individual preferences of all the voters owing to factors such as their lack of interest to provide prompt, The original version of this paper is accepted for publication in IEEE Transactions on Network Science and Engineering. The copyright for this article belongs to IEEE. DOI 10.1109/TNSE.2017.2772878 Contact author: Swapnil Dhamal ([email protected]). S. Dhamal and R. D. Vallam were with the Department of Computer Science and Automation, Indian Institute of Science, Bangalore, when most of the work was done. A part of the work was done when S. Dhamal was with T´el´ecom SudParis, CNRS, Universit´e Paris-Saclay, France, and R. D. Vallam was with IBM India Research Labs, Bangalore. Y. Narahari is with the Department of Computer Science and Automation, Indian Institute of Science, Bangalore. truthful, well-informed, and well-thought out preferences over the given alternatives. As an immediate example, consider a company desiring to launch a future product based on its customer feedback. However, very few customers might be willing to devote the needed effort to promptly provide a useful feedback. Further, even if we manage to gather preferences of all the voters, obtaining an aggregate preference may not be feasible owing to computational issues. Owing to the difficulty involved in obtaining individual preferences of an entire population and in computing the aggregate preference, an attractive approach would be to select a subset of voters whose preferences reflect the population's preferences, and hence incentivize only those voters to report their preferences. We refer to these voters as representatives. To determine such representatives, this work proposes ideas for harnessing additional information regarding the population of voters: the underlying social network. It has been established based on a large number of empirical evidences over the years that, there is a significant correlation between the preferences of voters and the underlying social network; this can be attributed to the homophily phenomenon [1]. There have been several efforts for modeling homophily and strength of ties in social networks [2], [3]. The social network and the involved tie strengths (similarities among nodes) could thus give addi- tional information regarding the individual preferences. In the context of social networks, we use 'nodes' to repre- sent voters and 'neighbors' to represent their connections. A. Overview of the Problem and Solution Approach We now informally describe the problem addressed in this paper. Given a population and a topic (such as political party) for which alternatives need to be ranked, let pA be the col- lective (or aggregate) preference of the population computed using a certain voting (or aggregation) rule. Note that unless we have the preferences of the nodes in the population, pA is indeterminate. Suppose instead of obtaining preferences of all the nodes, we obtain preferences of only a subset of nodes and compute their collective preference, say pB. The problem we study is to find a subset of a certain cardinality k such that pB is as close as possible to pA. For determining how close pB is to pA, it is required that we deduce pA (since it is unknown to us). To do this, we need an underlying model for deducing the preferences of nodes, with which we can compute an estimate of pA using the voting rule. Motivated by the correlation that exists between the preferences of nodes and the underlying social network, we propose a model that captures how preferences are distributed in the network. Such a model would enable us to deduce the individual preferences of all the nodes, with the knowledge of preferences of a subset of nodes. With such a model in place, we would be able to estimate how close pB is to pA, and also find a subset of nodes for which this 'closeness' is optimal. The problem of determining the best representatives can thus be classified into two subproblems: (a) deducing how preferences are distributed in the population and (b) finding a subset of nodes whose collective preference closely resembles or approximates the collective preference of the population. This paper addresses these two subproblems. B. Preliminaries We now provide some preliminaries on preference aggrega- tion, required throughout the paper. Given a set of alternatives, we refer to a ranked list of alternatives as a preference and the multiset consisting of the individual preferences as preference profile. For example, if the set of alternatives is {X, Y, Z} and node i prefers Y the most and X the least, i's preference is written as (Y, Z, X)i. Suppose node j's preference is (X, Y, Z)j, then the preference profile of the population {i, j} is {(Y, Z, X), (X, Y, Z)}. A widely used measure of dissimilarity between two preferences is Kendall- Tau distance which counts the number of pairwise inversions with respect the normalized Kendall-Tau distance can be obtained by dividing (cid:17), the maximum distance between any two this distance by (cid:16)r to the alternatives. Given r alternatives, 2 2 preferences on r alternatives. For example, the Kendall-Tau distance between preferences (X, Y, Z) and (Y, Z, X) is 2, since two pairs, {X, Y } and {X, Z}, are inverted between them. The normalized Kendall-Tau distance is 2/ (cid:16)3 (cid:17). An aggregation rule takes a preference profile as input and outputs the aggregate preference, which aims to reflect the collective opinion of all the nodes. We do not assume any tie-breaking rule in order to avoid bias towards any particular alternative while determining the aggregate preference. So an aggregation rule may output multiple aggregate preferences (that is, aggregation rule is a correspondence). A survey of voting rules and their extensions to aggregation rules, can be found in [4]. We consider several aggregation rules for our study, namely, Bucklin, Smith set, Borda, Veto, Minmax (pair- wise opposition), Dictatorship, Random Dictatorship, Schulze, Plurality, Kemeny, and Copeland. C. Relevant Work This work is at the interface of social network analysis and voting theory. Specifically, we adapt a model of opinion dynamics in social networks, so as to model how preferences are distributed in a network. Using the adapted model, we sample a subset of nodes which could act as representatives of the network. The research topics of relevance to our work are thus, relation between social networks and voting, models of opinion dynamics, and network sampling. We now present the relevant literature and position our work. 1) Social networks and voting: The pioneering Columbia and Michigan political voting research [5] emphasizes on the importance of the underlying social network. It has been 2 observed that the social network has higher impact on one's political party choice than background attributes like class or ethnicity [6] as well as religion, education, and social sta- tus [7]. It has been argued that interactions in social networks have a strong, though often overlooked, influence on voting, since interactions allow an individual to gather information beyond personal resource constraints [8], [9]. The impact of social networks has also been compared with that of mass media communication with respect to voting choices, where it is observed that social discussions outweigh the media effect [10], and that both the effects should be studied together [11]. On the other hand, it has also been argued via a maximum likelihood approach to political voting, that it is optimal to ignore the network structure [12]. It is also not uncommon to observe highly accurate predictions about election outcomes by soliciting opinions of randomly chosen voters. There are supporting arguments for both views (regarding whether or not social network plays a role in voting); so one of the goals of this work is to identify conditions under which social network visibly plays a role. As we will see, our work suggests that social network and homophily indeed play a critical role in voting related to personal topics (such as lifestyle). However, for voting related to social topics (such as government policies), factors which are external to the network and common to all nodes (such as mass media channels) could play a strong role, which would allow ignoring social network if the sample size is reasonable. 2) Models of opinion dynamics: Opinion dynamics is the process of development of opinions in a population over time, primarily owing to the information exchanged through interactions. Several models of opinion dynamics in networks have been studied in the literature [1], [13], [14], such as DeGroot, Friedkin-Johnsen, Independent Cascade, Linear Threshold, etc. Since opinions and networks are key factors in opinion dynamics as well as our setting, it is natural to consider the applicability of opinion dynamics techniques to our setting. One of the primary factors that distinguishes our setting from opinion dynamics is that, the edge weights in opinion dy- namics represent influence weights or probabilities, while the edge weights in our setting represent probability distributions over similarity values (homophilic tie strengths). So if one intends to use the models of opinion dynamics for the problem under consideration, they need to be appropriately adapted. In this paper, we propose an adaptation of the Independent Cascade model; instead of deducing the probability of a node getting influenced (given edge probabilities and a subset of nodes which are already influenced), we deduce the preference of a node (given homophilic tie strengths and the preferences of a subset of nodes). 3) Network sampling: A taxonomy of different graph sam- pling objectives and approaches is provided in [15]. Problems in developing a general theory of network sampling are dis- cussed in [16]. A discussion on which sampling method to use and how small the sample size can be, is provided in [17]; there it is also experimentally observed that simple uniform random node selection performs surprisingly well. The problem of finding a subset of users to statistically represent the original social network has also been studied [18], [19]. Our setting principally deviates from the existing literature in that, as stated earlier, we consider edges having probability distributions over similarity values (instead of weights or prob- abilities). Moreover, we address the problem of sampling best representative nodes based on a ranked list of alternatives, and undertake a study to determine the performance of sampling- based approach for preference aggregation with respect to a number of voting rules. Furthermore, the problem of node selection based on ranked list of alternatives has been studied by utilizing the attributes of voters and alternatives [20], however, the underlying network is ignored. D. Our Contributions Our specific contributions are as follows. • We develop a Facebook app to create a dataset consisting of the preferences of nodes over a variety of topics and the underlying social network. With this dataset, we pro- pose and validate a number of simple yet faithful models with the aim of capturing how preferences are distributed among nodes in a social network, while having probabilistic information regarding tie similarities. • We formulate an objective function for the problem of determining best representative nodes in a social network, and hence propose a robustness property for aggregation rules to justify appropriateness of two surrogate objective functions for computational purpose. • We provide a guarantee on the performance of one of the algorithms (Greedy-min), and study desirable properties of a second algorithm (Greedy-sum) which exhibits excellent performance in practice. We compare these algorithms with the popular random polling method and well-known centrality measures over a number of voting rules, and analyze the results. • We present insights on the effectiveness of our approach with respect to personal and social topics. We believe the results in this paper offer a rigorous model for capturing spread of preferences in a social network, and present effective methods for sampling-based preference ag- gregation using social networks. II. MODELING SPREAD OF PREFERENCES IN A SOCIAL NETWORK In this section, we first introduce the idea of modeling the spread of preferences in a social network, with an analogy to modeling opinion dynamics. We then describe the dataset created through our Facebook app and hence develop a number of simple and intuitive yet faithful models for deducing the spread of preferences across the nodes in a social network. Here we use the term 'spread' to indicate distribution, not diffusion (we do not use the term 'distribution' of preferences 3 since we frequently use it in the context of probability distribu- tions). We treat an edge as representing similarity (tie strength with respect to homophily) between two connected nodes, and not as influence weights or probabilities as in opinion dynamics models. The preferences of the nodes could have resulted owing to opinion dynamics over the network, along with external influences such as mass media channels. Our goal here is to model the spread of these preferences while knowing the edge weights indicating similarities. A. Dataset for Modeling Spread of Preferences in a Social Network We presented a connection between the opinion dynamics setting and our setting in Section I-C2. It is assumed while studying opinion dynamics that the edge influence weights or probabilities are given, using which, a model (such as Indepen- dent Cascade and Linear Threshold) predicts the probability with which each node would get influenced starting with a given seed set. Alternatively, models such as DeGroot would predict the final opinion of each node, based on the edge influence weights which are assumed to be given. On similar lines, for our proposed models in Section II-C, we assume the edge similarity parameters to be given, using which we deduce the preference of each node. It can also be viewed that, given the edge parameters indicating homophilic tie strengths, we aim to find preferences of all nodes such that they are consistent with the given parameters for all edges, that is, how preferences are distributed or spread across the nodes in the network. These edge parameters, however, would need to be inferred from some available data. This, again, is on similar lines as opinion dynamics models, where the influence weights or probabilities would be required to be inferred from some past data. In order to develop models for achieving the aforementioned objectives, there was a need of a dataset that consists of (a) preferences of nodes for a range of topics and (b) the underlying social network. With this underlying goal, we developed a Facebook app titled The Perfect Representer, which asked the app users to report their preferences for 8 topics, over 5 alternatives for each topic. The topics (broadly classified into personal and social types), their alternatives, the network of app users, and details about dataset preprocessing, are provided in Appendix A. Table I provides some statistics of this dataset. Table II presents the notation used throughout the paper. TABLE I STATISTICS OF THE FACEBOOK DATASET number of nodes number of edges average clustering coefficient number of triangles fraction of closed triangles diameter 90-percentile effective diameter power law exponent 844 6129 0.5890 33216 0.4542 13 4.9 2.12 TABLE II NOTATION USED IN THE PAPER N E n m r P d(x, y) f i, j d(i, j) c(i, j) k M Φ(M, i) Q Q(cid:48) ∆ set of nodes in the network set of edges in the network number of nodes in the network number of edges in the network number of alternatives preference profile of N distance between preferences x and y preference aggregation rule typical nodes in the network expected distance between preferences of i and j 1 − d(i, j) desired cardinality of the representative set set of representatives who report their preferences representative of node i in set M profile containing unweighted preferences of M profile containing weighted preferences of M error operator between aggregate preferences B. Modeling Distance between Preferences of Nodes In order to study the homophilic tie strength or similarity between two nodes with respect to their preferences, we use the measure of normalized Kendall-Tau distance. The histogram of distance between preferences of most pairs of nodes (connected as well as unconnected), over the considered topics, followed a bell curve (most distances were clubbed together, with few of them spread apart). As a preliminary fit to the data, we consider Gaussian distribution since it is a natural and most commonly observed distribution in real- world applications. Since the range of values taken by the distance is bounded between 0 and 1, we consider Truncated Gaussian distribution. Furthermore, as the range of values is discrete, we consider a discrete version of truncated Gaussian distribution; denote it by D. The discretization can be done in the following way. We know that when the number of alternatives is r, the distance between consecutive discrete values is 1/ r(r−1). Let F be the cumulative distribution function of the continuous truncated Gaussian distribution; the value of the probability mass function of D at x can be shown (cid:27)(cid:19) (cid:18) to be (cid:27)(cid:19) = 2 (cid:26) (cid:16)r (cid:17) (cid:26) (cid:18) 2 F min x + 1 r(r − 1) , 1 − F max x − 1 r(r − 1) , 0 . So for a pair of nodes {i, j}, there is an associated histogram of normalized Kendall-Tau distances over different topics. To this histogram, we attempt to fit distribution D using MLE, and infer the corresponding parameters (µij and σij of the original Gaussian distribution from which D is derived). We use KL divergence to find the fitting error between the true histogram obtained from the data and the fitted distribution D. This process is run for all pairs of nodes; the resulting histogram of KL divergences over all pairs is presented in Figure 1. The root mean square (RMS) KL divergence for connected as well as unconnected pairs was observed to be 0.25 with more than 90% pairs having KL divergence less than 0.6. 4 Fig. 1. Histogram of KL divergence between the normalized histograms and the distribution D obtained using MLE for all pairs of nodes Let the expected distance between nodes i and j with respect to their preferences, be denoted by d(i, j). Let distance matrix be a matrix whose cell (i, j) is d(i, j) and similarity matrix be a matrix whose cell (i, j) is c(i, j) = 1 − d(i, j). Following are certain statistics about d(i, j)'s over all pairs of nodes in the obtained Facebook app data. The means (= avg {i,j} d(i, j)) for personal, social, and both types of topics are respectively 0.40, 0.30, 0.35, while the standard deviations are respectively 0.12, 0.08, 0.09. (Our focus throughout this paper will be on aggregating preferences across all topics or issues; we provide a preliminary analysis by considering different types of topics separately, in Section IV-E). C. Modeling Spread of Preferences in Social Network Recollect that the primary objective of modeling the spread of preferences in a social network is to identify best set of representative nodes for the entire social network. In order to do this, we need not only the distribution of distances between connected nodes, but also that between unconnected nodes. As an analogy to modeling opinion dynamics as per models such as Independent Cascade, in order to identify best set of seed nodes for maximizing opinion diffusion, we need the influence of a candidate set, not only on its neighbors but also on distant nodes. Given the preferences of a set of nodes (call it initializing set), our models aim to deduce the possible preferences of all the nodes in the social network. If this model is run for several iterations, say T, with a randomized initializing set in each iteration, we would have deduced the preferences of nodes for these T generated (or simulated) topics (and hence T preference profiles). This would then enable us to deduce the distribution of distances between unconnected nodes as well. We address each of our models as a Random Preferences Model (RPM) since the deduced preferences and hence the distances are randomized. The models that we propose work iteratively (similar to the Independent Cascade model wherein iterations correspond to time steps). In each iteration, we partition the nodes into two sets, namely, (1) assigned nodes which are assigned a 00.30.60.91.20123456x 104KL divergenceNumber of pairs Algorithm 1: A generic model for spread of preferences in a social network Input: Connected graph G with parameters µ, σ on its edges, Number of generated (simulated) topics T Output: Preference profiles for T generated topics for t ← 1 to T do Randomly choose an initializing set of certain size s; Assign preferences to nodes in this initializing set; for i ← 1 to n − s do Choose an unassigned node u uniformly at random from the set of potentially next nodes; Assign a preference to u based on: (i) the model under consideration and (ii) either (a) preferences of assigned neighbors or (b) preference of one of its assigned neighbors chosen based on a certain criterion; preference, and (2) unassigned nodes which are not assigned a preference as yet. Let potentially next nodes in a given iteration be the subset of unassigned nodes, which have at least one neighbor in the set of assigned nodes. Starting with the nodes in the initializing set as the only assigned nodes, a node is chosen uniformly at random from the set of potentially next nodes in each iteration, and is assigned a preference based on the preferences of its assigned neighbors (neighbors belonging to the set of assigned nodes). Algorithm 1 presents a generic model on these lines. Note that the preference profiles are obtained by considering independently sampled initializing sets across iterations (ver- sus considering the same set in models such as Independent Cascade). Also, social networks are known to have a core- periphery structure. Considering a random core node and a random periphery node, the latter is more likely to deduce its preference due to the preference of the former, than the other way around; this is captured over iterations in Algorithm 1. We now present a number of models as its special cases. 1) Independent Conditioning (RPM-IC): Let Pj be the random preference to be assigned to a node j and Aj be the set of assigned neighbors of node j. So given the preferences of its assigned neighbors, the probability of node j being assigned a preference pj is (cid:1) P(cid:0)Pj = pj(Pi = pi)i∈Aj P(cid:0)(Pi = pi)i∈AjPj = pj P(cid:0)(Pi = pi)i∈AjPj = pj (cid:80) ∝ P(cid:0)(Pi = pi)i∈AjPj = pj (cid:1) = pj (cid:1) P(Pj = pj) (cid:1) P(Pj = pj) (Bayes' rule) The proportionality results since the denominator is com- mon, and P(Pj = pj) = 1 r! for all pj's (assuming no prior bias). Now we make a simplifying assumption of mutual independence among the preferences of assigned neighbors of node j, given its own preference. So the above proportionality results in P(cid:0)Pj = pj(Pi = pi)i∈Aj (cid:1) ∝ (cid:89) i∈Aj P(Pi = piPj = pj) (1) 5 The right hand term consists of factors P(Pi = piPj = pj) for each i ∈ Aj. P(Pi = piPj = pj) says, given we have assigned preference pj to j, what is the probability that i had preference pi? We now show how to compute it. Let Dij be the random variable corresponding to the distance between i and j (so Dij has distribution D with values of µ, σ corresponding to pair {i, j}). Let d(pi, pj) be the distance between preferences pi and pj. So, (cid:17) (cid:17) P (Pi = piPj = pj ) = P(cid:16) = P(cid:16) = P(cid:16) Here, P(cid:16) other, P(cid:16) Pi = pi, Dij = d(pi, pj )Pj = pj Dij = d(pi, pj )Pj = pj Dij = d(pi, pj ) (cid:17) P(cid:16) (cid:17) P(cid:16) (∵ given Pj , Pi ∩ Dij = Pi) Pi = piDij = d(pi, pj ), Pj = pj (2) (∵ Dij is independent of Pj ) (cid:17) Pi = piDij = d(pi, pj ), Pj = pj (cid:17) (cid:17) Dij = d(pi, pj) Pi = piDij = d(pi, pj), Pj = pj can be readily obtained by look- ing at the distribution D corresponding to {i, j}. Also, as we assume that no preference has higher priority than any is precisely the reciprocal of the number of preferences which are at dis- tance d(pi, pj) from a given preference. This value can be expressed in terms of distance d(pi, pj) and the number of alternatives. As an example for the case of 5 alternatives, the number of preferences which are at a normalized Kendall- Tau distance of 0.1 (or Kendall-Tau distance of 1) from any given preference is 4; for example, if the given preference is (A, B, C, D, E), the 4 preferences are (B, A, C, D, E), (A, C, B, D, E), (A, B, D, C, E), (A, B, C, E, D). It is clear that this count is independent of the given preference. The initializing set for this model is a singleton set chosen uniformly at random, and is assigned a preference chosen uniformly at random from the set of all preferences. For each unassigned node, this model computes probabilities for each of the r! possible preferences, by looking at the preferences of its assigned neighbors, and hence chooses exactly one preference based on the computed probabilities (multinomial sampling). So the time complexity of this model for assigning preferences i∈N deg(i))T) = O(r!mT), where deg(i) is the degree of node i. Note that the initializing set is taken to be singleton, since an initializing set consisting of multiple nodes may lead to conflict in preferences, and hence inconsistencies with the distributions. for T topics is O(r!((cid:80) 2) Sampling (RPM-S): For assigning preference to an unas- signed node j, we first choose one of its assigned neighbors i; say its assigned preference is pi. Then we sample a value from the discretized truncated Gaussian distribution D having the parameters (µij, σij); say the sampled value is dij. Following this, we choose a preference pj such that the Kendall Tau distance between pi and pj, that is d(pi, pj), is dij (in case of multiple possibilities, choose pj uniformly at random from among these possibilities). The assigned neighbor i ∈ Aj could be selected in multiple ways; we enlist three natural ways which we consider in our study: a) Random: A node is selected uniformly at random from Aj. This is a natural way and is immune to overfitting. b) µ-based: A node i is selected from Aj with probability proportional to 1 − µij (multinomial sampling). This is consistent with the empirical belief that a node's preference depends more on its more similar neighbors. c) σ-based: A node i is selected from Aj with probability proportional to 1/σij (multinomial sampling). This is sta- tistically a good choice because, giving lower priority to distributions with low standard deviations may result in extremely large errors. Like RPM-IC, the initializing set for this model also is a singleton set chosen uniformly at random, and is assigned a preference chosen uniformly at random from the set of all preferences. For each unassigned node, this model selects an assigned neighbor in one of the above ways, samples a distance value from the corresponding distribution, and chooses a preference uniformly at random from the set of preferences which are at that distance from the preference of the selected assigned neighbor. So the time complexity of this model for i∈N deg(i))T) = assigning preferences for T topics is O(r!((cid:80) O(r!mT). 3) Duplicating (RPM-D): In this model, node j is assigned a preference by duplicating the preference of its most similar assigned neighbor. This model pushes the similarity between a node and its most similar assigned neighbor to the extreme extent that, the preference to be assigned to the former is not just similar to the latter, but is exactly its copy due to imitation. Here, if the initializing set is a singleton, all nodes would have the same preference (since the graph is assumed to be connected). A small-sized initializing set also would lead to very few distinct preferences. So as a heuristic, the initializing set for this model is a connected set of certain size s which is obtained using the following iterative approach: start with a node chosen uniformly at random and then continue adding a new node to the set uniformly at random, from among the nodes that are connected to at least one node in the set. In our experiments, we choose s itself to be uniformly n(cid:101)} (similar to the information n(cid:101) is usually a good heuristic upper bound for the size of the seed set). The nodes in this initializing set are assigned preferences based on RPM-IC. The time complexity of this model for assigning preferences for T topics at random from {1, . . . ,(cid:100)√ diffusion setting where (cid:100)√ is O(((cid:80) i∈N deg(i))T) = O(mT). 4) Random (RPM-R): In this model, preferences are as- signed randomly to all the nodes without considering the distribution of distances from their neighbors, that is, without taking the social network effect into account. This model can be refined based on some known bias in preferences, for instance, there may be a prior distribution on preferences owing to common external effects such as mass media. Its time complexity for assigning the preferences for T topics is O(nT). 5) Mean Similarity Model - Shortest Path Based (MSM-SP): Unlike the models discussed so far, this model does not deduce the spread of preferences in a social network. 6 TABLE III A PARTIAL VIEW OF TABLE T5 0.00 0.00 0.10 0.10 0.17 0.20 0.20 0.26 0.32 0.30 0.30 0.33 0.37 0.40 0.40 0.40 0.42 0.43 0.45 0.47 0.50  dx dy 0.50 0.50 0.50 0.50 0.50 0.50 0.00 0.10 0.20 0.30 0.40 0.50 Instead, it deduces the mean similarity between any pair of nodes, given the mean similarities of connected nodes. Recall that cell (i, j) of a distance matrix contains d(i, j), the expected distance between preferences of nodes i and j. We initialize all values in this matrix to 0 for i = j and to 1 (the upper bound on distance) for any unconnected pair {i, j}. In the case of a connected pair {i, j}, the value d(i, j) is initialized to the actual observed expected distance (this value is known from the edge parameters indicating homophilic tie strength). Following the initialization of the distance matrix, the next step is to update it. Consider nodes (i, v, j) where we know the expected dis- tances d(v, i) and d(v, j), and we wish to find d(i, j) via node v. Given the preference of node v and dx = d(v, i), let the preference of node i be chosen uniformly at random from the set of preferences that are at a distance η from the preference of node v, where η is drawn from distribution D with mean dx (and some standard deviation). Similarly, given dy = d(v, j), let the preference of node j be obtained. Using this procedure, the distance between the obtained preferences of nodes i and j via v over several iterations and varying values of standard deviations, was observed to follow a bell curve; so we again approximate this distribution by D. Let the corresponding expected distance constitute the cell (dx, dy) of a table, say Tr, where r is the number of alternatives (for the purpose of forming a table, we consider only finite number of values of dx, dy). It is clear that this distance is independent of the actual preference of node v. r (cid:54)= r(cid:48). Following are the general properties of Tr: We empirically observe that Tr is different from Tr(cid:48) for • Tr(dy, dx) = Tr(dx, dy) • Tr(1 − dx, dy) = Tr(dx, 1 − dy) = 1 − Tr(dx, dy) • Tr(1 − dx, 1 − dy) = Tr(dx, dy) As the topics of our app had 5 alternatives, we obtain the table T5 for any pair {dx, dy}. In order to consider finite number of values of dx, dy for forming the table, we only account for values that are multiples of 0.01 (and also round every entry in Tr to the nearest multiple of 0.01). Table III presents a partial view of T5 which can be completed using the general properties of Tr enlisted above; we present dx, dy in multiples of 0.10 for brevity. Now the next question is to find d(i, j) for any pair {i, j}. In order to provide a fit to the distances obtained from the dataset, we initialize the distance matrix as explained in the beginning of this subsection (while rounding every value to the nearest multiple of 0.01) and update it based on the all pairs shortest path algorithm [21] with the following update rule: if d(v, i) +(cid:13)r d(v, j) < d(i, j) then d(i, j) = d(v, i) +(cid:13)r d(v, j), where we define operator +(cid:13)r as follows: (cid:40) dx +(cid:13)r dy = Tr(dx, dy), max{dx, dy}, if dx ≤ 0.5 and dy ≤ 0.5 if dx > 0.5 or dy > 0.5 The corresponding similarity matrix is obtained by assigning 1 − d(i, j) to its cell (i, j). The two cases while defining +(cid:13)r ensure that d(i, j) via v is assigned a value which is at least max{d(v, i), d(v, j)}. This is to guarantee the convergence of the adapted all pairs shortest path algorithm. The time complexity of deducing the mean distances be- tween all pairs of nodes using MSM-SP is dominated by the all pairs shortest path algorithm, O(n2 log n + nm) using Di- jkstra's algorithm over all source nodes, where m is generally small owing to sparsity of social networks. Remark 1. We have already seen the time complexities of the models (other than MSM-SP) for assigning preferences for T topics; the time complexity of deducing the mean distances between all pairs of nodes after that, is O(Grn2T), where Gr is the time complexity of computing the distance between two preferences (for instance, Gr is O(r2) for Kendall-Tau distance, O(r) for Spearman Footrule distance). D. Validating the Models To validate a given model, we generated the preferences of all the nodes for T = 104 simulated topics. Following this, we could get the distances between preferences of every pair of nodes in terms of normalized Kendall-Tau distance. In order to measure the error err({i, j}) of this deduced model distribution against the distribution D with the actual values of µij and σij for a particular pair of nodes {i, j}, we used the following methods: 1) Kullback-Leibler (KL) divergence, a standard way of mea- suring error between actual and model distributions, 2) Earth Mover's distance (EMD), another measure of the distance between two probability distributions, 3) Absolute difference between the means of these two dis- tributions, since some of our algorithms would be working with the distribution means, 4) Chi-Square Goodness of Fit Test, a non-parametric test to compare the obtained distribution with the expected probability distribution (we use significance level 0.05). (cid:113) For methods 1-3, we measured the total error over all pairs of nodes as the root mean square (RMS) error, that avg {i,j}[err({i, j})]2. Figure 2 provides a comparison is, among the models under study, with respect to their errors and running times. (Note that RMS KL divergence and EMD are not applicable for MSM-SP). RPM-IC gave the least errors but at the cost of extremely high running time. RPM-D and RPM-R ran fast but their errors were in a higher range. RPM- S showed a good balance between the errors and running time; the way of choosing the assigned neighbor (µ-based, σ-based, or random) did not show significant effect on its results. MSM-SP was observed to be the best model when 7 Fig. 2. Comparison among the considered models when run for 104 iterations (or simulated topics) FRACTION OF PAIRS FAILING CHI-SQUARE GOODNESS OF FIT TEST TABLE IV RPM-IC 0.001 RPM-S RPM-D RPM-R MSM-SP 0.02 0.96 0.99 NA our objective was to deduce the mean distances between all pairs of nodes, and not the preferences themselves. With 5 alternatives, the normalized Kendall-Tau distances can take 11 possible values {0, 0.1, . . . , 0.9, 1}. The upper critical value of chi-square distribution with 10 degrees of freedom for significance level 0.05 is 18.307. The test is failed if the chi- square test statistic exceeds this value. The chi-square statistic is high (punishes heavily) if the deduced distribution allots non-negligible probability to values which are allotted negligible probability by the actual distri- bution. This was the case for a large fraction of pairs when using RPM-D and for over 99% of pairs when using RPM-R, thus leading to high fractions of failures. Remark 2. Owing to a good balance between accuracy and efficiency, RPM-S can be justified to be used for deducing the preferences of nodes in a social network, with the knowledge of preferences of a subset of nodes. However, if we need only the deduced edge similarities for all pairs of nodes without having to deduce the actual preferences, MSM-SP is a promising model. As explained in Section I-A, a model that could deduce the preferences of all the nodes, would allow us to deduce the actual aggregate preference of the network. This would hence allow us to estimate how closely the aggregate preference obtained using a set of representative nodes resembles the actual aggregate preference. With an estimate of closeness associated with every candidate representative set, it would now be possible to determine a representative set with the closest resemblance. The focus of the following sections will be on formulating an objective function that quantifies this closeness, and hence developing algorithms for determining the best representative set. RPM−ICRPM−S RPM−D RPM−R MSM−SP00.20.40.60.8NANAModelsRMS error RPM−ICRPM−S RPM−D RPM−R MSM−SP050100150200Running time (hours)RMS KL divergenceRMS EMDRMS error in meanRunning Time III. THE SAMPLING-BASED PREFERENCE AGGREGATION PROBLEM Given a network with a set of nodes N and an aggregation rule f, our objective is to choose a set of representative nodes M ⊆ N of certain cardinality k, and aggregate their prefer- ences to arrive at an aggregate preference that is 'close enough' to the aggregate preference of N using f, in expectation (in expectation, owing to the stochastic nature of the edge similarities). We now formalize this problem. Let the expected distance between a set S ⊆ N and a node i ∈ N be d(S, i) = min j∈S d(j, i) (3) We call d(S, i) as the 'expected' distance since d(j, i) is the expected distance between nodes j and i with respect to their preferences. Since d(i, i) = 0,∀i ∈ N, we have d(S, j) = 0,∀j ∈ S. Let Φ(S, i) ∼U arg min j∈S d(j, i) (4) be a node chosen uniformly at random from the set of nodes in S that are closest in expectation to node i in terms of preferences. We say that Φ(S, i) represents node i in set S. In other words, Φ(S, i) is the unique representative of i in S. A. Aggregating Preferences of Representative Nodes Recall that preference profile is a multiset containing prefer- ences of the nodes. Let the preference profile of the population N be P and that of the selected representative set M be Q. Suppose M = {i, j} where j represents, say ten nodes including itself, while i represents one node (only itself). If the preferences are aggregated by feeding Q to aggregation rule f, the aggregate preference f (Q) so obtained may not reflect the preferences of the population, in general, owing to the asymmetry in importance of the selected nodes. So to capture this asymmetry, their preferences must be weighted. In our approach, the weight given to the preference of a node is precisely the number of nodes that it represents. Let Q(cid:48) be the preference profile obtained by replacing every node's preference in P by its uniquely chosen representative's preference. So, k = M = Q ≤ Q(cid:48) = P = N = n. In our approach, the weight of a representative implies the number of nodes it represents or equivalently, the number of times its preference appears in the new preference profile. the new profile Q(cid:48) consists of So in the above example, ten preferences of j and one of i. Thus we aggregate the preferences of selected nodes using f (Q(cid:48)). So the problem under consideration can be viewed as a setting where given certain nodes representing a population, every node in the population is asked to choose one among them as its representative; now the representatives vote on behalf of the nodes who chose them. B. A Measure of 'Close Enough' Now given k, our objective is to select a set of nodes M such that M = k, who report their preferences such that, in expectation, the error incurred in using the aggregate preference, say f (R), obtained by aggregating the preferences 8 of the nodes in M (in an unweighted manner if R = Q or in a weighted manner if R = Q(cid:48)) instead of f (P ) obtained by aggregating the preferences of the nodes in N, is minimized. Note that an aggregation rule f may not output a unique aggregate preference, that is, f is a correspondence. So the aggregation rule f on the preferences of the entire population outputs f (P ) which is a set of preferences. If f (R) is a set of multiple preferences, we need to have a way to determine how close it is to f (P ). For this purpose, we propose an extension of Kendall-Tau distance for sets of preferences. Now, since f (P ) is generally not known and all preferences in f (R) are equivalent in our view, we choose a preference from f (R) uniformly at random and see how far we are from the actual aggregate preference, in expectation. In order to claim that a chosen preference in f (R) is a good approximation, it suffices to show that it is close to at least one preference in f (P ). Also, as any preference y in f (R) is chosen uniformly at random, we define the error incurred in using f (R) instead of f (P ) as (cid:20) (cid:21) f (P ) ∆ f (R) = Ey∼U f (R) min x∈f (P ) d(x, y) (5) where d(x, y) is the distance between preferences x and y in terms of the same distance measure as d(·,·) (normalized Kendall-Tau distance in our case). Notice that in general, f (P ) ∆ f (R) (cid:54)= f (R) ∆ f (P ). For instance, if f (P ) = {pA, pB}, f (R) = {pA}, the error is zero since we have ob- tained an aggregate preference that is among the actual aggre- gate preferences. On the other hand, if f (P ) = {pA}, f (R) = {pA, pB}, there is a half probability of choosing pA which is consistent with the actual aggregate preference, however, there is a half probability of choosing pB which is inconsistent; this d(pB, pA). Note that ∆ can be results in f (P ) ∆ f (R) = 1 2 defined in several other ways depending on the application or the case we are interested in (worst, best, average, etc.). In this paper, we use the definition of ∆ as given in Equation (5). Recall that the distance between a pair of nodes is drawn from distribution D with the corresponding parameters, so the realized values for different topics would be different in general. The value f (P ) ∆ f (R) can be obtained for every topic and hence the expected error E[f (P ) ∆ f (R)] can be computed by averaging the values over all topics. It can be easily seen that E[f (P ) ∆ f (R)] ∈ [0, 1]. Now our objective is to find a set M such that E[f (P ) ∆ f (R)] is minimized. C. An Abstraction of the Problem For aggregation rule f, we define the objective function to be F(M ) = 1 − E[f (P ) ∆ f (R)] with the objective of finding a set M that maximizes this value. However, even if M is given, computing F(M ) is computationally intensive for several aggregation rules and furthermore, hard for rules such as Kemeny. It can be seen that F(·) is not monotone for non-dictatorial aggregation rules (the reader is referred to Figure 3 for the non-monotonic plots of Greedy-sum and Degree-cen algorithms since in a run of these algorithms, a set of certain cardinality is a superset of any set having a smaller cardinality). It can also be checked empirically that F(·) is neither submodular nor supermodular. Even for simple non-dictatorial aggregation rules, it is not clear if one could efficiently find a set M that maximizes F(·), within any constant approximation factor. This motivates us to propose an approach that finds set M agnostic to the aggregation rule being used. To this end, we propose a property for preference aggregation rules, weak insensitivity. Definition 1 (weak insensitivity property). A preference ag- gregation rule satisfies weak insensitivity property under a distance measure and an error operator between aggregate preferences ∆, if and only if for any d, a change of ηi ≤ d in the preferences of all i, results in a change of at most d in the aggregate preference. That is, ∀d, ηi ≤ d , ∀i ∈ N =⇒ f (P ) ∆ f (P (cid:48)) ≤ d where P (cid:48) is the preference profile of voters after deviations. We call it 'weak' insensitivity property because it allows 'limited' change in the aggregate preference (strong insensi- tivity can be thought of as a property that allows no change). This is potentially an important property that an aggregation rule should satisfy as it is a measure of its robustness in some sense. It is clear that under normalized Kendall-Tau distance measure and ∆ as defined in Equation (5), an aggregation rule that outputs a random preference does not satisfy weak insensitivity property as it fails the criterion for any d < 1, whereas dictatorship rule that outputs the preference of a single voter satisfies the property trivially. For our purpose, we propose a weaker form of this property, which we call expected weak insensitivity. Definition 2 (expected weak insensitivity property). A pref- erence aggregation rule satisfies expected weak insensitivity property under a distribution, a distance measure, and an error operator between aggregate preferences ∆, if and only if for any µd, a change of ηi in the preferences of all i, where ηi is drawn from the distribution with mean δi ≤ µd and any permissible standard deviation σd, results in an expected change of at most µd in the aggregate preference. That is, ∀µd, ∀ permissible σd, δi ≤ µd , ∀i ∈ N =⇒ E[f (P ) ∆ f (P (cid:48))] ≤ µd (6) where P (cid:48) is the preference profile of voters after deviations. Note that in E[f (P ) ∆ f (P (cid:48))], the expectation is over the varying modified preferences of the voters (since ηi's vary across instances and also, there are multiple preferences at a distance of ηi from any given preference, in general). In this paper, we study expected weak insensitivity property under distribution D, normalized Kendall-Tau distance, and ∆ as defined in Equation (5). For distribution D with µd ∈ [0, 1], the permissible range of σd depends on µd. This range is wider for intermediate values of µd and shortens as we move towards the extremes. In any case, the permissible range for σd cannot ≈ 0.28 (value at which the truncated Gaussian exceed becomes a Uniform distribution), while for µd ∈ {0, 1}, the permissible σd = 0 (since a Gaussian distribution truncated in [0, 1] with any non-zero standard deviation cannot have 0 or 1 as the mean). 1√ 12 9 TYPICAL FRACTIONS OF SIMULATION RUNS IN WHICH THE CRITERION TABLE V FOR EXPECTED WEAK INSENSITIVITY WAS SATISFIED BY VARIOUS AGGREGATION RULES UNDER DISTRIBUTION D, NORMALIZED KENDALL-TAU DISTANCE, AND ∆ AS DEFINED Dictatorship Copeland Minmax .87 1.00 .97 Kemeny Smith set Plurality .85 .998 .95 Bucklin Schulze Borda .82 Veto .997 .92 .69 2 (cid:16)r (cid:17) (the finest resolution for the given r), and discrete Remark 3. We conducted extensive simulations for inves- tigating empirical satisfaction of the expected weak insen- sitivity property by the considered aggregation rules under distribution D, normalized Kendall-Tau distance, and ∆ as defined in Equation (5). The simulations considered values of r = 3, . . . , 7, n = 100, 200, . . . , 1000, different distributions on the voter preferences, discrete values of µd separated by 1/ values of σd separated by 10% of the maximum permissible value for the corresponding µd. For any fixed preference profile, Table V presents typical fractions of simulation runs in which Criterion (6) was satisfied, by various aggregation rules. Dictatorship rule always satisfied the criterion, whereas Smith set and Schulze rules satisfied it almost always. It was, however, violated by Veto rule for a large fraction of simulation runs. For all other considered rules, if (6) was violated, it was usually for the lowest values of µd. Furthermore, in most cases, the extent of violation was not very significant. So if µd is not very small, these rules could be assumed to satisfy the expected weak insensitivity property for practical purposes. Lemma 1. Given a distance measure and a ∆, with a pref- erence aggregation rule satisfying expected weak insensitivity property under distribution D, if the expected distance between every node and the representative set M is at most d ∈ [0, 1], then the expected error incurred in using f (Q(cid:48)) instead of f (P ) is at most d. That is, for d ∈ [0, 1], d(M, i) ≤ d , ∀i ∈ N =⇒ E[f (P ) ∆ f (Q(cid:48))] ≤ d Proof. In the preference profile P of all nodes, the preference of any node i ∈ N is replaced by the preference of its repre- sentative node p = Φ(M, i) to obtain Q(cid:48). From Equations (3), (4), and the hypothesis, we have d(p, i) ≤ d. Since in P , preference of every i is replaced by that of the corresponding p to obtain Q(cid:48), and distance between i and p is distributed according to distribution D with mean d(p, i) and some standard deviation σd, the above is equivalent to node i deviating its preference by some value which is drawn from distribution D with mean d(p, i) = d(M, i). So we can map these variables to the corresponding variables in Equation (6) as follows: δi = d(M, i) ∀i, µd = d, and P (cid:48) = Q(cid:48). Also, recall that in E[f (P ) ∆ f (P (cid:48))], the expectation is over varying modified preferences of the nodes, while in E[f (P ) ∆ f (Q(cid:48))], the expectation is over varying preferences of the nodes' representatives in M with respect to different topics (and hence preferences) of the nodes. These are equivalent given P (cid:48) = Q(cid:48). As this argument is valid for any permissible σd, the result follows. So under the proposed model and for aggregation rules satisfying the expected weak insensitivity property, Lemma 1 establishes a relation between (a) the closeness of the chosen representative set to the population in terms of expected distance and (b) the error incurred in the aggregate preference if that set is chosen as the representative set. We now return to our goal of abstracting the problem of determining a representative set, by proposing an approach that is agnostic to the aggregation rule being used. D. Objective Functions in the Abstracted Problem Recall that c(·,·) = 1− d(·,·). Our objective is now to find a set of critical nodes M that maximizes a certain objective function, with the hope of minimizing E[f (P ) ∆ f (R)] where R = Q(cid:48) in our case. As the aggregation rule is anonymous, in order to ensure that the approach works well, even for rules such as random dictatorship, the worst-case objective function for the problem under consideration, representing least expected similarity, is c(S, i) ρ(S) = min i∈N (7) The above is equivalent to: maxi∈N d(S, i) = 1 − ρ(S). Thus d = 1 − ρ(S) in Lemma 1, and so this objective function offers a guarantee on E[f (P ) ∆ f (Q(cid:48))] for aggregation rules satisfying the expected weak insensitivity property. We will provide a detailed analysis for the performance guarantee of an algorithm that aims to maximize ρ(S), in Section IV-B. Now the above worst-case objective function ensures that our approach works well even for aggregation rules such as random dictatorship. However, such extreme aggregation rules are seldom used in real-world scenarios; hence, another surrogate objective function, representing average expected similarity, or equivalently sum of expected similarities, is (cid:88) i∈N ψ(S) = c(S, i) (8) We will look into the desirable properties of an algorithm that aims to maximize ψ(S), in Section IV-C. We now turn towards the problem of maximizing the above two surrogate objective functions. Proposition 1. Given constants χ and ω, (a) it is NP-hard to determine whether there exists a set M consisting of k nodes such that ρ(M ) ≥ χ, and (b) it is NP-hard to determine whether there exists a set M consisting of k nodes such that ψ(M ) ≥ ω. We provide a proof of Proposition 1 in Appendix B. A function h(·) is said to be submodular if, for all v ∈ N \ T and for all S, T such that S ⊂ T ⊂ N, h(S ∪ {v}) − h(S) ≥ h(T ∪ {v}) − h(T ) Proposition 2. The objective functions ρ(·) and ψ(·) are non- negative, monotone increasing, and submodular. We provide a proof of Proposition 2 in Appendix C. For a non-negative, monotone increasing, and submodular func- tion, the greedy hill-climbing algorithm (selecting elements 10 one at a time, each time choosing an element that provides the largest marginal increase in the function value), gives a e ) ≈ 0.63-approximation to the optimal solution [22]. (1 − 1 As the considered objective functions in Equations (7) and (8) satisfy these properties, we use the greedy hill-climbing algorithm to obtain a good approximation to the optimal solution. Moreover, as desired, the functions are agnostic to the aggregation rule being used. We next devise algorithms for finding a representative set, present their performance with the aid of extensive experimen- tation, and provide detailed analysis of the results. IV. SELECTION OF THE REPRESENTATIVE SET: ALGORITHMS AND PERFORMANCE Recall that the preference profile of N is P , that of M is Q, and that obtained by replacing every node's preference in P by that of its uniquely chosen representative in M, is Q(cid:48). Given the number of nodes to be selected k, our objective is to find a set M of size k such that E[f (P ) ∆ f (R)] is minimized, where R = Q(cid:48) or Q depending on the algorithm. A. Algorithms for Finding Representatives We now describe the algorithms we consider in our study. • Greedy-orig (Greedy hill-climbing for maximizing 1 − E[f (P ) ∆ f (Q(cid:48))]): Initialize M to {}. Until M = k, choose a node j ∈ N \M that minimizes the expected error or equivalently, maximizes 1 − E[f (P ) ∆ f (Q(cid:48) M )], where Q(cid:48) M is the preference profile obtained by replacing every node's preference in P by the preference of its uniquely chosen representative in M. Note that the optimal set would depend on the aggregation rule f. Its time complexity for obtaining M and hence R is O(knTf ), where Tf is the time complexity of obtaining an aggregate preference using the aggregation rule f. For instance, Tf is O(rn) for plurality, O(1) for dictatorship. • Greedy-sum (Greedy hill-climbing for maximizing ψ(·)): Initialize M to {}. Until M = k, choose a node j ∈ N\M that maximizes ψ(M ∪{j})− ψ(M ). Then obtain f (R) = f (Q(cid:48)). If the similarity matrix is known, its time complexity for obtaining M and hence R is O(kn2). If the similarity matrix is unknown, the time complexity for deriving it is largely decided by the model used for deducing the mean distances between all pairs of nodes. • Greedy-min (Greedy hill-climbing for maximizing ρ(·)): Similar to Greedy-sum, with ρ(·) instead of ψ(·). • Between-cen (Betweenness centrality heuristic): Choose k nodes having the maximum values of Freeman's between- ness centrality (edge weights being dissimilarities). Then obtain f (R) = f (Q). Its time complexity for obtaining M is O(nm + n2 log n). • Degree-cen (Degree centrality heuristic): Choose k nodes having the maximum weighted degrees (edge weights being similarities). Then obtain f (R) = f (Q). Its time complex- ity for obtaining M is O(nk + n log n). • Random-poll (Random polling): Choose k nodes uniformly at random. Then obtain f (R) = f (Q). It is an important baseline, since it is the most employed method in practice. Also, it has been claimed in the literature that it is optimal to ignore the social network [12] and that random node selection performs well in practice [17]. • Other centrality measures (PageRank, Katz, eigenvector): In a weighted network like the one under study, the sum of weights of edges adjacent on a node could exceed 1. So the edge weights are required to be attenuated for computing these measures. For instance, while employing PageRank, the edges need to be converted to directed edges [23] (perhaps by adding self loops as well) and reweighed so that the outgoing edge weights from any node, sum to 1. Katz centrality involves a parameter α which is required to be less than the reciprocal of the largest eigenvalue of the weighted adjacency matrix, thus effectively reweighing the weights of the walks. In all algorithms, the time complexity of computing f (R) depends on the aggregation rule f. For dictatorship, if the dictator is not in M, Random-poll outputs the preference of a node in M chosen uniformly at random, else it outputs the dictator's preference; other algorithms output the preference of the dictator's representative in M. We now present desirable properties of Greedy-min and Greedy-sum algorithms. B. Performance Guarantee for Greedy-min Algorithm Here, we show the performance guarantee of Greedy-min. Theorem 1. For an aggregation rule satisfying expected weak insensitivity, the error incurred in using the aggregate preference given by the Greedy-min algorithm instead of the actual aggregate preference, where ρ∗ = maxS⊆N,S≤k ρ(S). Proof. Let SG be a set obtained using greedy hill-climbing algorithm for maximizing ρ(·). Since greedy hill-climbing (cid:1) ρ∗(cid:1), (cid:1)-approximation to the optimal solution, we is at most (cid:0)1 −(cid:0)1 − 1 provides a(cid:0)1 − 1 e e have (cid:18) (cid:19) ∗ ρ c(SG, i) ≥ ρ(SG) = min i∈N d(SG, i) ≥ =⇒ 1 − max i∈N d(SG, i) ≤ 1 − =⇒ max i∈N =⇒ d(SG, i) ≤ 1 − (cid:18) 1 − 1 e ∗ ρ (cid:19) (cid:19) ∗ ρ (cid:18) (cid:18) 1 − 1 e 1 − 1 e ∗ (cid:19) ρ 1 − 1 e , ∀i ∈ N For an aggregation rule satisfying expected weak insensi- tivity property, from Lemma 1, when the representative set M = SG, we have E[f (P ) ∆ f (Q(cid:48))] ≤ 1 −(cid:0)1 − 1 (cid:1) ρ∗. e It is to be noted that, though the approximation ratio given by the greedy algorithm is modest in theory, it has been observed in several domains that its performance is close to optimal in practice when it comes to optimizing non-negative, monotone increasing, submodular functions. C. A Cooperative Game Theoretic Viewpoint of Greedy-sum Algorithm 11 to maximize the objective function ψ(S) = (cid:80) i∈N c(i, j) or equivalently(cid:80) that maximizes(cid:80) (cid:80) function ν(S) = (cid:80) Shapley value is known to act as a good measure for node selection problems in social networks, particularly that of influence maximization [24], [25]. We have seen that, i∈N c(S, i), the greedy hill-climbing algorithm first chooses a node j i∈N,i(cid:54)=j c(i, j) (since c(j, j) = 1,∀j). It has been shown in [26] that i∈N,i(cid:54)=j c(i, j) is the Shapley value of player j, in a convex Transferable Utility (TU) game (N, ν) with the characteristic i,j∈S,i(cid:54)=j c(i, j). This characteristic func- tion can be viewed as an indication of how tightly knit a group is, or how similar the members of a set S are to each other. Let φ(ν), N u(ν), Gv(ν), τ (ν) be Shapley value, Nucleolus, Gately point, τ-value of the TU game (N, ν). Theorem 2. For the TU game defined by ν(S) = i,j∈S,i(cid:54)=j c(i, j), φ(ν) = N u(ν) = Gv(ν) = τ (ν). We provide a proof of Theorem 2 in Appendix D. So the Greedy-sum algorithm aims to maximize a term that is unanimously suggested by several solution concepts for a TU game capturing the similarities within a set. In other words, the solution concepts unanimously suggest that the first node chosen by the Greedy-sum algorithm, is on average most similar to different subsets of the population. (cid:80) D. Experimental Observations After obtaining the representative set using the aforemen- tioned algorithms, we tested their performance on T = 104 topics or preference profiles generated using the RPM-S model (with the assigned neighbor chosen in a random way) on our Facebook data. Owing to the nature of the Random-poll algorithm, we ran it sufficient number of times to get an independent representative set each time, and then defined the performance as the average over all the runs. The values of E[f (P ) ∆ f (R)] were computed using extensive simulations with the considered aggregation rules. We observed that for any node i, in all algorithms except Random-poll, the candidate set arg minj∈S d(j, i) (see Equa- tion (4)) was a singleton for low values of k. For higher values of k (higher than 7), the number of candidates were usually less than or equal to 4, with a maximum of 10 for k = 50 in one instance. We thus ran the experiments several times; we observed that changes in the error plots were not very significant. Also, the aggregate preferences f (P ) and f (R) both consisted of one preference in almost all the runs, so the error E[f (P ) ∆ f (R)] was equivalent to Kendall-Tau distance between the actual aggregate preference and the obtained aggregate preference (see Equation (5)). Figure 4(a) shows the plots for the worst case of Random Dictatorship, that is, when the randomly chosen dictator is the most dissimilar to the chosen representative set. Greedy-min performed the best owing to it ensuring that no node in the network is very dissimilar to the chosen representative set. The error for Greedy-orig could not be plotted since the objective function cannot be computed in this case. 12 unacceptable. The variance was acceptable for higher values of k. One reason for its performance being not very bad on average could be the low standard deviation of the mean distances (see Section II-B). • Performance of Between-cen. Between-cen lagged behind Greedy-sum when the size of the representative set was small. However, it performed at par with or at times better when the size of the representative set was moderate to high. Both Between-cen and Greedy-sum are based on the idea of shortest paths, albeit with different additive operators (simple addition in case of Between-cen versus MSM-SP in case of Greedy-sum) and with the difference that Between- cen concerns intermediary nodes and Greedy-sum concerns end nodes. • Performance of Degree-cen. Degree-cen showed a per- fect balance between performance and running time. This demonstrates that high degree nodes indeed serve as good representatives of the population. • Performance of other centrality measures. Centrality included in the plots) such as Katz and measures (not eigenvector (belonging to the Bonanich family) as well as PageRank performed almost at par with Between-cen for most values of k. Katz and eigenvector centralities, in particular, selected representative nodes which often were neighbors of each other; this is intuitively undesirable for the problem of sampling representatives which should ideally represent different parts of the network. Also, as discussed earlier, these measures reweigh edges, which may be detrimental to their performance. • Non-monotonicity of error plots. The error plot need not be monotone decreasing with the representative set, that is, adding a node to a representative set need not reduce the error. For example, let s1 be the selected representative node for k = 1, and s2 be the node added when k = 2. If we aggregate preferences of the representative nodes in an unweighted way, it is clear that if s1 is truly a good representative of almost the entire population and s2 is a good representative of only a section of the population, weighing their preferences equally (R = Q) would lead to more error than considering s1 alone (with k = 1). This is precisely the reason why we employed the method of weighing their preferences differently while aggregating their preferences. Weighing their preferences proportional to the number of nodes they represent (R = Q(cid:48)) based on the deduced similarity matrix, was used as only a heuristic and so does not guarantee that the error would reduce with an increasing k. • Role of social network. We observe that algorithms which consider the underlying social network perform better than random polling, implying that the network plays a role and should be considered while determining representatives. We next provide a more detailed insight. Fig. 3. Comparison among algorithms for Plurality aggregation rule The plots for all non-dictatorial aggregation rules were similar (albeit with different scaling) to the ones plotted in Figure 3. Our key observations are as follows: • Performance of Greedy-orig. Greedy-orig performed the best throughout, however it had unacceptably high running time (order of days) even for computationally fast aggrega- tion rules such as plurality; so it is practically infeasible to run this algorithm for computationally intensive rules, for example, Kemeny. • Performance of Greedy-sum. Greedy-sum performed very well; but its plots displayed non-monotonicity especially in the lower range of k, and so a higher k might not always lead to a better result. Greedy-sum, with MSM-SP as a precursor, attempts to find nodes which are closest to other nodes on average, where closeness is based on the similarity deduced using adaptation of the shortest path algorithm (as described in Section II-C5). This is on similar lines as finding influential nodes for diffusing information, which would lead to other nodes being influenced with maximum probabilities on average. • Performance of Greedy-min. Greedy-min performed bet- ter than Random-poll for low values of k; this difference in performance decreased for higher values of k. The effect of satisfaction or otherwise of expected weak insensitivity was not very prominent, because the property is not violated by an appreciable enough margin for any aggregation rule. Nonetheless, the expected weak insensitivity property does provide a guarantee on the performance of Greedy-min for an aggregation rule. • Performance of Random-poll. As mentioned earlier, the performance of Random-poll is based on an average over several runs; the variance in performance was very high for low values of k, and the worst case performance was 110203040500.30.350.40.450.5Number of representative nodes (k) E[ f(P) ∆ f(R)] Greedy−origGreedy−sumGreedy−minBetween−cenDegree−cenRandom−poll 13 (a) Random Dictatorship (worst case) (b) Plurality (Personal topics) (c) Plurality (Social topics) Fig. 4. Comparison among algorithms under other settings E. Personal versus Social Topics We have focused on aggregating preferences across all topics, without classifying them into different types. Now, we provide a preliminary analysis of personal versus social type of topics. It is to be noted that the model fitting (as discussed in Section II-B) was employed based on only four topics of each type that were available from our Facebook data. So the obtained results (Figures 4(b-c)) are provided with low confidence, but have qualitative implications. All the algorithms showed relatively low errors for social topics. Random-poll performed very well on average for sufficiently high values of k. This could be attributed to a lower average mean distance for social topics (0.30), resulting in nodes being more similar to each other; so nodes chosen at random are likely to be more similar to most other nodes. However, it performed badly while aggregating preferences with respect to personal topics, which has a higher standard deviation (0.12) and also a higher average mean distance (0.40). Also, the variance in performance of Random-poll was unacceptably high for lower values of k, but acceptable for higher values. So though the usage of Random-poll seems undesirable in general, it is justified for social topics with a reasonable sample size. A high level of similarity between unconnected nodes with respect to social topics could be attributed to the impact of news and other common channels. It may also be justified by a theory of political communication [27] which stresses the importance of citizen discussion beyond the boundaries of cohesive groups for the dissemination of public opinion. V. CONCLUSION This paper focused on two subproblems with respect to preference aggregation in social networks, namely, (a) how preferences are spread and (b) how to determine the best set of representative nodes. We started by motivating both these problems. Based on our Facebook dataset, we developed a number of simple and natural models, of which RPM-S showed a good balance between accuracy and running time; while MSM-SP was observed to be the best model when our objective was to deduce the mean distances between all pairs of nodes, and not the preferences themselves. We formulated an objective function for representative-set selection and followed it up with two surrogate objective functions for practical usage. We then proposed algorithms for selecting best representatives, wherein we provided a guarantee on the performance of the Greedy-min algorithm, subject to the aggregation rule satisfying the expected weak insensitivity property; we also studied the desirable properties of the Greedy-sum algorithm. We also observed that degree centrality heuristic performed very well, thus showing the ability of high-degree nodes to serve as good representatives of the population. Our preliminary analysis also suggested that selecting representatives based on social network is advanta- geous for aggregating preferences related to personal topics, while random polling with a reasonable sample size is good enough for aggregating preferences related to social topics. A. Future Work It is intuitive that the network structure would affect the ease of sampling best representatives and how well they represent the population. For instance, a tightly-knit network would likely consist of nodes with similar preferences, thus requiring a small number of representatives, while a sparse network would require a higher number. A network with a larger diameter also would require a higher number of representatives distributed across the network. For a network in which there exist natural communities, we could have representatives from each community and the number of representatives from a community would depend on the size of the community. In general, a good representative set would consist of nodes distributed over the network, so that they represent different sections of the network. Hence it would be interesting to study how the network structure influences the ease of determining representative set and its effectiveness. Network compression techniques could be considered for solving the studied problem; the preferences with respect to a number of topics over their sets of alternatives, could be viewed as constituting the state of a node. Some of the relevant techniques that could be useful are efficient data representations for large high-dimensional data [28] using spectral graph theory and graph Laplacian [29], multiple transforms for data indexed by graphs [30], etc. Furthermore, with the emergence of online social networks, it is possible to 110203040500.30.40.50.60.70.8Number of representative nodes (k) E[ f(P) ∆ f(R)] Greedy−sumGreedy−minBetween−cenDegree−cenRandom−poll110203040500.350.40.450.50.550.60.65Number of representative nodes (k) E[ f(P) ∆ f(R)] Greedy−origGreedy−sumGreedy−minBetween−cenDegree−cenRandom−poll110203040500.20.250.30.35Number of representative nodes (k) E[ f(P) ∆ f(R)] Greedy−origGreedy−sumGreedy−minBetween−cenDegree−cenRandom−poll obtain detailed attributes and interests of a node based on its public profile, liked pages, followed events and personalities, shared posts, etc. Network compression techniques could be used for arriving at a concise set of attributes and nodes, for representing network data. We believe the expected weak insensitivity property intro- duced in this paper, could be of interest to the social choice theory community and has a scope of further study. It will also be interesting to study how one should weigh the preferences of the nodes in a representative set, so that the error is a monotone decreasing function of the set. One could consider the scenario when nodes are strategic while reporting their preferences. Alternative models for the spread of preferences in a network, given the edge similarities, could be studied. Considering the attributes of nodes and alternatives [20] in addition to the underlying social network for determining the best representatives, is another direction worth exploring. ACKNOWLEDGMENTS The original version of this paper is accepted for publication in IEEE Transactions on Network Science and Engineering (DOI 10.1109/TNSE.2017.2772878). A previous version of this paper is published in First AAAI Conference on Human Computation and Crowdsourcing [31]. This research was in part supported by an unrestricted research grant from Adobe Labs, Bangalore. We thank Balaji Srinivasan and his team for helpful discussions. The first author was supported by IBM Doctoral Fellowship when most of this work was done. Thanks to Akanksha Meghlan, Nilam Tathawadekar, Cressida Hamlet, Marilyn George, Aiswarya S., and Chandana Dasari, Mani Doraisamy, Tharun Niranjan, and Srinidhi Karthik B. S., for helping us with the Facebook app. Thanks to Prabuchandran K. J. for useful discussions. Many thanks to Google India, Bangalore (in particular, Ashwani Sharma) for providing us free credits for hosting our app on Google App Engine. Also thanks to several of our colleagues for their useful feedback on the app. We thank the anonymous reviewers for their useful and insightful comments, which led to improvements across all sections of the paper. REFERENCES [1] D. Easley and J. Kleinberg, Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge Univ Press, 2010. [2] M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a feather: Homophily in social networks," Annual Review of Sociology, vol. 27, no. 1, pp. 415–444, 2001. [3] R. Xiang, J. Neville, and M. Rogati, "Modeling relationship strength in online social networks," in 19th International Conference on World Wide Web (WWW). ACM, 2010, pp. 981–990. [4] F. Brandt, V. Conitzer, and U. Endriss, "Computational social choice," www.cs.duke.edu/~conitzer/comsocchapter.pdf, 2013. [5] C. A. Sheingold, "Social networks and voting: the resurrection of a research agenda," American Sociological Review, vol. 38, no. 6, pp. 712–720, 1973. [6] P. Burstein, "Social networks and voting: Some Israeli data," Social Forces, vol. 54, no. 4, pp. 833–847, 1976. [7] P. Nieuwbeerta and H. Flap, "Crosscutting social circles and political choice: Effects of personal network composition on voting behavior in The Netherlands," Social Networks, vol. 22, no. 4, pp. 313–335, 2000. [8] S. D. McClurg, "The electoral relevance of political talk: Examining disagreement and expertise effects in social networks on political par- ticipation," American Journal of Political Science, vol. 50, no. 3, pp. 737–754, 2006. 14 [9] A. S. Zuckerman, The Social Logic of Politics: Personal Networks as Contexts for Political Behavior. Temple University Press, 2005. [10] P. A. Beck, R. J. Dalton, S. Greene, and R. Huckfeldt, "The social calculus of voting: Interpersonal, media, and organizational influences on presidential choices," American Political Science Review, vol. 96, no. 1, pp. 57–73, 2002. [11] D. Campus, G. Pasquino, and C. Vaccari, "Social networks, political discussion, and voting in Italy: A study of the 2006 election," Political Communication, vol. 25, no. 4, pp. 423–444, 2008. [12] V. Conitzer, "Should social network structure be taken into account in elections?" Mathematical Social Sciences, vol. 64, no. 1, pp. 100–102, 2012. [13] D. Acemoglu and A. Ozdaglar, "Opinion dynamics and learning in social networks," Dynamic Games and Applications, vol. 1, no. 1, pp. 3–49, 2011. [14] J. Lorenz, "Continuous opinion dynamics under bounded confidence: A survey," International Journal of Modern Physics C, vol. 18, no. 12, pp. 1819–1838, 2007. [15] P. Hu and W. C. Lau, "A survey and taxonomy of graph sampling," arXiv preprint arXiv:1308.5865, 2013. [16] M. Granovetter, "Network sampling: Some first steps," American Jour- nal of Sociology, vol. 81, no. 6, pp. 1287–1303, 1976. [17] J. Leskovec and C. Faloutsos, "Sampling from large graphs," in 12th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD). ACM, 2006, pp. 631–636. [18] J. Tang, C. Zhang, K. Cai, L. Zhang, and Z. Su, "Sampling representative users from large social networks," in Twenty Ninth AAAI Conference on Artificial Intelligence. AAAI, 2015, pp. 304–310. [19] K. Sun, D. Morrison, E. Bruno, and S. Marchand-Maillet, "Learning representative nodes in social networks," in Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 2013, pp. 25–36. [20] H. A. Soufiani, D. C. Parkes, and L. Xia, "Preference elicitation for general random utility models," in 29th Conference on Uncertainty In Artificial Intelligence (UAI). AUAI Press, 2013, pp. 596–605. [21] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms. MIT press, 2009. [22] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, "An analysis of ap- proximations for maximizing submodular set functions-I," Mathematical Programming, vol. 14, no. 1, pp. 265–294, 1978. [23] W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for prevalent viral marketing in large-scale social networks," in 16th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2010, pp. 1029–1038. [24] R. Narayanam and Y. Narahari, "A shapley value-based approach to discover influential nodes in social networks," IEEE Transactions on Automation Science and Engineering, vol. 8, no. 1, pp. 130–147, 2011. [25] T. P. Michalak, K. V. Aadithya, P. L. Szczepanski, B. Ravindran, and N. R. Jennings, "Efficient computation of the Shapley value for game- theoretic network centrality," Journal of Artificial Intelligence Research, vol. 46, pp. 607–650, 2013. [26] V. K. Garg, Y. Narahari, and M. Narasimha Murty, "Novel biobjective clustering (BiGC) based on cooperative game theory," IEEE Transac- tions on Knowledge and Data Engineering, vol. 25, no. 5, pp. 1070– 1082, 2013. [27] R. Huckfeldt, P. A. Beck, R. J. Dalton, and J. Levine, "Political environments, cohesive social groups, and the communication of public opinion," American Journal of Political Science, vol. 39, no. 4, pp. 1025– 1054, 1995. [28] M. Belkin and P. Niyogi, "Laplacian eigenmaps for dimensionality reduction and data representation," Neural computation, vol. 15, no. 6, pp. 1373–1396, 2003. [29] F. R. Chung, Spectral graph theory. American Mathematical Soc., 1997, vol. 92. [30] A. Sandryhaila and J. M. Moura, "Discrete signal processing on graphs," IEEE Transactions on Signal Processing, vol. 61, no. 7, pp. 1644–1656, 2013. [31] S. Dhamal and Y. Narahari, "Scalable preference aggregation in social networks," in First Conference on Human Computation & Crowdsourc- ing (HCOMP). AAAI, 2013, pp. 42–50. [32] P. Diaconis and R. L. Graham, "Spearman's footrule as a measure of disarray," Journal of the Royal Statistical Society. Series B (Methodolog- ical), pp. 262–268, 1977. [33] Y. Chun and T. Hokari, "On the coincidence of the Shapley value and the nucleolus in queueing problems," Seoul Journal of Economics, vol. 20, no. 2, pp. 223–238, 2007. [34] P. D. Straffin, Game Theory and Strategy. Mathematical Association of America, 1993, vol. 36. APPENDIX A DESCRIPTION OF THE FACEBOOK APP A. Overview Online social networking sites such as Facebook, Twitter, and Google+ are highly popular in the current age; for instance, Facebook has over 2 billion monthly active users as of 2017. Using such online social networking sites for data collection has become a trend in several research domains. When given permission by a user, it is easy to obtain access to the user's friend list, birthday, public profile, and other relevant information using Facebook APIs. Furthermore, Facebook provides a facility to its users to invite their friends to use any particular application, and hence propagate it. Owing to these reasons, in order to obtain the data for our purpose, we de- veloped a Facebook application titled The Perfect Representer for eliciting the preferences of users over a set of alternatives for a wide range of topics, as well as to obtain the underlying social network. Once a user logged into the app, the welcome page as shown in Figure 5 was presented, which described to the user what was to be expected from the app. First, the user would have to give his/her preferences over 5 alternatives for 8 topics, using a drag'n'drop interface as shown in Figure 6. The user was given the option of skipping any particular topic if he/she wished to. The topics, which were broadly classified into personal and social types, and their alternatives are listed in Table VI (the ordering of alternatives from top to bottom is based on the aggregate preference computed from our data as per the Borda count aggregation rule). From a user's viewpoint, the app gave the user a social centrality score out of 10, telling how well the user represents the society or how well the user's opinions are aligned with that of the society with respect to the provided preferences. The score was dynamic and kept on updating as more users used the app (since the aggregate preference itself kept on updating); this score could be posted on the user's timeline. The user also had an option of viewing how similar his/her preferences were to his/her selected friends. Explicit incentives were provided for users to propagate the app either by inviting their friends or sharing on their timelines as well as messaging through emails and popular websites (Figure 7). To host our application, we used Google App Engine, which provides a Cloud platform for facilitating large number of hits at any given time as well as large and fast storage. B. The Scores Let A be the set of alternatives and r = A. Let c(p, q) be the similarity between preferences p and q. In our app, we implement c(p, q) to be the normalized Footrule similarity as a computationally efficient approximation [32] to normalized Kendall-Tau similarity (which is used throughout our study) for scoring the users in real-time; the normalized Kendall-Tau a denote the position similarities are computed offline. Let wp of alternative a in preference p. The Footrule distance between a∈A wp a−wq a. With r being the number of alternatives, it can be shown that the maximum 2(cid:99). So the normalized 2(cid:101)(cid:98) r possible Footrule distance is 2(cid:100) r preferences p and q is given by(cid:80) 15 Fig. 5. Screenshot of the welcome page Fig. 6. Screenshot of a page with topics and their alternatives Footrule distance between preferences p and q can be given by (cid:80) a − wq a∈A wp a 2(cid:100) r 2(cid:101)(cid:98) r 2(cid:99) d(p, q) = and normalized Footrule similarity by c(p, q) = 1 − d(p, q). For example, the normalized Footrule similarity between preferences p = (A, B, C, D, E) and q = (B, E, C, A, D) is c(p, q) = 1 − 1−4+2−1+3−3+4−5+5−2 (cid:16) (cid:17) 3. = 1 2(cid:100) 5 2(cid:101)(cid:98) 5 2(cid:99) 1) Social Centrality Score - How Perfectly you Represent the Society?: Let pit be the preference of node i for topic t, and pAt be the aggregate preference of the population for topic t. For the purpose of our app's implementation, we obtain the aggregate preference using the Borda count rule. For computing the social centrality, we give each topic t, a weight proportional to nt (the number of users who have given their responses for that topic). So the fractional score of user i is given by(cid:80) (cid:17) (cid:16) nt(cid:80) t t nt c(pit, pAt). 16 TOPICS AND ALTERNATIVES IN THE FACEBOOK APP TABLE VI Hangout Place Friend's place Adventure Park Trekking Mall Historical Place Personal Chatting App WhatsApp Facebook Hangouts SMS Skype Facebook Activity Viewing Posts Chatting Posting Games/Apps Marketing Lifestyle Intellectual Exercising Social activist Lavish Smoking Website visited Google Facebook Youtube Wikipedia Amazon Government Investment Education Agriculture Infrastructure Military Space explore Social Serious Crime Rape Terrorism Murder Corruption Extortion Leader N. Modi (India) B. Obama (USA) D. Cameron (UK) V. Putin (Russia) X. Jinping (China) C. The Incentive Scheme A typical active Facebook user uses several apps in a given span of time, and invites his/her friends to use it depending on the nature of the app and the benefits involved. In order to ensure a larger reach, it was important to highlight the benefits of propagating our app. We achieved this by designing a simple yet effective incentive scheme for encouraging users to propagate the app by sharing it on their timelines and inviting their friends to use it. We incorporated a points system in our app, where suitable points were awarded on a daily, weekly, as well as on an overall basis, for spreading the word about the app through shares, invites, likes, etc. Bonus points were awarded when a referred friend used the app through the link shared by the user. To ensure competitiveness in sharing and inviting, the daily and weekly 'top 10' point collectors were updated in real-time and the winners were declared at 12 noon GMT (daily) and Mondays 12 noon GMT (weekly). A cutoff was set on the number of points to be eligible to get a prize. Users were also given a chance to win a big prize through daily, weekly, and bumper lucky draws, if they crossed a certain amount of points, so that users with less number of friends could also put their effort even though they did not have a chance to make it into the 'top 10'. Prizes were awarded in the form of gift coupons so that getting the prize was in itself, quick as well as hassle-free for the users. The points structure as well as the links to invite, like, and share were provided on the scoring page (Figure 7), giving the users a clear picture of how to earn points and win prizes. The lists of daily and weekly winners were displayed on the welcome page and the scoring page. D. Preprocessing of the Obtained Dataset The obtained dataset consisted of 1006 nodes and 7112 edges. Figure 8 shows the network of app users and Table VII shows some user statistics. It was necessary to preprocess the data before using it for model-fitting. For instance, we eliminated nodes which provided responses to fewer than 6 topics so as to consider only those nodes which responded to sufficient number of topics. Further, in order to observe the network effect, it was necessary that all nodes belonged to the same component; so we considered only the giant component which consisted of 844 nodes and 6129 edges. The obtained network is a subgraph of nodes who have used the Facebook app to give their preferences for the asked topics. The users had the option of inviting their friends to Fig. 7. Screenshot of the sharing and scoring page A primary drawback of standard measures such as Kendall- Tau or Footrule distance is the way distances between prefer- ences themselves are distributed. For instance, there are several preferences which are at a distance of, say 0.5, from a given preference as compared to those at a distance of, say 0.3, which leads to a bias in distances to be concentrated in the in- termediate range. Since the distance between two preferences (here, user preference and the aggregate preference) for most topics would be concentrated in the intermediate range, a user would seldom get a very high or a very low score. A mediocre score would, in some sense, act as a hurdle in the way of user sharing the post on his/her timeline. So to promote posting their scores, we used a simple boosting rule (square root) and then enhanced it to the nearest multiple of 0.5, resulting in the final score of (cid:39) (cid:38) 1 2 20 (cid:115)(cid:88) (cid:18) nt(cid:80) t t nt (cid:19) c(pit, pAt) (out of 10). 2) How Perfectly you Represent your Friends?: Once a user selected a list of friends to see how similar they are to the user, the app would give the similarity for each friend in terms of percentage. This similarity was also a function of the number of common questions they responded to. So the similarity between nodes i and j in terms of percentage was given by (cid:18)(cid:80) (cid:19) (cid:80) t 1 t c(pit, pjt) 100 where c(pit, pjt) = 0 if either i or j or both did not respond to topic t. 17 APPENDIX B PROOF OF PROPOSITION 1 Proposition 1. Given constants χ and ω, (a) it is NP-hard to determine whether there exists a set M consisting of k nodes such that ρ(M ) ≥ χ, and (b) it is NP-hard to determine whether there exists a set M consisting of k nodes such that ψ(M ) ≥ ω. Proof. We reduce an NP-hard Dominating Set problem in- stance to the problem under consideration. Given a graph G of n vertices, the dominating set problem is to determine whether there exists a set D of k vertices such that every vertex not in D, is adjacent to at least one vertex in D. Given a dominating set problem instance, we can construct a weighted undirected complete graph H consisting of the same set of vertices as G such that, the weight c(i, j) of an edge (i, j) in H is some high value (say 0.9) if there is edge (i, j) in G, else it is some low value (say 0.6). Now there exists a set D of k vertices in G such that the distance between any vertex in G and any vertex in D is at most one, if and only if there exists a set M of k vertices in H such that ρ(M ) ≥ 0.9 or ψ(M ) ≥ k + 0.9(n − k). Here χ = 0.9 and ω = k + 0.9(n − k). This shows that the NP- hard dominating set problem is a special case of the problems under consideration, hence the result. Fig. 8. Network of the app users TABLE VII APP USER STATISTICS Attribute Age Location Gender Value 13-18 19-21 22-24 25-28 29-32 33-40 41-50 51-70 Indeterminate North America Europe Middle east India East Asia Australia Indeterminate Male Female Indeterminate Count 25 120 291 272 58 37 14 12 15 44 18 12 749 8 5 8 565 269 10 use the app and sharing their app social centrality scores on their timelines, and were provided incentives for the same. It is well known that users generally use an app suggested by their close friends and also invite their close friends to use an app. Similarly, the social centrality posts shared by users are more likely to be viewed and clicked on by their close friends. We observed that connected nodes had mean dissimilarity (= avg (i,j)∈E d(i, j)) of 0.24 and unconnected nodes had mean dissimilarity of 0.37. Due to the way that the app usage is propagated, it is likely for most nodes to have their close friends included in the network. This is an intuition behind the observed homophily in the obtained network. APPENDIX C PROOF OF PROPOSITION 2 Proposition 2. The objective functions ρ(·) and ψ(·) are non- negative, monotone, and submodular. Proof. We prove the properties in detail for ψ(·). The proof for ρ(·) is similar. Consider sets S, T such that S ⊂ T ⊂ N and a node v ∈ N \ T . It is clear that ψ(·) is non-negative. Let xi = c(S, i), yi = c(T, i), ¯xi = c(S ∪ {v}, i), ¯yi = c(T ∪ {v}, i). For any i ∈ N, c(S, i) = max j∈S⊆T c(j, i) ≤ max j∈T =⇒ xi ≤ yi c(j, i) = c(T, i) (9) That is, ψ(·) is monotone. Similarly, it can be shown that ¯xi ≤ ¯yi ; xi ≤ ¯xi ; Now, yi < ¯yi =⇒ k /∈ arg max j∈T∪{v} =⇒ k /∈ arg max j∈S∪{v} =⇒ xi < ¯xi (10) yi ≤ ¯yi c(j, i) ∀k ∈ T (11) c(j, i) ∀k ∈ S ⊆ T (12) (13) The contrapositive of the above, from Inequalities (10) is xi = ¯xi =⇒ yi = ¯yi (14) Also, from Implications (11) and (12), yi < ¯yi =⇒ {v} = arg max j∈T∪{v} =⇒ ¯xi = ¯yi c(j, i) = arg max j∈S∪{v} c(j, i) (15) 18 Let M (ν) = (Mi(ν))i∈N and m(ν) = (mi(ν))i∈N , where Mi(ν) = ν(N )−ν(N\{i}) and mi(ν) = ν({i}). For a convex game, τ (ν) = λM (ν) + (1 − λ)m(ν), where λ ∈ [0, 1] is chosen such that [33],(cid:88) (cid:88) S⊆NS=2 From (17), Mi(ν) = i∈N [λMi(ν) + (1 − λ)mi(ν)] = ν(N ) ν(S) − (cid:88) (19) ν(S) This, with Equation (19) and the fact that for our game, for all i, mi(ν) = ν({i}) = 0, Mi(ν) = λ ν(N ) = λ (cid:88) (cid:88) ν(S) = 2λ ν(S) i∈N i∈N (cid:88) S⊆N i∈SS=2 (cid:88) S⊆NS=2 ν(S) = S⊆N\{i} S=2 (cid:88) S⊆N i∈SS=2 2. So we have (cid:88) S⊆N i∈SS=2 Using Equation (17), we get λ = 1 τi(ν) = 1 2 Mi(ν) + 1 2 mi(ν) = 1 2 ν(S) This, with Equation (18), gives φ(ν) = τ (ν) Now from Inequalities (10), depending on node i, four cases arise that relate the values of ¯xi − xi and ¯yi − yi. Case 1: xi = ¯xi and yi = ¯yi: In case of such an i, we have ¯xi − xi = ¯yi − yi Case 2:xi = ¯xi and yi < ¯yi: Case 3:xi < ¯xi and yi = ¯yi: By Implication (14), there does not exist such an i. In case of such an i, we have ¯xi − xi > ¯yi − yi Case 4:xi < ¯xi and yi < ¯yi: For such an i, (from (13) and (15)) (from Inequality (9)) ¯xi − xi = ¯yi − xi ≥ ¯yi − yi From the above cases, we have =⇒ (cid:88) =⇒ (cid:88) ¯xi − xi ≥ ¯yi − yi, ∀i ∈ N ( ¯yi − yi) ( ¯xi − xi) ≥(cid:88) ¯xi −(cid:88) xi ≥(cid:88) ¯yi −(cid:88) i∈N i∈N i∈N i∈N i∈N =⇒ ψ(S ∪ {v}) − ψ(S) ≥ ψ(T ∪ {v}) − ψ(T ) As the proof is valid for any v ∈ N \ T and for any S, T such that S ⊂ T ⊂ N, the result is proved. yi i∈N APPENDIX D Theorem 2. For PROOF OF THEOREM 2 (cid:80) Proof. The characteristic function ν(S) = (cid:80) c(i, j), φ(ν) = N u(ν) = Gv(ν) = τ (ν). i,j∈S i(cid:54)=j the TU game defined by ν(S) = when S = 2 where S = {i, j}, c(i, j), i,j∈S i(cid:54)=j (16) (17) ν({i, j}) = c(i, j) ∴ ν(S) = ν(T ) (cid:88) T⊆NT=2 From Equation (16), the Shapley value can be rewritten as φj(ν) = 1 2 c(i, j) = 1 2 ν({i, j}) = 1 2 ν(S) (18) (cid:88) i∈N i(cid:54)=j (cid:88) i∈N i(cid:54)=j (cid:88) S⊆N j∈SS=2 The proof for φ(ν) = N u(ν) follows from [33]. Fur- thermore, it has been shown in [33] that, for the TU game satisfying Equation (18), for each S ⊆ N, ν(S) −(cid:88) φi(ν) = ν(N\S) − (cid:88) φi(ν) ∴ ν({i}) − φi(ν) = ν(N\{i}) −(cid:88) i∈S i∈N\S φj(ν) , for S = {i} j∈N j(cid:54)=i So, the propensity to disrupt for player i [34] for the Shapley value allocation is (cid:80) j∈N,j(cid:54)=i φj(ν) − ν(N\{i}) di(φ(ν)) = φi(ν) − ν({i}) = 1 As the propensity to disrupt is equal for all the players (= 1), this allocation is the Gately point [34], that is, φ(ν) = Gv(ν).
1311.0680
2
1311
2013-12-28T13:40:30
Geo-located Twitter as the proxy for global mobility patterns
[ "cs.SI", "physics.soc-ph" ]
In the advent of a pervasive presence of location sharing services researchers gained an unprecedented access to the direct records of human activity in space and time. This paper analyses geo-located Twitter messages in order to uncover global patterns of human mobility. Based on a dataset of almost a billion tweets recorded in 2012 we estimate volumes of international travelers in respect to their country of residence. We examine mobility profiles of different nations looking at the characteristics such as mobility rate, radius of gyration, diversity of destinations and a balance of the inflows and outflows. The temporal patterns disclose the universal seasons of increased international mobility and the peculiar national nature of overseen travels. Our analysis of the community structure of the Twitter mobility network, obtained with the iterative network partitioning, reveals spatially cohesive regions that follow the regional division of the world. Finally, we validate our result with the global tourism statistics and mobility models provided by other authors, and argue that Twitter is a viable source to understand and quantify global mobility patterns.
cs.SI
cs
Geo-located Twitter as the proxy for global mobility patterns Bartosz Hawelkaa,b,*, Izabela Sitkoa,b, Euro Beinata, Stanislav Sobolevskyb, Pavlos Kazakopoulosa and Carlo Rattib a GISscience Doctoral College, Department of Geoinformatics – Z_GIS, University of Salzburg, Austria b SENSEable City Laboratory, Massachusetts Institute of Technology, Cambridge, USA * Corresponding author: [email protected] In the advent of a pervasive presence of location sharing services researchers gained an unprecedented access to the direct records of human activity in space and time. This paper analyses geo-located Twitter messages in order to uncover global patterns of human mobility. Based on a dataset of almost a billion tweets recorded in 2012 we estimate volumes of international travelers in respect to their country of residence. We examine mobility profiles of different nations looking at the characteristics such as mobility rate, radius of gyration, diversity of destinations and a balance of the inflows and outflows. The temporal patterns disclose the universal seasons of increased international mobility and the particular national nature of overseas travels. Our analysis of the community structure of the Twitter mobility network, obtained with the iterative network partitioning, reveals spatially cohesive regions that follow the regional division of the world. Finally, we validate our result with the global tourism statistics and mobility models provided by other authors, and argue that Twitter is a viable source to understand and quantify global mobility patterns. Keywords: geo-located Twitter; global mobility patterns; community detection; collective sensing Introduction Reliable and effective monitoring of the worldwide mobility patterns plays an important role in studies exploring migration flows (Castles and Mill 1998; Greenwood 1985; Sassen 1999), touristic activity (Miguéns and Mendes 2008) but also the spread of diseases and epidemic modeling (Bajardi et al. 2011; Balcan et al. 2009). Traditionally, those studies relied either on the aggregated and temporally-sparse official statistics or on the selective small- scale observations and surveys. In a more recent approach, international mobility was approximated with the air traffic volumes (Barrat et al. 2004), i.e. the dataset with the potentially global coverage but biased toward just one mode of transportation and in many cases difficult to obtain. However, in the advent of a pervasive presence of location sharing services researchers have gained an unprecedented access to the direct records of human activity. Each day, millions of individuals leave behind their digital traces by using services such as mobile phones, credit cards or social media. Most of those traces can be located in space and time, and thus constitute a valuable source for human mobility studies. Out of several types of collectively sensed data, the one that was the most intensively explored for analysis of human mobility has undoubtedly been cellular phone records. With truly pervasive character they provided a basis to formulate important findings on the nature of a collective movement in urban (Calabrese et al. 2010; Kang et al. 2012), regional (Sagl et al. 2012; Calabrese et al. 2013) and country-wide scales (Krings et al. 2009; Simini et al. 2012). Nevertheless, a high fragmentation of the mobile telecom market actually excludes the availability of any worldwide dataset. In this case, a good alternative is offered by social media data. Despite its lower penetration and a potential bias towards a younger part of the population, social media constantly gains in popularity and representativeness (Gesenhues 2013) and in most cases are global by design. 1     In this study we attempt to uncover global mobility patterns, as well as to compare mobility characteristics of different nations. Our work is based on the data from Twitter – one of the most popular social media platforms, with over 500 million users registered by mid- 2013 (Twitter Statistics 2013). Initially established in the USA, the service has quickly spread to other countries (Java et al. 2007; Leetaru et al. 2013; Mocanu et al. 2013), becoming a worldwide phenomenon. By design Twitter is an open and public medium, which practically limits privacy consideration, especially in studies such as ours, which seek for collective rather than individual patterns of human behavior. In particular, we take advantage of the portion of tweets augmented with explicit geographic coordinates, as measured either by GPS embedded in a mobile device, or located to the nearest address based on the IP location of a computer. We call these tweets geo-located tweets. They are still a limited sample of all tweets and account for around 1% of the total feed (Morstatter et al. 2013). However, thanks to the increasing penetration of smart devices and mobile applications, the volume of the geo- located Twitter is constantly growing (Figure 1) and progressively becoming a valuable register of human traces in space and time. The absolute volume of 3.5M geo-located tweets per day (authors’ calculation for December 2012) appears as a promising base for carrying out the worldwide mobility analysis, which as such is also the subject of our exploration. Figure 1. Number of geo-located tweets (blue line) and users (orange line) per month in 2012. Because of the richness yet simplicity of the medium, Twitter has already been the subject of many studies for a variety of applications. First explorations focused on the properties of Twitter as a social network, already proving its global character and scientific potential one year after the launch of the service (Java et al. 2007; Kwak et al. 2010; Huberman et al. 2008). Another line of research examined a content of tweets to assess a mood of society (Golder and Macy 2011; Bollen et al. 2011; Pak and Paroubek 2010), recently also with the geographic perspective based on a geo-located stream (Frank et al. 2013, Mitchell et al. 2013). The next area that has received much attention was crisis management (MacEachren et al. 2011; Thom et al. 2012; Sakaki et al. 2010), where the emphasis was placed on the detection of anomalous activity, as well as on the potential of a locally generated content to inform emergency services. Geo-located Twitter data were also considered as a support in urban management and planning (Wakamiya et al. 2011; Frias-Martinez et al. 2012), as well as in public health assessment (Ghosh and Guha 2013). All the aforementioned works were spatially selective, focusing on specific study areas. The global perspective was introduced in the study of Kamath et al. (2012), with the analysis of the geographic spread of hashtags. Furthermore, Leetaru et al. (2013) attempted to describe the geography of Twitter based on a one-month sample of global geo-located tweets, while Mocanu et al. (2013) described the global distribution of different languages used while tweeting. Given the well acknowledged role of location information registered within social networking services, the attempts to translate it into mobility characteristics remain relatively sparse. The most important foundations were provided by Cheng et al. (2011), who analyzed   2   different aspects of mobility based on Twitter check-ins, at that point dominated by the feed from another location sharing service i.e. Foursquare. The study had an extensive scope, but was limited by the time data availability. Other explorations were given e.g. by Cho et al. (2011), who modeled the influence of human mobility on social ties in Gowalla and Brightkite services, or by Noulas et al. (2012), who focused on intra-urban mobility approximated with Foursquare check-ins. In this paper, we present a global study of mobility. We focus on the worldwide patterns that emerge from the analysis of Twitter data, as well as on the mobility characteristics of different nations. Furthermore, we seek to discover spatial patterns and clusters of regional mobility. Finally, we attempt to validate the representativeness of geo-located Twitter as a global source for mobility data. The paper is organized as follows. First of all, we describe the dataset and illustrate a method to assign users to a country of residence, hence allowing the determination of home users and foreign visitors. Next, we present and compare mobility profiles of various countries, as well as the temporal patterns of inflows and outflows dynamics. Further, we explore a country-to-country network of the flows of travelers, and perform a community detection delineating global regions of mobility. Finally, we validate the results in two ways: (i) comparing against the worldwide tourism statistics and (ii) comparing Twitter data against commonly used models of human mobility. Data preparation and pre-processing Our study relies on one full year of geo-located tweets, which were posted by users all over the world from January 1st until December 31st 2012. By geo-located we mean the messages with explicit geographic coordinates attached to each message. The database consists of 944M records generated by a total of 13M users. The stream was gathered through the Twitter Streaming API1. Although the service sets a limit on the accessible volume to less than 1% of the total Twitter stream, the total geo-located content was found not to exceed this restriction (Morstatter et al. 2013). Therefore we believe that we successfully collected the complete picture of global geo-located activity within 2012. Before the actual analysis, the database had to be cleaned from evident errors and artificial tweeting noise, which could pollute mobility statistics. First we examined all the consecutive locations of a single user, and excluded those that implied a user relocating with a speed over 1000km/h, i.e. faster than a passenger plane. Further, we filtered out non-human Twitter activity such as web advertising (e.g. tweetmyjob), web gaming (e.g. map-game) or web reporting (e.g. sandaysoft). Those services can generate significant volumes of data, which does not reflect any sort of human physical presence in the reported place and time. To correct for this noise we checked the popularity of a message’s source, assuming that those with only few users can probably be classified as an artificial activity. As the threshold we used a cumulative popularity among 95% of users, constructing the ranking separately for each country. All tweeting sources falling below the threshold were discarded from further analysis. In total, the refinement procedure preserved 98% of users and 95% of tweets from the initial database.                                                                                                                           1  https://dev.twitter.com/docs/streaming-­‐apis     3   Definition of a country of the user’s residence An essential first step in our cross-country mobility analysis was an explicit assignment of each user to a country of residence. This made our work different from most of the other Twitter studies, which usually did not attempt to uncover users’ origin and characterized a study area using only the total volume of tweets observed in this area (e.g. Mocanu et al. 2013). While for certain research problems this approach is suitable, from the perspective of a global mobility study the differentiation between residents and visitors is crucial. It enables a clear definition of origin and destination of travels and reveals which nation is traveling where and when. Taking advantage of the history of tweeting records of every user, we defined her country of residence as the country where the user has issued most of the tweets. Once the country of residence was identified, the user’s activity in any other region of the world was considered as traveling behavior, and the user was counted as a visitor to that country. We use the country definitions of the Global Administrative Areas spatial database (Global Administrative Areas 2012), which divides the world into 253 territories. Twitter “residents” were identified in 243 of them, with the number of users greatly varying among different countries. The unquestionable leader is USA with over 3.8M users, followed by the United Kingdom, Indonesia, Brazil, Japan and Spain with over 500K users each. There are also countries and territories with only few or no Twitter users assigned. To evaluate the representativeness of Twitter in a given area, a more illustrative metric is the penetration rate, defined as the ratio between the number of Twitter users and the population of a country. As expected, this ratio does not distribute uniformly across the globe and scales superlinearily with the level of a country’s economic development approximated by a GDP per capita (Figure 2A and B). While this property has already been described e.g. by Mocanu et al. (2013) the goodness of a fit of a power law approximation increased when considering penetration of only residents rather than all Twitter users appearing in a country. In the analysis we exclude all countries with a penetration rate below 0.05% (we also exclude countries with the number of resident users smaller than 10,000). Figure 2. Twitter penetration rate across countries of the world. (A) Spatial distribution of the index. (B) Superlinear scaling of the penetration rate with per capita GDP of a country. R2 coefficient equals 0.70. Mobility profiles of countries Human mobility can be analyzed at different levels of granularity. In this study we considered a user as being ‘mobile’ if over the whole year the user had been tweeting from at least one country other than her country of residence. In total, this applied to 1M users, 4     around 8% of all those who used geo-located Twitter in 2012. Figure 3 shows the percentage of mobile users per country and the (geo-located) Twitter penetration in that country in 2012. Most of the top mobile countries, e.g. Belgium, Austria, were characterized by only moderate levels of Twitter adoption. On the other hand users of geo-located Twitter from the USA, the country with the highest penetration rate, revealed a surprisingly small tendency to travel. The only two countries with a high mobility and penetration rates were Singapore and Kuwait. In general, while an increased popularity of Twitter can be treated as a sign of a more active society, it did not immediately imply higher mobility of its users. Figure 3. Top countries with the highest rates of users’ travel activity. Next, we examined how spatially spread or concentrated the mobility of users is in a certain nation. This was captured through the average radius of gyration of the users. The radius of gyration measures the spread of user’s locations around her usual location. Here, we defined a usual location as the center of mass rather than a home location, as the latter is 𝑟! =   𝑎! −   𝑎!" ! defined broadly - only with the assignment to a particular country. For each user, the radius !! !!!! of gyration was computed according to the equation: where n is the number of tweeting locations, āi represents the location of a particular tweet (a pair of xy coordinates), and ācm is a user’s center of mass. Low values of the radius indicate a tendency to travel locally, while bigger values indicate more long-distance travels. The average values computed for users from different countries are shown in Figure 4. A first observation indicated an obviously important role played by the geographical location of a country. Isolated countries such as New Zealand or Australia had an average radius of gyration of over 700km. There was also a positive correlation between the average distance travelled by residents of a country and the mobility rate of its Twitter population, as well as the number of visited countries (Figures 4A and 4B). In any case, the drivers for increased mobility are connected with the economic prosperity of a country, as all received rankings were led by highly developed countries. (1)   5   Figure 4. Average radius of gyration of users from different countries compared to (A) percentage of mobile Twitter users and (B) number of countries visited. The mobility profile of each country can be analyzed from two perspectives: a country being the origin or the destination of international travels. By building the directional country-to-country network of the human flows, we were able to quantify both the inflow and outflow of visitors. Figure 5 shows the analysis for each country based on Twitter users and on total number of Twitter travelers normalized by the Twitter penetration rate in this country, used as an estimation of a total mobility flux. Figures 5A and 5B show the number of Twitter users originating from a country and traveling to another (5A) and users visiting this particular country (5B). Figures 5C and 5D present number of Twitter travelers normalized by the Twitter penetration rate in the country of a user’s origin. In case of international arrivals, both the raw number of Twitter users and the estimated population of visitors unveiled the most visited countries to be USA, UK, Spain and France. On the other hand, the ranking of travelers’ nationality seemed highly influenced by Twitter’s penetration rate, with the biggest groups coming from the countries of high Twitter popularity. Furthermore, low penetration indices leaded to an overestimation of the actual travelers’ volume, which may explain the values estimated for Russia or Germany. Figure 5E presents the yearly balance between the estimated inflow and outflow of travelers revealing different countries to be either the origin or destination of international trips. Figure 5. Number of visitors coming from or arriving in a country. Number of Twitter travelers (A and B), number of Twitter travelers normalized by the Twitter penetration rate in the country of origin of the visitor (C and D) and the overall balance of travelers (E).   6   Temporal patterns of mobility Human mobility is always subject to temporal variations. In order to uncover patterns occurring at the global, as well as at the country level, we measured how many Twitter users were active outside of their country of residence for each day of 2012. The first pattern that emerged from the analysis was the weekly scheme of check-ins abroad (Figure 6). The tendency of increased mobility over weekends seemed to be universal across the globe. Moreover, there were two obvious seasons of higher mobility: the summer months of July and August, and the end of the year, connected to Christmas and New Year’s Eve holidays. Figure 6. Global temporal pattern of users who traveled abroad. Looking at the specific countries we discovered a variety of deviations from the aforementioned global pattern. Several of them were easy to interpret and shared by more than one country. For instance, there was a substantial group of European nations with the biggest peak over one of the summer months and a few smaller ones, most probably connected to extended weekends e.g. at the beginning of May (examples are shown in Figure 7A). Another group exhibited a similar pattern, however with the summer mobility increase stretched between June and September (Figure 7B). An interesting example of the mobility behavior influenced by the social and cultural features of a country was observed in the group of Arabic countries (Figure 7C). The period of Ramadan corresponded to a major decrease in the amount of travels abroad, while the time of the Mecca pilgrimage marked a sharp peak at the end of October. In all cases, the end of the year corresponded to a time of increased international mobility. Figure 7. Normalized temporal patterns of mobility, from the perspective of the country of origin. The values for each country are scaled between 0 and 100% of the maximum daily number of travelers being abroad during 2012.   7   The temporal variations of the inflow of visitors were much more stable than the outflow patterns. Visual inspection of those patterns indicated three main groups. The first group included countries without any specific seasonality of international visits (with the exception of the end of the year period). The second group covered popular summer touristic destinations such as Spain, Italy, Croatia or Greece (Figure 8), with a significant increase in arrivals over the months of July and August. Finally, in the third group we included countries where increased international visits were connected to special events such as Euro 2012 in Poland or the 2012 Olympics in United Kingdom. Figure 8. Examples of summer destinations of touristic activity marked by the increased inflow of international Twitter users over summer. The values for each country are scaled between 0 and 100% of the maximum daily number of international visitors during 2012. Country-to-country network & partitioning In the next step, we analyzed the topology of the country-to-country mobility network created by travelers estimated through the Twitter community. As it has already been proven by many studies, partitioning of a raw network of human communicational interactions e.g. based on mobile phone data (Ratti et al. 2010; Blondel et al. 2010; Blondel 2011; Sobolevsky et al. 2013a), as well as partitioning of human mobility (Amini et al. 2013, Kang et al. 2013), can lead to the delineation of spatially cohesive communities, aligning surprisingly well with the existing socio-economic borders of the underlying geographies. Our aim was to test if this finding holds true for the Twitter-based mobility network, and if so, which distinctive mobility clusters emerge in different parts of the world. Taking advantage of our methodology of assigning a user to their country of residence and focusing on the mobile users, we built the worldwide country-to-country network of Twitter flows. Each country was considered as a node of the network, and the edges were weighted with the number of Twitter users travelling between a pair of nodes. The network was directional, as the connections were built from the country of residence to each other country where a user appeared as a visitor. To deal with the sparseness of the network and different levels of Twitter representativeness, we filtered out all countries with the outgoing population smaller than 500 Twitter users, as well as those countries where the Twitter penetration was below 0.05%. Furthermore, the flows were normalized by the Twitter penetration rate in the country of a user’ origin in order to estimate the real mobility flux rather than just a number of Twitter users. The top 30 flows between different countries are presented in Figure 9.   8   Figure 9. Top 30 country-to-country estimated flows of visitors. Colors of the ribbons correspond to the destination of a trip, while the country of origin is marked with the thin stripe at the end of a ribbon (visualization method based on Krzywinski et al. 2009). The network partitioning procedure was based on the well-known modularity optimization approach (Newman 2006) using a highly-efficient optimization algorithm recently proposed by Sobolevsky et al. (2013b). In general terms, the procedure assesses the relative strength of particular links versus the estimations of the homogenous null model preserving the strength of each network node. It optimizes the overall modularity score of a network partitioning, which quantifies the strength of intra-cluster connections (in the “ideal” partitioning case they should be as strong as possible) and the weakness of outer ties (supposed to be as weak as possible). After obtaining the initial split of the network, the partitioning procedure was applied in the iterative manner to the sub-networks inside each community, similarly as in Sobolevsky et al. (2013a). As the result, the Twitter network was split into mobility clusters on three hierarchical levels, each level being a sub-partitioning of the previous one. The initial level (Figure 10A) uncovered four groups of countries that closely agreed with the continental division of the world. In this sense, travel connections e.g. within both Americas were stronger than between America and Europe, while the Europeans traveled more within Europe and Asia than to the other continents. Further sub-divisions followed the same type of common logic, all clusters tend to be spatially connected and well aligned with expected socio-geographical regions. For instance, on level 2 we observed a split into Western, Central, Eastern and Northern Europe (Figure 10B), and on level 3 Central Europe was further divided into the more continental northern part and the Balkans (Table 1). In general, received clusters uncovered that people keep traveling more within their direct ‘neighborhoods’ rather than connect to further destinations. Furthermore, the fact that clusters were spatially continuous and reflected common regions of the world is in line with the findings of previous studies based on the mobile phone data (Ratti et al. 2010; Blondel et al. 2010; Blondel 2011; Sobolevsky et al. 2013a). It also extends the validity of network-based community detection form a country to global scale. Additionally, we see that the partitioning of mobility networks possess similar regularities compared to human communication networks and might also be used for regional delineation purposes. 9     2 Figure 10. Mobility regions uncovered by the partitioning of country-to-country network of Twitter users flows. Regions distinguished at the first (A) and second (B) level of partitioning. Grey color indicates no data. Table 1. Countries assigned to different regions of mobility. Level 1 Level 2 Level 3 1 1 1 2 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Assigned countries Bahamas, Canada, Dominican Rep., Jamaica, Mexico, Puerto Rico, United States Colombia, Ecuador, Panama, Trinidad and Tobago, Venezuela Costa Rica, El Salvador, Guatemala, Honduras, Bolivia, Chile, Peru, Argentina, Brazil, Paraguay, Uruguay France, Ireland, Malta, Martinique, Morocco, Portugal, Spain, Tunisia, United Kingdom Belgium, Germany, Iceland, Italy, Luxembourg, Netherlands, Switzerland Denmark, Norway, Sweden Austria, Czech Republic, Hungary, Poland, Romania, Slovakia Bosnia and Herzegovina, Croatia, Kosovo, Macedonia, Serbia, Slovenia Azerbaijan, Bulgaria, Cyprus, Greece, Israel, Kazakhstan, Latvia, Lithuania, Russia, Ukraine Belarus, Estonia, Finland, Turkey Ghana, Nigeria Kenya, South Africa Bahrain, Egypt, Jordan, Kuwait, Lebanon, Saudi Arabia Oman, Qatar, United Arab Emirates Maldives, Sri Lanka Japan, South Korea, Taiwan Philippines Brunei, Indonesia, Malaysia, Singapore Cambodia, Thailand, Vietnam Australia, New Zealand 12 13 14 9 10 11 3 4 5 6 7 8 3 4   10   Validation of the results In case of global mobility, it is difficult to find the appropriate dataset for the direct validation of results obtained with Twitter, especially one being considerably bias-free in respected to the way it captures human mobility. An interesting comparison could be held for example with the register of flight connections, though possibly hampered by partially disaggregated character of direct connections, often being just a segment of an indirect travel rather than a valid indication of an origin and a destination. In practice such a comparison is also obviously prevented by the difficult accessibility criterion. In this study, we relied on the tourism statistics as provided by the report of the WEF (World Economic Forum 2013) at the country level. We used two of those statistics: international tourist arrivals (thousands, 2011) and international tourism receipts (US$, millions, 2011) and compared them to arrivals estimated with the Twitter data (Figure 11A and 10B). In both cases we found a strong linear correlation (respectively with the R2 of 0.69 and 0.88), which is the confirmation of the validity of received mobility estimations. Figure 11. International arrivals estimated with Twitter data versus the arrivals (A) and nominal value of touristic receipts (expenditures by international inbound visitors, B) provided by WEF (2013). Correlation measured with the R2 statistic equals 0.69 and 0.88 respectively. We further validated the results indirectly by demonstrating that mobility measures derived with Twitter exhibit similar statistical properties as those received on the basis of other datasets. Firstly, we computed the distance between each pair of consecutive user’s locations (tweets) and plotted the frequencies of computed displacement on a log-log scale. 𝑃(∆𝑟)   =   ∆𝑟!! Similarly to other mobility studies, we found that the distribution is well approximated by the where Δr is a displacement of certain length and β = 1.62. Importantly, the received exponent power law (Figure 11A): (2) stays in the similar range as the results obtained with other mobility datasets such as mobile phone data (González et al. 2008, β = 1.75), bank note dispersal (Brockmann et al. 2006, β = 1.59) and Foursquare check-ins (Cheng et al. 2011, β = 1.88). We also plotted the frequency of previously computed users’ radiuses of gyration. As expected, it also followed a power law with an exponent of 1.25.   11   Figure 12. Probability of displacement (A) and frequency of radius of gyration (B). (3) Considering a limited access to global mobility data suitable for a direct comparison with Twitter-based human flows, we further tested our data against a commonly accepted mobility model, i.e. the classic gravity approach, as yet another way of indirect verification of uncovered patterns. Many studies proved the gravity law to provide a good basis for modelling the intensity of interactions between locations depending on their weights and distance, not only in the context of mobility (e.g. Zipf 1946, Jung et al. 2008, Balcan et al. 2009) but also human interaction networks (Krings et al. 2009, Expert et al. 2011). We assume that if the Twitter data are to be claimed suitable for a description of human mobility, they should follow a similar law and distance dependence as it was proven for other data types e.g. railway connections, airline traffic, mobile telecom records. Furthermore, we tested how much the gravity law holds on a global scale, especially in times when the influence of 𝐹!" = 𝐴 !!!!!!!!"! distance as a friction for mobility is often considered to decrease in importance. We used the gravity model in the form: where Fij represents a flow of people between a pair of countries, pi is the population in the country of origin, and pj the population of the destination, rij is the distance measured between the capitals and A is a constant. To compensate for the limitation of our definition of country- to-country distance we restricted the connections to the countries that are at least 100 km apart. The model was fitted to the two versions of our network. First, the flows were defined as a raw number of Twitter users traveling between two countries, and the population of each country was equal to the number of Twitter residents (Figure 13A). In this case we received the exponents of α = 0.81, β = 0.63 and γ = 1.02, and an R2 coefficient of 0.79. The second variation of the model (Figure 13B) used the flows estimated based on the Twitter penetration rate (again with the threshold of 0.05%), and the population as provided by the Central Intelligence Agency (2012). Received exponents were fairly similar to the previous results: α = 0.89, β = 0.69 and γ = 1.1 with only a slight decrease of the R2 coefficient to 0.71. Received population exponents indicate an underlinear influence of a country’s size on the growth of a human flow, both in case of origin and destination, but the influence of the population in a country of origin is obviously bigger. These underlinear relations can be explained with two conjectures. On the one hand, it is plausible that residents of a country do not take part in mobility in an equal manner, instead it is rather a domain of the most active ones. On the other hand, the visitors are never attracted by the whole country but rather only by certain places. On average the number of active users and attractive places among countries may grow slower comparing to their respective total population.   12   The gamma exponents suggest, as expected, a decrease of interaction intensity with distance (Figure 13A and 13B), however at a slower rate than often pre-assumed, e.g. by Jung et al. (2008) or Krings et al. (2009), r2 decay relationship. This difference can be interpreted through the scale of analysis. In a global scale, where most of the trips are happening by air, increase of a distance comes with relatively smaller effort or cost than in a country or local levels where substantial part of mobility is taking place by land. But even in the world of this subjective ‘shrinkage’ of distances, certain level of dependency is still preserved. As the reason we suppose social ties, which remain stronger in a local than in a global scale (Takhteyev et al. 2012). In other words, people may simply have more reasons to travel shorter distances, which also correlates well with the results received during network partitioning. Visually, both variations models seem to be well fitted (Figure 13A and B), with the slopes well reflecting the average tendency in the observed data and the distant decay functions remaining within the standard errors across the whole distance range. The similarity of both models suggests that Twitter data may not only provide a valid picture of mobility of its direct users, but can further be used for the estimation of real human flows. (A piαpjβ) on the distance in comparison to a distance decay function (r-γ) modeled with the gravity law. (A) Figure 13. Dependence of human flow (Fij) normalized with populations in countries of origin and destination Network defined based on raw Twitter flows (B) Network of total population flows estimated with the Twitter penetration rate in the country of origin (B). Conclusions Geo-located Twitter is one of the first free and easily available global data sources that store millions of digital and fully objective records of human activity located in space and time. With our study we demonstrated that, despite the unequal distribution over the different parts of the world and possible bias toward a certain part of the population, in many cases geo-located Twitter can and should be considered as a valuable proxy for human mobility, especially at the level of country-to-country flows. Our approach proposed to capture mobility respective to the nationality of travelers based on the simple yet effective method of assigning each user to her country of residence. In this way, we were able to compare mobility profiles of countries, considering each of them both as a potential origin as well as a destination of international travels. Received results showed that increased mobility measured in terms of probability, diversity of destinations, and geographical spread of travels, is characteristic of more developed countries such as the West-European ones. The travelling distance was additionally affected by the geographic isolation of a country as in the case of Australia or New Zealand. The analysis of temporal patterns indicated the existence of   13   globally universal season of increased mobility at the end of the year, clearly visible regardless of the nationality of travelers. Although the summer mobility was increased for a wide range of countries, it varied in terms of intensity and duration, and in some cases was not visible at all. Additionally, we discovered specific patterns driven either by cultural conditionings or special events occurring in a given country. However in many cases the results just confirmed the common logic expectations, this agreement should be treated as an indicator of the legitimacy of Twitter as a global and objective register of human mobility. Furthermore, we demonstrated that community detection performed using the Twitter mobility network resulted in spatially cohesive regions that followed the regional division of the world. This finding is important from several stand points. First of all, it is in agreement with the results obtained by other authors (Ratti et al. 2010; Blondel et al. 2010; Sobolevsky et al. 2013a) based on the different types of networks i.e. mobile phone interactions. Furthermore, it extends the spatial validity of the community detection approach from a previously examined country scale to the global one. Finally, it shows that even in the era of globalization and seeming decrease of the influence of distance, people still tend to travel locally, visiting immediate neighboring countries more often than those further away. As our final contribution we validated, to a certain extent, geo-located Twitter as a proxy of global mobility behavior. First of all, we demonstrated that volumes of visitors estimated for different countries based on Twitter data are in line with the official statistics on international tourism. The correlation (R2 around 0.7) shows a fairly good correspondence given the wider scope of mobility captured through Twitter, as well as significantly different character of data acquisition. Secondly, we confirmed that Twitter data exhibits similar statistical properties as other mobility datasets. For instance, the measures such as a radius of gyration and the probability of displacement are well approximated with the power law distribution, similarly as in Brockmann et al. (2006) or Cheng et al. (2011), and the network of the estimated flows of travelers can be well approximated with the classic model of a mobility i.e. the gravity model. Altogether, we believe that our analysis proved the potential of geo-located Twitter as a fully objective, and freely accessible source for global mobility studies. Further research will focus on the exploration how far this potential can be translated to finer spatial scales. Acknowledgements This research was funded by the Austrian Science Fund (FWF) through the Doctoral College GIScience (DK W 1237-N23), Department of Geoinformatics - Z_GIS, University of Salzburg, Austria. We would like to thank Sebastian Grauwin and Karolina Stanislawska for their support. We further thank the MIT SMART Program, the Center for Complex Engineering Systems (CCES) at KACST and MIT CCES program, the National Science Foundation, the MIT Portugal Program, the AT&T Foundation, Audi Volkswagen, BBVA, The Coca Cola Company, Ericsson, Expo 2015, Ferrovial, GE and all the members of the MIT Senseable City Lab Consortium for supporting the research.   14   References: Amini, A., K. Kung, C. Kang, S. Sobolevsky, and C. Ratti. 2013. “The Differing Tribal and Infrastructural Influences on Mobility in Developing and Industrialized Regions”. In Proceedings of 3rd Int. Conference on the Analysis of Mobile Phone Data (NetMob 2013): 330-339. Bajardi, P., C. Poletto, J. J. Ramasco, M. Tizzoni, V. Colizza, and A. Vespignani. 2011. “Human Mobility Networks, Travel Restrictions, and the Global Spread of 2009 H1N1 Pandemic.” PLoS ONE 6 (1): e16591. Balcan, D., V. Colizza, B. Gonçalves, H. Hu, J. J. Ramasco, and A. Vespignani. 2009. “Multiscale Mobility Networks and the spatial spreading of infectious diseases.” Proceedings of National Academy of Science 106 (51): 21484-21489. Barrat, A., M. Barthélemy, R. Pastor-Satorras, and A. Vespignani. 2004. “The Architecture of Complex Weighted Networks.” Proceedings of the National Academy of Sciences of the United States of America 101 (11): 3747–3752. Blondel, V. 2011. “Voice on the Border: Do Cellphones Redraw the Maps?” Open Access publications from Université catholique de Louvain info: hdl:2078.1/108639. Blondel, V., G. Krings, and I. Thomas. 2010. “Regions and Borders of Mobile Telephony in Belgium and in the Brussels Metropolitan Zone.” Brussels Studies 42(4). Bollen, J., A. Pepe, and H. Mao. 2011. “Modeling Public Mood and Emotion: Twitter Sentiment and Socio- economic Phenomena.” In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media: 450–453. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/viewFile/2826/3237. Brockmann, D., L. Hufnagel, and T. Geisel. 2006. “The Scaling Laws of Human Travel.” Nature 439 (7075): 462–465. Calabrese, F., M. Diao, G. Di Lorenzo, J. Ferreira Jr., and C. Ratti. 2013. “Understanding Individual Mobility Patterns from Urban Sensing Data: A Mobile Phone Trace Example.” Transportation Research Part C: Emerging Technologies 26: 301–313. Calabrese, F., F. C. Pereira, G. Di Lorenzo, L. Liu, and C. Ratti. 2010. “The Geography of Taste: Analyzing Cell-Phone Mobility and Social Events.” In Pervasive Computing. Lecture Notes in Computer Science 6030: 22–37. Castles, S., and M. J. Miller. 1998. The Age of Migration: International Population Movements in the Modern World. New York–London. Guildford Press. Central Intelligence Agency (CIA). 2012. “The World Factbook”. Available at: https://www.cia.gov/library/publications/the-world-factbook/. Accessed on 27-09-2013. Cheng, Z., J. Caverlee, K. Lee, and D. Z. Sui. 2011. “Exploring Millions of Footprints in Location Sharing Services.” AAAI ICWSM: 81-88. Cho, E., S. A. Myers, and J. Leskovec. 2011. “Friendship and Mobility: User Movement in Location-based Social Networks.” In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining: 1082–1090. Expert, P., T. S. Evans, V. D. Blondel, and R. Lambiotte. 2011. “Uncovering Space-independent Communities in Spatial Networks.” Proceedings of the National Academy of Sciences 108 (19): 7663–7668. Frias-Martinez, V., V. Soto, H. Hohwald, and E. Frias-Martinez. 2012. “Characterizing Urban Landscapes Using Geolocated Tweets.” In Privacy, Security, Risk and Trust (PASSSAT), 2012 Int. Conference on Social Computing (SocialCom), 239-248. Frank, M. R., L. Mitchell, P. S. Dodds, and C. M. Danforth. 2013. “Happiness and the Patterns of Life: A Study of Geolocated Tweets.” Scientific Reports 3. Gesenhues, A. 2013. “Study: Mobile Users & Older Generations are Driving Social Media Growth around the world”. Marketing Land publication service. Third Doors Media, Inc. Available at: http://marketingland.com/study-social-network-growth-across-the-globe-driven-by-mobile-users-older- generations-41982. Accessed on 27-09-2013. Ghosh, D., and R. Guha. 2013. “What Are We ‘tweeting’ About Obesity? Mapping Tweets with Topic Modeling and Geographic Information System.” Cartography and Geographic Information Science 40 (2): 90–102. “Global Administrative Areas”. 2012. GADM database of Global Administrative Areas. Available at: http://www.gadm.org/. Accessed on 15-08-2013. 15     Golder, S. A., and M. W. Macy. 2011. “Diurnal and Seasonal Mood Vary with Work, Sleep, and Daylength Across Diverse Cultures.” Science 333 (6051): 1878–1881. González, M. C., C. A. Hidalgo, and A. L. Barabási. 2008. “Understanding Individual Human Mobility Patterns.” Nature 453 (7196): 779–782. Greenwood, M. J. 1985. “Human Migration: Theory, Models, and Empirical Studies.” Journal of Regional Science 25 (4): 521–544. Huberman, B. A., D. M. Romero, and F. Wu. 2008. “Social Networks That Matter: Twitter Under the Microscope”. SSRN Scholarly Paper ID 1313405. http://papers.ssrn.com/abstract=1313405. Java, A., X. Song, T. Finin, and B. Tseng. 2007. “Why We Twitter: Understanding Microblogging Usage and Communities.” In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis: 56–65. Jung, W-S., F. Wang, and H. E. Stanley. 2008. “Gravity Model in the Korean Highway.” Europhysics Letters 81(4): 48005. Kamath, K. Y., J. Caverlee, Z. Cheng, and D. Z. Sui. 2012. “Spatial Influence Vs. Community Influence: Modeling the Global Spread of Social Media.” In Proceedings of the 21st ACM international conference on Information and knowledge management: 962-971. Kang, C., X. Ma, D. Tong, and Y. Liu. 2012. “Intra-urban Human Mobility Patterns: An Urban Morphology Perspective.” Physica A: Statistical Mechanics and Its Applications 391 (4): 1702–1717. Kang, C., S. Sobolevsky, Y. Liu and C. Ratti. 2013. “Exploring human movements in Singapore: a comparative analysis based on mobile phone and taxicab usages”. In UrbComp’13 Proceedings of the 3rd ACM SIGKDD International Workshop on Urban Computing: 330-339. Krings, G., F. Calabrese, C. Ratti, and V. D. Blondel. 2009. “Urban Gravity: a Model for Inter-city Telecommunication Flows.” Journal of Statistical Mechanics: Theory and Experiment 2009 (07): L07003. Krzywinski, M., J. Schein, I. Birol, J. Connors, R. Gascoyne, D. Horsman, S. J. Jones, and M. A. Marra. 2009. “Circos: An Information Aesthetic for Comparative Genomics.” Genome Research 19 (9): 1639–1645. Kwak, H., C. Lee, H. Park, and S. Moon. 2010. “What Is Twitter, a Social Network or a News Media?” In Proceedings of the 19th International Conference on World Wide Web: 591–600. Leetaru, K., S. Wang, A. Padmanabhan, and E. Shook. 2013. “Mapping the Global Twitter Heartbeat: The Geography of Twitter.” First Monday 18 (5). MacEachren, A. M., A. C. Robinson, A. Jaiswal, S. Pezanowski, A. Savelyev, J. Blanford, and P. Mitra. 2011. “Geo-Twitter Analytics: Applications in Crisis Management.” In Proceedings, 25th International Cartographic Conference, Paris, France. Miguéns, J.I.L., and J.F.F. Mendes. 2008. “Travel and Tourism: Into a Complex Network.” Physica A: Statistical Mechanics and Its Applications 387 (12): 2963–2971. Mitchell, L., K. D. Harris, M. R. Frank, P. S. Dodds, and C. M. Danforth. 2013. “The Geography of Happ iness: Connecting Twitter Sentiment and Expression, Demographics, and Objective Characteristics of Place.” ArXiv e-print arXiv: 1302.3299. Mocanu, D., A. Baronchelli, N. Perra, B. Gonçalves, Q. Zhang, and A. Vespignani. 2013. “The Twitter of Babel: Mapping World Languages through Microblogging Platforms.” PLoS ONE 8 (4): e61981. Morstatter, F., J. Pfeffer, H. Liu, and K. M. Carley. 2013. “Is the Sample Good Enough? Comparing Data from Twitter’s Streaming Api with Twitter’s Firehose.” Proceedings of ICWSM. Newman, M. E. J. 2006. “Modularity and Community Structure in Networks.” Proceedings of the National Academy of Sciences 103 (23): 8577–8582. Noulas, A., S. Scellato, R. Lambiotte, M. Pontil, and Cecilia Mascolo. 2012. “A Tale of Many Cities: Universal Patterns in Human Urban Mobility.” PLoS ONE 7 (5): e37027. Pak, A., and P. Paroubek. 2010. “Twitter as a Corpus for Sentiment Analysis and Opinion Mining.” In Proceedings of LREC: 436-439. Ratti, C., S. Sobolevsky, F. Calabrese, C. Andris, J. Reades, M. Martino, R. Claxton, and S. H. Strogatz. 2010. “Redrawing the Map of Great Britain from a Network of Human Interactions.” PLoS ONE 5 (12): e14248. Sagl, G., B. Resch, B. Hawelka, and E. Beinat. 2012. “From Social Sensor Data to Collective Human Behaviour Patterns: Analysing and Visualising Spatio-Temporal Dynamics in Urban Environments.” In Proceedings of the GI-Forum 2012: Geovisualization, Society and Learning: 54–63.   16   Sakaki, T., M. Okazaki, and Y. Matsuo. 2010. “Earthquake Shakes Twitter Users: Real-time Event Detection by Social Sensors.” In Proceedings of the 19th International Conference on World Wide Web: 851–860. Sassen, S. 1999. Globalization and Its Discontents: Essays on the New Mobility of People and Money. New York: The New Press. ISBN: 1565845188. Simini, F., M. C. González, A. Maritan, and A. L. Barabási. 2012. “A Universal Model for Mobility and Migration Patterns.” Nature 484 (7392): 96–100. Sobolevsky, S., M. Szell, R. Campari, T. Couronné, Z. Smoreda, and C. Ratti. 2013a. “Delineating Geographical Regions with Networks of Human Interactions in an Extensive Set of Countries.” PlosONE 8(12): e81707. Sobolevsky, S., R. Campari, A. Belyi, and C. Ratti. 2013b. “A General Optimization Technique for High Quality Community Detection in Complex Networks.” ArXiv e-print arXiv: 1308.3508. Takhteyev, Y., A. Gruzd, and B. Wellman. 2012. “Geography of Twitter Networks.” Social Networks 34 (1): 73–81. Thom, D., H. Bosch, S. Koch, M. Worner, and T. Ertl. 2012. “Spatiotemporal Anomaly Detection through Visual Analysis of Geolocated Twitter Messages.” In Pacific Visualization Symposium (PacificVis), 2012 IEEE: 41–48. “Twitter Statistics”. 2013. Statistic Brain Research Institute, publishing as Statistic Brain. Available at: http://www.statisticbrain.com/twitter-statistics. Accessed on 27-09-2013. Wakamiya, S., R. Lee, and K. Sumiya. 2011. “Urban Area Characterization Based on Semantics of Crowd Activities in Twitter.” GeoSpatial Semantics: 108–123. World Economic Forum. 2013. “The Travel & Tourism Competitiveness Report 2013”. Available at: http://www.weforum.org/reports/travel-tourism-competitiveness-report-2013. Zipf, G. K. 1946. “The P1P2/D hypothesis: on the intercity movement of persons.” Aerican. Sociological Review 11: 677–686   17  
1807.05540
1
1807
2018-07-15T12:42:28
A Survey on Expert Recommendation in Community Question Answering
[ "cs.SI", "cs.IR" ]
Community question answering (CQA) represents the type of Web applications where people can exchange knowledge via asking and answering questions. One significant challenge of most real-world CQA systems is the lack of effective matching between questions and the potential good answerers, which adversely affects the efficient knowledge acquisition and circulation. On the one hand, a requester might experience many low-quality answers without receiving a quality response in a brief time, on the other hand, an answerer might face numerous new questions without being able to identify their questions of interest quickly. Under this situation, expert recommendation emerges as a promising technique to address the above issues. Instead of passively waiting for users to browse and find their questions of interest, an expert recommendation method raises the attention of users to the appropriate questions actively and promptly. The past few years have witnessed considerable efforts that address the expert recommendation problem from different perspectives. These methods all have their issues that need to be resolved before the advantages of expert recommendation can be fully embraced. In this survey, we first present an overview of the research efforts and state-of-the-art techniques for the expert recommendation in CQA. We next summarize and compare the existing methods concerning their advantages and shortcomings, followed by discussing the open issues and future research directions.
cs.SI
cs
Wang X, Huang C, Yao L et al. A survey on expert recommendation in community question answering. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 33(1): 1–29 January 2018. DOI 10.1007/s11390-015-0000-0 A Survey on Expert Recommendation in Community Question Answering Xianzhi Wang1, Member, ACM, IEEE, Chaoran Huang2, Lina Yao2, Member, ACM, IEEE, Boualem Benatallah2, Member, IEEE, and Manqing Dong2, Student Member, ACM, IEEE 1 School of Software, University of Technology Sydney, NSW 2007, Australia 2 School of Computer Science and Engineering, University of New South Wales, Sydney, 2052 NSW, Australia E-mail: [email protected], {chaoran.huang, lina.yao, b.benatallah, manqing.dong}@unsw.edu.au Received July 15, 2018; revised October 14, 2018. Abstract Community question answering (CQA) represents the type of Web applications where people can exchange knowledge via asking and answering questions. One significant challenge of most real-world CQA systems is the lack of effective matching between questions and the potential good answerers, which adversely affects the efficient knowledge acquisition and circulation. On the one hand, a requester might experience many low-quality answers without receiving a quality response in a brief time; on the other hand, an answerer might face numerous new questions without being able to identify their questions of interest quickly. Under this situation, expert recommendation emerges as a promising technique to address the above issues. Instead of passively waiting for users to browse and find their questions of interest, an expert recommendation method raises the attention of users to the appropriate questions actively and promptly. The past few years have witnessed considerable efforts that address the expert recommendation problem from different perspectives. These methods all have their issues that need to be resolved before the advantages of expert recommendation can be fully embraced. In this survey, we first present an overview of the research efforts and state-of-the-art techniques for the expert recommendation in CQA. We next summarize and compare the existing methods concerning their advantages and shortcomings, followed by discussing the open issues and future research directions. Keywords community question answering, expert recommendation, challenges, solutions, future directions 1 Introduction The prosperity of crowdsourcing and web 2.0 has fostered numerous online communities featuring ques- tion answering (Q&A) activities. Such communities ex- ist in various forms such as dedicated websites, online forums, and discussion boards. They provide a venue for people to share and obtain knowledge by asking and answering questions, known as community ques- tion answering (CQA) [1]. While traditional online in- formation seeking approaches (e.g., search engines) re- trieve information from existing information reposito- ries based on keywords, they face several challenges. First, answers to some questions may not exist in the previously answered questions [2] and thus cannot be re- trieved from existing repositories directly. Second, most real-world questions are written in complicated natu- ral languages that require certain human intelligence to be understood. Third, some questions inherently seek people's opinions and can only be answered by hu- mans. While machines find difficult to handle the above cases, CQA can leverage the "wisdom of crowds" and obtain answers from multiple people simultaneously. Typical Q&A websites include Yahoo! Answers (an- swers.yahoo.com), Quora (www.quora.com), and Stack Overflow (stackoverflow.com). The first two websites cover a wide range of topics, while the last only focuses on the topic of computer programming. Though advantages over the traditional information seeking approaches, CQA faces several unique chal- lenges. First, a CQA website may have tens of thou- sands of questions posed every day, let alone the mil- lions of questions that already exist on the website. The huge volume of questions makes it difficult for a gen- Survey ©2018 Springer Science + Business Media, LLC & Science Press, China 2 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 eral answerer to find the appropriate questions to an- swer [3]. Second, answerers usually have varying inter- est and expertise in different topics and knowledge do- mains. Thus, they may give answers of varying quality to different questions. The time required for preparing answers [4] and the intention of answering also affect the quality of their responses. An extreme case is that an- swerers may give irrelevant answers that distract other users [5] without serious thinking. All the above situa- tions cause additional efforts of an information seeker in obtaining good answers. Third, instead of receiving an answer instantly, users in CQA may need to wait a long time until a satisfactory answer appears. Previ- ous studies [6] show that many questions on real-world CQA websites cannot be resolved adequately, meaning the requesters recognize no best answers to their ques- tions within 24 hours. Fortunately, several studies [7–9] have shown that some core answerers are the primary drivers of answer production in the many communities. Recent work on Stack Overflow and Quora [10] further indicates that these sites consist of a set of highly dedicated domain experts who aim at satisfying requesters' query but more importantly at providing answers with high last- ing value to a broader audience. All these studies sug- gest the needs for recommending a small group of most competent answerers, or experts to answer the new questions. In fact, the long-tail phenomena in many real-world communities, from the statistic perspective, lays the ground of the rationale of expert recommenda- tion in CQA [11], as most answers and knowledge in the communities come from only a minority of users [11;12]. As an effective means of addressing the practical chal- lenges of traditional information seeking approaches, expert recommendation methods bring up the attention of only a small number of experts, i.e., the users who are most likely to provide high-quality answers, to an- swer a given question [13]. Since expert recommendation inherently encourages fast acquisition of higher-quality answers, it potentially increases the participation rates of users, improves the visibility of experts, as well as fosters stronger communities in CQA. Given the advantages of expert recommendation and related topics such as question routing [6;14] and question recommendation [15] in the domains of Natu- ral Language Processing (NLP) and Information Re- trieval (IR), we aim to present a comprehensive survey on the expert recommendation in CQA. On the one hand, considerable efforts have been conducted on the expert recommendation and have delivered fruitful re- sults. Therefore, it is necessary to review the related methods and techniques to gain a timely and better understanding of state of the art. On the other hand, despite the active research in CQA, expert recommen- dation remains a challenging task. For example, the sparsity of historical question and answer records, low participation rates of users, lack of personalization in recommendation results, the migration of users in or out of communities, and lack of comprehensive consid- eration of different clues in modeling users expertise are all regarded as challenging issues in literature. Given the diverse existing methods, it is crucial to develop a general framework to evaluate these methods and ana- lyze their shortcomings, as well as to point out promis- ing future research directions. To the best of our knowledge, this is the first com- prehensive survey that focuses on the expert recommen- dation issue in CQA. The remainder of the article is or- ganized as follows. We overview the expert recommen- dation problem in Section 2 and its current applications in CQA in Section 3. In Section 4, we present the clas- sification and introduction of state of the art expert rec- ommendation methods. In Section 5, we compare the investigated expert recommendation methods on vari- ous aspects and discuss their advantages and pitfalls. In Section 6, we highlight several promising research directions. Finally, we offer some concluding remarks in Section 7. 2 Expert Recommendation Problem The expert recommendation issue is also known as the question routing or expert finding problem. The basic inputs of an expert recommendation problem in- clude users (i.e., requesters and answerers) and user- generated content (i.e., the questions raised by re- questers and the answers provided by answerers). More inputs might be available depending on the applica- tion scenarios. Typically, they include user profiles (e.g., badges, reputation scores, and links to external resources such as Web pages), users' feedback on ques- tions and answers (e.g., textual comments and votings), and question details (e.g., the categories of questions and duplication relations among questions). The rela- tionship among the different types of inputs of an ex- pert recommendation problem is described in the class diagram shown in Fig. 1. Question answering websites usually organize infor- mation in the form of threads. Each thread is led by a single question, which is replied to with none, one, or Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 3 Fig.1. Elements of expert recommendation in CQA. multiple answers. Each question or answer is provided by a single user, called a requester or an answerer, re- spectively. A requester may ask multiple questions, and each answerer may answer various questions. A user can be either a requester or an answerer, or both at the same time in the same CQA website, and all users are free to provide different types of feedback on the posted questions and answers. For example, in Stack Overflow, any registered user can comment and vote (by giving a thumb up or thumb down) on an answer posted for any question, and the requester has the authority to mark one from the posted answers as the best answer. In case that the requester has not designated the best answer within a specified period, the system will auto- matically mark the response that received the highest voting score as the best answer. The objective of the expert recommendation prob- lem is to raise the attention of experts, i.e., a small num- ber of users who are most likely to provide high-quality answers, to the given question based on the above prob- lem inputs. Despite the various possible types of inputs, only a subset of them might be available in a specific application scenario. Therefore, researchers may define the expert recommendation problem differently accord- ing to the inputs. Besides, researchers may take into account different concerns and expect different types of outputs from their methods. Generally, topical rel- evance and expertise are the two most considered as- pects of concerns by the existing research. While some researchers develop methods to find a group of high- quality answerers, other researchers aim to deliver a ranked list, where the users are ranked according to their potential to provide the best answer. We will elaborate the variations in the problem definition in Section 5. Generally, it is only necessary to recommend experts when the new question is significantly different from any previous questions with best answers, meaning that no satisfactory answers are readily available within the archive of best answers to the earlier questions. Expert recommendation generally brings about the following advantages to CQA: i) users usually prefer answers from experts, who are supposed to have sufficient motiva- tion and knowledge to answer the given questions and therefore more likely to provide high-quality answers promptly; ii) expert recommendations can potentially reduce the waiting time of requesters in finding satis- factory answers as well as the time of experts in find- ing their questions of interests; iii) by bridging the gap between requesters and answerers, expert recommenda- tions can potentially promote their participation rates and thus foster stronger communities. Since experts are recommended with questions that fit their exper- tise, their visibility is expected to be improved as well. 3 Current Applications in CQA Currently, there exist various Q&A websites where expert recommendation techniques are applied or can be potentially applied. Due to the large number of Q&A websites that exist nowadays, we selectively list some typical Q&A websites by launch year in Table 1. In the following subsections, we will categorize and give further illustrations of several typical websites of each category. 3.1 Early CQA Services Most early-stage Q&A services (e.g., the first four websites in Table 1) meet a requesters' information needs by resorting to the opinions of experts rather than the crowd. These experts are acknowledged by either the websites or third-party authorities and are often limited in number. They usually have rich knowledge and experience in some domains but require a payment for the answers they provide. We introduce two of these websites as examples as follows: 4 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 Community MedHelp Mad Scientist Netwok WebMD Google Answers Naver KiN WikiAnswers Answerbag IAsk Baidu Knows Live QnA TurboTax Live Community Sogou Wenwen Stack Overflow Quora Seasoned Advice Table 1. Some Popular Question Answering Communities Language Specialized Domain Launch Year Still Active Quality Guarantee English English English Multiple Korean English English Chinses Chinese English English Chinese English English English Medical Various Medical Various Various Various Various Various Various Various Tax Various Programming Various Cooking 1994 1995 1996 2002 2002 2002 2003 2005 2005 2006 2007 2007 2008 2010 2010 Y Y Y N Y Y Y Y Y N Y Y Y Y Y Y Y Y Y N N N N N N N N N N N Mad Scientist Network 1 : a famous ask-a-scientist web service where people ask questions by filling forms and moderators are responsible for reviewing the ques- tions and sending them to the appropriate members for answers. The moderators will also review the answers before making them public. Google Answers 2 : a knowledge market service de- signed as an extension to Google's search service. There were a group of answerers called Google Answers Re- searchers who are officially approved to answer ques- tions through an application process. Instead of pas- sively waiting for other people to moderate or answer their questions, people can actively find the potential answerers by themselves and pay the answerers. 3.2 General-purpose CQA Websites The Q&A services that emerge in the past two decades are increasingly leveraging the "wisdom of the crowd" rather than a small number of experts to give answers. Websites following this philosophy allow any users to voluntarily answer any questions on their free will and most of them serve as general purpose plat- forms for knowledge sharing rather then domain fo- cused ones. We overview some typical general purpose websites as follows: Quora: one of the largest existing Q&A website where users can ask and answer questions, rate and edit the answers posted by others. Zhihu 3 : a Chinese Q&A website similar to Quora. It allows users to create and edit questions and answers, rate system, and tag questions. Also, users may also post blogs in Zhihu for sharing while others can view and comment on such posts. Naver KiN 4 : a Korean CQA community, one of the earlier cases of expansion of search service using user-generated content. WikiAnswers 5 : a wiki service that allows people to raise and answer questions, as well as edit existing answers to questions. It uses a so-called "alternates sys- tem" to automatically merge similar questions. Since an answer may be associated with multiple questions, duplicated entries can be avoided to some extent. Answerbag 6 : a CQA community where users can ask and answer questions, give comments to answers, rate questions, rate answers, and suggest new cate- gories. Live QnA 7 : also known as MSN QnA, was part of Microsoft MSN group services. In this system, users can ask and answer questions, tag them to specific top- ics, and gain points and reputations by answering ques- 1 http://www.madsci.org/, May 2018. 2 http://answers.google.com/, May 2018. 3 http://www.zhihu.com/, May 2018. 4 http://kin.naver.com/, May 2018. 5 http://www.wikianswers.com/, May 2018. 6 http://www.answerbag.com/, May 2018. 7 http://qna.live.com/, May 2018. Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 5 tions. 4 Expert Recommendation Methods 3.3 Domain-focused CQA Websites Compared with those general purpose websites, each domain-focused Q&A website only covers limited topics or knowledge domains. The Stack Exchange net- works are probably the largest host of domain-focused Q&A websites nowadays. Some typical websites hosted by it include the following: MathOverflow 8 : a Q&A website focused on math- ematical problems. AskUbuntu 9 : a website supporting Q&A activities related to Ubuntu operation Systems. StackOverflow : a Q&A website focused on com- puter programming. All these websites follow similar sets of styles and functions. Apart from the basic question answering features, they commonly use badges to recognize the achievement of answerers and grant badges to users based on their reputation points. Users can also un- lock more privileges with higher reputation points. 3.4 Summary In summary, despite the prevalence of diverse types of Q&A websites, few of them have incorporated any effective expert recommendation techniques to bridge requesters and answers. To the best of our knowledge, currently, the only implementation of the idea of rout- ing questions to the appropriate users in Q&A is called "Aardvark" [16]. However, the primary purpose of this system is to serve as an enhanced search engine, and the expert recommendation techniques it employs are still at a preliminary stage. Recently, Bayati et al. [17] design a framework for recommending security experts for software engineering projects. This framework offers more strength to facilitate expert recommendation by considering multiple aspects of users such as program- ming language, location, and social profiles on domi- nant programming Q&A websites like StackOverflow. Since the Q&A systems can be regarded as a type of crowdsourcing systems [18], the expert recommendation methods for a Q&A system can potentially be gener- alized and applied to general crowdsourcing systems as well. 8 http://mathoverflow.net/, May 2018. 9 http://askubuntu.com/, May 2018. As the major technique to facilitate effective CQA, considerable efforts have been contributed to the ex- pert recommendation research from the information re- trieval (IR), machine learning, and social computing perspectives, and have delivered fruitful results. We classify the state of the art expert recommendation methods into eight categories and review the methods by category in the following subsections. 4.1 Simple Methods One of the most critical tasks of expert recommen- dation is to evaluate users. Given a new question to be answered, some methods use simple metrics such as counts of positive/negative votes, proportions of best answers, and the similarity between the new ques- tion and users' previous answered questions to evaluate users' fitness to answer the questions. In the following, we introduce the methods that use the three metrics, respectively. For any of these methods, a higher score indicates a better answerer. Votes: the method evaluates a user by the number of affirmative votes minus the number of negative votes, combined with the total percentage of affirmative votes that the user receives from other users averaged over all the answers the user have attempted. Best answer proportion: this method ranks users by the fraction of best answers among all the answers at- tempted by an answerer. The best answers are either awarded by the requester of questions or by the ques- tion answering platform when requesters designate no best answers. Textual similarity: the most famous method for measuring textual similarity is to compute the cosine similarity based on the term frequency-inverse docu- ment frequency (TF-IDF) model, a classic vector space model (VSM) [19] borrowed from the information re- trieval domain. VSM is readily applicable to computing the similarity of an answerer's profile to a given ques- tion. Therefore, it can be directly used for the expert recommendation by relating a new question to the an- swerers who have previously answered the most relevant questions to the given question. 6 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 4.2 Language Models Despite the simplicity, VSM adopts the "bag-of- words" assumption and thus brings the high-dimension document representation issue. In contrast, language models use a generative approach to compute the word- based relevance of a user's previous activities to the given question, and in turn, to predict the possibility of a user answering the question. Such models can, to some extent alleviate the high dimension issue. In a language model, the users whose profiles are most likely to generate the given question are believed to have to highest probability to answer the given question. The model finally returns a ranked list of users according to their likelihood of answering the given question. The language model-based methods include profile- based methods and document-based methods. The for- mer [20] models the knowledge of each user with the as- sociated documents and ranks the candidate experts for a given topic based on the relevance scores between their profiles and the given question. The latter [20] finds related documents for a given topic and ranks candidates based on mentions of the candidates in the related documents. 4.2.1 QLL and Basic Variants Among the methods of this category, query likeli- hood language (QLL) model [21] is the most popular technique. QLL calculates a probability that user pro- files will generate terms of the routed question. The traditional language models often suffer the mismatch between the question and user profiles caused by the co-occurrence of random words in user profiles or ques- tions resulting from data sparseness. Translation mod- els [22] overcomes data sparseness by employing statis- tical machine translation and can differentiate between exact matched words and translated semantically re- lated ones. A typical work [23] using this method views the problem as an IR problem. It considers the new question as a query and the expert profiles as docu- ments. It next estimates an answerer's expertise by combining its previously answered questions, and re- gards experts as the users who have answered the most similar questions in the past. Besides the basic models, many variants of QLL have also emerged as alternatives or enhancements. For example, Liu et al. propose two variants of the ba- sic language model, namely relevance-based language model [24] and cluster-based language model [25] to rank user profiles. Petkova and Croft [26] propose a hierarchi- cal language model which uses a finer-grained approach with a linear combination of the language models built on subcollections of documents. 4.2.2 Category-sensitive QLL Considering the availability of categories in many Q&A websites, Li et al. [27] propose a category-sensitive QLL model to exploit the hierarchical category infor- mation presented with questions in Yahoo! Answers. Once a question gets categorized, the task is to find the users who are most likely to answer that question within its category. Their experiments over the Yahoo! An- swers dataset show that taking categories into account improves the recommendation performance. A limita- tion of the category-sensitive model is that categories need to be well predefined and some questions might be closely related to multiple categories due to the ex- istence of similar categories that share the same con- texts. A possible solution to address this limitation is the transferred category-sensitive QLL model [27], which additionally builds and considers the relevance between categories. 4.2.3 Expertise-aware QLL Zheng et al. [28] linearly combine two aspects, user relevance (computed based on the QLL) and answer quality (estimated using a maximum entropy model), using the simple weighted sum method to represent user expertise on a given question. Besides the rele- vance and quality aspects, Li et al. [6] further consider the availability of users and use the weighted sum of the three aspects to represent user expertise on a given question. In particular, the relevance is estimated us- ing the QLL model, the answer quality is estimated as the weighted average of previous answer quality incor- porated with the Jelinek-Mercer smoothing [29] method, and users' availability to answer a given question during a given period is predicted by an autoregressive model. Compared with most existing methods, this method ex- ploits not only time series availability information of users but also multiple metadata features such as an- swer length, question-answer length, number of answers for this question, the answerer's total points, and the answerer's best answer ratio. These features have rarely been used by the existing research. 4.3 Topic Models Since language models are based on exact word matching, they are most effective when they are used within the same topic. Besides, they are not able to Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 7 capture more advanced semantics and solve the prob- lem of the lexical gap between a question and user pro- files. In contrast, topic models do not require the word to appear in the user profile, as it measures their re- lationship in the topic space rather than in the word space. It can, therefore, alleviate the lexical gap prob- lem and previous experimental evaluations have con- firmed the better performance of many topic models over language models [30;31]. Here, we focus on review- ing two most widely used topic models, Probabilistic Latent Semantic Analysis (PLSA) and Latent Dirichlet Allocation (LDA), as well as their variants and a few other models. 4.3.1 PLSA and Its Variants Probabilistic Latent Semantic Probabilistic Latent Semantic Analysis (PLSA) a.k.a. Indexing (PLSI) [32] is developed based on Latent Semantic In- dexing (LSI) [33], which uses Singular Value Decomposi- tion to represent a document in a low-dimension space. Compared with LSI, which lacks semantic explanation, PLSA uses latent topics to represent documents and model the data generation process as a Bayesian net- work. In this way, it can leverage the semantic between words in documents to reduce the document representa- tion space dimension. There are generally two classes of PLSA-based methods that model users directly and in- directly, respectively. We briefly review the two classes of methods as follows: Direct User Model by PLSA. Methods of this class treat all the questions that a user accesses as one docu- ment. Then, PLSA is used directly to derive the topic information of the user using word distributions. A typ- ical method of this class [15] would identify the under- lying topics of questions to match users' interest and thereby help the capable users locate the right ques- tions to answer. The Expectation Maximization (EM) algorithm is generally used to find a local maximum of the log-likelihood of the question collection and to learn model parameters. Indirect User Model by PLSA. A typical method of this class is proposed in [34]. This work presents an incremental automatic expert recommendation frame- work based on PLSA. It considers both users' interests and feedback and takes questions as documents. It fur- ther uses PLSA to model the question to gain its distri- bution on topics, followed by representing users as the average of topic distributions of all the questions that he accesses to facilitate recommendation. A most important variant of PLSA is probably the Dual Role Model (DRM) proposed by Xu et al. [35]. Instead of combining the consideration of a user as a requester and an answerer, DRM separately mod- els users' roles as requesters and as answerers and de- rive the corresponding probabilistic models based on PLSA. Depending on the modeling approach of user's role, DRM diverges into independent DRM, a type of method modeling user role indirectly, and dependent DRM, a method which learns the role model directly. In particular, the independent DRM assumes all users are independent of each other and models each user individually. In contrast, dependent DRM considers the dependence between users. Besides modeling users' topic distribution as requesters and answerers, it addi- tionally models the relationship between answerers and requesters for better performance. 4.3.2 LDA and Its Variants The Latent Dirichlet Allocation (LDA) model [36] is probably the most widely used topic model among all existing topic models developed. In LDA, the topic mixture is drawn from a conjugate Dirichlet prior that remains the same for all users. More specifically, LDA assumes a certain generative process for data. To gener- ate a user profile, LDA assumes that for each user pro- file a distribution over topics is sampled from a Dirich- let distribution. In the next step, for each word in the user profile, a single topic is chosen according to this topic distribution. Finally, each word is sampled from a multinomial distribution over words specific to the sampled topic. Here, we briefly review two important classes of LDA variants that have been applied for the expert recommendation in CQA: Segmented Topic Model (STM) [37]. This is a topic model that discovers the hierarchical structure of top- ics by using the two-parameter Poisson Dirichlet pro- cess [38]. As a four-level probabilistic model, STM con- tains two levels of topic proportions and shows supe- riority over traditional models. Instead of grouping all the questions of a user under a single topic distribution, it allows each question to have a different and separate distribution over the topics. A user profile is considered a document that contains questions (segments). The above distributions cover the expertise set of a user, the topics of each question in the profile, as well as the correlation between each profile and its questions. TagLDA [39]. This method uses only tag informa- tion to infer users' topical interest. It is more efficiently, 8 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 but the effectiveness is dependent on the accuracy and availability of tags. 4.3.3 Expertise-aware LDA The work in [40] considers both the topical interest and expertise of a user relevant to the topics of the given question. It also uses LDA to identify topical in- terest from previous answers of the user, but additional compute the expertise level of users using collaborative voting mechanism. Sahu et al. [39] incorporate question tags and related voting information in LDA to compute user expertise, where user expertise is computed based on both the topical distribution of users and voting in- formation under the same question tags. 4.3.4 Other Topic Models Besides the famous QLL and LDA models, Zhou et al. [14] propose a method that groups threads (i.e., a question and related answers) of similar content into clusters to build a cluster-based thread for each user. Each cluster represents a coherent topic and is associ- ated with users to indicate the relevance relationship. The ranking score for a user is then computed based on the aggregation of the relevance of the user to all clusters given a new question. Guo [3] proposes a user- centric and category-sensitive generative model for dis- covering topics, named User-Question-Answer (UQA). The work incorporates topics discovered by UQA model with term-level matching methods to recommend ex- perts and increase the participation rate of users in CQA. In this model, each user is considered as a pseudo- document which is a combination of all the questions the user has asked and all the answers the user has pro- vided in reply to other users' questions. More methods can be derived based on this model as well as the com- binations of these methods. 4.4 Network-based Methods The network-based methods evaluate users' author- itativeness in a user-user network formed by their asking-answering relations and recommend the most authoritative users as experts for a new question. The simplest network-based method uses Indegree [41] to rank and recommend users. In particular, an inde- gree score equals the number of other users a user has helped by answering their questions, represented by an arrow from the requester to the answerer in the user- user network. Since frequent posters tend to have a significant interest in the topic and a larger degree of a node usually correlates with answer quality [41;42], this method regards the users with higher degrees as better answerers for the recommendation. The mainstream of this category include three families of methods based on PageRank [43], HITS [44], and ExpertiseRank [41], re- spectively. We will also briefly introduce several other network-based methods to gain a comprehensive view of the related techniques. 4.4.1 PageRank and Its Variants PageRank [45;46] uses nodes to represent users, and a directed edge to indicate one user (i.e., the source node) answers the questions of another user (i.e., the destina- tion node). It estimates the likelihood that a random walk following links (and occasional random jumps) will visit a node. Each edge is associated with an affinity weight that measures the times that the answerer has replied to the requesters' questions. Two users are con- nected if their affinity weight is greater than 0, and the transition probabilities between nodes are obtained by normalizing the affinity weights. Now, the algorithm has been extended to bias the jump probability for par- ticular topics [47] and many others static web ranking tasks. Choetkiertikul et al. [48] also use PageRank, but they measure the weights differently, i.e., evaluating the number of users' tags and activity times in common as weights between the users who have asking-answering relations. The main variants of PageRank include SALSA [49], EntityRank [50], TwitterRank [51], and AuthorRank [52]. They differ from the above PageRank-based methods in focusing on some specific application domains. How- ever, they still have the potential to be generalized to broader scenarios. 4.4.2 HITS and Its Variants Different from PageRank, which does not distin- guish between hub and authority nodes, the HITS al- gorithm is based on the observation that there are two types of nodes: (1) hubs, which links to authoritative nodes; (2) authorities, which provide useful information on the given topics. HITS assigns each node two scores: hub score and authority score. A hub score represents the quality of outgoing links from the nodes while au- thority represents the quality of information located on that nodes. A typical work based on HITS is proposed by Jurczyk et al. [45;46]. Instead of the times of the an- swerer replying to the requester's questions, this work models the weights of edges to indicate answer quality in HITS, based on users' explicit feedback, e.g., thumb Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 9 up/down from users, and whether the answer is the best answer. The results show that the HITS algorithm out- performs the methods based on simple graph measures such as in-degree. An important variant of HITS is proposed by Shahriari et al. [53]. Instead of considering the entire user-user network as a single community, this method regards the network as the combination of multiple user communities. Thereby, it detects overlapping communities [54] and differentiate the impact of intra- community and inter-community users to other users in the user-user network. 4.4.3 Expertise-aware Network-based Methods Zhang et al. [41] propose ExpertiseRank based on the intuition that an answerer whore replies to a ques- tion usually has superior expertise than the requester on the specific topic. Their experimental results indi- cate that for a closed domain such as the Java devel- oper forum, ExpertiseRank performs better than gen- eral graph-based algorithms like PageRank and HITS. ExpertiseRank considers not only how many other users a user has helped but also which other users the user has helped. It propagates the expertise scores of users through the question-answer relationship in a user-user network. The intuition behind ExpertiseRank is that one should get more credit for answering the questions of a user with higher expertise rather than the questions of a user with lower expertise. The ExpertiseRank computation finally derives a score for each user, called z-score, based on which to quantify their authoritativeness. Z-score [41] com- bines users' asking and replying patterns to measure how many standard deviations above or below the ex- pected 'random' value a user lies. The more questions a user has answered and the fewer questions the user has asked, the higher the Z-score of this user. There- fore, this method recommends users with the highest z- scores as experts. The experts obtained by this method should answer many questions and ask very few ques- tions. Besides ExpertiseRank, Jurczyk et al. [45] incorpo- rate users' authoritativeness on a given question (esti- mated by the tags of users' posts) and users' answer quality (predicted based on their past answer activi- ties); the method in [55] differs in determining user qual- ity by the number of best answers they provide. Zhou et al. [14] use the post content of users to compute user expertise and reply frequencies of users computed by PageRank to re-rank users. They further use inverted indexes and threshold algorithm [56] to store and re- trieve pre-computed intermediate scores to accelerate the computation. The final score of a user takes the product of the results of language model and the re- sults of PageRank. 4.4.4 Other Network-based Methods Here, we review some typical enhancement or ex- tension of the traditional link analysis methods as fol- lows: Zhu et al. [57;58] additionally consider the cate- gory relevance of questions and rank user authority in an extended category link graph; Liu et al. [59] compre- hensively utilize multiple types of relationships between requesters and answerers, and between the best answer- ers and other answerers to find expert users; rather than leveraging the asking-answering interactions, Lai et al. [60] employ the endorsement relationship among users to form user reputation graphs, based on which to recommend experts. Similarly, Lin et al. [61]compute user reputation based on their trust relationship in a user-user network. By assuming each question has a known category and theme, they cluster users based on their reputation scores on each question theme and evaluate users based on their theme-specific reputation. Liu et al. [62] incorporate user-subject relevance (com- puted by cosine similarity) and user reputation with users' category-specific authoritativeness obtained from link analysis for the expert recommendation. The latest network-based method is proposed by Liu et al. [63]. This work routs questions to potential an- swerers from the viewpoint of knowledge graph embed- ding and integrates topic representations with network structure into a unified question routing framework. The framework takes into account various types of re- lationships among users and questions. It is demon- strated to increase the answer rates of questions by us- ing the recommended experts. 4.5 Classification Methods When regarding experts as a particular class of users among all users, the problem of identifying the experts can be easily transformed into a classification problem that aims to distinguish such a particular class of expert users from the other users. Compared with the other methods, classification methods can easily apply multi- ple aspects of features from the user, question, answer, or user-user interaction's perspectives, to the expert recommendation problem. For example, Pal et al. [64] use three classes of features and train a binary classifier 10 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 to distinguish experts from ordinary users. These fea- tures include question features (e.g., question length, word n-gram), user features (e.g., number of answers and number of best answers provided by a user), and user feedback on answers (e.g., user votes and com- ments to the answers), Support Vector Machine (SVM) is the most used classification method for distinguishing expert from those non-experts. Beside diverse methods, the clas- sification methods have used different features besides the basic question and user features, such as part-of- speech features, graph features to trains their models. For example, Pal et al. [65] extract features by model- ing users' motivation and ability to help others and use SVM and C4.5 decision tree separately for expert detec- tion. Zhou et al. [66] also use SVM but they define both local and global features on questions, user history, and question-user relationship and additional consider KL- divergence as a new feature. Ji et al. [67] additionally use text similarities as features to train SVM and one of its variant, RankingSVM. Besides, more methods such as random forests (RF) [48] and Naive Bayes [68] are used by existing stud- ies. Some typical work includes: Le et al. [69] con- sider more new features such as community features (e.g., average score of posts, average number of com- ments, average favorites marked), temporal features (e.g., time gaps between posts), and consistent fea- tures (e.g., scores of the posts, time gap between re- cent posts). They also try some new methods like lo- gistic regression and adaptive boosting in addition to decision trees and random forest for the classification. As an enhancement to decision trees, Dror et al. [70] propose a representation model based on multi-channel vector space model, where users and questions are rep- resented as vectors consisting of multi-dimensional fea- tures. Then, the matching degree between a user and a question is learned from their respective features us- ing a binary classifier called Gradient Boosted Decision Trees (GBDT). Instead of the conventional features used for iden- tifying experts, Pal et al. [64] use a different crite- rion, question selection bias, for recommending experts, based on the assumption that experts prefer answering questions to which they bear a higher chance of mak- ing a valuable contribution. o They use the probability of answering questions of different value as the feature vector and employ two methods, logistic regression and Gaussian Mixture Model, to solve the binary classifica- tion problem. In a later version, Pal et al. [71] use differ- ent equations to estimate the value of existing questions and to model the selection probabilities of questions by users. The method shows better performance of the Bagging metaclassifier over several single-version clas- sification algorithms The work also partially confirms that experts have some bias on question selection based on the existing value of answers to the questions. Given the advantages of ranked recommendation re- sults over unranked results, Ji et al. [67] propose Rank- ingSVM, a ranking model based on SVM, for the ex- pert recommendation. Burel et al. [72] extract pat- terns from the question-selection behaviors of users in a Q&A community and then use Learning to Rank (LTR) models to identify the most relevant question to a user at any given time. They further employ Ran- dom Forests, LambdaRank [73], and ListNet [74] to de- rive a pointwise method, a pairwise method, and a list- wise method, respectively, to gain ranked expert list along with the classification process. Similarly, Cheng et al. [75] also formalize expert finding as a learning-to- rank task. However, they leverage users' voting infor- mation on answers as the "relevance" labels and utilize LambdaMART to learn ranking models which directly optimizes a rank-based evaluation metric, normalized discounted cumulative gain (nDCG). Logistic regres- sion [76] has also been used recently to facilitate both ranking and classification. 4.6 Expertise Probabilistic Models Dom et al. [77] propose the only probabilistic model that focuses on user expertise for the expert recom- mendation in CQA. They use a Bayesian probabilis- tic model to obtain a posterior estimate of user credi- bility thereby recommending experts for a given ques- tion. This work assumes user expertise conforms to the Bernoulli distribution (or the mixture of two beta distri- butions) and uses Maximum A Posteriori (MAP) esti- mation to make predictions. It then ranks users accord- ing to their probabilities of providing the best answer to the given question, characterized by the probability of each user to be awarded the best answer on a question given the user's question-answering history. The work also discovered that Bayesian smoothing performs bet- ter than several other smoothing methods such as max- imum a priori estimation, maximum likelihood (ML) estimation, and Laplace smoothing. Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 11 4.7 Collaborative Filtering Methods Given the advantages such as flexibility and scala- bility of collaborative filtering (CF) methods, esp., the matrix factorization techniques [78] in the recommenda- tion domain, some researchers seek to use CF for the expert recommendation in CQA. For example, Cho et al. [79] consider that case that only one expert will be designated to answer each question. They then cap- ture users' behavioral features as potential answerers by matrix factorization [80]. Regularization terms are incorporated to represent user interest, user similarity, and users' probability to answer for better performance. Instead of the basic matrix factorization model, Yang et al. [81] employ probabilistic matrix factorization (PMF), which combines generative probabilistic model and matrix factorization, to address the expert recom- mendation problem. In particular, PMF learns the la- tent feature space of both users and tags to build a user-tag matrix [82], which is then used to recommend experts given a new question. 4.8 Hybrid Methods To comprehensively take into account multiple as- pects of clues, some researchers propose hybrid methods that combine different aspects of concerns techniques and different techniques for better recommendation re- sults. Here, we review the typical hybrid methods as follows. 4.8.1 Language Model + Topic Model Liu et al. [30] combine QLL and LDA and show the hybrid approach outperforms either of the original mod- els. 4.8.2 Topic Model + Network-based Method Zhou et al. [83] identify authoritative users by con- sidering both the link structure and topic information about users. They first apply LDA to obtain user-topic matrix and topic-word matrix, and then use PageR- ank and Topical PageRank for the expert recommen- dation. Liu et al. [84] propose a topic-sensitive proba- bilistic model to estimate the user authority ranking for each question. The model is based on PageRank incorporate with topical similarities between users and questions. A very similar method named topic-sensitive link analysis is proposed by Yang et al. [85]. Recently, Rao et al. [86] propose a similar approach that recom- mends experts based on users' topical relevance and authoritativeness given a new question. They also use LDA to discover topics but measure users' authorita- tiveness for each topic based on the 'like' relationship among users in a social network. Zhao et al. [87] use the TEL model to generate topic information, based on which to model experts over top- ics. TEL is based on LDA and is a unified model combining both graph-based link analysis and content- based semantic analysis for expert modeling in CQA. Instead of using a fixed user-answering graph to influ- ence the prior of expert modeling, TEL highlights the causal relationship between topics and experts by using both user-user matrix and question-user matrix to rep- resent a user's contribution to another user or a ques- tion, with best answers given higher weights. It is com- pared with two baseline topic modeling methods, one recommending experts based on requester-answerer in- teractions and the other recommending experts based on question-answerer interactions, which show its bet- ter performance. Zhou et al. [88] extend PageRank with the topic- sensitive probabilistic model by considering topical similarity. In particular, the method improves the PageRank-based expert recommendation methods by running PageRank for each topic separately, with each topic-specific PageRank prefers those users with high relevance to the corresponding topic. As a further step, Yang et al. [89] jointly model topics and exper- tise to find experts with both similar topical preference and superior topical expertise on the given question. The method integrates textual content model (GMM) and link structure analysis and leverages both tagging and voting information. It linearly incorporates the estimated user topical expertise score into the recur- sive PageRank score computation formula and extends PageRank to make the final recommendation. 4.8.3 Language+Topic+Network-based Model Liu et al. [30] assume that more authoritative an- swerers may give more accurate answers, and more ac- tive answerers may be more willing to answer new ques- tions. They linearly combine QLL and LDA models to compute relevance, and additionally consider both user activity and authority information for the recommen- dation. 4.8.4 Topic Model + Classification Method RankingSVM [67] employs LDA to calculate text similarity and use this similarity as a feature in a classification method for the expert recommendation. 12 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 The experimental results show the resulting method achieves better performance than SVM. 4.8.5 Topic Model +Collaborative Filtering Yan et al. [90] combine topic model and tensor fac- torization for the expert recommendation. They train an LDA via Gibbs Sampling with a manually defined topic number, followed by performing tensor factoriza- tion (TF) based on "requester-topic-answerer " triples via gradient descent to compute the recommendation scores of users. 4.8.6 Network-based Method + Clustering Following the similar idea of geo-social community discovery [91] in Point of Interest (POI) recommenda- tion, Bouguessa et al. [55] incorporate clustering meth- ods with network-based measures for the expert recom- mendation. In particular, they consider the number of best answers as an indicator of authoritativeness of a user in a user-user network, where users are connected via directed edge from requesters to best answerer, with the edges weighted by the number of best answers in- between. In particular, they model the authority scores of users as a mixture of gamma distribution and use the Fuzzy C-Means algorithm to partition users into differ- ent numbers of clusters. They further use Bayesian Information Criteria (BIC) to estimate the appropri- ate number of mixtures. Finally, the users are classi- fied into to classes, one representing authoritative users with high in-degrees and the other non-authoritative users with low in-degrees. In this way, the method can automatically surface the number of experts in a com- munity rather than producing a ranked list of users. 5 Comparison and Discussion To gain a better understanding of state of the art, we first summarize the existing expert recommendation methods concerning the used dataset, the required in- put & output, and the evaluation metric. We further compare and discuss the methods from three perspec- tives: the covered aspects of concern, reliance on suffi- cient data, and complexity, to identify their strengths and pitfalls. The three perspectives reflect the methods' capability in the recommendation power, applicability (robustness to cold start or sparse data), and easiness of usage (implementation difficulty), respectively. 5.1 Datasets In this section, we list the most used datasets by ex- isting expert recommendation research. These datasets include both the real-world and synthetic ones, as well as those that do not belong to but are readily applicable to evaluating the methods for the expert recommenda- tion in CQA. Among the real-world datasets, only the first two represent the dominant datasets used by most existing research while all the others are less used. 5.1.1 Yahoo! Answers Yahoo! Answers [3;6;27;35;45;66;83;87;90;92] is perhaps the most popular and most studied datasets in Q&A related research. The characteristics of Yahoo! An- swers, such as the diversity of questions and answers, the breadth of answering, and the quality of those an- swers, are first investigated by Adamic et al. [11] in 2008. In particular, they use user entropy to indicate a user's concentration or focus on the different categories of top- ics. They further cluster questions and answers based on the content to understand users' activity on different topics in CQA. The results showed that the majority of users participated in a small number of topics. These features set the practical foundation for predicting an- swer quality by the amount of work and activities of users. Since each question has at most one best answer, the amount of ground truth might be sparse when only a part of the entire dataset is used in experiments. For this reason, some researchers set up their own criteria to determine whether an answer is a "good" answers or not, to expand the training and test set for their meth- ods. For example, Li et al. [6] label an answer a "good" answer either when it is selected as the best answer or when it obtains more than 50% of up-votes for all the answers of the question. Meanwhile, one answer is la- beled as a "bad" answer if it receives more than 50% of rate-downs for all answers of the question. 5.1.2 Stack Overflow Stack Overflow [31;37;39;48;64;69;71;75;93;94] involves over five million users and content about 11,053,469 questions, among which only 73% have received answers and closed and 55%, i.e., over six million questions, have accepted best answers (as of 10 March 2016). Like the Yahoo! Answers dataset, the records in the Stack Overflow dataset is massive, and most existing research sample a subset of the entire dataset for study. For ex- ample, Pal et al. [71] sample a small dataset of 100 users and employ two expert coders to label the 100 users Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 13 Sogou Wenwen [90]: formerly known as Tencent Wenwen or Soso Wenwen, is similar to Quora and also run with credit points and reputation points. Users can obtain points by asking or answering questions and use them as bounty. Iask 13 [30]: a leading web 2.0 site in China. The working mechanism is similar to Baidu Knows, while in Iask, a requester can increase bounty to extend 15 days before question closed due to a previously accepted answer. Other datasets on Stack Exchange: such as com- puter science 14 , fitness 15 [53], and cooking 16 . There are total 133 communities for knowledge sharing and ques- tion answering, covering enormous topics on Stack Ex- change. Estonian Nature forum [53]: a Q&A website popular in Estonia. MedHelp 17 [79]: a website which partners with doc- tors from hospitals and research facilities to provide on- line discussion and to satisfy users' medical information needs. 5.1.4 Synthetic Dataset Generally, no single method outperforms all the oth- ers on all the datasets for two main reasons: first, online communities usually have different structural charac- teristics and lead to differences in the performance of methods [41]; second, the same users may behave differ- ently in different communities due to various reasons such as the subjectivity and rewarding mechanism of a Q&A system. Given the lack of benchmarks to evaluate the different methods, it has become a common prac- tice to conduct controlled experiments with simulated datasets to test how a method performs under differ- ent scenarios. We will not give more introduction to the synthetic datasets due to the significant variances in the assumptions and conditions to generating these datasets. 5.1.5 Non-CQA Datasets There are plenty of datasets do not belong to the Q&A domain but are readily applicable to or have been as either experts or non-experts. It turns out that the inter-rater agreement between the expert coders is 0.72 (Fleiss kappa with 95%CI, p ∼ 0), indicating the high agreement between the raters is not accidental. Out of the 100 users, 22 are labeled as experts and rest as non-experts. 5.1.3 Other CQA Datasets TurboTax Live Community (TurboTax) 10 [64;65;71]: this is a Q&A service related to preparation of tax re- turns. TurboTax has employees that manually evaluate an expert candidate on factors, such as correctness and completeness of answers, politeness in responses, lan- guage and choice of words used. They also have some labeled experts. Quara [95;96]: a general and probably the world' largest Q& A website that covers various topics. Java Developer Forum [41]: an online community where people come to ask questions about Java. It has 87 sub-forums that focus on various topics concerning Java programming. There is a broad diversity of users, ranging from students learning Java to the top Java ex- perts. A typical sub-forum, e.g., "Java Forum", a place for people to ask general Java programming questions, has a total of 333,314 messages in 49,888 threads as of as early as 2007. the largest Naver KnowledgeCiN : question- answering online community in South Korea. Nam et al. [97] analyze the characteristics of knowledge gen- eration and user participation behavior in this website and finds that altruism, learning, and competency are often the motivations for top answerers to participate. Baidu Knows 11 : a Chinese language CQA service, where a member can put questions with bounty to pro- mote others answering it. Once the answer is accepted, it turns into search result of relevant questions. Tripadvisor forums 12 [14]: a travel-related websites with user-generated content focusing on accommoda- tion bookings. The service is free to users, who provide feedback and reviews to hotels, accommodation facili- ties, and other traveling related issues. 10 http://ttlc.intuit.com/, May 2018. 11 http://zhidao.baidu.com/, May 2018. 12 http://www.tripadvisor.com/, May 2018. 13 http://iask.sina.com.cn/, May 2018. 14 http://cs.stackexchange.com/, May 2018. 15 http://fitness.stackexchange.com/, May 2018. 16 http://cooking.stackexchange.com/, May 2018. 17 http://www.medhelp.org/, May 2018. 14 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 used for the study of expert recommendation methods for the CQA. A slight difference of the methods devel- oped based on studying these datasets is that they most aim to rank and find the most best-skilled or authorita- tive users given an existing domain or topic instead of a new question. These datasets include co-authorship network [52;98;99] such as DBLP [100–102], social net- works [16;103;104], microblogs [105–107] such as Twit- ter [51], Email network [108–110], Internet forums [41], log data [111], e-Learning platform [112], Usenet news- groups [7;8], Google Groups [9], general documents [113], and enterprise documents [20;26;114] such as Enterprise track of TREC [115–117]. 5.2 Input and Output To ease illustration, we first summarize the typical inputs and outputs of existing expert recommendation methods in Table 2. Here, we list five categories of com- monly used inputs for expert recommendation methods. These inputs are either textual, numerical, or relational information, while the outputs, i.e., the recommended experts, are either ranked or unranked, depending on the methods adopted. Based on the input/output list, we further present a comparison of the representative methods with respect to their inputs and outputs in Table 3. Some methods may use derived features from the original inputs as additional inputs. For example, a classification method may use the length of questions (implied by question content), total question number of users (implied by users' question history), and total answer number of users (implied by users' answer history) as additional features to train their models. 5.3 Evaluation Metrics We summarize three categories of metrics used to evaluate expert recommendation methods for CQA, namely the basic, rank-based, and human-judgment- based metrics. The following subsections introduce the metrics of each category, respectively, where each met- ric is computed as (the mean of) the average of the metric values over a set of query questions or top- ics [14;27;53;79;83;90]. 5.3.1 Basic Metrics recommended by a method. Recall [53;64–66;118]: the fraction of users who are rec- ommended by a method and meanwhile turn out to be the real experts, among all the real experts to the given questions. F1-score [64–66;68;69;118]: the harmonious average of the Precision and Recall. Accuracy [66;69;70;118]: the fraction of users who are correctly identified as either an expert or an non-expert by a method. The metric integrates the precision of the method in identifying the experts and non-experts. 5.3.2 Rank-based Metrics Precision at top n (P@n) [14;27;79;83;87;90;92;93;119]: the percentage of the top-N candidate answers retrieved that are correct. It is also known as Precision at top n (P@n) [87;90;93;119] or Success at top N (S@N) [37]. A special case is Precision@1 [95;96] when n = 1. Recall at top N (R@N) [90;92;93;96], a natural expan- sion of the basic recall to rank-based scenario, similar to P@n. Accuracy by Rank [96]: the ranking percentage of the best answerer among all answers. A similar metric us- ing the best answerer's rank is proposed in [15] and [35]. Mean Reciprocal Rank (MRR) [6;14;27;53;72;83;84;90;94]: the mean of the reciprocal ranks of the first correct ex- perts over a set of questions, measuring gives us an idea of how far down we must look in a ranked list in order to find a correct answer. Matching Set Count (MSC) @n [93;94]: the average number of the questions that were replied by any user ranked within top n recommended users. Normalized Discounted Cumulative Gain (nDCG) [53;95]: a number between 0 and 1, measuring the performance of a recommendation system based on the graded relevance of the recommended items. A variant is nDCG@k, the division of the raw DCG by the ideal DCG, where k is the maximum number of items to be recommended. Pearson Correlation Coefficient [45;120;121]: the cor- relation degree between the estimated ranking with the ranks of users according to the scores derived from the user feedback. Area Under ROC Curve (AUC) [70]: the probability that an expert is scored higher than a non-expert. There are four set-based metrics to evaluate an ex- 5.3.3 Human Judgment-based Metrics pert recommendation method: Precision [64–66;118]: the fraction of users who are true experts to the given questions, among all the users Correctness percentage: human judgment is nec- essary in the case where the ground truth is unavail- able or hard to be determined automatically. In such Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 15 Table 2. Typical Inputs and Outputs of Expert Recommendation Methods Type Category Question profile User profile Input Historical questions & answers Social profile Network profile Recommended experts Output Id I0 I1 I2 I3 I4 I5 I6 I7 I8 I9 IA IB IC O1 O2 Input/output name Input/output type content (and category) of the given question textual users' question history users' answer history user-question mapping user-answer mapping users' historical viewing and answering activity multiple user-question mapping timestamps of users' answering activity numerical question content question category info question tags answer content best answer info voting info user reputation textual textual textual textual answer–{0,1} mapping numerical numerical question-answer relations among users directed user-user mapping an unranked group of experts a ranked list of experts set list Table 3. A Comparison of Inputs and Outputs of Representative Expert Recommendation Methods √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ I0 I1 I2 I3 I4 I5 I6 I7 I8 I9 IA IB IC O1 O2 √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ Category Simple methods Language models Topic models Network-based methods Classification methods Expertise probability model Collaborative Filtering Hybrid methods Representative method Votes Best answer proportion Consine similarity based on TF-IDF [19] QLL [23–25] Category-sensitive QLL [27;27] Expertise-aware QLL [6;28] PLSA [15;34], LDA [36], STM [37], UQA [3] DRM [35] TagLDA [39] Indegree [41], PageRank [47;48], HITS [46;53] z-score [41], Expertise-aware methods [14;41;45;55;56] Reputation-aware methods [60;61] Category-sensitive methods [57;58] Graph embedding method [63] SVM [65;66], C4.5 [65], RF [48], GBDT [70] LTR [72] Bernoulli MAP model [77] MF [79] Tag-based PMF [81] QLL+LDA [30], Topical PageRank [83], TEL [87],LDA+TF [90] Topical PageRank+Expertise [89] QLL+LDA+userActivity+Indegree [30] Indegree+Clustering [55] √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ cases, humans usually give either Yes/No answers [3] or ratings [41] to the recommended users. Then, the system calculates the percentage of correctly recom- mended users by investigating the agreement between the judgments made by different people [55;83;118]. 5.4 Covered Aspects of Concern To study the covered aspects of concern of differ- ent methods, we summarize the main aspects of con- cern and their indicators in an expert recommendation problem in Table 4. The inputs taken by each method 16 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 directly reflect the method's covered aspects of con- cern. For example, to take user expertise into account, a method needs to consider at least one of the three as- pects: user reputation, voting information to answers, and best answer flags of answers. An indicator either belongs to or originates from the inputs. It falls into at least one of the two aspects: answer probability and expertise level of users. The inputs and outputs only give some intuitive clues of how powerful each method might be. In fact, it is not only the inputs but also the ways of using these inputs and the underlying techniques that determine a method's capability in adequately addressing the ex- pert recommendation problem. In the following, we elaborate each aspect of concern and make a compar- ative discussion of the investigated methods according to their covered aspects of concern. 5.4.1 Answer Probability A large body of the research on the expert recom- mendation in CQA focuses merely on ranking the rel- evance of the given question with users' previously an- swered questions. The underlying assumption is that users are more likely to answer those questions that are similar to their previously answered ones. This type covers all the methods that consider users' answer prob- ability yet not users' expertise level in Table 4 and range from the simple Cosine similarity method to QLL, LDA, MF, and further to hybrid methods that combine the above techniques like TEL. Similar to the general recommendation approach, it is reasonable to assume a user prefers to answer the questions that are similar to her already-answered ques- tions. On the other hand, there is no evidence to show that the stronger relevance of a user to a given ques- tion also indicates a higher expertise level of the user in answering that question. Therefore, such methods may not be able to distinguish users' different levels of expertise in either a question or a topic, and the rec- ommended experts may not provide quality answers to the given question. Other issues with this type of methods are related to the consideration of categories or topics. While con- sidering the category or topic information enables a method to provide personalized recommendations cus- tomized to the given question, it raises additional issues to the method. First, the category-sensitive methods highly rely on the availability and proper definition of categories. For example, suppose a user has answered a lot of questions about 'c++' covered by the category of 'Programming,' and is deemed a potential answerer for questions of this category. Given a question related to another programming language like 'Python,' which is also covered by the category of 'Programming,' rec- ommending this user as an expert may not be appro- priate as the user may not be familiar with 'Python' as well. The topic-sensitive approach is more reasonable as topics are usually not predefined but dynamically con- structed by algorithms, and therefore they can adapt to the ever increasing questions and answers in a Q&A community. Second, an inevitable issue with considering cate- gories or topics is that a user may have an expertise in multiple categories or topics. For category-sensitive methods, although the correlation among categories can be incorporated explicitly, it could be difficult to designate a question to a single category when the ques- tion is related to multiple categories. For the topic- sensitive methods, they mostly discover topics based on probabilistic models such as LDA. Since the probabilis- tic models distribute the total probability of 1 among all the topics for each user, having a higher probability on one topic will discount the probability on other topics. However, the fact is, a user could be more relevant to multiple topics than another user simultaneously. This situation has not been sufficiently taken into account by the existing research. 5.4.2 User Expertise There are a few methods that take into account user expertise while neglecting to consider the answer probability of users in the expert recommendation in CQA. These methods typically include simple tech- niques (e.g., votes, best answer proportion) and the ex- pertise probabilistic model in Table 4. A limitation of these methods is that they only consider the probabil- ity of a user giving the best answer under the condition that the user has decided to answer the given question. The fact is, a user with the appropriate expertise may not answer the question in the first place due to var- ious reasons such as lack of interest or unavailability. Therefore, as far as answer probability is concerned, the recommended experts may not have a good chance of giving a quality answer. Another issue with the methods of this type is that they commonly compute a global expertise score for each user while neglecting the fact that user expertise may also be topic-sensitive, similar to answer proba- bility. Consequently, the recommendation results inde- pendent of to the specific problem scenario: given a new Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 17 Table 4. Aspects of Concern and Their Indicators Covered by Representative Expert Recommendation Methods Representative method Answer probability Expertise level Votes Best answer proportion Consine similarity of TF-IDF [19] QLL [23–25] Category-sensitive QLL [27;27] Expertise-aware QLL [6;28] PLSA [15;34], LDA [36], STM [37], UQA [3] DRM [35] TagLDA [39] Indegree [41] PageRank [47;48], HITS [46;53] z-score [41] textual relevance textual relevance question category textual relevance textual relevance topical relevance topical relevance topical relevance of tags a# of users a# & q# of users a# & q# of users Expertise-aware methods [14;41;45;55;56] a# & q# of users Category Simple methods Language models Topic models Network-based methods Classification methods Expertise prob. model Collaborative Filtering Hybrid methods vote counts of answers best answer ratio best answer ratio a# & q# of users a# & q# of users, best answer number a# & q# of users, best answer number a# & q# of users, user reputation a# & q# of users a# & q# of users, best answer number best answer number best answer ratio best answer number a# & q# of users a# & q# of users, best answer number best answer number Reputation-aware methods [60;61] Category-sensitive methods [57;58] Graph embedding method [63] SVM [65;66], C4.5 [65], RF [48], GBDT [70], LTR [72] Bernoulli MAP model [77] MF [79] Tag-based PMF [81] QLL+LDA [30], TEL [87] LDA+TF [90] Indegree+Clustering [55] Topical PageRank [83] Topical PageRank+Expertise [89] a# & q# of users a# & q# of users, category relevance a# & q# of users, textual relevance textual relevance, question features, user features (e.g., a#), metrics (e.g., z-score) textual & topical relevance textual & topical relevance a# & q# of users topical relevance, a# & q# of users topical relevance, a# & q# of users textual relevance textual relevance of tags best answer ratio QLL+LDA+userActivity+Indegree [30] textual/topical relevance, a#, q#, active time of users Note: q# and a# denote the number of questions asked and answered by a user, respectively. question, the recommended experts may perform gener- ally well but unfortunately perform poorly on the given question. The global expertise model is most suitable for scenarios where the same topic covers all questions. 5.4.3 Both Aspects Given the importance of both aspects of concern, many existing methods, especially the latest ones, com- bine the two above aspects for the better expert recom- mendation. These methods typically include expertise- aware QLL models, all variants of PageRank/HITS, classification methods, collaborative filtering methods, and hybrid methods that combine two or more of the above methods. The straightforward way of integrat- ing the two aspects is to compute a score for each as- pect separately and then combine the two scores into a weighted sum, which would be used as the criterion for ranking users and deriving the recommendation results. The other methods, including network-based methods, classification methods, and collaborative filtering meth- ods, combine the two aspects of consideration more nat- urally. For example, the network-based methods natu- rally incorporate the two aspects to compute a sin- 18 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 gle criterion, user authoritativeness, for the expert recommendation-the users who have provided many questions yet asked few questions are considered au- thoritative; such users are generally believed to have both higher probabilities to answer and better exper- tise in a user-user network. An alternative is to use the related user number to replace question number in the above computation. This replacement slight changes the computation method but does not affect the author- itativeness definition. Instead of using a single metric such as authoritativeness to recommend experts, the classification methods directly take various factors as features, without explicitly distinguishing the two as- pects, to train a classification model. A limitation with classification methods is that they generally deliver a set of users as experts without further differentiating them. Therefore, they lack the flexibility to decide how many users to recommend as experts on the fly. To explicitly utilize the best answer information in a network-based method, a simple approach is to re- place the 'requester-answerer' relationship in a user- user network into the 'requester-best answerer' relation- ship among users. In this case, a link is drawn from one user to another user only when the second user has pro- vided the best answer to the first users' questions. The indegrees and other metrics (e.g., authoritativeness) of users derived from the modified model can directly be used to recommend users who are both active and have the right expertise. In this way, the recommended ex- perts are those who have provided best answers to the largest numbers of other users and have been answered by the fewest other users on their raised questions. Currently, almost all the hybrid methods that cover both aspects involves network-based methods as a com- ponent. These methods therefore still share some draw- backs of the basic network-based methods. First, the experts recommended by such methods are specific to a user-user network rather than a particular topic or a question. Intuitively, both the transitivity of users' au- thoritativeness and the effectiveness of network-based methods depend on the condition that the interactions between users concern only one topic. Second, although the link structure can, to some extent, implies the corre- lation among users and questions, the user-user network is not directly related to a user's topical preference. To recommended experts for a given problem, they still need some approach to connect the question to users or their historical questions to make a personalized recom- mendation. The more recent expertise-aware network- based methods often hybridize with relevance models (e.g., language models and topic models) to overcome the above deficiencies. Another possible issue with the hybridization of network-based methods with other methods is that au- thoritativeness is a vague concept, which already, to some extent, implies the interest and expertise of users. Therefore, the combination of techniques may cause the hybrid methods to consider multiple times of the same aspects. The rationale and effect of such hybridization are yet to be examined. 5.5 Reliance on Sufficient Data The cold start or data sparsity problem concerns both the ground truth or numbers of users' activity records, and it turns out to be a common challenge for all the investigated expert recommendation methods. For the amount of ground truth, the rule of thumb is that the more straightforward methods tend to be less affected by the small ground truth size, as the more complicated methods usually require a larger train set. For example, the classification methods generally per- form better under high-dimensional features given suffi- cient training data. When the training data is limited, these methods need to restrain the dimensionality to avoid over-fitting. In contrast, the voting-base tech- niques require no training and thus unaffected by the size of training data. The effect of the historical record numbers of users on the recommendation methods is closely related to the early detection of experts, i.e., promoting the par- ticipation rate of new experts or rising stars, i.e., the low profile users who have strong potential to con- tribute to the community later after short observations in CQA [69]. The lack of sufficient information in the user profile is, in fact, the primary obstacle towards identifying such early-career experts. Previous stud- ies [22] show that only 15.67% of all users in Yahoo! An- swers answered more than four questions. This obser- vation indicates that all these approaches involve only a small portion of highly active users and therefore can- not recommend new questions to the rest of the com- munity. If the recommendation method can also involve the good users with few activity records, these users can become motivated to take more intensive participation in a community or even develop into highly active ex- perts. Despite the significance of early expert detection is- sue, the markers that reflect the expertise of an or- dinary user (e.g., number of answers and number of Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 19 best answers) are not that strong for a newly joined user. Therefore, not much prior work has researched on finding potential experts in early-stage in CQA [64;65;71]. Many existing methods bypass the cold start and data sparsity issues due to their reliance on sufficient data from CQA systems. For example, some approaches con- sider only those users who previously provided more than 5 [40], 10 [3] or even 20 answers [122]. Other meth- ods take only users with a significant number of best answers into consideration (e.g., more than 10 [30] or 20 best answers [31]). Among the existing methods, we identify two promising categories of methods that can potentially better detect experts early. One is semi-supervised Learning methods (e.g., [68]), which regard users who provide above average-best-answers on a topic tag as topical experts. They apply a data-driven approach to predict whether a user will become an expert in the long term. The other is expertise propagation meth- ods (e.g., [123]), which infer or consolidate the expertise of low-profile users by propagating the expertise of old users through their shared activities in a community. 5.6 Method Complexity Generally, the more aspects considered, the better a method can potentially perform, and the more compli- cated the method could be. The expertise-aware tech- niques based on QLL usually combine the two aspects linearly using the simple weight sum method. The pri- mary issue with these methods is the difficulty in allo- cating the weights wisely among the two aspects. Usu- ally, they need to resort to human experience or re- peated trials in real applications to determine the opti- mal weights. Though applicable to the expert recommendation problem, recommendation techniques face severe chal- lenges besides the fundamental issues like the cold start problem. For example, considering multiple aspects of concerns could make a recommendation technique com- plex and challenging to optimize. More recently recom- mendation methods such as factorization machines may help resolve the problem but have not yet been applied to the expert recommendation in CQA. Despite the ability to incorporate multiple aspects of concern, there is a lack of universal principle regard- ing which features to use for the classification methods. Consequently, the performance of classification meth- ods largely depends on the features used and whether the technique and features fit the size of the labeled data. 6 Future Directions After reviewing the state of the art methods, we identify several challenging yet promising issues for the future research. We summarize them as realistic user modeling, recommending experts as a collabora- tive group, coping with dynamicity, utilization of ex- ternal data, and comprehensive expert recommenda- tion solutions. In the following, we review the lim- ited related studies to the above challenges, highlight the significance of and new opportunities for address- ing these challenges, and finally, outlook the promising directions for future research. We hope this discussion could provide novel viewpoints to the existing studies and encourage more future contributions to this promis- ing field of research. 6.1 Realistic User Modeling Expert recommendation relies on effective user modeling. Intuitively, there exist three aspects of con- cerns that affect whether a user gives a high-quality answer to a question in a real Q&A scenario as follows: The chance of a user noticing the question. Since a user may not have an opportunity to see a question, the user may not be an answerer to this question even though the user is an expert. The expert recommen- dation problem in CQA, however, is based on a dif- ferent assumption from the real-world scenarios, i.e., how likely a user would answer a question and mean- while provide a high-quality answer to the question if the user is invited to answer the question. Due to the above difference, when using the real-world labeled data to train the recommendation models, the recommenda- tion methods should better take into account the pos- sibility that a user may not have answered a question just because the user does not have the chance to no- tice the question. The likelihood that a user would see a question in real-world scenarios depends on various factors such as user availability (e.g., how often a user is online and available to answer questions), user be- haviors (e.g., whether the user looks for new questions to answer actively), and other users' activities related to the question (e.g., how widespread the question is among users). User's willingness to answer the question. Even if a user has noticed a question, the user may choose not to answer it. A user's willingness to answer a question also depends on various factors such as how well the question fits the user's interest, user's self-confidence 20 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 on the quality of answers, and user's expected gains from answering the question. User's expertise level on the question. Even if a user has noticed a question and is willing to answer it, the user may not have the adequate knowledge to give a high-quality answer. That is the first and foremost rea- son that we need an expert recommendation approach in CQA. Besides identifying the different aspects, we need to find a reasonable way to combine them to recommend real experts more comprehensively given a new ques- tion. Unfortunately, the existing expert recommenda- tion methods usually consider only the second, the last, or both the above aspects. For example, most language models and topic models focus on recommending users who are most likely to answer the given question. How- ever, a high possibility of a user answering a question does not necessarily mean the user would be able to pro- vide a high-quality answer. Many link analysis meth- ods identify experts as the most authoritative users in a user-user network, where authoritativeness is a dif- ferent concept from either relevance and user expertise. Therefore, the most authoritative users are not guar- anteed to be willing to answer a question nor being able to give a high-quality answer. Besides, some clas- sification methods merely rely on the previous answer quality and some metadata features without consider- ing users' topical distributions. For this reason, a rec- ommended expert by such methods may not want to answer a question even if the user is a good answerer in general. Worse still, to the best of our knowledge, the first aspect has not been considered by any previous research efforts. A promising research direction is to incorporate expert recommendation method with mod- els that could effectively predict user behaviors, just like the prediction of check-ins in a Point of Interest recommendation problem [124]. 6.2 Coping with Dynamicity Currently, the vast majority of research efforts con- sider the expert recommendation problem in a static context, where they use a snapshot of users' previously asked or answered questions for the expert recommen- dation. However, the real-world question answering websites are dynamic, with new users joining and leav- ing, users' interest changing, users' roles transforming, users' mutual interactions evolving, and the content on the website never stopping updating [125]. Therefore, it is especially promising to develop methods that lever- age the temporal information to make the expert rec- ommendation methods adaptive in a dynamic context in a real-time fashion. Currently, user availability is the most commonly consider dynamic aspect for the expert recommenda- tion problem. Several studies used temporal features to estimate the availability of users for a given day [6;93;123] or for a specific time of the day [93;126]. For example, Sung et al. [123] use all replies of users to train a sigmoid function and Chang et al. [93] build binary classifiers us- ing all responses of users within a fixed time frame (pre- vious day). Differs from the above work, Yeniterzi et al. [94] use only the particular question-related replies to estimate availability. Besides user availability, we identify two promising directions to cope with the dynamicity in CQA: User interest drifts. Similar to general recommen- dation systems, the expert recommendation problem for CQA also faces the user interest drift issue [127]. A straightforward solution is to include a decaying fac- tor to suppress questions answered in remote history and focus on users' recent interest (reflected by their shifting answering behavior) [128]. Although the topic drift issue has been studied in multiple areas such as social networks and mobile crowdsourcing [129], it is al- most an unexplored topic in the CQA context. More factors such as fluctuations in user behaviors and more sophisticated time series prediction methods could be employed to gain better results. Dynamic user expertise. Generally, users' expertise may not be consistent as well, as users' skills may im- prove over time and the quality of their answers may depend on various factors such as the users' status and other users' behaviors on a given question, not men- tioning the impact from the evolution of the Q&A com- munity. Pal et al. [130] analyze the evaluation of experts over time and show that estimating expertise using tem- poral data outperforms using static snapshots of the data. In a very recent work [94], Yeniterzi et al. incor- porate temporal information to model dynamic user ex- pertise and apply two models, namely exponential and hyperbolic discounting models, to discount the effect of older records in calculating z-scores. This method is still rather straightforward being equivalent to us- ing a decaying factor. In particular, the z-scores are calculated for each time interval and then discounted according to its temporal distance from the question's hosting interval. In the field of answer quality predic- tion, Szpektor [131] use a more advanced set of temporal features calculated between the time at which a ques- Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 21 tion and its replies are posted to improve prediction results. The similar method applies o the expert rec- ommendation problem. In summary, all the above dynamic aspects are sug- gesting an expert recommendation method suitable to self-evolve in an online fashion [132]. However, none of the above methods is designed to be online-friendly, and it could take tremendous time to retrain the new model when new information becomes available, which is un- acceptable in practice as most Q&A systems in the real-world involves a massive amount of data overall. Therefore, a promising research direction is to intro- duce novel methods that are capable of incrementally learning about users and continuously adapting their recommendation behaviors over time effectively and ef- ficiently. Besides the short of related work, we believe the dynamicity-related research for CQA is still at a preliminary stage, as most of the methods used are rel- atively simple and predict different aspects of considera- tion, such as user availability, user interest, and user ex- pertise, separately. Moreover, they have not considered the possible correlations among these aspects. There- fore, another potential point of research is to predict different aspects of features simultaneous using a single, comprehensive model for better results. As an exam- ple, Tensor Factorization (TF) [133] may model the cor- relations among high-dimensional features better than Matrix Factorization (MF). 6.3 Recommending Experts as a Collaborative Group Since a single user may not be able to well or fully address a given question, most methods would recom- mend either a ranked list or an unranked group of users instead of one user. The recommended user group is expected to address the question better than a single user, and their answers are supposed to be better than most, or ideally all the other possible user groups that contain the same number of members when considered as a whole. An ideal expert group should satisfy the following conditions. First, the question must appeal to all group members so that they are likely to answer the question. Second, the group members should be compatible with one another, so that the existence of one user in the group would not discourage another user to answer the question. Third, it is desirable for the group members to complement one another in the knowledge domains required to address the question, given that users may have different sets of skills and differed level of expertise on different skill aspects [134]. Another benefit of group recommendation is the poten- tial to make the recommending technique adaptive to specific scenarios and reduce the generation of redun- dant information in Q&A communities. For example, by capturing a global insight into an expert group, a method can automatically adjust the number of experts to recommend. In this way, the difficult questions may get more answers than easier ones. To better answer a question, it is necessary to eval- uate and select a competitive combination of poten- tial answerers as a collaborative group. Unfortunately, there is rarely any studies on this topic, and the group recommendation methods for traditional recommender system assume known user groups before making a rec- ommendation [135–137]. For example, Pal et al. propose an expert group recommendation for the CQA [138], aiming to find the experts from predefined communi- ties to provide an answer. Given a new question, the authors compute its similarity with the three aspects of features of each community, namely question features, user features, and community features. Then, they use the two k-NN algorithms over the similarity metrics to build a vector of community scores for each community. Finally, they use linear regression, Borda Count, SVM Ranking, as well as the combinations of the above three methods to train a binary classifier for distinguishing the desired from the non-desired communities for the given question. The issue with this method, as well as the traditional group recommendation methods, is that the users are evaluated separately and later put together to form a group. Consequently, the workers' answers may not collectively better address the ques- tion from the requester's perspective as the second and third conditions above may not be well met. Intuitively, the users who have frequently answers the similar question are likely to be compatible with one another [139]. A possible solution following this in- sight is to propose an expert recommendation scheme that aims at selecting the best subset (e.g. of a size of k ) of collaborative users by learning their co-occurrence in the same thread and topical expertise simultaneously. The selection of a group of collaborative users could also borrow ideas from two closely related topics, namely optimal task decomposition [140] and user group evalu- ation. Task decomposition is the opposite approach of group formation, which aims to break the knowl- edge requirement into sub-requirements and find a user for every sub-requirement to compose the final group. User group evaluation aims to set better heuristics to 22 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 promote better recommendation results and answers to the given question. On this aspect, Chang et al. [93] hypothesize that valuable question-answer threads are those where several people collaborate. A natural ap- plication of this hypothesis in group expert recommen- dation is that, instead of aiming to maximize the re- quester's satisfaction on the given question, we could select the group of collaborative users in such a way that maximizes the long-term value to a broader audi- ence of the thread. 6.4 Leveraging External Information To address the cold start problem and the sparsity of data, especially, users with the low level of activ- ity, it is crucial to leverage external data to facilitate the better expert recommendation in CQA. The types of non-CQA data may vary depending on the exter- nal services and platforms. Typically, they include the "about me" description, homepage, blogs, micro-blogs, or social networking sites. For example, many users make their GitHub homepages public in Stack Over- flow, which could be an external source of information to estimate the users' expertise. Until now, existing expert recommendation research information in a nar- for CQA only uses external row scope in a relatively simplistic manner. They mostly focus on users' social attributes including inter- relationship in social networks (either within or out- side the Q&A system) [141], and they either obtain user attributes through heuristic statistics outside of the model or combine users' social attributes with the orig- inal expert recommendation model by linear interpola- tion. The limited related work includes: Srba et al. [119] use non-CQA sources of data in topic-model-based ap- proaches as a supplement for Q&A activities in exper- tise estimation; Zhao et al. [96] consider both topical in- terests and the "following relations" between the users to build a user-to-user graph. The graph is then used in combination with past question-answering activities of users to evaluate and rank users. Instead of using social attributes as heuristics to estimate user expertise, both Liu et al. [142] and Luo et al. [143] directly use users' so- cial characteristics as additional features in addition to user expertise for the expert recommendation in CQA; Zhao et al. [95] combine heuristics from two different so- cial networks, i.e., social following and social friendship on Twitter and Quora for ranking answerers. Besides the explicit links to external information sources for the users in a Q&A system, we identify two promising fields of research that could avail the detection and use of external information by an expert recommendation method. The first is account linkage techniques, which aim to identify and link to accounts of the same users on different systems such as web- sites. By automatically detecting the linked account of a user in CQA, the external information for this user could be efficiently extracted and utilized. The second is cross-domain learning, represented by transfer learn- ing techniques, which aims to utilize the information in the related or similar domains to help learn user models for a targeted domain. Though great potentials in the Q&A domain, both techniques have not yet currently introduced to the CQA. 6.5 More Comprehensive Solutions Despite hybrid methods have considered multiple aspects of concern comprehensively, the research in this area is still at a preliminary stage as many of those methods simple combine the calculation results on dif- ferent aspects as a weighted sum. Considering this de- ficiency, it is beneficial to develop more comprehensive methods. To this end, we advocate several approaches beyond the existing techniques for the expert recom- mendation in CQA: factorization machines, ensemble learning, graph embedding, and deep learning models. We will briefly discuss them in the following. Factorization machines (FM) [144] is a matrix factor- ization based machine learning models similar to linear regression models. It represents a generic approach that combines the generality of feature engineering with the superiority of factorization models in estimating inter- actions between the massive variables in a vast domain. FM model has the advantages of embedded variable interactions, reliable estimation of a linear number of parameters under high sparsity, and applicability to a variety of prediction tasks including regression, binary classification, and ranking. All these advantages make FM a better replacement of traditional recommenda- tion methods such as matrix factorization and tensor factorization for the expert recommendation in CQA. Ensemble learning [145] is a method of using multiple learning algorithms to obtain better performance than that obtainable by any of individual learning algorithm alone. It generally includes parallel and the sequen- tial ensemble learning and applies to various problems such as classification, regression, feature selection, and anomaly detection. Therefore, it could be potentially used to recommend experts in CQA. Following the se- quential or parallel ensemble paradigms, the candidate Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 23 experts are either filtered by one learning algorithm af- ter another or obtained by merging the recommended lists of experts by different algorithms. Gradient tree boosting [146], represented by XGBoost [147], is another class of ensemble models that shines in many applica- tions in recent years. It is also promising yet unexplored in the context of CQA. Graph embedding [148] is an effective and efficient way to solve the various graph analytics problems such as node classification, node recommendation, and link prediction while well overcoming the high computa- tion and space cost issues of traditional graph analytics methods. It converts the graph data into a low di- mensional space which maximally preserves the graph's properties and structural information. In fact, graphs is an ideal form to represent the complicated interac- tions among various aspects of users, questions, and answers in CQA, especially when considering multiple aspects of concern and numerous information sources. A benefit of applying the graph embedding approach is that various approximation algorithms and probabilis- tic solutions are readily available to address complex problems. Deep learning [149] has proven successful in many ap- plications, and various deep learning models such as those based on autoencoders and neural autoregressive models have been applied to recommender systems [150]. Deep learning models have the advantage of utilizing multimodal heterogeneous features and thus has the po- tential of solving complex problems such as the expert recommendation problem on a large scale. Convolu- tional neural network (CNN) is the only a deep learn- ing model we are aware of that combines user feature representations with question feature representations to recommend experts for a given question in CQA [151]. A closely related topic to the expert recommen- dation in CQA is question answering, which aims to find or generate answers to a given question auto- matically. This topic is more classic and also heavily researched in the Q&A research domain. Other re- lated research topics include question retrieval, answer quality/probability prediction, and expert finding in broader contexts. In fact, though rare adoption for the expert recommendation problem, deep learning models have been widely applied for question answering in the domain of CQA. Therefore, it could be a good idea to borrow and adapt the various sophisticated methods in these related domains to address the expert recommen- dation problem in CQA. 7 Conclusions In this survey, we focus on the expert recommen- dation problem, one of the most significant issues in Community question answering (CQA), and review the main techniques and state-of-the-art efforts on address- ing the problem. We have summarized and compared the existing methods in various aspects, including the datasets, input and output, evaluation metric, the cov- ered aspects of concern, robustness over data distribu- tions, and complexity, followed by discussing the advan- tages and shortcomings of these methods and pointing out the open issues and promising future research di- rections. We hope this survey can help readers gain a quick and comprehensive understanding of the state of the art research in the expert recommendation in CQA and inspire more future research in this area. References [1] Srba I, Bielikova M. A comprehensive survey and classi- fication of approaches for community question answering. ACM Transactions on the Web, 2016, 10(3): Article No. 18. [2] Liu Q, Agichtein E, Dror G, Maarek Y, Szpektor I. When web search fails, searchers become askers: Understanding the transition. In Proc. the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, Aug. 2012, pp. 801–810. [3] Guo J, Xu S, Bao S, Yu Y. Tapping on the potential of q&a community by recommending answer providers. In Proc. the 17th ACM International Conference on Information and Knowledge Management, Oct. 2008, pp. 921–930. [4] Su Q, Pavlov D, Chow J H, Baker W C. Internet-scale collection of human-reviewed data. In Proc. the 16th In- ternational Conference on World Wide Web, May 2007, pp. 231–240. [5] Agichtein E, Castillo C, Donato D, Gionis A, Mishne G. Finding high-quality content in social media. In Proc. In- ternational Conference on Web Search and Data Mining, May 2008, pp. 183–194. [6] Li B, King I. Routing questions to appropriate answerers in community question answering services. In Proc. the 19th ACM International Conference on Information and Knowledge Management, Oct. 2010, pp. 1585–1588. [7] Fisher D, Smith M, Welser H T. You are who you talk to: Detecting roles in usenet newsgroups. In Proc. the 39th An- nual Hawaii International Conference on System Sciences, volume 3, Jan. 2006, pp. 59b–59b. [8] Vi´egas F B, Smith M. Newsgroup crowds and authorlines: Visualizing the activity of individuals in conversational cy- berspaces. In Proc. the 37th Annual Hawaii International Conference on System Sciences, Jan. 2004, pp. 10–pp. [9] Welser H T, Gleave E, Fisher D, Smith M. Visualizing the signatures of social roles in online discussion groups. Journal of Social Structure, 2007, 8(2):1–32. 24 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 [10] Anderson A, Huttenlocher D, Kleinberg J, Leskovec J. Dis- covering value from community activity on focused ques- tion answering sites: A case study of stack overflow. In Proc. the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug. 2012, pp. 850–858. [11] Adamic L A, Zhang J, Bakshy E, Ackerman M S. Knowl- edge sharing and yahoo answers: Everyone knows some- thing. In Proc. the 17th International Conference on World Wide Web, May 2008, pp. 665–674. [12] Movshovitz-Attias D, Movshovitz-Attias Y, Steenkiste P, Faloutsos C. Analysis of the reputation system and user contributions on a question answering website: Stackover- flow. In Proc. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Aug. 2013, pp. 886–893. [13] Yimam-Seid D, Kobsa A. Expert-finding systems for or- ganizations: Problem and domain analysis and the demoir approach. Journal of Organizational Computing and Elec- tronic Commerce, 2003, 13(1):1–24. [14] Zhou Y, Cong G, Cui B, Jensen C S, Yao J. Routing ques- tions to the right users in online communities. In Proc. the IEEE 25th International Conference on Data Engineering, Apr. 2009, pp. 700–711. [15] Qu M, Qiu G, He X, Zhang C, Wu H, Bu J, Chen C. Prob- abilistic question recommendation for question answering communities. In Proc. the 18th International Conference on World Wide Web, May 2009, pp. 1229–1230. [16] Horowitz D, Kamvar S D. The anatomy of a large-scale social search engine. In Proc. the 19th International Con- ference on World wide web, Apr. 2010, pp. 431–440. [17] Bayati S. Security expert recommender in software engi- neering. In Proc. the 38th International Conference on Software Engineering Companion, May 2016, pp. 719–721. [18] Rjab A B, Kharoune M, Miklos Z, Martin A. Character- ization of experts in crowdsourcing platforms. In Proc. International Conference on Belief Functions, Sept. 2016, pp. 97–104. [19] Baeza-Yates R, Ribeiro-Neto B et al. Modern Information Retrieval, volume 463. ACM press, New York, 1st edition, 1999. [20] Balog K, Azzopardi L, De Rijke M. Formal models for expert finding in enterprise corpora. In Proc. the 29th An- nual International ACM SIGIR Conference on Research and Development in Information Retrieval, Jul. 2006, pp. 43–50. [21] Miller D R, Leek T, Schwartz R M. A hidden markov model information retrieval system. In Proc. the 22nd An- nual International ACM SIGIR Conference on Research and Development in Information Retrieval, Aug. 1999, pp. 214–221. [22] Zhou G, Liu K, Zhao J. Joint relevance and answer quality In Proc. learning for question routing in community qa. the 21st ACM International Conference on Information and Knowledge Management, Oct. 2012, pp. 1492–1496. [23] Liu X, Croft W B, Koll M. Finding experts in community- based question-answering services. In Proc. the 14th ACM International Conference on Information and Knowledge Management, Oct. 2005, pp. 315–316. [24] Lavrenko V, Croft W B. Relevance based language mod- els. In Proc. the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Aug. 2001, pp. 120–127. [25] Liu X, Croft W B. Cluster-based retrieval using language models. In Proc. the 27th Annual International ACM SI- GIR Conference on Research and Development in Infor- mation Retrieval, Aug. 2004, pp. 186–193. [26] Petkova D, Croft W B. Hierarchical language models for expert finding in enterprise corpora. International Journal on Artificial Intelligence Tools, 2008, 17(01):5–18. [27] Li B, King I, Lyu M R. Question routing in community question answering: Putting category in its place. In Proc. the 20th ACM International Conference on Information and Knowledge Management, Oct. 2011, pp. 2041–2044. [28] Zheng X, Hu Z, Xu A, Chen D, Liu K, Li B. Algorithm for recommending answer providers in community-based question answering. Journal of Information Science, 2012, 38(1):3–14. [29] Zhai C, Lafferty J. A study of smoothing methods for lan- guage models applied to information retrieval. ACM Trans- actions on Information Systems, 2004, 22(2):179–214. [30] Liu M, Liu Y, Yang Q. Predicting best answerers for new questions in community question answering. In Proc. In- ternational Conference on Web-Age Information Manage- ment, Jun. 2010, pp. 127–138. [31] Riahi F, Zolaktaf Z, Shafiei M, Milios E. Finding expert users in community question answering. In Proc. the 21st International Conference on World Wide Web, May 2012, pp. 791–798. [32] Hofmann T. Probabilistic latent semantic indexing. In roc. the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Apr. 1999, pp. 50–57. [33] Deerwester S, Dumais S T, Furnas G W, Landauer T K, Harshman R. Indexing by latent semantic analysis. Jour- nal of the American Society for Information Science, 1990, 41(6):391–407. [34] Wu H, Wang Y, Cheng X. Incremental probabilistic latent semantic analysis for automatic question recommendation. In Proc. ACM Conference on Recommender Systems, Oct. 2008, pp. 99–106. [35] Xu F, Ji Z, Wang B. Dual role model for question recom- mendation in community question answering. In Proc. the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, Apr. 2012, pp. 771–780. [36] Blei D M, Ng A Y, Jordan M I. Latent dirichlet allocation. Journal of Machine Learning Research, 2003, 3(Jan):993– 1022. [37] Du L, Buntine W, Jin H. A segmented topic model based on the two-parameter poisson-dirichlet process. Machine Learning, 2010, 81(1):5–19. [38] Pitman J, Yor M. The two-parameter poisson-dirichlet dis- tribution derived from a stable subordinator. The Annals of Probability, 1997, pp. 855–900. [39] Sahu T P, Nagwani N K, Verma S. Taglda based user persona model to identify topical experts for newly posted questions in community question answering sites. Inter- Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 25 national Journal of Applied Engineering Research, 2016, 11(10):7072–7078. International Conference on World Wide Web, May 2015, pp. 1369–1374. [40] Tian Y, Kochhar P S, Lim E P, Zhu F, Lo D. Predicting best answerers for new questions: An approach leveraging topic modeling and collaborative voting. In Workshops at the International Conference on Social Informatics, Sept. 2013, pp. 55–68. [41] Zhang J, Ackerman M S, Adamic L. Expertise networks in online communities: Structure and algorithms. In Proc. the 16th International Conference on World Wide Web, May 2007, pp. 221–230. [42] Jeon J, Croft W B, Lee J H, Park S. A framework to predict the quality of answers with non-textual features. In Proc. the 29th annual International ACM SIGIR Conference on Research anDevelopment in Information Retrieval, Apr. 2006, pp. 228–235. [43] Borodin A, Roberts G O, Rosenthal J S, Tsaparas P. Link analysis ranking: Algorithms, theory, and experi- ments. ACM Transactions on Internet Technology, 2005, 5(1):231–297. [44] Kleinberg J M. Authoritative sources in a hyperlinked en- vironment. Journal of the ACM, 1999, 46(5):604–632. [45] Jurczyk P, Agichtein E. Discovering authorities in ques- tion answer communities by using link analysis. In Proc. the 16th ACM Conference on Information and Knowledge Management, Oct. 2007, pp. 919–922. [46] Jurczyk P, Agichtein E. Hits on question answer portals: Exploration of link analysis for author ranking. In Proc. the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Apr. 2007, pp. 845–846. [47] Haveliwala T H. Topic-sensitive pagerank. In Proc. the 11th International Conference on World Wide Web, Apr. 2002, pp. 517–526. [48] Choetkiertikul M, Avery D, Dam H K, Tran T, Ghose A. Who will answer my question on stack overflow? In Proc. 24th Australasian Software Engineering Conference, Sept. 2015, pp. 155–164. [49] Lempel R, Moran S. Salsa: The stochastic approach for link-structure analysis. ACM Transactions on Information Systems, 2001, 19(2):131–160. [50] Cheng T, Yan X, Chang K C C. Entityrank: Searching entities directly and holistically. In Proc. the 33rd Interna- tional Conference on Very Large Data Bases, Sept. 2007, pp. 387–398. [51] Weng J, Lim E P, Jiang J, He Q. Twitterrank: Finding topic-sensitive influential twitterers. In Proc. the 3rd ACM International Conference on Web Search and Data Min- ing, Feb. 2010, pp. 261–270. [52] Liu X, Bollen J, Nelson M L, Sompel H. Co-authorship networks in the digital library research community. Infor- mation Processing & Management, 2005, 41(6):1462–1480. [53] Shahriari M, Parekodi S, Klamma R. Community-aware ranking algorithms for expert identification in question- answer forums. In Proc. the 15th International Confer- ence on Knowledge Technologies and Data-driven Busi- ness, Oct. 2015, p. 8. [54] Shahriari M, Krott S, Klamma R. Disassortative degree mixing and information diffusion for overlapping commu- nity detection in social networks (dmid). In Proc. the 24th [55] Bouguessa M, Dumoulin B, Wang S. Identifying author- itative actors in question-answering forums: The case of yahoo! answers. In Proc. the 14th ACM SIGKDD In- ternational Conference on Knowledge Discovery and Data Mining, Aug. 2008, pp. 866–874. [56] Fagin R, Lotem A, Naor M. Optimal aggregation algo- rithms for middleware. Journal of Computer and System Sciences, 2003, 66(4):614–656. [57] Zhu H, Cao H, Xiong H, Chen E, Tian J. Towards expert finding by leveraging relevant categories in authority rank- ing. In Proc. the 20th ACM International Conference on Information and Knowledge Management, Oct. 2011, pp. 2221–2224. [58] Zhu H, Chen E, Xiong H, Cao H, Tian J. Ranking user au- thority with relevant knowledge categories for expert find- ing. World Wide Web, 2014, 17(5):1081–1107. [59] Liu J, Song Y I, Lin C Y. Competition-based user ex- pertise score estimation. In Proc. the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, Apr. 2011, pp. 425–434. [60] Lai L C, Kao H Y. Question routing by modeling user expertise and activity in cqa services. In Proc. the 26th Annual Conference of the Japanese Society for Artificial Intelligence, Jun. 2012, pp. 1–10. [61] Lin Y, Shen H. system for Smartq: swer worthy answers. doi:10.1109/TBDATA.2017.2735442. (preprint). A question and an- supplying high-quality and trust- IEEE Transactions on Big Data. [62] Liu D R, Chen Y H, Kao W C, Wang H W. Integrating ex- pert profile, reputation and link analysis for expert finding in question-answering websites. Information Processing & Management, 2013, 49(1):312–329. [63] Liu Z, Li K, Qu D. Knowledge graph based question routing for community question answering. In Proc. International Conference on Neural Information Processing, Nov. 2017, pp. 721–730. [64] Pal A, Konstan J A. Expert identification in community question answering: Exploring question selection bias. In Proc. the 19th ACM International Conference on Informa- tion and Knowledge Management, 2010, pp. 1505–1508. [65] Pal A, Farzan R, Konstan J A, Kraut R E. Early detection of potential experts in question answering communities. In Proc. International Conference on User Modeling, Adap- tation, and Personalization, Jul. 2011, pp. 231–242. [66] Zhou T C, Lyu M R, King I. A classification-based ap- proach to question routing in community question answer- ing. In Proc. the 21st International Conference on World Wide Web, May 2012, pp. 783–790. [67] Ji Z, Wang B. Learning to rank for question routing in com- munity question answering. In Proc. the 22nd ACM Inter- national Conference on Information & Knowledge Man- agement, Oct. 2013, pp. 2363–2368. [68] Dijk D, Tsagkias M, Rijke M. Early detection of topical expertise in community question answering. In Proc. the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, Apr. 2015, pp. 995–998. 26 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 [69] Le L T, Shah C. Retrieving rising stars in focused com- munity question-answering. In Proc. Asian Conference on Intelligent Information and Database Systems, Mar. 2016, pp. 25–36. [70] Dror G, Koren Y, Maarek Y, Szpektor I. I want to answer, who has a question? yahoo! answers recommender system. In Proc. the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug. 2011, pp. 1109–1117. [71] Pal A, Harper F M, Konstan J A. Exploring question se- lection bias to identify experts and potential experts in community question answering. ACM Transactions on In- formation Systems, 2012, 30(2): Artical No. 10. [72] Burel G, Mulholland P, He Y, Alani H. Predicting answer- ing behaviour in online question answering communities. In Proc. the 26th ACM Conference on Hypertext & Social Media, Sept. 2015, pp. 201–210. [73] Burges C J, Ragno R, Le Q V. Learning to rank with nonsmooth cost functions. In Proc. Advances in Neural Information Processing Systems, Dec. 2007, pp. 193–200. [74] Cao Z, Qin T, Liu T Y, Tsai M F, Li H. Learning to rank: From pairwise approach to listwise approach. In Proc. the 24th International Conference on Machine Learning, Jun. 2007, pp. 129–136. [75] Cheng X, Zhu S, Chen G, Su S. Exploiting user feedback for expert finding in community question answering. In IEEE International Conference on Data Mining Workshop, Nov. 2015, pp. 295–302. [76] Wang N, Abel M H, Barth`es J P, Negre E. An answerer recommender system exploiting collaboration in cqa ser- vices. In Proc. IEEE 20th International Conference on Computer Supported Cooperative Work in Design, May 2016, pp. 198–203. [77] Dom B, Paranjpe D. A bayesian technique for estimat- ing the credibility of question answerers. In Proc. SIAM International Conference on Data Mining, May 2008, pp. 399–409. [78] Koren Y, Bell R, Volinsky C. Matrix factorization techniques for recommender systems. Computer, 2009, 42(8):42–49. [79] Cho J H, Li Y, Girju R, Zhai C. Recommending forum posts to designated experts. In Proc. IEEE International Conference on Big Data, Oct. 2015, pp. 659–666. [80] Singh A P, Gordon G J. Relational learning via collective matrix factorization. In Proc. the 14th ACM SIGKDD In- ternationalConference on Knowledge Discovery and Data Mining, Aug. 2008, pp. 650–658. [81] Yang B, Manandhar S. Tag-based expert recommendation in community question answering. In Proc. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Aug. 2014, pp. 960–963. [82] Mnih A, Salakhutdinov R R. Probabilistic matrix factoriza- tion. In Proc. Advances in Neural Information Processing Systems, Dec. 2008, pp. 1257–1264. [83] Zhou G, Liu K, Zhao J. Topical authority identification in community question answering. In Proc. Chinese Confer- ence on Pattern Recognition, Nov. 2012, pp. 622–629. answering websites. In Proc. International Conference on Web-Based Learning, Aug. 2015, pp. 165–173. [85] Yang J, Peng S, Wang L, Wu B. Finding experts in commu- nity question answering based on topic-sensitive link anal- ysis. In Proc. IEEE International Conference on Data Sci- ence in Cyberspace, Jun. 2016, pp. 54–60. [86] Rao Y, Xie H, Liu X, Li Q, Wang F L, Wong T L. User au- thority ranking models for community question answering. Journal of Intelligent & Fuzzy Systems, 2016, 31(5):2533– 2542. [87] Zhao T, Bian N, Li C, Li M. Topic-level expert modeling in community question answering. In Proc. SIAM Interna- tional Conference on Data Mining, volume 13, May 2013, pp. 776–784. [88] Zhou G, Lai S, Liu K, Zhao J. Topic-sensitive probabilis- tic model for expert finding in question answer communi- ties. In Proc. the 21st ACM International Conference on Information and Knowledge Management, Oct. 2012, pp. 1662–1666. [89] Yang L, Qiu M, Gottipati S, Zhu F, Jiang J, Sun H, Chen Z. Cqarank: Jointly model topics and expertise in commu- nity question answering. In Proc. the 22nd ACM Interna- tional Conference on Information & Knowledge Manage- ment, Oct. 2013, pp. 99–108. [90] Yan Z, Zhou J. A new approach to answerer recommen- dation in community question answering services. In Proc. European Conference on Information Retrieval, Apr. 2012, pp. 121–132. [91] Yin H, Hu Z, Zhou X, Wang H, Zheng K, Nguyen Q V H, Sadiq S. Discovering interpretable geo-social communities for user behavior prediction. In Proc. IEEE 32nd Inter- national Conference on Data Engineering, May 2016, pp. 942–953. [92] Suryanto M A, Lim E P, Sun A, Chiang R H. Quality-aware collaborative question answering: Methods and evaluation. In Proc. the 2nd ACM International Conference on Web Search and Data Mining, Feb. 2009, pp. 142–151. [93] Chang S, Pal A. Routing questions for collaborative answering in community question answering. In Proc. IEEE/ACM International Conference on Advances in So- cial Networks Analysis and Mining, Aug. 2013, pp. 494– 501. [94] Yeniterzi R, Callan J. Moving from static to dynamic mod- eling of expertise for question routing in cqa sites. In Proc. 9th International AAAI Conference on Web and Social Media, Jun. 2015, pp. 702–705. [95] Zhao Z, Zhang L, He X, Ng W. Expert finding for question answering via graph regularized matrix completion. IEEE Transactions on Knowledge and Data Engineering, 2015, 27(4):993–1004. [96] Zhao Z, Wei F, Zhou M, Ng W. Cold-start expert finding in community question answering via graph regularization. In Proc. International Conference on Database Systems for Advanced Applications, May 2015, pp. 21–38. [97] Nam K K, Ackerman M S, Adamic L A. Questions in, knowledge in?: A study of naver's question answering com- munity. In Proc. SIGCHI Conference on Human Factors in Computing Systems, Apr. 2009, pp. 779–788. [84] Liu X, Ye S, Li X, Luo Y, Rao Y. Zhihurank: A topic- sensitive expert finding algorithm in community question [98] Li X L, Foo C S, Tew K L, Ng S K. Searching for rising stars in bibliography networks. In Proc. International Confer- Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 27 ence on Database Systems for Advanced Applications, Apr. 2009, pp. 288–292. [99] Daud A, Abbasi R, Muhammad F. Finding rising stars in social networks. In Proc. International Conference on Database Systems for Advanced Applications, Apr. 2013, pp. 13–24. [100] Deng H, King I, Lyu M R. Formal models for expert finding on dblp bibliography data. In Proc. 8th IEEE International Conference on Data Mining, Nov. 2008, pp. 163–172. [101] Hashemi S H, Neshati M, Beigy H. Expertise retrieval in bibliographic network: A topic dominance learning ap- proach. In Proc. the 22nd ACM International Conference on Information & Knowledge Management, Oct. 2013, pp. 1117–1126. [102] Mimno D, McCallum A. Expertise modeling for matching papers with reviewers. In Proc. the 13th ACM SIGKDD In- ternational Conference on Knowledge Discovery and Data Mining, Aug. 2007, pp. 500–509. [103] Bagdouri M. Cross-platform question routing for better question answering. In Proc. the 38th International ACM SIGIR Conference on Research and Development in Infor- mation Retrieval, Feb. 2015, pp. 1053–1053. [104] Richardson M, White R W. Supporting synchronous social q&a throughout the question lifecycle. In Proc. the 20th international conference on World wide web, Apr. 2011, pp. 755–764. [105] Java A, Kolari P, Finin T, Oates T. Modeling the spread of influence on the blogosphere. In Proc. the 15th Interna- tional World Wide Web Conference, Oct. 2006, pp. 22–26. [106] Kempe D, Kleinberg J, Tardos ´E. Maximizing the spread of influence through a social network. In Proc. the 9th ACM SIGKDD International Conference on Knowledge Discov- ery and Data Mining, May 2003, pp. 137–146. [107] Pal A, Counts S. Identifying topical authorities in mi- croblogs. In Proc. the 4th ACM international Conference on Web Search and Data Mining, Oct. 2011, pp. 45–54. [108] Campbell C S, Maglio P P, Cozzi A, Dom B. Expertise identification using email communications. In Proc. the 12th International Conference on Information and Knowl- edge Management, Oct. 2003, pp. 528–531. [109] Dom B, Eiron I, Cozzi A, Zhang Y. Graph-based rank- ing algorithms for e-mail expertise analysis. In Proc. the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Jun. 2003, pp. 42–48. [110] Shetty J, Adibi J. Discovering important nodes through graph entropy the case of enron email database. In Proc. the 3rd International Workshop on Link Discovery, Aug. 2005, pp. 74–81. [111] Mockus A, Herbsleb J D. Expertise browser: A quantita- tive approach to identifying expertise. In Proc. the 24th International Conference on Software Engineering, Jun. 2002, pp. 503–512. [112] Wei W, Lee J, King I. Measuring credibility of users in an e- learning environment. In Proc. the 16th International Con- ference on World Wide Web, May 2007, pp. 1279–1280. [113] Fu Y, Xiang R, Liu Y, Zhang M, Ma S. A cdd-based formal model for expert finding. In Proc. the 16th ACM Confer- ence on Conference on Information and Knowledge Man- agement, Oct. 2007, pp. 881–884. [114] Balog K, Bogers T, Azzopardi L, De Rijke M, Van Den Bosch A. Broad expertise retrieval in sparse data en- vironments. In Proc. the 30th annual International ACM SIGIR Conference on Research and Development in Infor- mation Retrieval, Aug. 2007, pp. 551–558. [115] Pasca M A, Harabagiu S M. High performance ques- tion/answering. In roc. the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Apr. 2001, pp. 366–374. [116] Fang H, Zhai C. Probabilistic models for expert finding. In Proc. European Conference on Information Retrieval, Apr. 2007, pp. 418–430. [117] Macdonald C, Ounis I. Voting for candidates: Adapting data fusion techniques for an expert search task. In Proc. the 15th ACM International Conference on Information and Knowledge Management, Oct. 2006, pp. 387–396. [118] Liu Y, Bian J, Agichtein E. Predicting information seeker satisfaction in community question answering. In Proc. the 31st International ACM SIGIR Conference on Research and Development in Information Retrieval, Apr. 2008, pp. 483–490. [119] Srba I, Grznar M, Bielikova M. Utilizing non-qa data to improve questions routing for users with low qa activity in cqa. In Proc. the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Aug. 2015, pp. 129–136. [120] Fagin R, Kumar R, Sivakumar D. Comparing top k lists. SIAM Journal on Discrete Mathematics, 2003, 17(1):134– 160. [121] Herlocker J L, Konstan J A, Terveen L G, Riedl J T. Eval- uating collaborative filtering recommender systems. ACM Transactions on Information Systems, 2004, 22(1):5–53. [122] Fang L, Huang M, Zhu X. Question routing in community based qa: Incorporating answer quality and answer con- tent. In Proc. the ACM SIGKDD Workshop on Mining Data Semantics, Aug. 2012, p. 5. [123] Sung J, Lee J G, Lee U. Booming up the long tails: Dis- covering potentially contributive users in community-based question answering services. In Proc. International AAAI Conference on Weblogs and Social Media, Jul. 2013, pp. 602–610. [124] Yin H, Zhou X, Shao Y, Wang H, Sadiq S. Joint modeling of user check-in behaviors for point-of-interest recommenda- tion. In Proc. the 24th ACM International on Conference on Information and Knowledge Management, Oct. 2015, pp. 1631–1640. [125] Yin H, Cui B. Spatio-temporal Recommendation in Social Media. Springer, Berlin, 1st edition, 2016. [126] Liu Q, Agichtein E. Modeling answerer behavior in col- laborative question answering systems. In Proc. European Conference on Information Retrieval, Apr. 2011, pp. 67– 79. [127] Yin H, Zhou X, Cui B, Wang H, Zheng K, Nguyen Q V H. Adapting to user interest drift for poi recommendation. IEEE Transactions on Knowledge and Data Engineering, 2016, 28(10):2566–2581. [128] Szpektor I, Maarek Y, Pelleg D. When relevance is not enough: Promoting diversity and freshness in personal- ized question recommendation. In Proc. the 22nd Inter- 28 J. Comput. Sci. & Technol., January 2018, Vol.33, No.1 national Conference on World Wide Web, May 2013, pp. 1249–1260. Conference on Intelligent User Interfaces, Oct. 2014, pp. 7–16. [129] Tong Y, Cao C C, Chen L. Tcs: Efficient topic discovery over crowd-oriented service data. In Proc. the 20th ACM SIGKDD International Conference on Knowledge Discov- ery and Data Mining, Aug. 2014, pp. 861–870. [130] Pal A, Chang S, Konstan J A. Evolution of experts in question answering communities. In Proc. the 6th Inter- national AAAI Conference on Weblogs and Social Media, Jun. 2012, pp. 274–281. [131] Cai Y, Chakravarthy S. Improving answer quality predic- tion in q/a social networks by leveraging temporal feature. Proc. International Journal of Next-Generation Comput- ing, 2013, 4(1):1–27. [132] Tong Y, She J, Ding B, Wang L, Chen L. Online mobile micro-task allocation in spatial crowdsourcing. In Proc. IEEE 32nd International Conference on Data Engineer- ing, Apr. 2016, pp. 49–60. [133] Yin H, Chen H, Sun X, Wang H, Wang Y, Nguyen Q V H. Sptf: A scalable probabilistic tensor factorization model for semantic-aware behavior prediction. In Proc. IEEE In- ternational Conference on Data Mining, Nov. 2017, pp. 585–594. [134] Yin H, Cui B, Huang Y. Finding a wise group of experts in social networks. In Proc. International Conference on Advanced Data Mining and Applications, Nov. 2011, pp. 381–394. [135] O'connor M, Cosley D, Konstan J A, Riedl J. Polylens: A recommender system for groups of users. In Proc. European Conference on Computer-Supported Cooperative Work, Sept. 2001, pp. 199–218. [136] Ye M, Liu X, Lee W C. Exploring social influence for rec- ommendation: A generative model approach. In Proc. the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, Aug. 2012, pp. 671–680. [137] Gorla J, Lathia N, Robertson S, Wang J. Probabilistic group recommendation via information matching. In Proc. the 22nd International Conference on World Wide Web, May 2013, pp. 495–504. [138] Pal A. Metrics and algorithms for routing questions to user communities. ACM Transactions on Information Systems, 2015, 33(3):14. [139] Feng W, Zhu Q, Zhuang J, Yu S. An expert recommendation algorithm based on pearson correla- tion coefficient and fp-growth. Cluster Computing. doi:https://doi.org/10.1007/s10586-017-1576-y. (preprint). [140] Tong Y, Chen L, Zhou Z, Jagadish H V, Shou L, Lv W. Slade: A smart large-scale task decomposer in crowdsourc- ing. IEEE Transactions on Knowledge and Data Engineer- ing. doi:10.1109/TKDE.2018.2797962. (preprint). [141] Atkinson J, Maurelia A. Redundancy-based trust in question-answering systems. Computer, 2017, 50(1):58–65. [142] Liu Z, Jansen B J. Predicting potential responders in social q&a based on non-qa features. In Proc. ACM CHI Confer- ence on Human Factors in Computing Systems, Apr. 2014, pp. 2131–2136. [143] Luo L, Wang F, Zhou M X, Pan Y, Chen H. Who have got answers?: Growing the pool of answerers in a smart en- terprise social qa system. In Proc. the 19th International [144] Rendle S. Factorization machines. In Proc. the 10th IEEE International Conference on Data Mining, Dec. 2010, pp. 995–1000. [145] Zhou Z H. Ensemble Methods: Foundations and Algo- rithms. CRC press, Boca Raton, 1st edition, 2012. [146] Friedman J H. Greedy function approximation: A gradient boosting machine. Annals of Statistics, 2001, 29(5):1189– 1232. [147] Chen T, Guestrin C. Xgboost: A scalable tree boosting sys- tem. In Proc. the 22nd ACM SIGKDD International Con- ference on Knowledge Discovery and Data Mining, Aug. Aug. 2016, pp. 785–794. [148] Yan S, Xu D, Zhang B, Zhang H J, Yang Q, Lin S. Graph embedding and extensions: A general framework for dimen- sionality reduction. IEEE transactions on Pattern Analysis and Machine Intelligence, 2007, 29(1):40–51. [149] Yin H, Wang W, Wang H, Chen L, Zhou X. Spatial-aware hierarchical collaborative deep learning for poi recommen- dation. IEEE Transactions on Knowledge and Data Engi- neering, 2017, 29(11):2537–2551. [150] Lin S, Hong W, Wang D, Li T. A survey on expert finding techniques. Journal of Intelligent Information Systems, 2017, 49(2):255–279. [151] Zheng C, Zhai S, Zhang Z. expert for communities. proach swering https://arxiv.org/abs/1711.05350, Jun. 2018. identification A deep learning ap- an- 2017. question in arXiv:1711.05350, Xianzhi Wang is a research fellow with School of Information Systems, Singapore Management University, Singapore. He received his B.E. degree from Xi'an Jiaotong Univer- sity, Xi'an, M.E. and Ph.D. degrees from Harbin Institute of Technology, Harbin, all in computer science in 2007, 2009, and 2014. His research interests include Internet of Things, data management, machine learning, and services computing. He received ARC Discovery Early Career Researcher Award (DECRA) in 2017 and IBM Ph.D. Fellowship Award in 2013. Chaoran Huang is currently a Ph.D. candidate at School of Computer Science and Engineering, University of New South Wales, Sydney. He received his B.E. degree from Tianjin Polytechnic University, Tianjin, in 2014. His research inter- ests include data mining, Internet of Things, and service-oriented computing. Xianzhi Wang et al.: A Survey on Expert Recommendation in CQA 29 She received her Ph.D. Lina Yao is a lecturer at School of Computer Science and Engineering, University of New South Wales, Sydney. in computer science from University of Adelaide, Adelaide, Her research interests include data mining learning applications and machine with the focuses on Internet of Things, recommender systems, human activity recognition, and Brain Computer Interface. She is the recipient of ARC Discovery Early Career Researcher Award (DECRA) and Inaugural Vice Chancellor's Women's Research Excellence Award in 2015. in 2014. Boualem Benatallah is a sci- entia professor and research group leader at University of New South He received his Wales, Sydney. Ph.D. from Grenoble University, Grenoble. His research interests include Web ser- vices composition, quality control in crowdsourcing services, crowdsourcing for vulnerability discovery, data curation, cognitive services engineering, and cloud services orchestration. in computer science is Manqing Dong currently a Ph.D. candidate at School of Computer Science and Engineering, University of New South Wales, Syd- ney. She received her BE degree from Jilin University, Jilin, and her MSc in the City University of Hong Kong, Her research interests Hongkong. include anomaly detection, data mining, deep learning, statistical learning, and probabilistic graphical models. She is a student member of IEEE and ACM.
1802.09808
3
1802
2018-05-17T01:35:13
#DebateNight: The Role and Influence of Socialbots on Twitter During the 1st 2016 U.S. Presidential Debate
[ "cs.SI" ]
Serious concerns have been raised about the role of 'socialbots' in manipulating public opinion and influencing the outcome of elections by retweeting partisan content to increase its reach. Here we analyze the role and influence of socialbots on Twitter by determining how they contribute to retweet diffusions. We collect a large dataset of tweets during the 1st U.S. Presidential Debate in 2016 (#DebateNight) and we analyze its 1.5 million users from three perspectives: user influence, political behavior (partisanship and engagement) and botness. First, we define a measure of user influence based on the user's active contributions to information diffusions, i.e. their tweets and retweets. Given that Twitter does not expose the retweet structure - it associates all retweets with the original tweet - we model the latent diffusion structure using only tweet time and user features, and we implement a scalable novel approach to estimate influence over all possible unfoldings. Next, we use partisan hashtag analysis to quantify user political polarization and engagement. Finally, we use the BotOrNot API to measure user botness (the likelihood of being a bot). We build a two-dimensional "polarization map" that allows for a nuanced analysis of the interplay between botness, partisanship and influence. We find that not only social bots are more active on Twitter - starting more retweet cascades and retweeting more -- but they are 2.5 times more influential than humans, and more politically engaged. Moreover, pro-Republican bots are both more influential and more politically engaged than their pro-Democrat counterparts. However we caution against blanket statements that software designed to appear human dominates political debates. We find that many highly influential Twitter users are in fact pro-Democrat and that most pro-Republican users are mid-influential and likely to be human (low botness).
cs.SI
cs
#DEBATENIGHT: The Role and Influence of Socialbots on Twitter During the 1st 2016 U.S. Presidential Debate Marian-Andrei Rizoiu12 and Timothy Graham1 and Rui Zhang12 and Yifei Zhang12 and Robert Ackland1 and Lexing Xie12 1The Australian National University, 2Data61 CSIRO, Canberra, Australia. 8 1 0 2 y a M 7 1 ] I S . s c [ 3 v 8 0 8 9 0 . 2 0 8 1 : v i X r a Abstract Serious concerns have been raised about the role of 'so- cialbots' in manipulating public opinion and influencing the outcome of elections by retweeting partisan content to in- crease its reach. Here we analyze the role and influence of socialbots on Twitter by determining how they contribute to retweet diffusions. We collect a large dataset of tweets during the 1st U.S. presidential debate in 2016 and we analyze its 1.5 million users from three perspectives: user influence, po- litical behavior (partisanship and engagement) and botness. First, we define a measure of user influence based on the user's active contributions to information diffusions, i.e. their tweets and retweets. Given that Twitter does not expose the retweet structure – it associates all retweets with the origi- nal tweet – we model the latent diffusion structure using only tweet time and user features, and we implement a scalable novel approach to estimate influence over all possible un- foldings. Next, we use partisan hashtag analysis to quantify user political polarization and engagement. Finally, we use the BotOrNot API to measure user botness (the likelihood of being a bot). We build a two-dimensional "polarization map" that allows for a nuanced analysis of the interplay between botness, partisanship and influence. We find that not only are socialbots more active on Twitter – starting more retweet cas- cades and retweeting more – but they are 2.5 times more influ- ential than humans, and more politically engaged. Moreover, pro-Republican bots are both more influential and more po- litically engaged than their pro-Democrat counterparts. How- ever we caution against blanket statements that software de- signed to appear human dominates politics-related activity on Twitter. Firstly, it is known that accounts controlled by teams of humans (e.g. organizational accounts) are often identified as bots. Secondly, we find that many highly influential Twitter users are in fact pro-Democrat and that most pro-Republican users are mid-influential and likely to be human (low bot- ness). 1 Introduction Socialbots are broadly defined as "software processes that are programmed to appear to be human-generated within the context of social networking sites such as Facebook and Twitter" (Gehl and Bakardjieva 2016, p.2). They have re- cently attracted much attention and controversy, with con- cerns that they infiltrated political discourse during the 2016 Copyright c(cid:13) 2018, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. U.S. presidential election and manipulated public opinion at scale. Concerns were heightened with the discovery that an influential conservative commentator (@Jenn_Abrams, 70,000 followers) and a user claiming to belong to the Ten- nessee Republican Party (@TEN_GOP, 136,000 followers) – both retweeted by high-profile political figures and celebri- ties – were in fact Russian-controlled bots operated by the Internet Research Agency in St. Petersburg (Collins and Cox 2017; Timberg, Dwoskin, and Entous 2017). There are several challenges that arise when conducting large-scale empirical analysis of political influence of bots on Twitter. The first challenge concerns estimating user in- fluence from retweet diffusions, where the retweet relations are unobserved – the Twitter API assigns every retweet to the original tweet in the diffusion. Current state-of-the-art influence estimation methods such as ConTinEst (Du et al. 2013) operate on a static snapshot of the diffusion graph, which needs to be inferred from retweet diffusions using ap- proaches like NetRate (Rodriguez, Balduzzi, and Schölkopf 2011). This workflow suffers from two major drawbacks: first, the algorithms for uncovering the diffusion graph do not scale to millions of users like in our application; second, operating on the diffusion graph estimates the "potential of being influential", but it loses information about user activ- ity – e.g. a less well connected user can still be influential if they tweet a lot. The question is how to estimate at scale the influence of millions of users from diffusion in which the retweet relation is not observed? The second challenge lies in determining at scale whether a user is a bot and also her political behavior, as manually labeling millions of users is infeasible. The question is therefore how to leverage au- tomated bot detection approaches to measure the botness of millions of users? and how to analyze political behav- ior (partisanship and engagement) at scale? This paper addresses the above challenges using a large dataset (hereafter referred to as #DEBATENIGHT) of 6.5 million tweets authored by 1.5 million users that was col- lected on 26 September 2016 during the 1st U.S. presidential debate. To address the first challenge, we introduce, evaluate, and apply a novel algorithm to estimate user influence based on retweet diffusions. We model the latent diffusion structure using only time and user features by introducing the diffu- sion scenario – a possible unfolding of a diffusion – and its likelihood. We implement a scalable algorithm to estimate user influence over all possible diffusion scenarios associ- ated with a diffusion. We demonstrate that our algorithm can accurately recover the ground truth on a synthetic dataset. We also show that, unlike simpler alternative measures–such as the number of followers, or the mean size of initiated cascades–our influence measure ϕ assigns high scores to both highly-connected users who never start diffusions and to active retweeters with little followership. We address the second challenge by proposing three new measures (political polarization P, political engagement E and botness ζ) and by computing them for each user in #DE- BATENIGHT. We manually compile a list of partisan hash- tags and we estimate political engagement based on the ten- dency to use these hashtags and political polarization based on whether pro-Democrat or pro-Republican hashtags were predominantly used. We use the BotOrNot API to evalu- ate botness and to construct four reference populations – Human, Protected, Suspended and Bot. We build a two-dimensional visualization – the polarization map – that enables a nuanced analysis of the interplay between botness, partisanship and influence. We make several new and impor- tant findings: (1) bots are more likely to be pro-Republican; (2) bots are more engaged than humans, and pro-Republican bots are more engaged than pro-Democrat bots; (3) the aver- age pro-Republican bot is twice as influential as the average pro-Democrat bot; (4) very highly influential users are more likely to be pro-Democrat; and (5) highly influential bots are mostly pro-Republican. • We introduce a scalable algorithm to estimate user in- fluence over all possible unfoldings of retweet diffusions where the cascade structure is not observed; the code is publicly accessible in a Github repository1; • We develop two new measures of political polarization and engagement based on usage of partisan hashtags; the list of partisan hashtags is also available in the repository; • We measure the botness of a very large population of users engaged in Twitter activity relating to an important political event – the 2016 U.S presidential debates; • We propose the polarization map – a novel visualization of political polarization as a function of user influence and botness – and we use it to gain insights into the influence of bots on the information landscape around the U.S. pres- idential election. The main contributions of this work include: 2 Related work We structure the discussion of previous work into two cat- egories: related work on the estimation of user influence and work concerning bot presence and behavior on Twitter. Estimating user influence on Twitter. Aggregate mea- sures such as the follower count, the number of retweets and the number of mentions have been shown to be in- dicative of user influence on Twitter (Cha et al. 2010; 1Code and partisan hashtag list is publicly available https://github.com/computationalmedia/ at cascade-influence Kwak et al. 2010). More sophisticated estimates of user in- fluence use eigenvector centrality to account for the con- nectivity of followers or retweeters; for example, TwitteR- ank (Weng et al. 2010) extends PageRank (Page et al. 1999) by taking into account topical similarity between users and network structure. Other extensions like Temporal PageR- ank (Rozenshtein and Gionis 2016) explicitly incorporate time into ranking to account for a time-evolving network. However, one limitation of PageRank-based methods is that they require a complete mapping of the social networks. More fundamentally, network centrality has the drawback of evaluating only the potential of a user to be influential in spreading ideas or content, and it does not account for the actions of the user (e.g. tweeting on a particular subject). Our influence estimation approach proposed in Sec. 3 is built starting from the user Twitter activity and it does not require knowledge of the social network. Recent work (Yates, Joselow, and Goharian 2016; Chikhaoui et al. 2017) has focused on estimating user in- fluence as the contribution to information diffusion. For ex- ample, ConTinEst (Du et al. 2013) requires a complete dif- fusion graph and employs a random sampling algorithm to approximate user influence with scalable complexity. How- ever, constructing the complete diffusion graph might prove problematic, as current state-of-the-art methods for uncov- ering the diffusion structure (e.g. (Rodriguez, Balduzzi, and Schölkopf 2011; Simma and Jordan 2010; Cho et al. 2013; Li and Zha 2013; Linderman and Adams 2014)) do not scale to the number of users in our dataset. This is because these methods assume that a large number of cascades oc- cur in a rather small social neighborhood, whereas in #DE- BATENIGHT cascades occur during a short period of time in a very large population of users. Our proposed algorithm es- timates influence directly from retweet cascades, without the need to reconstruct the retweet graph, and it scales cubically with the number of users. Bot presence and behavior on Twitter. The 'BotOrNot' Twitter bot detection API uses a Random Forest supervised machine learning classifier to calculate the likelihood of a given Twitter user being a bot, based on more than 1,000 features extracted from meta-data, patterns of activity, and tweet content (grouped into six main classes: user-based; friends; network; temporal; content and language; and senti- ment) (Davis et al. 2016; Varol et al. 2017)2. The bot scores are in the range [0, 1], where 0 (1) means the user is very unlikely (likely) to be a bot. BotOrNot was used to exam- ine how socialbots affected political discussions on Twitter during the 2016 U.S. presidential election (Bessi and Ferrara 2016). They found that bots accounted for approximately 15 % (400,000 accounts) of the Twitter population involved in election-related activity, and authored about 3.8 million (19 %) tweets. However, Bessi and Ferrara (2016) sampled the most active accounts, which could bias upwards their esti- mate of the presence of bots as activity volume is one of the features that is used by BotOrNot. They found that bots were just as effective as humans at attracting retweets from humans. Woolley and Guilbeault (2017) used BotOrNot to 2See: https://botometer.iuni.iu.edu/#!/ (a) (b) (c) Figure 1: Modeling latent diffusions. (a) The schema of a retweet cascade as provided by the Twitter API, in which all retweets are attributed to the original tweet. (b) Four diffusion scenarios (out of 120 possible scenarios), associated with the retweet cascade in (a). (c) Intuition of the independent conditional model. A new node v5 appears conditioned on one diffusion scenario G. Four new diffusion scenarios are generated as v5 can attach to any of the existing nodes. test 157,504 users randomly sampled from 1,798,127 Twit- ter users participating in election-related activity and found that over 10% were bots. Here we use BotOrNot to classify all 1.5 million users in our dataset to obtain a less biased approximation of their numbers and impact. Previous work has studied the political partisanship of Twitter bots. Kollanyi, Howard, and Woolley (2016) ana- lyzed candidate-oriented hashtag use during the 1st U.S. presidential debate and found that highly automated ac- counts (self-identified bots and/or accounts that post at least 50 times a day) were disproportionately pro-Trump. Bessi and Ferrara (2016) also studied political partisanship by identifying five pro-Trump and four pro-Clinton hashtags and assigning users to a particular political faction. The re- sults suggested that both humans and bots were more pro- Trump in terms of hashtag partisanship. However, the above findings are limited to a comparison between humans and bots of frequency counts of tweets authored and retweets re- ceived, and they provide no insight into the importance of users in retweet diffusions. We overcome this limitation by modeling the latent structure of retweet diffusions and com- puting user influence over all possible scenarios. 3 Estimating influence in retweet cascades An information cascade V of size n is defined as a series of messages vi sent by user ui at time ti, i.e. V = {vi = (ui, ti)}i=1:n. Here v1 = (u1, t1) is the initial message, and v1, . . . , vn with t1 < . . . < tn are subsequent reposts or relays of the initial message. In the context of Twitter, the initial message is an original tweet and the subsequent messages are retweets of that original tweet (which by def- inition, are also tweets). A latent retweet diffusion graph G = (V, E) has the set of tweets as its vertexes V , and additional edges E = {(vi, vj)} that represent that the jth tweet is a retweet of the ith tweet, and respects the tempo- ral precedence ti < tj. Web data sources such as the Twit- ter API provide cascades, but not the diffusion edges. Such missing data makes it challenging to measure a given user's contribution to the diffusion process. 3.1 Modeling latent diffusions Diffusion scenarios. We focus on tree-structured diffusion graphs, i.e. each node vj has only one incoming link (vi, vj), i < j. Denote the set of trees that are consistent with the temporal order in cascade C as G, we call each diffusion tree a diffusion scenario G ∈ G. Fig. 1a contains a cascade visualized as a star graph, attributing subsequent tweets to the first tweet at t1. Fig. 1b shows four example diffusion scenarios consistent with this cascade. The main challenge here is to estimate the influence of each user in the cascade, taking into account all possible diffusion trees. Probability of retweeting. For each tweet vj, we model the probability of it being a direct descendant of each previous tweet in the same cascade as a weighted softmax function, defined by two main factors: firstly, users retweet fresh con- tent (Wu and Huberman 2007). We assume that the probabil- ity of retweeting decays exponentially with the time differ- ence tj−ti; secondly, users prefer to retweet locally influen- tial users, known as preferential attachment (Barabási 2005; Rizoiu et al. 2017). We measure the local influence mi of a user ui using her number of followers (Kwak et al. 2010; Cha et al. 2010). We quantify the probability that vj is a di- rect retweet of vi as: (cid:80)j−1 mie−r(tj−ti) k=1 mke−r(tj−tk) pij = (1) where r is a hyper-parameter controlling the temporal de- cay. It is set to r = 6.8 × 10−4, tuned using linear search on a sample of 20 real retweet cascades (details in the supple- ment (sup 2018, annex D)). 3.2 Tweet influence in a retweet cascade We additionally assume retweets follow independent con- ditional diffusions within a cascade. This is to say that con- ditioned on an existing partial cascade of j − 1 retweets denoted as V (j−1) = {vk}j−1 k=1 whose underlying diffusion scenario is G(j−1), the jth retweet is attributed to any of the k = 1, . . . , j−1 prior tweets according to Eq. 1, and is inde- pendent of the diffusion scenario G(j−1). For example, the 5th tweet in the cascade will incur four valid diffusion trees for each of the diffusion scenarios for 4 tweets – this is illus- trated in Fig. 1c. This simplifying assumption is reasonable, as it indicates that each user j makes up his/her own mind about whom to retweet, and that the history of retweets is available to user j (as is true in the current user interface of Twitter). It is easy to see that under this model, the to- tal number of valid diffusion trees for a 5-tweet cascade is 1 · 2 · 3 · 4 = 24, and that for a cascade with n tweets is (n − 1)!. The goal for influence estimation for each cascade is to compute the contribution ϕ(vi) of each tweet vi averaging over all independent conditional diffusion trees consistent with cascade V and with edge probabilities prescribed by Eq. 1. Enumerating all valid trees and averaging is clearly computationally intractable, but the illustration in Fig. 1c lends itself to a recursive algorithm. Tractable tweet influence computation We introduce the pair-wise influence score mij which measures the in- fluence of vi over vj. vi can influence vj both directly when vj is a retweet of vi, and indirectly when a path exists from vi to vj in the underlying diffusion scenario. Let vk be a tweet on the path from vi to vj (i < k < j) so that vj is a direct retweet of vk. mik can be computed at the kth re- cursion step and it measures the influence of vi over vk over all possible paths starting with vi and ending with vk. Given the above independent diffusions assumption, the mij can be computed using mik to which we add the edge (vk, vj). User uj can chose to retweet any of the previous tweets with probability pkj, k < j, therefore we further weight the con- tribution through vk using pij. We consider that a tweet has a unit influence over itself (mii = 1). Finally, we obtain that:  (cid:80)j−1 1 0 k=i mikp2 kj mij = , i < j , i = j , i > j. (2) Naturally, ϕ(vi) the total influence of node vi is the sum of mij, j > i the pair-wise influence score of vi over all sub- sequent nodes vj. The recursive algorithm has three steps. 1. Initialization. mij = 0 for i, j = 1, . . . , n, j (cid:54)= i, and mii = 1 for i = 1, . . . , n; 2. Recursion. For j = 2, . . . , n; (a) For k = 1, . . . , j − 1, compute pkj using Eq. (1); (b) For i = 1, . . . , j − 1, mij =(cid:80)j−1 3. Termination. Output ϕ(vi) = (cid:80)n k=i mikp2 kj; k=i+1 mik, for i = 1, . . . , n. We exemplify this algorithm on a 3-tweet toy example. Consider the cascade {v1, v2, v3}. When the first tweet v1 arrives, we have m11 = 1 by definition (see Eq. (2)). After the arrival of the second tweet, which must be retweeting the first, we have m12 = m11p2 12 = 1, and m22 = 1 by definition. The third tweet can be a retweet of the first or the second, therefore we obtain: m13 =m11p2 m23 =m22p2 m33 =1 . 13 + m12p2 23 ; 23 ; The second term of m13 accounts for the indirect influence of v1 over v3 through v2. This is the final step for a 3-node cascade. The computational complexity of this algorithm is O(n3). There are n recursion steps, and calculating pij at sub-step (a) needs O(n) units of computation, and sub-step (b) takes O(n2) steps. In real cascades containing 1000 tweets, the above algorithm finishes in 34 seconds on a PC. For more details and examples, see the online supplement (sup 2018, annex B). 3.3 Computing influence of a user Given T (u) – the set of tweets authored by user u –, we define the user influence of u as the mean tweet influence of tweets v ∈ T (u): (cid:80) ϕ(u) = v∈T (u) ϕ(v) T (u) ,T (u) = {vuv = u} (3) To account for the skewed distribution of user influence, we mostly use the normalization – percentiles with a value of 1 for the most influential user our dataset and 0 for the least influential – denoted ϕ(u)% . 4 Dataset and measures of political behavior In this section, we first describe the #DEBATENIGHT dataset that we collected during the 1st U.S. presidential de- bate. Next, we introduce three measures for analyzing the political behavior of users who were active on Twitter dur- ing the debate. In Sec. 4.1, we introduce political polariza- tion P and political engagement E. In Sec. 4.2 we introduce the botness score ζ and we describe how we construct the reference bot and human populations. The #DEBATENIGHT dataset contains Twitter discus- sions that occurred during the 1st 2016 U.S presiden- tial debate between Hillary Clinton and Donald Trump. Using the Twitter Firehose API3, we collected all the tweets (including retweets) that were authored during the two hour period from 8.45pm to 10.45pm EDT, on 26 September 2016, and which contain at least one of the hashtags: #DebateNight, #Debates2016, #election2016, #HillaryClinton, #Debates, #Hillary2016, #DonaldTrump and #Trump2016. The time range includes the 90 minutes of the presidential debate, as well as 15 minutes before and 15 minutes after the debate. The resulting dataset contains 6,498,818 tweets, emitted by 1,451,388 twitter users. For each user, the Twit- ter API provides aggregate information such as the number of followers, the total number (over the lifetime of the user) of emitted tweets, authored retweets, and favorites. For in- dividual tweets, the API provides the timestamp and, if it is 3Via the Uberlink Twitter Analytics Service. lyzed within context, our content analysis methodology fo- cussed on three units of analysis (following the approach de- veloped by Small (2011)). The first is hashtags, comprised of a set of the 1000 most frequently occurring hashtags over all tweets in our dataset. The second unit of analysis was individual tweets that contained these hashtags. In or- der to gain a more nuanced and 'situated' interpretation of hashtag usage, for each hashtag we referred to a small ran- dom sample of tweets in our dataset that contained each given hashtag. In some instances the polarity (or neutral- ity) was clear and/or already determined from previous stud- ies, which helped to speed up the analysis of tweets. The third unit of analysis was user profiles, which we referred to in situations where the polarity or neutrality of a given hashtag was unclear from the context of tweet analysis. For example, #partyoflincoln was used by both Republican and Democrat Twitter users, but an analysis of both tweets and user profiles indicated that this hashtag was predominantly used by Pro-Trump supporters to positively align the Re- publican Party with the renowned historical figure of Pres- ident Abraham Lincoln, who was a Republican. The con- tent analysis resulted in a subset of 93 pro-Democrat and 86 pro-Republican hashtags (see the wordcloud visualization in Fig. 2), whilst the remaining 'neutral' hashtags were subse- quently excluded from further analysis. The resulting parti- san hashtag list contains hashtags indicating either strong support for a candidate (e.g., #imwithher for Clinton and #trump2016 for Trump), or opposition and/or antag- onism (e.g., #nevertrump and #crookedhillary). The complete list of partisan hashtags is publicly available in the Github repository. Two measures of political behavior. We identify 65,031 tweets in #DEBATENIGHT that contain at least one partisan hashtag (i.e., one of hashtags in the reference set of parti- san hashtags constructed earlier). 1,917 tweets contain par- tisan hashtags with both polarities: these are mostly negative tweets towards both candidates (e.g., "Let's Get READY TO RUMBLE AND TELL LIES. #nevertrump #neverhillary #Obama") or hashtag spam. We count the number of occur- rences of partisan hashtags for each user, and we detect a set of 46,906 politically engaged users that have used at least one partisan hashtag. Each politically engaged user ui has two counts: demi the number of Democrat hashtags that ui used, and repi the number of Republican hashtags. We mea- sure the political polarization as the normalized difference between the number of Republican and Democrat hashtags used: . (4) P(ui) takes values between −1 (if ui emitted only Demo- crat partisan hashtags) and 1 (ui emitted only Republican hashtags). We threshold the political polarization to con- struct a population of Democrat users with P(u) ≤ −0.4 and Republican users with P(u) ≥ 0.4. In the set of po- litically engaged users, there are 21,711 Democrat users, 22,644 Republican users and 2,551 users with no polariza- tion (P(u) ∈ (−0.4, 0.4)). We measure the political engage- ment of users using the total volume of partisan hashtags in- cluded in their tweets E(ui) = repi + demi. P(ui) = repi − demi repi + demi Figure 2: Wordclouds of partisan hashtags in #DE- BATENIGHT: Democrat (top) and Republican (bottom). Hashtags sizes are scaled by their frequency. a retweet, the original tweet that started the retweet cascade. The #DEBATENIGHT dataset contains 200,191 retweet dif- fusions of size 3 and larger. 4.1 Political polarization P and engagement E Protocol. Content analysis (Kim and Kuljis 2010) was used to code the 1000 most frequently occurring hashtags according to their political polarity. More specifically, we used Directed Content Analysis (Hsieh and Shannon 2005) to contextually analyse hashtags and code them according to their political polarity (or not, denoted as 'neutral' and sub- sequently excluded from analysis). This approach has been used in previous work to study hashtags on Twitter in a man- ner that is valid, reliable and replicable (Small 2011). There were two previous studies of Twitter activity during the 2016 U.S. presidential election that informed the develop- ment of our coding schema. Firstly, Bessi and Ferrara (2016) devised a binary classification scheme that attributed po- litical partisanship to a small set of key hashtags as ei- ther 'Trump-supporting' (#donaldtrump, #trump2016, #nev- erhillary, #trumppence16, #trump) or 'Clinton-supporting' (#hillaryclinton, #imwithher, #nevertrump, #hillary). Sec- ondly, in studying Twitter activity during the 1st U.S. pres- idential debate, Kollanyi, Howard, and Woolley (2016) de- veloped a coding schema that categorized tweets into seven categories based on the hashtags that occurred within the tweet. However, the authors found that three 'exclusive' categories ('Pro-Trump', 'Pro-Clinton', and 'Neutral') ac- counted for the majority (88.5%) of observations. Given the findings of previous research, we developed a code book with three categories: 'Pro-Trump', 'Pro- Clinton', and 'Neutral'. To ensure that hashtags were ana- Table 1: Tabulating population volumes and percent- ages of politically polarized users over four populations: Protected, Human, Suspended and Bot. All Prot. Human Susp. 10,162 265 111 154 Bot 17,561 All 1,451,388 435 44,299 185 21,676 22,623 250 48.93% 46.99% 44.90% 41.89% 42.53% 51.07% 53.01% 55.10% 58.11% 57.47% 45,316 499,822 1,245 11,972 5,376 585 660 6,596 Polarized Democrat Republican Dem. % Rep. % 4.2 Botness score ζ and bot detection Detecting automated bots. We use the BotOrNot (Davis et al. 2016) API to measure the likelihood of a user be- ing a bot for each of the 1,451,388 users in the #DE- BATENIGHT dataset. Given a user u, the API returns the botness score ζ(u) ∈ [0, 1] (with 0 being likely human, and 1 likely non-human). Previous work (Varol et al. 2017; Bessi and Ferrara 2016; Woolley and Guilbeault 2017) use a botness threshold of 0.5 to detect socialbots. However, we manually checked a random sample of 100 users with ζ(u) > 0.5 and we found several human accounts be- ing classified as bots. A threshold of 0.6 decreases mis- classification by 3%. It has been previously reported by Varol et al. (2017) that organizational accounts have high botness scores. This however is not a concern in this work, as we aim to detect 'highly automated' accounts that behave in a non-human way. We chose to use a threshold of 0.6 to construct the Bot population in light of the more encom- passing notion of account automation. Four reference populations. In addition to the Bot pop- ulation, we construct three additional reference populations: Human ζ(u) ≤ 0.2 contains users with a high likelihood of being regular Twitter users. Protected are the users whose profile has the access restricted to their followers and friends (the BotOrNot system cannot return the botness score); we consider these users to be regular Twitter users, since we assume that no organization or broadcasting bot would restrict access to their profile. Suspended are those users which have been suspended by Twitter between the date of the tweet collection (26 September 2016) and the date of retrieving the botness score (July 2017); this popu- lation has a high likelihood of containing bots. Table 1 tab- ulates the size of each population, split over political polar- ization. 5 Evaluation of user influence estimation In this section, we evaluate our proposed algorithm and measure of user influence. In Sec 5.1, we evaluate on syn- thetic data against a known ground truth. In Sec. 5.2, we compare the ϕ(u) measure (defined in Sec. 3.3) against two alternatives: the number of followers and the mean size of initiated cascades. (a) (b) (c) Figure 3: Evaluation of the user influence measure. (a) 2D density plot (shades of blue) and scatter-plot (gray circles) of user influence against the ground truth on a synthetic dataset. (b)(c) Hexbin plot of user influence percentile (x- axis) against mean cascade size percentile (b) and the num- ber of followers (c) (y-axis) on #DEBATENIGHT. The color intensity indicates the number of users in each hex bin. 1D histograms of each axis are shown using gray bars. Note 72.3% of all users that initiate cascades are never retweeted. 5.1 Evaluation of user influence Evaluating user influence on real data presents two ma- jor hurdles. The first is the lack of ground truth, as user in- fluence is not directly observed. The second hurdle is that the diffusion graph is unknown, which renders impossible comparing to state-of-the-art methods which require this in- formation (e.g. ConTinEst (Du et al. 2013)). In this section, evaluate our algorithm against a known ground truth on a synthetic dataset, using the same evaluation approach used for ConTinEst. Evaluation on synthetic data. We evaluate on synthetic data using the protocol previously employed in (Du et al. 2013). We use the simulator in (Du et al. 2013) to generate an artificial social network with 1000 users. We then simu- late 1000 cascades through this social network, starting from the same initial user. The generation of the synthetic social network and of the cascades is detailed in the online supple- ment (sup 2018, annex C). Similar to the retweet cascades in #DEBATENIGHT, each event in the synthetic cascades has a timestamp and an associated user. Unlike the real retweet cascades, we know the real diffusion structure behind each 0.50.70.90.250.500.751.00User influence %Mean cascade size %User influence vs. mean cascade size1204038103162754count0.000.250.500.751.000.250.500.751.00Number of followers %User influence vs. no. of followerscount8103403201User influence % (a) (b) (c) (d) (e) Figure 4: Profiling behavior of the Protected, Human, Suspended and Bot populations in the #DEBATENIGHT dataset. The numbers in parentheses in the legend are mean values. (a) CCDF of the number of Twitter diffusion cascades started. (b) CCDF of the number of retweets. (c)(d) CCDF (c) and boxplots (d) of the number of followers. (e) Number of items favorited. synthetic cascade. For each user u, we count the number of nodes reachable from u in the diffusion tree of each cascade. We compute the influence of u as the mean influence over all cascades. ConTinEst (Du et al. 2013) has been shown to asymptotically approximate this synthetic user influence. We use our algorithm introduced in Sec. 3.2 on the syn- thetic data, to compute the measure ϕ(u) defined in Eq. 3. We plot in Fig. 3a the 2D scatter-plot and the density plot of the synthetic users, with our influence measure ϕ on the y- axis and the ground truth on the x-axis (both in percentiles). Visibly, there is a high agreement between the two measures, particularly for the most influential and the least influential users. The Spearman correlation coefficient of the raw val- ues is 0.88. This shows that our method can output reliable user influence estimates in the absence of any information about the structure of the diffusions. 5.2 Comparison with other influence metrics We compare the influence measure ϕ(u) against two al- ternatives that can be computed on #DEBATENIGHT. Mean size of initiated cascades (of a user u) is the av- erage number of users reached by original content authored by u. It should be noted that this measure does not capture u's role in diffusing content authored by someone else. In the context of Twitter, mean size of initiated cascades is the average number of users who retweeted an original tweet authored by u: we compute this for every user in the #DE- BATENIGHT dataset, and we plot it against ϕ(u) in Fig. 3b. Few users have a meaningful value for mean cascade size: 55% of users never start a cascades (and they are not ac- counted for in Fig. 3b); out of the ones that start cascades 72.3% are never retweeted and they are all positioned at the lowest percentile (shown by the 1D histograms in the plot). It is apparent that the mean cascade size metric detects the in- fluential users that start cascades, and it correlates with ϕ(u). However, it misses highly influential users who never initi- ate cascades, but who participate by retweeting. Examples are user @SethMacFarlane (the actor and filmmaker Seth MacFarlane, 10.8 million followers) or user @michaelian- black (comedian Michael Ian Black, 2.1 million followers), both with ϕ in the top 0.01% most influential users. Number of followers is one of the simplest measures of direct influence used in literature (Mishra, Rizoiu, and Xie 2016; Zhao et al. 2015). While being loosely correlated with ϕ(u) (visible in Fig. 3c, Pearson r = 0.42), it has the drawback of not accounting for any of the user actions, such as an active participation in discussions or generating large retweet cascades. For example, user @PoliticJames (alt-right and pro-Trump, 2 followers) emitted one tweet in #DEBATENIGHT, which was retweeted 18 times and placing him in the top 1% most influential users. Similarly, user @ti- wtter1tr4_tv (now suspended, 0 followers) initiated a cas- cade of size 58 (top 1% most influential). Interestingly, half of the accounts scoring on the bottom 1% by number of fol- lowers and top 1% by influence are now suspended or have very high botness scores. 6 Results and findings In this section, we present an analysis of the interplay be- tween botness, political behavior (polarization and engage- ment) and influence. In Sec. 6.1, we first profile the activity of users in the four reference populations; next, we analyze the political polarization and engagement, and their relation with the botness measure. Finally, in Sec. 6.2 we tabulate user influence against polarization and botness, and we con- struct the polarization map. 6.1 Political behavior of humans and bots Twitter activity across four populations. We measure the behavior of users in the four reference populations de- fined in Sec. 4.1 using several measures computed from the Twiter API. The number of cascades started (i.e., number of original tweets) and the number of posted retweets are simple measures of activity on Twitter, and they are known to be long-tail distributed (Cha et al. 2010). Fig. 4a and 4b respectively plot the log-log plot of the empirical Comple- mentary Cumulative Distribution Function (CCDF) for each of the two measures. It is apparent that users in the Bot and Suspended populations exhibit higher levels of ac- tivity than the general population, whereas the Human and Protected populations exhibit lower level. Fig. 4c and 4d plot the number of followers and present a more nuanced story: the average bot user has 10 times more followers than the average human user; however, bots have a median of 190 followers, less than the median 253 followers of human users. In other words, some bots are very highly followed, 0501001502002501e−061e−041e−02Number of cascades startedNumber of cascades startedEmpirical CCDFAll (1.7)protected (1.1)human (1.5)suspended (2.3)bot (2)1e+000501001502002503003501e−061e−041e−021e+00Number of retweetsNumber of retweetsEmpirical CCDFAll (2.9)protected (2.7)human (2.1)suspended (3.8)bot (2.6)1e+021e+041e+061e+081e−061e−041e−021e+00Number of followersNumber of followersEmpirical CCDFAll (2,610)protected (786)human (414)suspended (2,581)bot (20,572)0100020003000400050006000Number of followersNumber of followersAll (2,610)protected (786)human (414)suspended (2,582)bot (20,572)Allprotectedsuspendedbothuman05000100001500020000Number of favoritedNumber of favorited itemsAll (5,096)protected (5,614)human (4,449)suspended (8,343)bot (4,594)Allprotectedsuspendedbothuman (a) (b) (c) (d) which will be greatly enhanced in the context of a politi- cal debate. Fig. 5b presents the log-log plot of the CCDF of the political engagement, which shows that the political en- gagement score is long-tail distributed, with pro-Democrats slightly more engaged than pro-Republicans overall (t-test significant, p-val = 0.0012). Botness and political polarization. The distribution of botness ζ exhibits a large peak around [0.1, 0.4] and a long tail (Fig. 5c). The dashed gray vertical lines show the thresh- holds used in Sec. 4.2 for constructing the reference Human (ζ ∈ [0, 0.2]) and Bot (ζ ∈ [0.6, 1]) populations. Fig. 5d shows the conditional density of polarization conditioned on botness. For both high botness scores (i.e., bots) and low bot- ness scores (humans) the likelihood of being pro-Republican is consistently higher than that of being pro-Democrat, while users with mid-range botness are more likely to be pro- Democrat. In other words, socialbots accounts are more likely to be pro-Republican than to be pro-Democrat. Political engagement of bots. Fig. 5e shows the CCDF of political engagement of the four reference populations, and it is apparent that the Bot and Suspended popula- tions exhibit consistently higher political engagement than the Human and Protected populations. Fig. 5f shows the CCDF of political engagement by the political partisanship of bots and we find that pro-Republican Bot accounts are more politically engaged than their pro-Democrat counter- parts. In summary, socialbots are more engaged than hu- mans (p-val = 8.55 × 10−5), and pro-Republican bots are more engaged than their pro-Democrat counterparts (p-val = 0.1228). 6.2 User influence and polarization map (e) (f) Figure 5: Political polarization, engagement and botness. (a) The density distribution of political polarization P. (b) Log-log plot of the CCDF of political engagement E for the Democrat and Republican populations. (c) The density dis- tribution of botness ζ for the entire population (solid line) and the politically polarized population (dashed line). (d) The conditional density of polarization conditioned on bot- ness. The top panel shows the volumes of politically polar- ized users in 30 bins. (e)(f) CCDF of political engagement for the reference populations (e) and for the polarized Bot populations (f). but most are simply ignored. Finally, Fig. 4e shows that bots favorite less than humans, indicating that their activity pat- terns differ from those of humans. Political polarization and engagement. The density distribution of political polarization (Fig. 5a) shows two peaks at -1 and 1, corresponding to strongly pro-Democrat and strongly pro-Republican respectively. The shape of the density plot is consistent with the sizes of Republican and Democrat populations (Sec. 4.1), and the extreme bi- modality can be explained by the clear partisan nature of the chosen hashtags and by the known political polarization of users on Twitter (Conover et al. 2011; Barberá et al. 2015), User influence across four populations. First, we study the distribution of user influence across the four reference populations constructed in Sec. 4.2. We plot the CCDF in Fig. 6a and we summarize user influence as boxplots in Fig. 6b for each population. User influence ϕ is long- tail distributed (shown in Fig. 6a) and it is higher for Bot and Suspended populations, than for Human and Protected (shown in Fig 6b). There is a large discrepancy between the influence of Human and Bot (p-val = 0.0025), with the average bot having 2.5 times more influence than the average human. We further break down users in the Bot population based on their political polarization. Fig. 6d aggregates as boxplots the influence of pro-Democrat and pro-Republican bots (note: not all bots are politically polar- ized). Notably, on a per-bot basis, pro-Republican bots are more influential than their pro-Democrat counterparts (p-val = 0.0096) – the average pro-Republican bot is twice as in- fluential as the average pro-Democrat bot. Political polarization and user influence. Next, we ana- lyze the relation between influence and polarization. Fig. 6c plots the probability distribution of political polarization, conditioned on user influence ϕ%. While for mid-range in- fluential users (ϕ% ∈ [0.4, 0.8]) the likelihood of being Re- publican is higher than being Democrat, we observe the in- verse situation on the higher end of the influence scale. Very highly influential users (ϕ% > 0.8]) are more likely to be pro-Democrat, and this is consistent with the fact that many −1.0−0.50.00.51.001234Density distribution of political polarizationPolitical polarizationDensityDemocratRepublican1251020501005e−051e−045e−041e−035e−031e−025e−021e−01Political engagement vs. political polarizationEmpirical CCDFAll Democrat Republican Political engagement0.00.20.40.60.81.00123Botness densityDensityAll usersPoliticallypolarizedBotsHumansBotnessPolitical polarizationconditioned on botnessPolitical polarization0.00.20.40.60.8DemocratRepublican0.00.20.40.60.81.00200040006000Botness1251020501005e−051e−045e−041e−035e−031e−025e−021e−01Political engagement (4 populations)Empirical CCDFAllprotectedhumansuspendedbotPolitical engagement1251020500.0020.0050.0100.0200.0500.1000.200Political engagement vs. political polarization of botsEmpirical CCDFAll botsDemocrat botsRepublican botsPolitical engagement (a) (b) (c) (d) Figure 6: Profiling influence, and linking to botness and political behavior. (a)(b) User influence ϕ(u) for the reference popula- tions, shown as log-log CCDF plot (a) and boxplots (b). (c) Probability distribution of polarization, conditional on ϕ(u)%. (d) Boxplots of user influence for the pro-Democrat and pro-Republican Bot users. Numbers in parenthesis show mean values. high botness scores. We compute the 2D density estimates for the pro-Democrat and pro-Republican users (shown in the online supplement (sup 2018, annex E)). For each point in the space (ϕ%, ζ) we compute a score as the log of the ratio between the density of the Republican users and that of the pro-Democrats, which is then renormalized so that values range from -1 (mostly Democrat) to +1 (mostly Re- publican). The resulting map – dubbed the polarization map – is shown in Fig. 7 and it provides a number of insights. Three areas of interest (A, B and C) are shown on Fig. 7. Area A is a pro-Democrat area corresponding to highly in- fluential users (already shown in Fig. 6c) that spans across most of the range of botness values. Area B is the largest predominantly pro-Republican area and it corresponds to mid-range influence (also shown in Fig. 6c) and concentrates around small botness values – this indicates the presence of a large pro-Republican population of mainly human users with regular user influence. Lastly, we observe that the top- right area C (high botness and high influence) is predomi- nantly red: In other words highly influential bots are mostly pro-Republican. 7 Discussion In this paper, we study the influence and the political be- havior of socialbots. We introduce a novel algorithm for es- timating user influence from retweet cascades in which the diffusion structure is not observed. We propose four mea- sures to analyze the role and user influence of bots versus humans on Twitter during the 1st U.S. presidential debate of 2016. The first is the user influence, computed over all possible unfoldings of each cascade. Second, we use the BotOrNot API to retrieve the botness score for a large num- ber of Twitter users. Lastly, by examining the 1000 most frequently-used hashtags we measure political polarization and engagement. We analyze the interplay of influence, bot- ness and political polarization using a two-dimensional map – the polarization map. We make several novel findings, for example: bots are more likely to be pro-Republican; the av- erage pro-Republican bot is twice as influential as its pro- Democrat counterpart; very highly influential users are more likely to be pro-Democrat; and highly influential bots are Figure 7: Political polarization by user influence ϕ(u)% (x- axis) and bot score ζ (y-axis). The gray dashed horizontal line shows the threshold of 0.6 above which a user is con- sidered a bot. The color in the map shows political polariza- tion: areas colored in bright blue (red) are areas where the Democrats (Republicans) have considerably higher density than Republicans (Democrats). Areas where the two popu- lations have similar densities are colored white. Three areas of interest are shown by the letter A, B and C. public figures were supportive of the Democrat candidate during the presidential campaign. The polarization map. Finally, we create a visualiza- tion that allows us to jointly account for botness and user influence when studying political partisanship. We project each politically polarized user in #DEBATENIGHT onto the two-dimensional space of user influence ϕ% (x-axis) and botness ζ (y-axis). The y-axis is re-scaled so that an equal length interval around any botness value contains the same amount of users, This allows to zoom in into denser areas like ζ ∈ [0.2, 0.4], and to deal with data sparsity around 1101001000100001e−061e−041e−021e+00AllprotectedhumansuspendedbotEmpirical CCDFUser influenceUser influenceAllprotectedsuspendedbot1.001.011.021.031.041.051.06User influenceAll (1.25)protected (1.08)human (1.08)suspended (1.47)bot (2.71)humanUser influencePolitical polarizationconditioned on user influence0.30.40.50.60.70.80.90.00.20.40.60.81.0Political polarizationDemocratRepublicanUser influence %AllDemocratRepublican1.01.21.41.61.82.0Bot influence over political biasAll bots (2.71)Democrat bots(1.43)Republican bots (3.53)User influence0.30.40.50.60.70.80.91.0Polarizationmap100020001000200030004000−1.0−0.50.00.51.0DemocratRepublican0.110.150.180.210.240.270.300.340.411.000.6BotnessUser influence %ACB mostly pro-Republican. Validity of analysis with respect to BotOrNot. The BotOrNot algorithm uses tweet content and user activity pat- terns to predict botness. However, this does not confound the conclusions presented in Sec. 6. First, political behav- ior (polarization and engagement) is computed from a list of hashtags specific to #DEBATENIGHT, while the BotOrNot predictor was trained before the elections took place and it has no knowledge of the hashtags used during the debate. Second, a loose relation between political engagement and activity patterns could be made, however we argue that en- gagement is the number of used partisan hashtags, not tweets – i.e. users can have a high political engagement score after emitting few very polarized tweets. Assumptions, limitations and future work. This work makes a number of simplifying assumptions, some of which can be addressed in future work. First, the delay between the tweet crawling (Sept 2016) and computing botness (July 2017) means that a significant number of users were sus- pended or deleted. A future application could see simul- taneous tweets and botscore crawling. Second, our binary hashtag partisanship characterization does not account for independent voters or other spectra of democratic participa- tion, and future work could evaluate our approach against a clustering approach using follower ties to political actors (Barberá et al. 2015). Last, this work computes the expected influence of users in a particular population, but it does not account for the aggregate influence of the population as a whole. Future work could generalize our approach to entire populations, which would allow answers to questions like "Overall, were the Republican bots more influential than the Democrat humans?". Acknowledgments. This research is sponsored in part by the Air Force Research Laboratory, under agreement number FA2386-15-1-4018. References [Barabási 2005] Barabási, A.-L. 2005. The origin of bursts and heavy tails in human dynamics. Nature 435(7039):207–11. [Barberá et al. 2015] Barberá, P.; Jost, J. T.; Nagler, J.; Tucker, J. A.; and Bonneau, R. 2015. Tweeting from left to right: Is online political communication more than an echo chamber? Psychologi- cal Science 26(10):1531–1542. [Bessi and Ferrara 2016] Bessi, A., and Ferrara, E. 2016. Social bots distort the 2016 u.s. presidential election online discussion. First Monday 21(11). [Cha et al. 2010] Cha, M.; Haddadi, H.; Benevenuto, F.; and Gum- madi, K. P. 2010. Measuring User Influence in Twitter: The Million Follower Fallacy. In ICWSM '10, volume 10, 10–17. [Chikhaoui et al. 2017] Chikhaoui, B.; Chiazzaro, M.; Wang, S.; and Sotir, M. 2017. Detecting communities of authority and an- alyzing their influence in dynamic social networks. ACM Trans. Intell. Syst. Technol. 8(6):82:1–82:28. [Cho et al. 2013] Cho, Y.-S.; Galstyan, A.; Brantingham, P. J.; and Tita, G. 2013. Latent self-exciting point process model for spatial- temporal networks. Disc. and Cont. Dynamic Syst. Series B. Jenna [Collins and Cox 2017] Collins, B., and Cox, J. abrams, russia's clown troll princess, duped the mainstream media and the world. Dailybeast.com. 2017. [Conover et al. 2011] Conover, M. D.; Ratkiewicz, J.; Francisco, M.; Goncalves, B.; Menczer, F.; and Flammini, A. 2011. Politi- cal polarization on Twitter. In ICWSM'11, 89–96. AAAI. [Davis et al. 2016] Davis, C. A.; Varol, O.; Ferrara, E.; Flammini, A.; and Menczer, F. 2016. Botornot: A system to evaluate social bots. In WWW Companion, 273–274. ACM. [Du et al. 2013] Du, N.; Song, L.; Gomez-Rodriguez, M.; and Zha, H. 2013. Scalable Influence Estimation in Continuous-Time Dif- fusion Networks. In NIPS'13, 3147–3155. [Gehl and Bakardjieva 2016] Gehl, R., and Bakardjieva, M. 2016. Socialbots and Their Friends: Digital Media and the Automation of Sociality. [Hsieh and Shannon 2005] Hsieh, H.-F., and Shannon, S. E. 2005. Three approaches to qualitative content analysis. Qualitative Health Research 15(9):1277–1288. [Kim and Kuljis 2010] Kim, I., and Kuljis, J. 2010. Applying con- tent analysis to web-based content. Jour. of Comp. and Inf. Tech. 18(4):369–375. [Kollanyi, Howard, and Woolley 2016] Kollanyi, B.; Howard, P. N.; and Woolley, S. C. 2016. Bots and automation over Twitter during the first U.S. presidential debate: Comprop data memo 2016.1. Oxford, UK. [Kwak et al. 2010] Kwak, H.; Lee, C.; Park, H.; and Moon, S. 2010. What is Twitter, a social network or a news media? In WWW'10, 591–600. [Li and Zha 2013] Li, L., and Zha, H. 2013. Dyadic event attri- bution in social networks with mixtures of hawkes processes. In CIKM'13, 1667–1672. ACM. [Linderman and Adams 2014] Linderman, S., and Adams, R. 2014. Discovering latent network structure in point process data. In ICML'14, 1413–1421. [Mishra, Rizoiu, and Xie 2016] Mishra, S.; Rizoiu, M.-A.; and Xie, L. 2016. Feature driven and point process approaches for popular- ity prediction. In CIKM'16, 1069–1078. [Page et al. 1999] Page, L.; Brin, S.; Motwani, R.; and Winograd, T. 1999. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford InfoLab. [Rizoiu et al. 2017] Rizoiu, M.-A.; Xie, L.; Sanner, S.; Cebrian, M.; Yu, H.; and Van Hentenryck, P. 2017. Expecting to be HIP: Hawkes Intensity Processes for Social Media Popularity. In WWW'17, 735– 744. [Rodriguez, Balduzzi, and Schölkopf 2011] Rodriguez, M. G.; Bal- duzzi, D.; and Schölkopf, B. 2011. Uncovering the Temporal Dy- namics of Diffusion Networks. In ICML'11, 561–568. [Rozenshtein and Gionis 2016] Rozenshtein, P., and Gionis, A. In ECML-PKDD'16, 674–689. 2016. Springer. [Simma and Jordan 2010] Simma, A., and Jordan, M. I. Modeling events with cascades of poisson processes. UAI'10. [Small 2011] Small, T. A. 2011. WHAT THE HASHTAG? A con- tent analysis of Canadian politics on Twitter. Information, Commu- nication & Society 14(6):872–895. [sup 2018] 2018. Appendix: #DebateNight: The role and influ- ence of socialbots on Twitter during the 1st 2016 U.S. presi- dential debate. https://arxiv.org/pdf/1802.09808. pdf#page=11. [Timberg, Dwoskin, and Entous 2017] Timberg, C.; Dwoskin, E.; and Entous, A. 2017. Russian Twitter account pretending to be tennessee gop fools celebrities, politicians. Chicagotribune. com. Temporal pagerank. 2010. [Varol et al. 2017] Varol, O.; Ferrara, E.; Davis, C. A.; Menczer, F.; and Flammini, A. 2017. Online human-bot interactions: Detection, estimation, and characterization. In ICWSM'17, 280–289. AAAI. [Weng et al. 2010] Weng, J.; Lim, E.-P.; Jiang, J.; and He, Q. 2010. Twitterrank: finding topic-sensitive influential twitterers. In WSDM'10, 261–270. ACM. [Woolley and Guilbeault 2017] Woolley, S. C., and Guilbeault, D. 2017. Computational propaganda in the united states of america: Manufacturing consensus online: Working paper 2017.5. [Wu and Huberman 2007] Wu, F., and Huberman, B. A. 2007. Nov- elty and collective attention. PNAS 104(45):17599–601. [Yates, Joselow, and Goharian 2016] Yates, A.; Joselow, J.; and Go- harian, N. 2016. The news cycle's influence on social media activ- ity. In ICWSM'16. [Zhao et al. 2015] Zhao, Q.; Erdogdu, M. A.; He, H. Y.; Rajaraman, A.; and Leskovec, J. 2015. SEISMIC: A Self-Exciting Point Pro- cess Model for Predicting Tweet Popularity. In KDD'15. Contents (Appendix) A Derivation of the influence formula A.1 Diffusion scenarios . . . . . . . . . . . A.2 Computing tweet influence . . . . . . . . . . . B Efficient tweet influence computation B.1 Complete derivation of the recursive influ- . . . . . . . . B.2 Tweet influence algorithm . . . . . . . ence formula . . . . . . . . . . C Generation of synthetic data C.1 Generation of random graphs . . . . . . C.2 Sampling synthetic cascades . . . . . . . . . . D Choosing the temporal decay parameter E Additional 2D densities plots 11 11 12 13 13 14 14 14 16 16 16 A Derivation of the influence formula In this section, we detail the calculation of the tweet in- fluence ϕ(v), proposed in Sec. 3. In Sec. A.1, we define the notion of diffusion scenario, and we compute its likelihood given an observed retweet cascade. In Sec. A.2, we compute the formula for tweet influence over all possible diffusion scenarios associated with the given cascade. A.1 Diffusion scenarios Diffusion trees. We can represent an online diffusion us- ing a directed tree G(V, E), in which each node has a single parent and the direction of the edges indicates the flow of the information. For retweet cascades, the nodes v ∈ V are in- dividual tweets and each directed edge e ∈ E, e = {va, vb} (showing the direction va −→ vb) indicates that vb is a direct retweet of va. A direct retweet means that ub – the user that emitted the tweet vb – clicked on the "Retweet" option under tweet va. The top panel of Fig. 8a shows an example of such a diffusion tree. Note that each node v has associated a time of arrival tv and that the diffusion tree respects the order of the times of arrival – i.e. given the edge e = {va, vb}, then ta < tb. The bottom panel of Fig. 8a shows the incremental construction of the diffusion tree shown in top panel: node v1 is the root of the tree and the source of the information diffusion; at each time ti, node vi attaches to the previous tree constructed at time ti−1. Diffusion scenarios for retweet cascades. The diffusion tree is not observed for real Twitter retweet cascades, since the Twitter API does not expose the direct retweet relation- ships. Instead, it assigns every retweet in the cascade to the original tweet. Every retweet cascades constructed based on raw retweet information from the Twitter API resembles the graph in Fig. 1a. Due to this particular shape, we denote retweet cascades as stars. However, the API exposes the time of arrival of the retweets ti. We denote as a diffusion scenario any valid diffusion tree that could be associated with the observed retweet star – i.e., the edges in the dif- fusion tree respects the order of arrival of retweets. Fig. 1b (a) (b) Figure 8: (a) An example of a diffusion tree (top) and its corresponding incremental diffusion process (bottom). (b) Enumera- tion of all possible diffusion scenarios: each retweet vk arrives at time tk, and it can attach to any of the previous nodes, in any of the diffusion scenario constructed at time tk−1. At time tk there are (k − 1)! diffusion scenarios, each with k nodes. shows four examples of diffusion scenarios associated with the star in Fig. 1a. Constructing diffusion scenarios. Fig. 8b exemplifies a straight-forward method to enumerate all diffusion scenarios associated with the star in Fig. 1a. The node v1 is the root node and it is published at time t1; tweet v2 occurs at time t2 and it is undoubtedly a direct retweet of v1 – a directed edge is drawn from v1 to v2. Tweet v3 observed at t3 can be a direct retweet of either tweet v1 or tweet v2. Therefore, at time t3 there are two possible diffusion scenarios: G1 with the edge set E = {{v1, v2},{v1, v3}} and G2 with the edge set E = {{v1, v2},{v2, v3}}. Similarly, v4 can be a direct retweet of v1, v2 or v3, in either G1 or G2. Consequently, at time t4 there are 6 possible diffusion scenarios. The pro- cess continues until all nodes have been attached. For an ob- served star of size k, there are (k − 1)! associated diffusion scenarios. Probability of a diffusion scenario. Given that in retweet cascades individual edges are not observed, we define the probability of an edge P({va, vb}) as the likelihood that ub emitted tweet vb as a direct retweet of va. We model two factors in the likelihood of retweeting: firstly, users retweet Table 2: Summary of notations. Notation G(V, E) v ∈ V Interpretation diffusion tree. In case the tree is unob- served, G is a diffusion scenario. node in the diffusion tree (i.e. retweets). e = {va, vb} ∈ E directed edge in the diffusion tree, tweet vb tv uv mv is a direct retweet of va. time of arrival of node v (timestamp of the tweet). user that has emitted tweet v. local influence (i.e. number of followers) of user uv. fresh content (Wu and Huberman 2007). The probability of the edge e decays exponentially with the time difference tb− ta; secondly, users prefer to retweet locally influential users, also known as preferential attachment (Barabási 2005). We measure the local influence of a user using his number of followers (Kwak et al. 2010; Cha et al. 2010; Rizoiu et al. 2017). We quantify the probability of an edge as: P({va, vb}) = mae−r(tb−ta) (5) where ma is the number of followers of the user of ua and r controls the temporal decay of the probability. Under the assumption that retweeting events (i.e. edges) occur independently one from another, we obtain the proba- bility of a diffusion scenario as: P(G) = {va,vb}∈E P({va, vb}) (6) (cid:89) Note that the above assumption of independence of retweet events is a strong assumption. Current state-of-the- art approaches (Mishra, Rizoiu, and Xie 2016; Zhao et al. 2015) for modeling retweet cascades employ self-exciting point processes, in which the arrival of one event increases the probability of future events. However, for our applica- tion of estimating the probability of a diffusion scenario it is the simplest assumption. Additional arguments in its favor are also that we are studying networks of events (in which each event is identified with unique user), not networks of users. The interdependence often observed in socially gen- erated networks (like triadic closure) can be ignored in edge formation within a particular retweet cascade. A.2 Computing tweet influence (Du et al. 2013) define user influence of a user u as the average number of users in the social network who get in contact with the content emitted by u. For retweet cascades the diffusion tree is not observed; it is impossible to directly measure user influence, apart from the root user. We define the tweet influence over a retweet cascade as the expected number of time it is retweeted – direct retweets or descen- dants in a diffusion scenario –, over all possible diffusion scenarios associated with the given star. Finally, we com- pute the influence of user u as the sum of the influences of the tweets that u authored. We see that the definition in (Du et al. 2013) is a special case of our definition, in which the diffusion tree is observed. influence over one diffusion scenario. Let z(vi, vk) ∈ G be a path in the diffusion scenario G – i.e a sequence of nodes which starts with vi and ends with vk. P(z(vi, vk)) is the probability of reaching vk from vi. ϕ(viG) is the influence of vi and it is computed as the ex- pected number of users reached from vi using a model of independent binomials to decide whether or not to take each hop in each path that starts with vi. Formally: Tweet ϕ(viG) = E 1{z(vi, vkG)}  (cid:21) E 1{z(vi, vkG)} P(z(vi, vkG)) (cid:89) P(cid:0){va, vb}(cid:1) (7) (8) vk∈V (G) (cid:20)  (cid:88) (cid:88) (cid:88) (cid:88) vk∈V (G) vk∈V (G) = = = vk∈V (G) {va,vb}∈z(vi,vk) where 1{z(vi, vkG)} is a function that takes the value 1 when the path from vi to vk exists in G. Tweet influence over a retweet cascade. We compute the influence of tweet vi over V G – all possible diffusion scenarios associated with a retweet cascade – as: (cid:88) (cid:88) G∈V G P(G)ϕ(viG) (cid:88) P(G) G∈V G vk∈V (G) ϕ(vi) = = P(cid:0)z(vi, vkG)(cid:1) (9) It is intractable to directly evaluate Eq. (9), plugged in with Eq. (6) and (8), particularly due to the factorial number of diffusion scenarios in V G. For example, there are 10156 dif- fusion scenarios for a cascade of 100 retweet. We develop, in the next section, an efficient linear time algorithm to com- pute the influence of all tweets in a retweet cascade. B Efficient tweet influence computation The key observation is that each tweet vk is added simul- taneously at time tk to all diffusion scenarios constructed at time tk−1. vk contributes only once to the tweet influence of each tweet that is found on the branch it attached to. This process is exemplified in Fig. 1c. Node v5 is added to a given diffusion scenario, generating 4 new diffusion scenarios at time t5. We color in red the nodes whose influence increases as a result of adding node v5. This allows to compute the tweet influence incrementally, by updating ϕ(vi), i < k at each time tk. We denote by ϕk(vi) the value of tweet influ- ence of vi after adding node vk. As a result, we only keep track of how tweet influence increases over time steps and we do not require to construct all diffusion scenarios. B.1 Complete derivation of the recursive influence formula Incremental construction of diffusion scenarios. Let G− ∈ V Gk−1 be a diffusion scenario constructed at time tk−1, with the set of nodes V − = {v1, v2,··· , vk−1}. When vk arrives, it can attach to any node in V −, generating k − 1 j = V − ∪ vk and new diffusion scenarios G+ j = E−∪{vj, vk}. This process is exemplified in Fig. 1c. E+ We can write the set of scenarios at time tk as: j = G− ∪ {vj, vk}(cid:12)(cid:12)∀j < k,∀G− ∈ V Gk−1(cid:9) V Gk =(cid:8)G+ j , with V + (10) We write the tweet influence of vi at time k as: P(G+)ϕ(viG+) ϕk(vi) = (cid:88) (cid:88) G+∈V Gk k−1(cid:88) cf. (10) = G−∈V Gk−1 j=1 P(G+ j )ϕ(viG+ j ) (11) Note that in Eq. (11) we explicitly make use of how diffusion scenarios at time k are constructed based on the diffusion scenarios at time k − 1. Attach a new node vk. We concentrate on the right-most factor in Eq. (11) – the tweet influence in scenario G+ j . We observe that the terms in Eq. (7) can be divided into two: the paths from vi to all other nodes except vk and the path from z(vi, vk). We obtain: ϕ(viG+ j )) + P(z(vi, vkG+ P(z(vi, vlG+ (cid:88) j ) = j )). vl∈G+ l>i,l(cid:54)=k j Note that a path that does not involve vk has the same prob- ability in G+ j and in its parent scenario G−: P(z(vi, vlG+ we obtain: ϕ(viG+ j ) = j )) = P(z(vi, vlG−)), for l > i, l (cid:54)= k (cid:88) P(z(vi, vlG−)) + P(z(vi, vkG+ j )) cf. (7) = ϕ(viG−) + P(z(vi, vkG+ j )) Combining Eq. (11) and (12), we obtain: vl∈G− l>i k−1(cid:88) j=1 ∈V Gk−1 G− (cid:88) (cid:88) (cid:88) (cid:124) (cid:124) G−∈V Gk−1 G−∈V Gk−1 ϕk(vi) = = + (12) (cid:21) (cid:20) k−1(cid:88) P(G+ j ) ϕ(viG−) + P(z(vi, vkG+ j )) ϕ(viG−) (cid:123)(cid:122) A k−1(cid:88) j=1 j=1 P(G+ j ) (cid:125) j )P(z(vi, vkG+ (cid:123)(cid:122) j )) (cid:125) P(G+ Mik . (13) Tweet influence at previous time step tk−1. Given the definition of G+ j ) = j P(G−)P({vj, vk}). Consequently, part A in Eq. (13) can be written as: in Eq. (10), we obtain that P(G+ ϕ(viG−) P(G−)P({vj, vk}) (cid:88) (cid:88) (cid:88) G−∈V Gk−1 G−∈V Gk−1 A = = = k−1(cid:88) k−1(cid:88) j=1 j=1 ϕ(viG−)P(G−) P(G−)ϕ(viG−) P({vj, vk}) G−∈V Gk−1 cf. (9) = ϕk−1(vi) time step tk−1. Note that(cid:80)k−1 (14) Consequently, A is the tweet influence of vi at the previous P({vj, vk}) = 1 because vk is necessarily the direct retweet of one of the previous nodes vj, j < k of the retweet cascade. Contribution of vk. With A being the influence of vi at the previous time step, intuitively Mik is the contribution of vk to the influence of vi. Knowing that: j=1 j ))P({vj, vk}) = P(z(vi, vjG−))P({vj, vk}) j ) = P(G−)P({vj, vk}) and j )} = P(z(vi, vjG+ k−1(cid:88) P(G−)P2({vj, vk})P(z(vi, vjG−)) P(G+ P{z(vi, vkG+ G−∈V Gk−1 j=1 we write Mik as: (cid:88) k−1(cid:88) k−1(cid:88) j=1 j=1 Mik = = = P2({vj, vk})Mij P2({vj, vk}) P(G−)P(z(vi, vjG−)) (cid:88) (cid:124) G−∈V Gk−1 (cid:123)(cid:122) Mij (cid:125) (15) An alternative interpretation for Mik is the influence of vi over vk. Eq. (15) can be intuitively understood as the ex- pected influence of vi over a newly attached node vk is pro- portional to the influence of vi over each already attached node vj multiplied with the likelihood that vk attached itself to vj. We obtain the formula of the the expected influence of a node vi over another node vk as: (cid:80)k−1 j=1 MijP2({vj, vk}) Mik = , i < k , i = k , i > k. influence. Using Eq (13) and (14), we can recursively compute the influence of vi at time tk as: Recursive computation of tweet  (16) 1 0 ϕk(vi) = ϕk−1(vi) + Mik = ϕk−2(vi) + Mi(k−1) + Mik = Mij. (17) k(cid:88) j=1 with Mij as defined in Eq. (16). Intuitively, the influence of vi at time tk is the sum of the expected influence over each of the nodes in the diffusion scenario. B.2 Tweet influence algorithm We define two matrices: matrix P = [Pij], with Pij = P2({vi, vj}). Element Pij of the matrix P is the square probability that tweet vj is a direct retweet of tweet vi; ma- trix M = [Mij], with Mij defined in Eq. (16). Element Mij of matrix M is the contribution of vj to the influence of vi. Alternatively, Mij can be interpreted as the influence of vi on vj. From Eq. (16) follows the formula for computing itera- tively the columns of matrix M:  M[1..j−1,1..j−1] × P[1:j−1,j] 1 0 0 ... 0  M·j = (18) with the value 1 occurring on line j. For each column j, we compute the first j − 1 elements by multiplying the sub- matrix M[1..j−1,1..j−1] with the first j − 1 elements on the jth column of matrix P . The computation of matrix M fin- ishes in linear time, after n steps, where n is the total number of retweets in the retweet cascade. Fig. 9 demonstrated the computation of the first four columns in M. Algorithm ?? gives an overview of the efficient influence computation al- gorithm. C Generation of synthetic data This section completes and details the results concern- ing the evaluation on synthetic data, presented in the main text Sec. 5.1. This section details the construction of a syn- thetic random social graph (Sec. C.1) and the sampling of synthetic cascades (Sec. C.2). The purpose is to construct a synthetic dataset of cascades, in which the user influence ground truth is known. Both the graph and cascade gener- ators described here below reproduce closely the synthetic experimental setup described in (Du et al. 2013). C.1 Generation of random graphs In this section, we describe the construction of a synthetic social graph, with n nodes, specified by its adjacency matrix M. Each node corresponds to a synthetic user, and the edges correspond to synthetic follow relations. We follow the be- low steps: • Given the number of nodes n in the graph (here 1000), create an null (all zero) adjacency matrix M of size n×n; • Randomly choose the number of edges E, between n/2 • Randomly choose i and j between 1 to n and set Mij to 1. Iterate this step until E different edges are generated. • The adjacency matrix M defines the final random graph. to n2.  (cid:124) 1 M12 M13 M14 1 M23 M24 0 1 M34 0 0 0 0 0 ... ... ... ... 1 0 0 0 0 (cid:123)(cid:122) M ··· M1n ··· M2n ··· M3n ··· M4n ... ... ··· 1  (cid:125)  (cid:124) M11 = 1 M12 = P12M11 M13 = P13M11 + P23M12 M23 = P13M21 + P23M22 (cid:41) M14 = P14M11 + P24M12 + P34M13 M24 = P14M21 + P24M22 + P34M23 M34 = P14M31 + P24M32 + P34M33 k = 1 k = 2 (cid:41) k = 3 k = 4  ··· P1n ··· P2n ··· P3n ··· P4n ... ... ··· 1 1 0 0 1 P12 P13 P14 P23 P24 0 P34 0 1 1 0 0 ... ... ... ... 0 0 P 0 0 (cid:125) (cid:123)(cid:122) (cid:20)1 M12 (cid:21)(cid:20)P13 (cid:20)M13 (cid:21) (cid:21) (cid:35)(cid:34)P14 (cid:34)1 M12 M13 (cid:35) [P12] [M11] = [M12] M23 P23 = 0 1 0 0 1 M23 0 1 = P24 P34 (cid:34)M14 (cid:35) M24 M34 Figure 9: Exemplification of the efficient computation of the first four columns of matrix M. Each kth column vector of matrix M is colored correspondingly with the column vector in P used in the multiplication. (a) (b) (c) Figure 10: 2D density plots for all politically polarized users in #DEBATENIGHT (a), for Democrat users (b) and for Republican users (c). 01000200030004000countl0.000.250.500.751.000.20.40.60.81.0User influence %Bot score %010002000count2D density for all politically polarized users0.000.250.500.751.000.20.40.60.81.0User influence %Bot score %123density2D density for pro−democrat users0.000.250.500.751.000.20.40.60.81.0User influence %Bot score %123density2D density for pro−republican users 6.2 × 10−4 maximizes the mean of AUC and it is chosen as r value in the experiments in Sec. 5 and 6. E Additional 2D densities plots We show in Fig. 10 the additional 2D density plots men- tioned in the main text Sec. 6.2. C.2 Sampling synthetic cascades In this section we describe how to construct synthetic cas- cades, given a synthetic social graph G constructed as shown in Sec. C.1. To generate one cascades, to each edge in G we associate an exponentially distributed waiting time and we construct a shortest path tree. We detail this procedure in the following steps: • Similar to previous work (ConTinEst (Du et al. 2013)), for each edge {vi, vj} ∈ G draw a transmission rate rij from a Weibull distribution of shape k = 2. • Given the transmission rate rij, we draw an Exponentially distributed waiting time τij using the inverse transform sampling: τij = − ln(s) rij where s is draw uniformly from U (0, 1). tree from vs to all the other nodes in G; • Set τij as the weight of edge {vi, vj}. • Starting from a source node vs, construct the shortest path • For each node vk compute two measures: tk – its time of occurrence as the total waiting time along the path from vs to vk – and ck – the number of reachable nodes from vk in the shortest path tree; • The generated cascade is {t1, t2, t3 ··· tn} where (t1 < t2 < t3 < ··· tn); • The ground truth influence of node vk is the mean ck over multiple random graphs (here 100). D Choosing the temporal decay parameter The temporal decay parameter r shown in Eq. (1) is de- termined by linear search. Eq. (1) measures the probabilities of edges in the retweeting (diffusion) network, however the real diffusions are not observed. We make the assumption that diffusions occur along edges in the underlying social graph (follower relation). We measure the fitness of edge probability by the likelihood of uncovering the ground truth follower graph. In other words, if the edge {vi, vj} exists in the follower graph (i.e. vj is a follower of vi) then the edge {vi, vj} has the highest probability in the diffusion tree than the edge {vl, vj} which does not exist in the following graph. In other words, we are using the retweeting probabil- ity to predict the existence of edges in the social graph. We randomly select 20 cascades, and we crawl the following list of every user appearing the the diffusions (the following list for a user uj consists of users ui followed by uj). We use this information as ground truth for the following prediction exercise: given a user uj who emitted tweet vj in a particu- lar cascade, we want to predict which among the users in the set {u1, u2, . . . , uj−1} are followed by uj. Considering that P({vl, vj}).∀l < j, j ≥ 2 are real numbers and the predic- tion target is binary, we use the AUC (are under ROC curve) the measure the prediction performance of a particular prob- ability scoring function. For each value of r in Eq. (1) we compute the mean AUC over all predictions. We perform a linear search for the optimal r between 10−8 to 3. Finally,
1609.08768
1
1609
2016-09-28T04:49:12
Ignoring Extreme Opinions in Complex Networks: The Impact of Heterogeneous Thresholds
[ "cs.SI", "cs.DM", "physics.soc-ph" ]
We consider a class of opinion dynamics on networks where at each time-step, each node in the network disregards the opinions of a certain number of its most extreme neighbors and updates its own opinion as a weighted average of the remaining opinions. When all nodes disregard the same number of extreme neighbors, previous work has shown that consensus will be reached if and only if the network satisfies certain topological properties. In this paper, we consider the implications of allowing each node to have a personal threshold for the number of extreme neighbors to ignore. We provide graph conditions under which consensus is guaranteed for such dynamics. We then study random networks where each node's threshold is drawn from a certain distribution, and provide conditions on that distribution, together with conditions on the edge formation probability, that guarantee that consensus will be reached asymptotically almost surely.
cs.SI
cs
Ignoring Extreme Opinions in Complex Networks: The Impact of Heterogeneous Thresholds Shreyas Sundaram∗ Abstract We consider a class of opinion dynamics on networks where at each time-step, each node in the network disregards the opinions of a certain number of its most extreme neighbors and updates its own opinion as a weighted average of the remaining opinions. When all nodes disregard the same number of extreme neighbors, previous work has shown that consensus will be reached if and only if the network satisfies certain topological properties. In this paper, we consider the implications of allowing each node to have a personal threshold for the number of extreme neighbors to ignore. We provide graph conditions under which consensus is guaranteed for such dynamics. We then study random networks where each node's threshold is drawn from a certain distribution, and provide conditions on that distribution, together with conditions on the edge formation probability, that guarantee that consensus will be reached asymptotically almost surely. 1 Introduction The study of how opinions, fads, and ideas spread through populations has received significant attention over the past several decades, spanning diverse disciplines including sociology, mathe- matics, physics, computer science and engineering. This body of work has shown that complex global phenomena can arise as a result of relatively simple interaction rules for the individuals in the population. In particular, there is a tight coupling between the structure of the interactions (i.e., who talks to whom) and the dynamics of these interactions (i.e., what happens when they talk). An early investigation of opinion dynamics in networks was initiated by DeGroot [DeGroot, 1974], who proposed that individuals repeatedly update their personal (real-valued) opinions as a weighted average of their neighbors' opinions. Such dynamics lead to consensus under mild assumptions on the underlying network topology, and there has been substantial effort devoted to extending such averaging rules to settings involving time-varying graph topologies, higher-order dynamics, and stubborn or malicious individuals [Acemoglu et al., 2013, Friedkin, 2015, Jadbabaie et al., 2003, Moreau, 2005, Pirani and Sundaram, 2016, Ren and Beard, 2005, Sundaram and Hadjicostis, 2011]. A modification of the classical DeGroot model is the bounded confidence model of Hegselmann and Krause (and separately, Weisbuch and Deffuant), where an individual only averages the opinions of those neighbors whose opinions are close (according to some metric) to their own [Amblard and Deffuant, 2004, Blondel et al., 2009, Etesami et al., 2013, Hegselmann and Krause, 2002, Weisbuch et al., 2002]. In such cases, the opinions in the network settle down to a stratified set of values (i.e., not necessarily in consensus), depending on the initial spread of opinions. ∗The author is with the School of Electrical and Computer Engineering at Purdue University. E-mail: [email protected]. In addition to the above studies of real-valued opinions, researchers have also investigated the diffusion of binary valued information; this models, for instance, the adoption of a certain innova- tion, or deciding whether to participate in an activity (such as a riot) [Granovetter, 1978, Masuda, 2015, Morris, 2000, Schelling, 2006, Sood and Redner, 2005, Watts, 2002, Yildiz et al., 2013]. The dynamics in such cases are often manifested as threshold-based rules, where an individual adopts the action if a certain number or fraction of their neighbors have done so. In particular, heterogeneous thresholds play an important role in such dynamics, as they lead to cascades whereby individuals with low thresholds initiate the adoption process, and individuals with increasingly higher thresh- olds subsequently join the cascade [Gladwell, 2006, Goldenberg et al., 2001, Granovetter, 1978, Watts, 2002]. In this paper, we study a generalization of DeGroot opinion dynamics by introducing a threshold- based filtering rule into the averaging dynamics. Specifically, instead of each node averaging all of its neighbors opinions (as in DeGroot), we consider the scenario where each individual disregards the most extreme opinions in its neighborhood and averages only the opinions of its moderate neigh- bors. This rule differs from the bounded confidence models of Hegselmann and Krause in that each individual discards only a certain number of most extreme values in its neighborhood under our dynamics, as opposed to any number of values that differ significantly from its own opinion. This type of filtering rule has been recently studied in the context of resilient consensus dynamics (where some nodes can be faulty or malicious), and all non-adversarial nodes use the same threshold (i.e., they all disregard the same number of extreme neighbors) [LeBlanc et al., 2013, Vaidya et al., 2012]. These previous works have established graph-theoretic conditions that are required for such rules to guarantee consensus among the non-adversarial nodes, regardless of the actions of the adversaries. In this paper we do not consider adversarial behavior, but instead study the impact of heterogene- ity in the filtering thresholds (motivated by the study of such heterogeneous thresholds in binary diffusion dynamics, as highlighted above). Our contributions are as follows. We first extend the graph-theoretic characterizations from [LeBlanc et al., 2013] to the case of heterogeneous thresholds and provide necessary and sufficient conditions on the network topology (in terms of the thresholds) for consensus to be guaranteed regardless of the initial opinions. We then study such dynamics in random graph models for complex networks, where each node's opinion filtering threshold is chosen independently and randomly from a certain distribution. We characterize properties of this distribution such that with high probability, the resulting network guarantees consensus; we study Erdos-R´enyi random graphs (where each edge is placed independently with the same probability), random interdependent networks (consisting of various subnetworks or communities with arbitrary topologies), and random graphs with heterogeneous edge probabilities. Notation and Definitions A graph (or network) is denoted by G = {V, E}, where V = {v1, . . . , vn} is a set of nodes (or vertices or individuals) and E ⊆ V × V is a set of edges. An edge (vj , vi) indicates that node vi can receive information from node vj. The set of neighbors of node vi is defined as Ni = {vj ∈ V (vj , vi) ∈ E}. Correspondingly, the degree of node vi is given by di = Ni, and the minimum degree of the network is minvi∈V di. A path from node vj to vi is a sequence of nodes vi1 , vi2 , . . . , vik such that vi1 = vj, vik = vi and (vil , vil+1) ∈ E for l = 1, 2, . . . , k − 1. The graph is said to be strongly connected if there is a path from every node to every other node. The connectivity of a graph is the smallest number of nodes that have to be removed in order to cause the remaining network to not be strongly connected. In our derivations, we use Z to denote the set of integers, N to denote the set of nonnegative integers, and R to denote the set of real numbers. We add subscripts to these quantities to denote restrictions of the sets to appropriate values. For two functions f : N → R and g : N → R, we say f (n) = O(g(n)) if there exist constants c > 0 and n0 such that f (n) ≤ cg(n) for all n ≥ n0. We say f (n) = o(g(n)) if f (n) g(n) → 0 as n → ∞. 2 Filtering-Based Opinion Dynamics Consider a population of individuals modeled by the directed network G = {V, E}. Each individual (node) vi has an initial opinion xi[0] ∈ R. We assume that time progresses in a sequence of quantized increments, referred to as time-steps. At each time-step k ∈ N, each node receives the opinions of its neighbors, and updates its opinion as a function of those received values. In this paper, we define a filtering threshold ti ∈ {0, 1, . . . , n − 1} for each node vi ∈ V. Based on this threshold, we consider the following class of opinion dynamics. 1. At each time-step k, each node vi gathers the opinions of its neighbors, i.e., {xj[k] vj ∈ Ni}. 2. Each node vi removes the ti largest opinions in its neighborhood that are higher than its own opinion (if there are fewer than ti such opinions, node vi only disregards those opinions). Each node vi also removes the ti smallest opinions in its neighborhood that are smaller than its own opinion (if there are fewer than ti such opinions, node vi only disregards those opinions). Ties in opinions are broken arbitrarily. Let Mi[k] ⊂ Ni denote the set of moderate neighbors of vi at time-step k (i.e., those nodes whose opinions were not discarded). 3. Each node vi updates its own opinion as xi[k + 1] = wii[k]xi[k] + Xvj ∈Mi[k] wij[k]xj[k], (1) where the weights wii[k] and wij[k], vj ∈ Mi[k] are nonnegative, lower bounded by some positive constant η, and sum to 1. Note that the set Mi[k] can be empty if node vi has fewer than 2ti neighbors. In particular, if ti = di for some vi, that node disregards all of its neighbors and thus becomes a stubborn node. When ti = 0 for all vi ∈ V, the above dynamics reduce to classical DeGroot dynamics. In this case, all nodes will reach consensus as long as the graph is strongly connected (or more generally, contains a spanning tree rooted at some node) [DeGroot, 1974, Ren and Beard, 2005]. However, when the nodes have nonzero filtering thresholds, simply having a strongly connected graph is no longer sufficient to ensure consensus. To illustrate, consider the network shown in Fig. 1 where every node has filtering threshold 1. This network consists of two complete subgraphs on node sets S1 and S2. Each node in S1 has exactly one neighbor in the opposite set. This network is strongly connected; in fact, it has connectivity n 2 . However suppose that each node in S1 has initial opinion 0 and each node in S2 has initial opinion 1. Under the filtering dynamics described above, each node in each community removes the opinion of its neighbor from the opposite community, and thus no node ever changes its opinion. Thus, consensus is not reached in this network even when each node disregards only a single highest and lowest opinion in its neighborhood at each time-step. 2 and minimum degree n In [LeBlanc et al., 2013], we considered the above class of filtering dynamics for the case where the thresholds for each node are the same (i.e., ti = tj for all vi, vj ∈ V), but where certain nodes in the network were allowed to be malicious and deviate from the dynamics in arbitrary ways. We established graph-theoretic properties that will ensure consensus of the non-malicious nodes under these conditions. In the next section, we will generalize these conditions to the case of heterogeneous thresholds, and establish necessary and sufficient graph conditions for consensus under the filtering dynamics (1). Subsequently, we will use these graph conditions to study this class of opinion dynamics in random graph models for complex networks, with randomly chosen filtering thresholds for each node. 3 Graph-Theoretic Conditions to Ensure Consensus Under Filtering- based Opinion Dynamics with Heterogeneous Thresholds Given a network G = {V, E} with n nodes, let T = {t1, t2, . . . , tn} be the set of filtering thresholds. We define the following notions. Definition 1. We say that a set S ⊂ V is (T + 1)-reachable if there exists a node vi ∈ S that has at least ti + 1 neighbors outside S, i.e., Ni \ S ≥ ti + 1. Definition 2. We say that network G is (T + 1)-robust if for every pair of disjoint nonempty subsets S1, S2 ⊂ V, either S1 or S2 is (T + 1)-reachable. Note that when ti = 0 for all vi ∈ V, then the network being (T + 1)-robust is equivalent to it having a spanning tree rooted at some node. The above definitions are a relatively straightforward extension of the notions of robust networks given in [LeBlanc et al., 2013, Zhang et al., 2015], where each node had the same threshold. The intuition behind the definition of a (T + 1)-robust graph follows from examining the failure of consensus in Fig. 1: that network contained two subsets of nodes where each node in each subset filtered away the only information it received from the opposite subset. In order to ensure consensus, we would like to avoid such situations. This is captured by the following theorem. Theorem 1. Consider a network G = {V, E} with a set of filtering thresholds T . Then consensus is guaranteed under the filtering-based opinion dynamics (1) regardless of the initial opinions if and only if the network is (T + 1)-robust. Proof. For the proof of necessity, suppose the network is not (T + 1)-robust. Then there exist two disjoint nonempty subsets S1 and S2 of nodes such that neither set is (T + 1)-reachable. Let the initial opinions of the nodes in set S1 be 0, and let the initial opinions of the nodes in set S2 be 1. Let the initial opinions of all nodes in set V \ {S1 ∪ S2} be 0.5. Now, since each node vi ∈ S1 has at most ti neighbors outside S1, each node will remove all of those opinions when it updates its opinion, and thus its opinion will stay at 0. The same reasoning holds for the set S2, and thus consensus will never be reached. The proof of sufficiency follows from a straightforward generalization of the proof of sufficiency under homogeneous thresholds given in [LeBlanc et al., 2013], and thus we omit it here. ..... ..... ..... S1 S2 Figure 1: Example of a network where consensus is not guaranteed when each node ignores the single highest and single lowest opinion in its neighborhood at each time-step. Armed with the above characterization of conditions under which the opinion dynamics (1) lead to consensus, we now study such dynamics in random graph models for large-scale networks. 4 Opinion Dynamics in Erdos-R´enyi Random Graphs We start by considering the outcome of the opinion dynamics (1) in Erdos-R´enyi random graphs, defined as follows. Definition 3. For n ∈ Z≥1, let Ωn be the set of all undirected graphs on n nodes, and define p(n) ∈ [0, 1]. Define the probability space (Ωn, Fn, Pn), where the σ-algebra Fn is the power set of Ωn, and Pn is a probability measure that assigns the probability Pn(G) = p(n)m(1 − p(n))(n 2)−m to each graph G with m edges. Then, a graph drawn from Ωn according to the above probability distribution is called an Erdos-R´enyi (ER) random graph, and denoted Gn,p. Equivalently, an ER graph is obtained by placing each edge in the graph independently with probability p(n). Definition 4. Let R be a graph property, and let GR n ⊆ Ωn be the set of graphs on n nodes that have that property. We say an ER graph has property R asymptotically almost surely (a.a.s.) if limn→∞ Pn(GR n ) = 1. An important feature of Gn,p is that the model displays 'phase transitions' for certain properties. Loosely speaking, if the probability of adding an edge is 'larger' than a certain value (which could be a function of n) then the ER graph will have a certain property a.a.s., and if the edge probability is 'smaller' than that value, then the graph will a.a.s. not have that property. We make this more precise for the following properties. Definition 5. For any r ∈ Z≥1, let Dr be the property of having minimum-degree r and let Kr be the property of having connectivity r. Lemma 1 ([Erdos and Renyi, 1961]). For any constant r ∈ Z≥1, let the edge probability be given by p(n) = ln n + (r − 1) ln ln n + c(n) n , where c(n) is some function of n. If c(n) → ∞ as n → ∞, the ER graph has properties Dr and Kr a.a.s. If c(n) → −∞ as n → ∞, then the ER graph a.a.s. does not have either of the properties Dr or Kr. Based on the above result, we see that the ER graph requires p(n) = ln n+c(n) with c(n) → ∞ in order to be connected a.a.s. (as this corresponds to the property K1). This is the regime that we will focus on here, as consensus under generic initial opinions cannot be obtained in disconnected networks, regardless of the filtering thresholds at the nodes. In particular, in our proofs, we will take r ∈ Z≥1 to be the largest integer such that p(n) ≥ ln n+(r−1) ln ln n+c(n) where c(n) → ∞; this r is then the minimum degree of the graph. If this is true for all r ∈ N, then our analysis holds for any positive integer r. n n As we are interested in the effects of heterogeneous filtering thresholds, we will consider the case where the threshold for each node is drawn independently from a given distribution q(·) with support [0, ¯r], where ¯r ∈ Z≥1. Specifically, the probability that node vi has filtering threshold t is given by q(t). There are a few subtle details underlying this analysis. First, note that if a node has a filtering threshold that is larger than its degree, then consensus will not be guaranteed in general (e.g., if that node has the largest opinion in the network, it will disregard all of its neighbors, and all other nodes with nonzero thresholds will disregard the extreme opinion of that node). On the other hand, even if the filtering thresholds are much smaller than the node degrees, the graph may not be (T + 1)-robust; for example, in the network shown in Fig. 1, all nodes have degree n 2 and filtering threshold 1, but the graph is not (T + 1)-robust. Thus, the filtering threshold distribution must be such that these events occur with vanishing probability. We provide such a characterization below. Theorem 2. Consider an ER graph with edge probability p(n) = ln n + (r − 1) ln ln n + c(n) n , (2) where c(n) = o(ln ln n) and goes to ∞ with n. Suppose the filtering threshold distribution has support [0, ¯r] for some ¯r ∈ N, and satisfies q(t) = O(cid:18) 1 (ln n)t−r+1(cid:19) (3) for t ≥ r. Then the ER random graph with filtering thresholds drawn from q(·) will facilitate consensus under the local-filtering opinion dynamics a.a.s. Proof. We will show that the ER graph is (T +1)-robust a.a.s. under the conditions in the theorem,1 where T is the vector of filtering thresholds, each drawn independently from the distribution q(·). To do this, we will show that every subset of vertices of cardinality up to αn is (T + 1)-reachable, where α ∈ (0, 1) is some function of n that goes to 1. This will be sufficient to prove (T + 1)- robustness of the network, since if we take any two disjoint nonempty sets, at least one of them will have size at most n 2 ≤ αn, and thus will be (T + 1)-reachable. To this end, consider any subset S ⊂ V of nodes with cardinality m ∈ {1, 2, . . . , αn}. Consider some node vi ∈ S. The probability that vi has less than ti + 1 neighbors outside S (where ti is randomly chosen from the distribution q(·)) is given by which is upper bounded by q(t) ¯r Xt=0 ¯r t Xj=0(cid:18)n − m Xj=0(cid:18)n t q(t) Xt=0 j (cid:19)pj(1 − p)n−m−j, j(cid:19)pj(1 − p)n−m−j. Thus, the probability PS that all nodes vi in set S have fewer than ti + 1 neighbors outside S is upper bounded by ¯r PS ≤ Xt=0  j(cid:1)pj(1 − p)n−m−j. We have bj bj−1 = Let bj ,(cid:0)n m q(t) t Xj=0(cid:18)n j(cid:19)pj(1 − p)n−m−j  n − j + 1 p j 1 − p ≥ n − t p t 1 − p (4) . (5) 1The choice of c(n) = o(ln ln n) in the theorem is for technical reasons, but is not restrictive; as we argue later in Section 6, any probability larger than the one given in this theorem will also suffice for the result to hold. for j ≤ t, which goes to ∞ for t = o(np). Thus, for any β > 1, we have large n. This yields bj bj−1 > β for sufficiently t Xj=0(cid:18)n j(cid:19)pj(1 − p)n−m−j ≤ t Xj=0 1 βt−j bt ≤ bt 1 βj = C1bt ∞ Xj=0 for some positive constant C1. Substituting this back into (5), we have PS ≤ C1 ¯r Xt=0 q(t)(cid:18)n t(cid:19)pt(1 − p)n−m−t!m . Using the fact that (cid:0)n t(cid:1) ≤ nt and 1 − p ≤ e−p, we have ¯r PS ≤ C1 Xt=0 q(t)(np)te−npep(m+t)!m . Substituting the expression for p from the theorem, we have PS ≤ C1 ¯r Xt=0 q(t) (ln n + (r − 1) ln ln n + c)t n(ln n)r−1 e−cep(m+t)!m . Using condition (3) on the filtering threshold distribution given in the theorem, we have q(t)(ln n + (r − 1) ln ln n + c)t 1 (ln n)r−1 = O(1). Thus, we have PS ≤ C2 for some positive constants C2 and C3. 1 n e−cep(m+t)!m ≤(cid:18)C3 1 n e−cepm(cid:19)m ¯r Xt=0 Let Pm be the probability that there is some set S ⊂ V of size m such that all nodes vi ∈ S have fewer than ti + 1 neighbors outside S. By the union bound, we have Pm ≤(cid:18) n where we used the fact that (cid:0) n epm m ≤ max{ep, 1 theorem, we see that m(cid:19)PS ≤(cid:18)C3 m(cid:1) ≤ (cid:0) ne αn eαnp} for 1 ≤ m ≤ αn. For the edge probability p of the form given in the m(cid:1)m. It was shown in [Zhang et al., 2015] that the function ne m 1 n e−cepm(cid:19)m m (cid:19)m =(cid:18)C3e1−c epm , 1 αn eαnp = 1 α eαnp−ln n = 1 α e−(1−α) ln n+α(r−1) ln ln n+αc(n) = o(1) whenever ln ln n = o((1 − α) ln n). Let α be such that this holds. Then we have epm m ≤ ep ≤ e for sufficiently large n. Thus, we have Pm ≤ (C4e−c)m for some constant C4. Finally, the probability that some set of size between 1 and αn is not (T + 1)-reachable is upper bounded by ⌊αn⌋ Xm=1 Pm ≤ ⌊αn⌋ ∞ Xm=1(cid:0)C4e−c(cid:1)m ≤ Xm=1(cid:0)C4e−c(cid:1)m = C4e−c 1 − C4e−c . Since c → ∞, we see that this probability goes to zero asymptotically, and thus the graph will be (T + 1)-robust asymptotically almost surely. Note that the filtering threshold distribution in the above theorem is allowed to have support that extends past the minimum degree r of the network. The key is to ensure that the probability that a node gets assigned a threshold above its degree goes to zero. The above result characterizes a condition on the distribution (given by (3)) to ensure this. This result generalizes the result on ER graphs given in [Zhang et al., 2015], which focused on the case of all nodes having the same threshold (below the minimum degree of the graph). A byproduct of the above proof is that all subsets of vertices of size up to αn are guaranteed to be (T + 1)-reachable a.a.s., where α is such that ln ln n = o((1 − α) ln n). For instance, α = 1 − 1 (ln n)ǫ for ǫ ∈ (0, 1) satisfies this condition. 5 Opinion Dynamics in Random Graphs with Arbitrary Commu- nity Structure In the previous section, we considered local-filtering based opinion dynamics in Erdos-R´enyi graphs, where every possible edge appears independently with the same probability. In this section, we extend our discussion to random graphs that consist of a set of communities (or subnetworks), where only the edges between communities appear independently with a certain probability p. We will remain agnostic about the intra-community topologies. Definition 6. A random interdependent network consists of k subnetworks Gi = {Vi, Ei}, i = 1, . . . , k, along with a set of inter-network edges {Vi × Vj} . EI ⊆ [i6=j Specifically, EI is obtained by placing each edge in Si6=j {Vi × Vj} independently with a probability p (which can be a function of the number of nodes in the network). In the rest of this section, we will assume that Vi = n for i = 1, . . . , k, so that the random interdependent network has nk nodes in total. Note that an Erdos-R´enyi graph on nk nodes is a special case of the above definition, where each edge within each subnetwork is also placed with probability p. When the subnetwork edges are placed independently with a probability ¯p that is different from p, such networks are known as stochastic block models [Decelle et al., 2011, Lelarge et al., 2015]. We will make no such assumptions on the intra-network topology here, however. Recent work has studied various structural properties of random interdependent networks, in- cluding algebraic connectivity and robustness [Shahrivar et al., 2015]. Here, as in the previous section, we consider the case where each node in the network has a personal opinion threshold, drawn from a distribution q (i.e., q(t) is the probability of a given node having threshold t). We have the following result. Theorem 3. Fix k ∈ Z≥2, and consider a random interdependent network on nk nodes where each inter-network edge is placed independently with probability p(n) = ln n + (r − 1) ln ln n + c(n) (k − 1)n , (6) where c(n) → ∞ and c(n) = o(ln ln n). Suppose the opinion threshold distribution has support [0, ¯r] for some ¯r ∈ N and satisfies for t ≥ r. Then the random interdependent network with opinion thresholds drawn from q(·) will facilitate consensus under the local-filtering opinion dynamics a.a.s. q(t) = O(cid:18) 1 (ln n)t−r+1(cid:19) Proof. The proof follows in a similar manner to that for Erdos-R´enyi graphs, although additional care must be taken to handle the fact that we are only placing edges between the subnetworks. To this end, consider a set S ⊂ ∪k i=1Vi consisting of m nodes, where 1 ≤ m ≤ αnk (for some function α that goes to 1). Denote S ∩ Vi = mi. Consider some node v ∈ S, and suppose v ∈ Vi. There are n(k − 1) − (m − mi) nodes that are not in set S or Vi for v to connect to. Thus, the probability that v has fewer than t + 1 neighbors outside S ∪ Vi (where t is drawn from the distribution q(·)) is given by q(t) ¯r Xt=0 This is upper bounded by t Xj=0(cid:18)n(k − 1) − (m − mi) j (cid:19)pj(1 − p)n(k−1)−(m−mi)−j . q(t) ¯r Xt=0 t Xj=0(cid:18)n(k − 1) j (cid:19)pj(1 − p)n(k−1)−m−j . Note that this is now in the same form as the probability of a given node having fewer than t + 1 neighbors outside its set in ER graphs (given by (4)) with the only exception being that n in (4) is replaced by n(k − 1). Thus, the rest of the proof follows in the same manner as that proof (with the substitution of n by n(k − 1)), and thus the result for the random interdependent network follows by replacing n by n(k − 1) in the probability p(n) for ER graphs. Comparing the edge probability for the random interdependent network in (6) to that for the ER network in (2), we see that the price paid for being agnostic about the subnetwork topology is k k−1 in the edge formation probabilities in the former case (after scaling an increase by a factor of (2) to pertain to an ER graph on nk nodes). 6 Opinion Dynamics in Random Graphs with Heterogeneous De- gree Distributions The graphs that we considered in the previous two sections were homogeneous, in the sense that each of the randomly chosen edges was placed with the same probability p (although the random interdependent networks were allowed to have arbitrary topologies inside the subnetworks). In this section, we discuss the extension of the results in the previous sections to random graphs with potentially different probabilities on each edge (e.g., as in the expected degree random graph model [Chung and Lu, 2006]). Theorem 4. Consider the undirected random graph where each edge (vi, vj) is present indepen- dently with probability pij(n). Suppose that pij(n) ≥ ln n + (r − 1) ln ln n + c(n) n for all vi, vj ∈ V (with vi 6= vj) and that c(n) = o(ln ln n) with c(n) → ∞. Suppose the opinion threshold distribution has support [0, ¯r] for some ¯r ∈ N and satisfies q(t) = O(cid:18) 1 (ln n)t−r+1(cid:19) for t ≥ r. Then the resulting network facilitates consensus under the local-filtering opinion dynamics a.a.s. Proof. The proof follows a standard coupling argument, relying on the monotonicity of the (T + 1)-robustness property (i.e., adding additional edges to a (T + 1)-robust graph maintains that property). Let p(n) be as in (2), and note that pij(n) ≥ p(n) for all vi, vj ∈ V. We create two networks G1 and G2 as follows. For each edge (vi, vj), we flip a coin that lands heads with probability p(n). If the coin lands heads, we place the edge (vi, vj) in both G1 and G2. If the coin lands tails, we do not place the edge in G1. We then flip another coin that lands heads with probability pij(n)−p(n) . If this coin lands heads, we place the edge in graph G2, and do not place the edge otherwise. We do this for all edges in the two graphs. 1−p(n) It is easy to see that graph G1 is an Erdos-R´enyi graph with edge probability p(n), and that each edge in graph G2 appears with probability pij(n). Furthermore, G1 is a subgraph of G2. Draw the filtering thresholds for graph G1 from the distribution q(t), and let the filtering thresholds for graph G2 be the same as the ones in G1. By Theorem 2, graph G1 will be (T + 1)-robust a.a.s., and thus graph G2 will be (T + 1)-robust a.a.s. This concludes the proof. 7 Summary and Future Work We studied a class of opinion dynamics where each node ignores the most extreme opinions in its neighborhood at each time-step. We allowed each node to have a personal threshold for the number of neighbors that it ignores, and provided necessary and sufficient conditions on the network topology that guarantee consensus under such dynamics. We then studied random graph models where each node has a random threshold that is drawn from a certain distribution. We characterized properties of that distribution (in terms of the edge probabilities of the underlying network) that led to the network satisfying the required conditions for consensus. Our analysis encompassed classical Erdos-R´enyi networks, as well as networks with arbitrary community structure and networks with heterogeneous edge probabilities. There are a variety of interesting directions for future research, including a study of other classes of random graphs (and threshold distributions), along with tightness characterizations of the conditions that we have provided on the threshold distribution. References Daron Acemoglu, Giacomo Como, Fabio Fagnani, and Asuman Ozdaglar. Opinion fluctuations and disagreement in social networks. Mathematics of Operations Research, 38(1):1 -- 27, 2013. Fr´ed´eric Amblard and Guillaume Deffuant. The role of network topology on extremism propagation with the relative agreement opinion dynamics. Physica A: Statistical Mechanics and its Applications, 343:725 -- 738, 2004. V. D. Blondel, J. M. Hendrickx, and J. N. Tsitsiklis. On Krause's multi-agent consensus model with state-dependent connectivity. IEEE Transactions on Automatic Control, 54(11):2586 -- 2597, November 2009. Fan RK Chung and Linyuan Lu. Complex graphs and networks, volume 107. American mathematical society Providence, 2006. Aurelien Decelle, Florent Krzakala, Cristopher Moore, and Lenka Zdeborov´a. Asymptotic analysis of the stochastic block model for modular networks and its algorithmic applications. Physical Review E, 84(6):066106, 2011. M. H. DeGroot. Reaching a consensus. Journal of the American Statistical Association, 69(345):118 -- 121, Mar. 1974. P. Erdos and A. Renyi. On the strength of connectedness of a random graph. Acta Math. Acad. Sci. Hungar., 12: 261 -- 267, 1961. Seyed Rasoul Etesami, Tamer Basar, Angelia Nedic, and Behrouz Touri. Termination time of multidimensional Hegselmann-Krause opinion dynamics. In American Control Conference (ACC), pages 1255 -- 1260, 2013. Noah E Friedkin. The problem of social control and coordination of complex systems in sociology: A look at the community cleavage problem. IEEE Control Systems, 35(3):40 -- 51, 2015. Malcolm Gladwell. The tipping point: How little things can make a big difference. Little, Brown, 2006. J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, 12(3):211 -- 223, 2001. M. Granovetter. Threshold models of collective behavior. American Journal of Sociology, 83(6):1420 -- 1443, 1978. Rainer Hegselmann and Ulrich Krause. Opinion dynamics and bounded confidence: models, analysis and simulation. Journal of Artificial Societies and Social Simulation, 5(3):1 -- 24, 2002. A. Jadbabaie, J. Lin, and A. S. Morse. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Transactions on Automatic Control, 48(6):988 -- 1001, June 2003. H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram. Resilient asymptotic consensus in robust networks. IEEE Journal on Selected Areas in Communications, 31(4):766 -- 781, April 2013. M. Lelarge, L. Massoulie, and Jiaming Xu. Reconstruction in the labelled stochastic block model. IEEE Transactions on Network Science and Engineering, 2(4):152 -- 163, Oct 2015. Naoki Masuda. Opinion control in complex networks. New Journal of Physics, 17(3):033031, 2015. Luc Moreau. Stability of multiagent systems with time-dependent communication links. IEEE Transactions on Automatic Control, 50(2):169 -- 181, Feb. 2005. Stephen Morris. Contagion. The Review of Economic Studies, 67(1):57 -- 78, 2000. Mohammad Pirani and Shreyas Sundaram. On the smallest eigenvalue of grounded Laplacian matrices. IEEE Transactions on Automatic Control, 61(2):509 -- 514, 2016. W. Ren and R. W. Beard. Consensus seeking in multiagent systems under dynamically changing interation topologies. IEEE Transactions on Automatic Control, 50(5):655 -- 661, May 2005. Thomas C Schelling. Micromotives and macrobehavior. WW Norton & Company, 2006. Ebrahim Moradi Shahrivar, Mohammad Pirani, and Shreyas Sundaram. Robustness and algebraic connectivity In Proceedings of the 5th IFAC Workshop on Estimation and Control in of random interdependent networks. Networked Systems, volume 48, pages 252 -- 257, 2015. Vishal Sood and Sidney Redner. Voter model on heterogeneous graphs. Physical Review Letters, 94(17):178701, 2005. S. Sundaram and C. N. Hadjicostis. Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Transactions on Automatic Control, 56(7):1495 -- 1508, 2011. N. Vaidya, L. Tseng, and G. Liang. Iterative approximate Byzantine consensus in arbitrary directed graphs. In ACM Symposium on Principles of Distributed Computing, pages 365 -- 374, 2012. Duncan J Watts. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences, 99(9):5766 -- 5771, 2002. G´erard Weisbuch, Guillaume Deffuant, Fr´ed´eric Amblard, and Jean-Pierre Nadal. Meet, discuss, and segregate! Complexity, 7(3):55 -- 63, 2002. Ercan Yildiz, Asuman Ozdaglar, Daron Acemoglu, Amin Saberi, and Anna Scaglione. Binary opinion dynamics with stubborn agents. ACM Transactions on Economics and Computation, 1(4):19, 2013. Haotian Zhang, Elaheh Fata, and Shreyas Sundaram. A notion of robustness in complex networks. IEEE Transactions on Control of Network Systems, 2(3):310 -- 320, 2015.
1806.00127
1
1806
2018-05-31T23:02:50
Damping Effect on PageRank Distribution
[ "cs.SI" ]
This work extends the personalized PageRank model invented by Brin and Page to a family of PageRank models with various damping schemes. The goal with increased model variety is to capture or recognize a larger number of types of network activities, phenomena and propagation patterns. The response in PageRank distribution to variation in damping mechanism is then characterized analytically, and further estimated quantitatively on 6 large real-world link graphs. The study leads to new observation and empirical findings. It is found that the difference in the pattern of PageRank vector responding to parameter variation by each model among the 6 graphs is relatively smaller than the difference among 3 particular models used in the study on each of the graphs. This suggests the utility of model variety for differentiating network activities and propagation patterns. The quantitative analysis of the damping mechanisms over multiple damping models and parameters is facilitated by a highly efficient algorithm, which calculates all PageRank vectors at once via a commonly shared, spectrally invariant subspace. The spectral space is found to be of low dimension for each of the real-world graphs.
cs.SI
cs
Damping Effect on PageRank Distribution Tiancheng Liu, Yuchen Qian, Xi Chen, and Xiaobai Sun Department of Computer Science, Duke University, Durham, NC 27708, USA 8 1 0 2 y a M 1 3 ] I S . s c [ 1 v 7 2 1 0 0 . 6 0 8 1 : v i X r a Abstract-This work extends the personalized PageRank model invented by Brin and Page to a family of PageRank models with various damping schemes. The goal with increased model variety is to capture or recognize a larger number of types of network activities, phenomenons and propagation patterns. The response in PageRank distribution to variation in damp- ing mechanism is then characterized analytically, and further estimated quantitatively on 6 large real-world link graphs. The study leads to new observation and empirical findings. It is found that the difference in the pattern of PageRank vector responding to parameter variation by each model among the 6 graphs is relatively smaller than the difference among 3 particular models used in the study on each of the graphs. This suggests the utility of model variety for differentiating network activities and propagation patterns. The quantitative analysis of the damping mechanisms over multiple damping models and parameters is facilitated by a highly efficient algorithm, which calculates all PageRank vectors at once via a commonly shared, spectrally invariant subspace. The spectral space is found to be of low dimension for each of the real-world graphs. I. INTRODUCTION Personalized PageRank, invented by Brin and Page [1], [2], revolutionized the way we model any particular type of activ- ities on a large information network. It is also intended to be used as a mechanism to counteract malicious manipulation of the network [1]–[3]. PageRank has underlain Google's search architecture, algorithms, adaptation strategies and ranked page listing upon query. It has influenced the development of other search engines and recommendation systems, such as topic- sensitive PageRank [4]. Its impact reaches far beyond digital and social networks. For example, GeneRank is used for generating prioritized gene lists [5], [6]. The seminal paper [1] itself is directly cited more than ten thousands times as of today. As surveyed in [7], [8], a lot of efforts were made to accelerate the calculation of personalized PageRank vectors, in part or in whole [9], [10]. Certain investigation were carried out to assess the variation in PageRank vector in response to varying damping parameter [11], [12]. Most efforts on PageRank study, however, are ad hoc to the Brin-Page model. Chung made a departure by introducing a diffusion-based PageRank model and applied it to graph cuts [13], [14]. In this paper we follow Brin and Page in the modeling aspect that warrants more attention as the variety of networks and activities on the networks increases incessantly. We extend the model scope to capture more network activities in a probabilistic sense. We study the damping effect on PageRank distribution. We consider the holistic distribution because it serves as the statistical reference for inferring conditional page ranking upon query. Our study has three intellectual merits with practical impact. (1) A family of damping models, which includes and connects the Brin-Page model and Chung's model. The family admits more probabilistic descriptions of network activities. (2) A unified analysis of damping effect on personalized PageRank distribution, with parameter variation in each model and comparison across models. The analysis provides a new insight into the solution space and solution methods. (3) A highly efficient method for calculating the solutions to all models under consideration at once, particular to a network and a personalized vector. Our quantitative analysis of 6 real-world network graphs leads to new findings about the models and networks under study, which we present and discuss in Sections III and V. Our modeling and analysis methods can be potentially used for recognizing and estimating activity or propagation patterns on a network, provided with monitored data. II. PAGERANK MODELS We first review briefly two precursor models and then introduce a family of PageRank models. A. Brin-Page model Brin and Page describe a network of webpages as a link graph, which is represented by a stochastic matrix 𝑃 [1]. We adopt the convention that 𝑃 is stochastic columnwise. Every webpage is a node with (outgoing) links, i.e., edges, to some other webpages and with incoming edges or backlinks as citations to the page. If page 𝑗 has 𝑛𝑗 > 0 outgoing links, then in column 𝑗 of 𝑃 , 𝑃𝑖,𝑗 = 1/𝑛𝑗 if page 𝑗 has a link to page 𝑖; 𝑃𝑖,𝑗 = 0, otherwise. In row 𝑖 of 𝑃 , every nonzero element 𝑃𝑖,𝑗 corresponds to a backlink from 𝑗 to 𝑖. In the Brin-Page model, the web user behavior is described as a random walk on a personalized Markov chain (i.e., a discrete-time Markov chain) associated with the following probability transition matrix 𝑀𝛼(𝑣) = 𝛼𝑃 + (1 − 𝛼)𝑣𝑒T, 𝛼 ∈ (0, 1), (1) where 𝑣 ≥ 0 is a personalized or customized distribu- tion/vector, 𝑒 denotes the vector with all elements equal to 1, and the damping factor 𝛼 describes a Bernoulli decision process. At each step, with probability 𝛼, the web user follows an outlink; or with probability (1 − 𝛼), the user jumps to any page by the personalized distribution 𝑣. The personalized transportation term is innovative. It customizes the Markov chain with respect to a particular type of relevance. In this paper we assume that the personalized vector 𝑣 is given and fixed, and focus on investigating the damping effect. In particular, with Brin-Page model, we focus on the role of 𝛼. The notation for the Markov chain may thus be simplified to 𝑀𝛼, or 𝑀 when 𝛼 is clear from the context. 𝑒T𝑣 = 1, ∞∑︁ Page ranking upon a search query depends on the stationary PageRank distribution, denoted by 𝑥 = 𝑥(𝛼), of the Markov chain: 𝑀𝛼 𝑥 = 𝑥, 𝑒T𝑥 = 1. (2) Arasu et al [15] recast the eigenvector equation (2) to a linear system to solve for 𝑥, (𝐼 − 𝛼𝑃 )𝑥 = (1 − 𝛼)𝑣, (3) where 𝐼 is the identity matrix. Because 𝛼‖𝑃‖1 < 1, the solution can be expressed via the Neumann series for the inverse of (𝐼 − 𝛼𝑃 ), 𝑥(𝛼) = (1 − 𝛼) 𝛼𝑘𝑃 𝑘𝑣. (4) 𝑘=0 The weights (1− 𝛼)𝛼𝑘 decrease by the factor 𝛼 from one step to the next. In [1], Brin and Page set 𝛼 to 0.85. In (4), the solution to Brin-Page model with 𝛼 ∈ (0, 1) is not the stationary distribution of network 𝑃 . It is analyzed in terms of steps on 𝑃 . Term 𝑘 represents the probabilistic accumulation of the Bernoulli decision process at each step by (1) to step 𝑘, 𝑘 ≥ 0. Every step has its print in distribution 𝑥(𝛼). B. Chung's model Chung introduced a PageRank model [13] in the form of a heat or diffusion equation, with 𝑣 as the initial distribution, 𝜕𝑥 𝜕𝛽 = −(𝐼 − 𝑃 )𝑥, 𝑥(0) = 𝑣, (5) where (𝐼−𝑃 ) is the Laplacian of the link graph, and we use 𝛽 to denote the time variable. From the viewpoint of probabilistic theory, model (5) is underlined by the Kolmogorov's backward equation system for a continuous-time Markov chain with −(𝐼 − 𝑃 ) as the transition rate matrix and with the identity matrix 𝐼 as the initial transition matrix. The solution to (5) is 𝑥(𝛽) = 𝑒−𝛽(𝐼−𝑃 )𝑣 = 𝑒−𝛽 𝛽𝑘 𝑘! 𝑃 𝑘𝑣. (6) C. A model family 𝑘=0 We introduce a family of PageRank models. Each member model is characterized by a scalar damping variable 𝜌 and a discrete probability mass function (pmf) 𝑤(𝜌) = {𝑤𝑘 = 𝑤𝑘(𝜌), 𝑘 ∈ N𝑤}. The support N𝑤 ⊂ N may be finite or infinite. There are a few equivalent expressions to describe our models. We start by defining the model with a kernel function 𝑓 (𝜆, 𝜌), 𝑓 (𝜆, 𝜌) = 𝑤𝑘(𝜌) 𝜆𝑘, 𝜆 ≤ 1. (7) ∑︁ 𝑘∈𝑁𝑤 The solution specific to network graph 𝑃 and personalized vector 𝑣 is, ∞∑︁ )︃ (︃∑︁ 𝑘∈𝑁𝑤 𝑥𝑓 (𝜌) = 𝑓 (𝑃 )𝑣 = 𝑤𝑘(𝜌) 𝑃 𝑘 𝑣. (8) The matrix function 𝑓 (𝑃 ) is stochastic. The rank distribution vector 𝑥𝑓 is the superposition of step terms with probabilis- tic weights 𝑤𝑘. The step term 𝑘 describes the probabilistic propagation of 𝑣 at step 𝑘. For a specific case, the damping variable may have a designated label, with a specific range, and the pmf may have a specific support and additional parameters. For convenience, we assume N as the support. Over the infinite support, the damping weights must decay after certain number of steps and vanish as 𝑘 goes to infinity. In theory, every discrete pmf can be used as a model kernel in (8). In practice, each describes a particular type of activity or propagation. The family includes Brin-Page model and Chung's model. For the former, the damping variable is denoted by 𝛼, the damping weights (1 − 𝛼)𝛼𝑘, 𝑘 ≥ 0, follow the geometric distribution with the expected value 𝛼(1 − 𝛼)−1. The kernel function is (1− 𝛼)(1− 𝛼𝜆)−1. For Chung's model, we denote the damping variable by 𝛽, 𝛽 > 0. The damping weights 𝑒−𝛽𝛽𝑘/𝑘!, 𝑘 ≥ 0, follow the Poisson distribution with the expected value 𝛽. The model's kernel function is 𝑒−𝛽(1−𝜆). We describe a few other models, among many, in the family. In fact, the precursor models are two special cases of the model associated with the Conway-Maxwell-Poisson (CMP) distribution, which has an additional parameter 𝜈 to the pmf, 𝑤𝑘(𝜌, 𝜈) = 𝜌𝑘 (𝑘!)𝜈 𝑍 , 𝜈 > 0, where 𝑍 is the normalization scalar, and 𝜈 is the decay rate parameter. The case with 𝜈 = 0 is the geometric distribution; the case with 𝜈 = 1 is the Poisson distribution. If the value of 𝜌 is fixed, the weights decay faster with a larger value of 𝜈. The negative binomial distribution, or the Pascal distribution, also includes the geometric distribution as a special case. It includes other cases that render damping weights with slower decay rates. In the rest of the paper, for the purpose of including and illustrating new models, we use the model associated with the logarithmic distribution, for 𝛾 ∈ (0, 1), (𝛾𝜆)𝑘 −1 ∞∑︁ ln(1 − 𝛾𝜆) ln(1 − 𝛾) . = (9) 𝑓 (𝜆, 𝛾) = ln(1 − 𝛾) 𝑘 𝑘=1 The weights decrease slightly faster than the geometrically distributed ones, but not in the CMP distribution class. We now present the system of linear equations with 𝑥(𝜌) in (8) as the solution, 𝐴(𝑃 )𝑥 = 𝑣, 𝐴(𝑃 ) = 𝑓−1(𝑃 ). (10) The matrix 𝐴 is an 𝑀 matrix. In particular, 𝐴 = (1−𝛼)−1(𝐼− 𝛼𝑃 ) for Brin-Page model, 𝐴 = 𝑒𝛽(𝐼−𝑃 ) for Chung's model and 𝐴 = ln(1 − 𝛾) ln −1(𝐼 − 𝛾𝑃 ) for the log-𝛾 model (9). The algebraic model expression (10) will be used next for the model expression in a differential equation. III. RESPONSE TO VARIATION IN DAMPING We provide a unified analysis of the response in PageRank distribution to the variation in the damping parameter value as well as to the change, or connection, from one model to another. A. Intra-model damping variation By (8), we obtain the trajectory of the PageRank vector 𝑥(𝜌) with the change in the damping variable 𝜌, 𝑑𝑥(𝜌) 𝜕 𝜕𝜌 (11) 𝑥(𝜌) = = 𝑓 (𝑃 )𝑣 = 𝑄(𝑃 ) 𝑥(𝜌), 𝑑𝜌 𝜕𝜌 𝑓 (𝑃 )𝑓−1(𝑃 ) by (10), which we may where 𝑄(𝑃 ) = 𝜕 refer to as the 𝜌-transition matrix. Equation (11) generalizes Chung's diffusion model (5), in which the 𝛽-transition matrix 𝑄 = −(𝐼 − 𝑃 ) is independent of 𝛽. For the Brin-Page model with damping variable 𝛼, 𝑄(𝛼) =[︀𝑃 (𝐼 − 𝛼𝑃 )−1 − (1 − 𝛼)−1𝐼]︀. (12) For the log-𝛾 model (9), 𝑄(𝛾) = (1 − 𝛾)−1 ln(1 − 𝛾) 𝐼 − 𝑃 (𝐼 − 𝛾𝑃 )−1(ln(𝐼 − 𝛾𝑃 ))−1. (13) For each model, 𝑒T𝑄 = 0. In addition to the element-wise response in the rank vector, we would also like to have an aggregated measure of the response to variation in 𝜌. Let 𝑥(𝜌𝑜) be a reference PageR- ank vector. We may use Kullback-Leibler divergence [16] to measure the discrepancy of 𝑥(𝜌) from 𝑥(𝜌𝑜), 𝐾𝐿(𝑥(𝜌), 𝑥(𝜌𝑜)) = 𝑥𝑖(𝜌) log 𝑥𝑖(𝜌) 𝑥𝑖(𝜌𝑜) . (14) ∑︁ 𝑖 When 𝜌 = 𝜌𝑜, 𝐾𝐿(𝑥(𝜌), 𝑥(𝜌𝑜)) = 0. We have the rate of change in KL divergence with the variation in 𝜌, 𝐾𝐿(𝑥(𝜌), 𝑥(𝜌𝑜)) = 𝑥(𝜌)T(log 𝑥(𝜌) − log 𝑥(𝜌𝑜) + 𝑒) 𝑑 𝑑𝜌 (15) We will describe in Section IV efficient algorithms for calcu- lating the vectors and measures above. B. Inter-model correspondence Each model has its own damping form and parameter. The expected value of the step weight distribution is, 𝜇(𝑤(𝜌)) = 𝑘 · 𝑤𝑘(𝜌). (16) ∑︁ 𝑘∈N𝑤 We may explain this as the expected value of walking steps. We establish the point of correspondence between models by their expected values. That is, for any two models, we set their expected values equal to each other. Without loss of generality, we let the expected values for the Brin-Page model serve as the reference. In particular, we have the correspondence equalities (︂ 𝛾 )︂ −1 1 − 𝛾 ln(1 − 𝛾) (17) 𝛼 1 − 𝛼 = 𝛽, 𝛼 1 − 𝛼 = for Chung's model and for the log-𝛾 model, respectively. We will show the comparisons in PageRank vectors at such correspondence points in Section V. IV. EFFICIENT ALGORITHMS FOR BATCH RANKING We introduce novel algorithms for efficient quantitative analysis of damping effect on PageRank distribution. Provided with a network graph 𝑃 and a personalized distribution vector 𝑣, the algorithms can be used in one batch of computation across multiple models as well as over a range of damping parameter value per model. A. Reduction to irreducible subnetworks Information networks in real world applications are not necessarily irreducible and aperiodic as assumed by many existing iterative solutions for guaranteed convergence. To meet such convergence conditions, some heuristics were used to perturb or twist the network structure with artificially introduced links [17], [18]. Instead, we decompose the net- work into strongly connected sub-networks by applying the Dulmage-Mendelsohn (DM) decomposition algorithm [19] to the Laplacian matrix 𝐼 − 𝑃 . The DM algorithm is highly efficient when diagonal elements are non-zero. It renders the matrix in block upper triangular form. See Figure 1 for the Google link graph released by Google in 2002 [20]. Each diagonal block 𝐵𝑖𝑖 corresponds to a subnetwork. A square diagonal block corresponds to an irreducible subnetwork. A non-zero off-diagonal block 𝐵𝑖𝑗 in the upper part, 𝑖 < 𝑗, represents the links from cluster 𝑗 to cluster 𝑖. The top block is associated with a sink cluster without outgoing links to other cluster; the bottom block is associated with a source cluster without incoming edges from other clusters. The solution for the entire network can be obtained by the solutions to the subnetworks and successive back substitution. (a) original link graph (b) link graph after DM permutation Fig. 1: The 1:1000 sparsity map of adjacency matrix of Google link graph [20] with 875,713 page nodes in (a) the provided ordering and (b) the ordering rendered by the DM decomposition, depicted by imagesc in matlab. Each point shows the number of non-zeros, in log scale, in the corresponding 1000×1000 block. The subnetwork in the middle of (b) is strongly connected with 434,818 nodes. B. Cascade of iterations Several iterative methods exist for computing the PageRank vector by the Brin-Page model. They include the power method by the eigenvector equation (2), and the Jacobi, Gauss- Seidel, and SOR methods by equation (3). There are various acceleration techniques used for calculating the PageRank vector, or a small part of the vector, or even a single pair of nodes between the personalized vector and the PageRank vector [10], [21]–[23]. For the Brin-Page model, the iterative 10020030040050060070080010020030040050060070080000.511.510020030040050060070080010020030040050060070080000.511.522.533.5 methods converge slower as 𝛼 increases and gets closer to 1. We developed a cascading initialization scheme. The solution to the model with 𝛼 is used as the initial guess to the iteration for the solution to the model with 𝛼 + 𝛿𝛼, 𝛿𝛼 > 0. Although it has accelerated the computation with successively increased 𝛼 values, this technique is limited to sequential computation and ad hoc to the Brin-Page model. We introduce next a novel algorithm without these limitations. C. Shared invariant Krylov space Our new algorithm for batch calculation of PageRank vec- tors with multiple models and parameter values is based on the very fact that the solutions to the models in Section II all reside in the same Krylov space, . (18) i.e., 𝒦(𝑃, 𝑣) = {𝑣, 𝑃 𝑣, 𝑃 2𝑣,··· , 𝑃 𝑘𝑣,···}, 𝑣 ≥ 0 𝑒T𝑣 = 1 The space has the property 𝑃𝒦(𝑃, 𝑣) = 𝒦(𝑃, 𝑣), it is a spectrally invariant subspace. In PageRank terminology, 𝒦(𝑃, 𝑣) is a personalized invariant subspace. We have the remarkable fact about the model family in Section II. Theorem 1. Any model solution (8), at any particular damp- ing parameter value, and its trajectory (11) are functions in the Krylov space 𝒦(𝑃, 𝑣). Theorem 2. Let 𝑚 = dimension(𝒦). Denote by 𝐾 the matrix composed of the Krylov vectors. Let 𝐾 = 𝑄𝑅 be the QR factorization of 𝐾. Then, 𝑄𝑒1 = 𝑣 and 𝑃 𝑄 = 𝑄𝐻, where 𝐻 is an 𝑚 × 𝑚 upper Hessenberg matrix, and 𝑒1 is the first column of the identity matrix 𝐼. A few remarks. Matrix 𝐻 in Theorem 2 is the representation of matrix 𝑃 under basis 𝑄 in the Krylov space. In numerical computation, we use a rank-revealing version of the QR factorization with 𝑄𝑒1 = 𝑣. In theory, the dimension 𝑚 is equal to the number of spectrally invariant components of 𝑃 that present in 𝑣. In the extreme case, 𝑚 = 1 when 𝑣 is the Perron vector of 𝑃 . In general, by the condition 𝑒T𝑣 = 1, 𝑣 is not deficient in Perror component. In our study on real- world graphs, which we will detail shortly in Section V, the numerical dimension is low, matrix 𝐻 is therefore small. We may view this as a manifest of the smallness of the real-world graphs under study. We exploit these theoretical and practical facts. Corollary 3. For any function 𝑔 in the Krylov space (18), we have 𝑔(𝑃 )𝑣 = 𝑄𝑔(𝐻)𝑒1. When dimension 𝑚 is modest, we translate by Corollary 3 the calculation of 𝑥𝑔 = 𝑔(𝑃 )𝑣 with 𝑁 × 𝑁 matrix 𝑃 on vectors to the calculation of ^𝑥𝑔 = 𝑔(𝐻)𝑒1 with 𝑚× 𝑚 matrix 𝐻 on vectors, followed by a matrix-vector product 𝑄^𝑥𝑔. The vector ^𝑥𝑔 is the spectral representation of 𝑥𝑔 in the Krylov space. In the model family, solutions 𝑥𝑓 (8) differ from one to another in their spectral representations ^𝑥𝑓 , they share the same basis matrix 𝑄 in the ambient network space. Our algorithm consists of the following major steps. Let 𝒢 = {𝑔} be a set of functions under study. (1) Calculu- ate Krylov vectors to form matrix 𝐾 in Theorem 2, apply rank-revealing 𝑄𝑅 factorization to 𝐾, and find numerical dimension 𝑚; 1 (2) Construct the matrix 𝐻, by Theorem 2, from 𝑅 and the permutation matrix Π rendered by the rank- revealing 𝑄𝑅; (3) Calculate ^𝑥𝑓 = 𝑔(𝐻)𝑒1 for all functions in 𝒢; (4) Transform ^𝑥𝑓 from the Krylov-spectral space to the ambient network space by the same basis matrix 𝑄, based on Corollary 3. V. EXPERIMENTS ON REAL-WORLD LINK GRAPHS We show in numerical values how PageRank vector re- sponses to variation in damping variable with each model and across models, on 6 real-world link graphs. A. Experiment setup: data and models The 6 link graphs we used for our experiments are publicly available at the Koblenz Network Collection [24]. The basic information of the graphs is summarized in Table 1, where max(𝑑𝑜𝑢𝑡) is the maximum out-degree (the number of cita- tions) of graph nodes, max(𝑑𝑖𝑛) is the maximum in-degree (the number of backlinks), 𝜇(𝑑𝑜𝑢𝑡) = 𝜇(𝑑𝑖𝑛) is the average out-degree, which equals to the average in-degree, and LSCC stands for the largest strongly connected component(s) of the graph. The Google graph of today is reportedly containing hundreds of trillions of nodes, substantially larger than the snapshot size used here. TABLE 1: Dataset Description Total #nodes #nodes in LSCC [max(𝑑𝑜𝑢𝑡), 𝜇(𝑑𝑜𝑢𝑡), max(𝑑𝑖𝑛)] Google [20] Wikilink [24] DBpedia [25] Twitter(www) [26] Twitter(mpi) [27] friendster [28] 875,713 12,150,976 18,268,992 41,652,230 52,579,682 68,349,466 434,818 7,283,915 3,796,073 33,479,734 40,012,384 48,928,140 [4209, 8.86, 382] [7527, 50.48, 920207] [8104, 26.76, 414924] [2936232, 42.65, 768552] [778191, 47.57, 3438929] [3124, 32.76, 3124] For variation analysis of each graph in Table 1, the as- sociated link matrix 𝑃 is well specified. We use the same personalized or customized distribution vector 𝑣, which we get by drawing elements from standard Gaussian distribution 𝒩 (0, 1), followed by normalization 𝑣T𝑒 = 1. We report variation analysis results with three particular models : Brin- Page model (3) with damping variable 𝛼, Chung's model (5) with variable 𝛽, and the log-𝛾 model (9). The last is used as an illustration of new models in the family (8). B. Variation in PageRank vector In order to show the quantitative response in PageRank vec- tor 𝑥𝑓 over 𝑁 nodes with the variation in damping variable 𝜌, we display the histogram of 𝑁·𝑥𝑓 (𝜌) for model 𝑓 at parameter value 𝜌. In Figure 2 we show the histograms associated with 1These substeps are integrated in pratical computation in order to deter- mine quickly a sufficient number of Krylov vectors. (a) 𝑥(𝜌) of Google link graph (b) 𝑥(𝜌) of Twitter(www) link graph Fig. 2: Inter-model comparison of histograms of 𝑁 · 𝑥𝑓 (𝜌) among the three models with corresponding parameter values 𝛼𝑜, 𝛽𝑜 and 𝛾𝑜 so that the expected value of walking steps for each model is 𝛼𝑜/(1 − 𝛼𝑜) = 5. 6 with 𝛼𝑜 = 0.85, see the model correspondence equalities (17). (a) comparison on Google link graph; (b) comparison on Twitter(www) link graph. three models on Google network. The parameter for Brin- Page model is set to the value 𝛼𝑜 = 0.85. The parameter for the other two models are set by (17). We observe that the histogram with Brin-Page model has higher and narrower peaks than Chung's model. The histogram of log-𝛾 model is in between. This is expected by the relationships in the damping weights among the three models, as discussed in Section III-B. (a) Brin-Page model (b) log-𝛾 model (c) Chung's model (d) Brin-Page model (e) log-𝛾 model (f) Chung's model Fig. 4: Comparison in histogram of 𝑁 · 𝑥𝑓 (𝜌) on the Twitter graph over a range of dampling value, in the same settings as in Figure 3. tion become less centralized. Log-𝛾 model, specifically, is less sensitive to 𝛾(𝛼) range with 𝛼 ∈ [0.7, 0.97]. C. Relative variation measured by KL divergence (a) Brin-Page model (b) log-𝛾 model (c) Chung's model (a) 𝛼𝑜 = 0.85 (b) 𝛾𝑜 = 0.94146 (c) 𝛽𝑜 = 5. 6 (d) Brin-Page model (e) log-𝛾 model (f) Chung's model Fig. 3: Comparison in histograms of 𝑁·𝑥𝑓 (𝜌) on the Google link graph over a range of damping variable value. Left column: Brin-Page model, Middle column: log-𝛾 model, Right column: Chung's model. Top row: 2D display of 6 histograms associated with 6 parameter values shown in the respective legends. The histogram in black with Brin-Page model is associated with the value 𝛼 = 0.85. The corresponding parameter values with Chung's model and log-𝛾 model are set by (17), the associated histograms are color coded by the corresponding parameter values. Bottom row: a stack of multiple histograms shown in 3D space over the range 𝛼 ∈ [0.7, 0.97] with Brin-Page model, 𝛽 ∈ [2. 6, 32. 3] with Chung's model, and 𝛾 ∈ [0.7787, 0.994] with log-𝛾 model. The histograms with Chung's model have flattened peaks at larger values (toward the back end). The log-𝛾 model is nearly insensitive to 𝛾 change in the range above. Figure 3 and Figure 4 show the variation in the histograms over a range of the damping variable per model as well as the comparison side by side between the three models on two datasets. The models have similar behaviors on the other 4 graphs in Table 1. Supplementary material can be found in [29]. With larger damping factors in the models, the distribu- (d) 𝛼𝑜 = 0.95 (e) 𝛾𝑜 = 0.98831 (f) 𝛽𝑜 = 19 Fig. 5: Intra-model relative variation as defined in (14) in PgeRank distribu- tion, on the Google graph, with respect to two reference distribution at 𝛼𝑜 ∈ {0.85, 0.95} with Brin-Page model (left column), 𝛾𝑜 ∈ {0.94146, 0.98831} with log-𝛾 model (middle column), and 𝛽𝑜 ∈ {5. 6, 19} with Chung's model (right column). Blue curves: the KL score 𝐾𝐿(𝑥𝑓 (𝜌)𝑥𝑓 (𝜌𝑜)) with numerically computed distribution vectors; Red curves: the derivative of the KL score (𝑑/𝑑𝜌)𝐾𝐿(𝑥𝑓 (𝜌)𝑥𝑓 (𝜌𝑜)). The red curves with · marker and ◇ marker are obtained empirically from numerical distribution vectors, with step size Δ𝜌 = (0.002, 0.008) respectively. The red curves with × marker are obtained analytically by (15). Remarks. With Brin-Page model and log-𝛾 model, the distribution changes gently from the reference distribution in the neighborhood of the reference value 𝛼𝑜 = 0.85, by the KL curve and the KL derivative curve. In sharp contrast, the distribution with Chung's model deviates rapidly from the reference distribution. We show the relative variation in PageRank vector with respect to a reference vector by (14). For Brin-Page model, we consider two particular reference vectors: one is associated with 𝛼 = 0.85 as chosen originally by Brin and Page, the other is at 𝛼 = 0.95, much closer to the extreme case 𝛼 = 1, in which the walks follow the links only. For Chung's model and log-𝛾 model, we use the corresponding parameter values by 10-610-410-210010201234567# of nodes (bin counts)10410-510010501234567# of nodes (bin counts)10610-610-410-210010201234567# of nodes (bin counts)10410-610-410-210010201234567# of nodes (bin counts)10410-610-410-210010201234567# of nodes (bin counts)10410.950.9010-50.8524104Bin counts0.8100610.950.9 00.8510-524104Bin counts0.8100630252001510-52104104Bin counts5100610-510010501234567# of nodes (bin counts)10610-510010501234567# of nodes (bin counts)10610-510010501234567# of nodes (bin counts)10610.950.90110-50.85234106Bin counts0.810051056710.950.9 010.85210-534Bin counts1060.8100561057302520150121010-534Bin counts10651005610570.70.750.80.850.90.95100.020.040.060.080.10.120.140.160.180.202468101214KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.750.80.850.90.95100.010.020.030.040.050.060.0702468101214161820KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.002010203040-0.3-0.2-0.100.10.20.3-0.15-0.1-0.0500.050.10.15KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.70.750.80.850.90.951-0.1-0.0500.050.10.150.20.250.30.35-2-1012345KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.750.80.850.90.951-0.0200.020.040.060.080.10.12-101234567KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.002010203040-0.6-0.4-0.200.20.40.6-0.3-0.2-0.100.10.20.3KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.002 (17). We show the differences between the three models on the Google graph in Figure 5 at the corresponding reference values, respectively, and on the twitter graph in Figure 6. (a) 𝛼𝑜 = 0.85 (b) 𝛾𝑜 = 0.94146 (c) 𝛽𝑜 = 5. 6 (d) 𝛼𝑜 = 0.95 (e) 𝛾𝑜 = 0.98831 (f) 𝛽𝑜 = 19 Fig. 6: Intra-model relative variation in PageRank distribution by (14), on the Twitter graph. The rest is in the same setting as in Figure 5. D. Batch calculation: efficiency and accuracy We show first that the Krylov space dimension is numeri- cally low for each of the 6 real world link graphs. Figure 7 gives the diagonal elements of each upper-triangular matrix 𝑅 obtained by a rank-revealing QR factorization. The elements below 10−17 are not shown. The numerical dimension ranges from 19 with DBpedia link graph to 62 with Google link graph. The low numerical dimension makes our algorithm in Section IV highly efficient. In addition, we exploited the sparsity of matrix 𝑃 in the Krylov vector calculation, see details in [30]. (a) Google (b) Twitter(www) (c) Wikipedia (d) DBpedia (e) Twitter(mpi) (f) Friendster Fig. 7: The diagonal elements of each upper-triangular matrix 𝑅 obtained by a rank-revealing QR factorization for the 6 datasets in Table 1. Google link graph has the highest numerical dimension 62 among the 6 datasets, and the DBpedia link graph has the lowest numerical dimension 19. The accuracy of our batch algorithm is evaluated in two ways. One is by 𝑒𝑟𝑟 = ‖(𝑥Krylov − 𝑥G-S)./𝑥G-S‖∞, the maximum element-wise relative difference in the PageRank vectors of Brin-Page model between the Gauss-Seidel method and our Krylov subspace method. In our experiments, the relative errors for all 6 datasets are below 10−10. In the other way, we show in Figure 5 and Figure 6 that the empirical rate of change agrees well with analytical prediction (15). VI. CONCLUDING REMARKS Our model extension, connection, unified analysis and nu- merical algorithm for quantitative estimation in batch are original, to our knowledge. Our study leads to new observation and several findings. (a) In network propagation pattern in response to variation in the damping mechanism, the inter- model difference among the 3 models is much more significant than the inter-dataset difference among the 6 datasets. This suggests the utility of model variety for differentiating network activities or propagation patterns. (b) The model solutions reside in the same customized, spectrally invariant subspace. On each of the 6 real-world graphs, the space dimension is low, which is a small-world phenomenon. (c) The shared computation is not limited to one personalized distribution. The Krylov space associated with a particular vector 𝑣 contains certainly many other distribution vectors. In fact, every Krylov vector is a distribution vector. This finding may lead to a much more efficient way to represent and compute PageRank distributions across multiple personalized vectors. (d) The low spectral dimension, estimated once for a particular graph 𝑃 and a personalized/customized vector 𝑣, may serve as a reasonable upper bound on the number of iterations by any competitive algorithm, with one matrix-vector product per iteration, for Brin-Page model, at any 𝛼 value in (0, 1), or any other model in the family (8). The power method and the Gauss-Seidel iteration take more iterations to reach the same error level on the larger real-world graphs among the studied, and take many more iterations when 𝛼 gets closer to 1. In brief conclusion, estimating PageRank distribution under various damping conditions is valuable and easily affordable. REFERENCES [1] L. Page, S. Brin, R. Motwani, and T. Winograd, "The PageRank citation ranking: Bringing order to the web." Stanford InfoLab, Tech. Rep., 1999. [2] S. Brin and L. Page, "The anatomy of a large-scale hypertextual web search engine," Computer networks and ISDN systems, vol. 30, no. 1-7, pp. 107–117, 1998. [3] D. Sheldon, "Manipulation of PageRank and Collective Hidden Markov Models," Ph.D. dissertation, Cornell University, Ithaca, NY, USA, 2010. [4] T. H. Haveliwala, "Topic-sensitive PageRank: A context-sensitive rank- ing algorithm for web search," IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 4, pp. 784–796, 2003. [5] J. L. Morrison, R. Breitling, D. J. Higham, and D. R. Gilbert, "Gen- erank: using search engine technology for the analysis of microarray experiments," BMC bioinformatics, vol. 6, no. 1, p. 233, 2005. [6] G. Wu, Y. Zhang, and Y. Wei, "Krylov subspace algorithms for com- puting generank for the analysis of microarray data mining," Journal of Computational Biology, vol. 17, no. 4, pp. 631–646, 2010. [7] A. N. Langville and C. D. Meyer, "Deeper inside PageRank," Internet Mathematics, vol. 1, no. 3, pp. 335–380, 2004. [8] P. Berkhin, "A survey on PageRank computing," Internet Mathematics, vol. 2, no. 1, pp. 73–120, 2005. [9] T. Haveliwala, S. Kamvar, and G. Jeh, "An analytical comparison of approaches to personalizing PageRank," Stanford InfoLab, Technical Report 2003-35, June 2003. 0.70.750.80.850.90.95100.050.10.150.2-1012345678KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.750.80.850.90.95100.010.020.030.040.050.06024681012KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.00205101520253035-0.3-0.2-0.100.10.20.3-0.4-0.3-0.2-0.100.10.20.30.4KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.70.750.80.850.90.951-0.8-0.6-0.4-0.200.20.4-3-2-1012KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.0020.750.80.850.90.951-0.0500.050.10.150.2-1-0.500.511.522.53KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.00205101520253035-1-0.8-0.6-0.4-0.200.20.40.60.81-0.6-0.4-0.200.20.40.6KL divergenceanalytical derivativeemprical derivative, =0.008emprical derivative, =0.00201020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-2001020304050607080-16-14-12-10-8-6-4-20 [36] F. Chung and W. Zhao, "PageRank and random walks on graphs," in Springer, 2010, pp. Fete of Combinatorics and Computer Science. 43–62. [10] S. Kamvar, T. Haveliwala, C. Manning, and G. Golub, "Exploiting the block structure of the web for computing PageRank," Stanford InfoLab, Technical Report 2003-17, 2003. [11] P. Boldi, M. Santini, and S. Vigna, "PageRank as a function of the damping factor," in Proceedings of the 14th International Conference on World Wide Web. ACM, 2005, pp. 557–566. [12] M. Bressan and E. Peserico, "Choose the damping, choose the ranking?" Journal of Discrete Algorithms, vol. 8, no. 2, pp. 199–213, 2010. [13] F. Chung, "The heat kernel as the PageRank of a graph," Proceedings of the National Academy of Sciences, vol. 104, no. 50, pp. 19 735–19 740, 2007. [14] --, "A local graph partitioning algorithm using heat kernel PageRank," Internet Mathematics, vol. 6, no. 3, pp. 315–330, 2009. [15] A. Arasu, J. Novak, A. Tomkins, and J. Tomlin, "PageRank computation and the structure of the web: Experiments and algorithms," in Proceed- ings of the 11th International Conference on World Wide Web, 2002, pp. 107–117. [16] S. Kullback and R. A. Leibler, "On information and sufficiency," The Annals of Mathematical Statistics, vol. 22, no. 1, pp. 79–86, 1951. [17] C. P.-C. Lee, G. H. Golub, and S. A. Zenios, "A fast two-stage algorithm for computing PageRank and its extensions," Scientific Computation and Computational Mathematics, vol. 1, no. 1, pp. 1–9, 2003. [18] A. N. Langville and C. D. Meyer, "A reordering for the PageRank problem," SIAM Journal on Scientific Computing, vol. 27, no. 6, pp. 2112–2120, 2006. [19] A. L. Dulmage and N. S. Mendelsohn, "Coverings of bipartite graphs," Canadian Journal of Mathematics, vol. 10, no. 4, pp. 516–534, 1958. http://www.google.com/ [20] Google, programming contest," "Google programming-contest/, 2002. [21] S. D. Kamvar, T. H. Haveliwala, C. D. Manning, and G. H. Golub, "Extrapolation methods for accelerating PageRank computations," in Proceedings of the 12th International Conference on World Wide Web. ACM, 2003, pp. 261–270. [22] S. Kamvar, T. Haveliwala, and G. Golub, "Adaptive methods for the computation of PageRank," Linear Algebra and its Applications, vol. 386, pp. 51–65, 2004. [23] P. A. Lofgren, S. Banerjee, A. Goel, and C. Seshadhri, "FAST-PPR: scaling personalized pagerank estimation for large graphs," in Proceed- ings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2014, pp. 1436–1445. [24] J. Kunegis, "KONECT–the koblenz network collection," in Proceedings of the 22nd International Conference on World Wide Web. ACM, 2013, pp. 1343–1350. [25] S. Auer, C. Bizer, G. Kobilarov, J. Lehmann, R. Cyganiak, and Z. Ives, "DBpedia: A nucleus for a web of open data," in The Semantic Web. Springer, 2007, pp. 722–735. [26] H. Kwak, C. Lee, H. Park, and S. Moon, "What is Twitter, a social network or a news media?" in Proceedings of the 19th International Conference on World Wide Web. New York, NY, USA: ACM, 2010, pp. 591–600. [27] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi, "Measuring User Influence in Twitter: The Million Follower Fallacy," in Proceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM), Washington DC, USA, May 2010. [28] J. Yang and J. Leskovec, "Defining and evaluating network communities based on ground-truth," Knowledge and Information Systems, vol. 42, no. 1, pp. 181–213, 2015. [29] Y. Qian, "Variable damping effect on network propagation," Master's thesis, Duke University, Durham, NC, USA, May 2018. [30] X. Chen, "Exploiting common structures across multiple network prop- agation schemes," Master's thesis, Duke University, Durham, NC, USA, May 2018. [31] T. Haveliwala and S. Kamvar, "The second eigenvalue of the google matrix," Stanford InfoLab, Technical Report 2003-20, 2003. [32] M. Richardson and P. Domingos, "The intelligent surfer: Probabilistic combination of link and content information in PageRank," in Advances in Neural Information Processing Systems, 2002, pp. 1441–1448. [33] T. Haveliwala, "Efficient computation of PageRank," Stanford, Tech. Rep., 1999. [34] A. N. Langville and C. D. Meyer, Google's PageRank and beyond: The science of search engine rankings. Princeton University Press, 2011. [35] G. Jeh and J. Widom, "Scaling personalized web search," in Proceedings of the 12th International Conference on World Wide Web. ACM, 2003, pp. 271–279.
1806.02155
1
1806
2018-06-06T13:04:25
Understanding News Outlets' Audience-Targeting Patterns
[ "cs.SI" ]
The power of the press to shape the informational landscape of a population is unparalleled, even now in the era of democratic access to all information outlets. However, it is known that news outlets (particularly more traditional ones) tend to discriminate who they want to reach, and who to leave aside. In this work, we attempt to shed some light on the audience targeting patterns of newspapers, using the Chilean media ecosystem. First, we use the gravity model to analyze geography as a factor in explaining audience reachability. This shows that some newspapers are indeed driven by geographical factors (mostly local news outlets) but some others are not (national-distribution outlets). For those which are not, we use a regression model to study the influence of socioeconomic and political characteristics in news outlets adoption. We conclude that indeed larger, national-distribution news outlets target populations based on these factors, rather than on geography or immediacy.
cs.SI
cs
Elejalde et al. RESEARCH Understanding News Outlets' Audience-Targeting Patterns Erick Elejalde1*, Leo Ferres2,3 and Rossano Schifanella4 *Correspondence: [email protected] 1Department of Computer Science, University of Concepcion, Concecpci´on, Chile Full list of author information is available at the end of the article 8 1 0 2 n u J 6 ] I S . s c [ 1 v 5 5 1 2 0 . 6 0 8 1 : v i X r a Abstract The power of the press to shape the informational landscape of a population is unparalleled, even now in the era of democratic access to all information outlets. However, it is known that news outlets (particularly more traditional ones) tend to discriminate who they want to reach, and who to leave aside. In this work, we attempt to shed some light on the audience targeting patterns of newspapers, using the Chilean media ecosystem. First, we use the gravity model to analyze geography as a factor in explaining audience reachability. This shows that some newspapers are indeed driven by geographical factors (mostly local news outlets) but some others are not (national-distribution outlets). For those which are not, we use a regression model to study the influence of socioeconomic and political characteristics in news outlets adoption. We conclude that indeed larger, national-distribution news outlets target populations based on these factors, rather than on geography or immediacy. Keywords: Media ecosystem; Propaganda model; Gravity model; News spreading 1 Introduction The mass media is one of the social forces with the strongest transformative power. However, news reach people unequally, in part because news outlets target con- tent to certain audiences. According to Herman and Chomsky's Propaganda Model (PM) [1], there are many factors that shape the distribution and influence of news media coverage. Two of the most important factors are the geographic reach of newspapers (national versus regional newspapers), and the direct targeting of spe- cific sectors of the population and/or the political ideology of the media outlet itself. The PM states that each linguistic account of an event must pass through five filters that define what is newsworthy. One such filter, the advertising filter (number two in the PM) predicts that most news outlets will try to reach a specific audience (segments of the population) with the objective of maximizing profit, in- stead of actually informing. In other words, outlets will try to cater to the target demographic's expectations, rather than being fair in their treatment of what is news. For instance, some advertisers will prefer to take their businesses to outlets with target audiences of high purchasing power, which will eventually marginalize working-class audiences; or by political reasons, with advertisers declining to do business with outlets perceived as ideological enemies or indeed any media unfavor- able to their private interests. Prat and Stromberg [2] provide another model (henceforth PS) that seems to bet- ter define the same concept of a media system entirely driven by profit-maximization Elejalde et al. Page 2 of 19 (PM's second filter). The authors identify the characteristics that a certain audi- ence needs to have for an outlet to create content that is relevant to that audience (Proposition 4 in [2]). To make Proposition 4 more concrete, Prat and Stromberg [2] suggest that the main factors that influence the mass media coverage of an event are: (a) if the matter is of interest for a large group of people (a group may be characterized by a political stand, geographic location, ethnicity, etc.), (b) if it has a significant advertising potential (e.g., it may attract readers with a higher pur- chasing power), (c) if it is newsworthy to a group within easy reach (i.e., it is cheap to distribute news to that group). Thus, in a media system driven by profit, areas of low population density, minorities, and low-income classes will be relatively under- served and underrepresented in mainstream news coverage. This creates a loop that ends up neglecting (policy-wise) the most vulnerable segments of society just for having limited access to the media. To date, there has been comparatively little large-scale, quantitative research on the relationship between the quality and diversity of the contents the media gener- ate, and the socioeconomic indices of a particular area of coverage. In this paper, we try to find whether or not an outlet's coverage deviates from the purely geo- graphic influence to a more sophisticated behavior involving the weight of political and socioeconomic interests for example, as operationalized by Prat and Stromberg. We examine the degree to which different geographic locations in the same country are covered by existing news outlets using Chilean social media data. We quan- tify how much of this coverage can be explained by a natural geographic targeting (e.g., local newspapers will give more importance to local news), and how much can be attributed to the politic/socioeconomic profile of the areas they serve. To find these coverage effects as predicted by the PM and PS models, we look for empir- ical evidence in the massive adoption of social networks. More specifically, we use statistical models that show how much of the distribution of Twitter followers can be explained based on the geographic, political and socioeconomic features of the different areas. 2 Related Work In this section we give a short account of these targeting strategies: geographic, socioeconomic, and political. We use the concepts in the PM, and the operational- ization of PS to identify them. 2.1 Geographic targeting According to Zipf's Gravity Model [3, 4], as we move farther away from the source of a piece of news, the interest/relevance of a story drops. Given that news outlets tend to cover stories where reporters can get quickly and easily (again, to minimize the cost of the piece of news), their followers are expected to be predominantly from populations that are closer to them. Also, the size of a population at a particular place may influence how newspapers cover events originating in that area. News- papers work on an economy of scale with a considerable first copy cost. According to the Gravity Model, we could predict the flow of information in the news media system and hence, indirectly, the proportional distribution of followers a target area will have for a given news outlet. Elejalde et al. Page 3 of 19 Distance and population size are also essential magnitudes to describe profit in the model proposed by Prat and Stromberg (Equation 5 in [2]). News outlets will favor in their coverage issues that may draw the attention of larger groups (e.g., big cities) and to which it is cheaper to deliver the news (e.g., at a shorter distance). 2.2 Socioeconomic targeting Another factor that influences the news coverage is the socioeconomic profile of an area. As we mentioned earlier, a strategy that the news outlets could implement to increase advertising revenue is to target sectors of the population with a higher purchasing power. Herman and Chomsky point out in the second filter of the PM that advertising, being a fundamental source of income for news outlets, plays an important role to maintain the hegemony of the top news companies in the free market. News outlets that can secure good advertising contracts may afford lower sell prices and become more competitive. This business model breaks the natural market rules that give the final buyer's choice the power to decide. In this case, the advertisers' contracts have a significant impact on the media growth or even their survival. So, outlets are forced to comply and demonstrate to the announcer how their content may serve to its needs. The audience of a newspaper becomes its product, which can then be "sold" to the sponsors. The second filter of the PM is in line with the predictions in the Proposition 4(b) in [2]. This filter suggests that in their effort to align their content with the advertisers' interests, the media have shifted to a lighter and less controversial programming (e.g., lifestyle, fashion, sports, etc.) [5, 6]. In [7], the author presents some evidence on the same direction, showing, for example, media preference for "soft news" content that is favored by advertisers as it targets a demographic of female and young people. A more recent and direct example on how advertisers may influence the content of the media is the evolution from product placements to Native Ads [8], which makes it difficult to the reader to differentiate between news and advertisement. This type of pseudo-content provides a significant part of the outlets' revenue [9]. Being able to detect this kind of behavior in the media is of utmost importance. For example, a socioeconomic bias in the media system can be very damaging as it may exacerbate the gap between rich and poor areas. A population with limited access to the news is less informed and, consequently, less likely to hold authorities responsible for public expenditure and providing broad public welfare [10, 11]. In turn, this motivates the incumbent to prioritize and divert resources to places where they will receive more media coverage and not necessarily where they are most needed. According to Chomsky and Herman [1], these characteristics make the news media system comparable to a political scheme where votes are weighted by income. Other aspects of a community and their links to different socioeconomic conditions have been studied. For example, the diversity in the individuals' relationships [12] or patterns in the urban mobility [13] have shown to be useful indicators for the deprivation levels of a region. However, there has been comparatively little large- scale quantitative research on the relationship between the media coverage, and the socioeconomic indices of a particular area. Elejalde et al. Page 4 of 19 2.3 Political targeting Political bias is probably the most studied type of bias in the mass media [14, 15, 16, 17]. In previous work [18], we analyze the nature of bias through a political quiz. Our study shows that even the political bias could have some economic factors. Extra evidence of this is given in [15]. The authors estimate the bias in newspapers according to how similar their language is compared to that used by congressmen for which a right/left stand is known. They do not find a direct relationship between the "slant" of a newspaper and the political preference of the owners (cf. our own work on the topic [19]). Instead, bias in the news is found to be more correlated to the political inclinations of the readers, showing a tendency in these news outlets to align themselves with the political preferences of their target audience and hence, maximizing selling profits. We think this is an important result because, although outlets may seem to take a political stand in their editorial line, evidence suggests that this may be another strategy to generate revenue by targeting a specific group of people. For example, governmental offices at various levels assign a considerable part of their budgets to advertising. Newspapers sympathizers of the government policies may benefit from lucrative advertising contracts with the incumbent. So, outlets discrimination can be also influenced by political reasons, with advertisers declining to do business with media that are perceived as ideological enemies or generally unfavorable to their interests. 2.4 Online news dynamics, coverage, bias In an interview with Mullen [20], Herman and Chomsky express their confidence in the applicability of the PM to forms of media other than newspapers, especially the Internet, where traditional news outlets compete with new digital media and advertising is more relevant than ever before. If anything, the "old" news industry has evolved and has adapted to the new environment. More recently, Robinson [21] evaluates if the introduction of new communication technologies and the Internet have affected the influence of the economic structure over the news media system. He argues that even though there has been a shift from the printed news to the digital media (newspaper website audiences grew by 7.4% in 2012 [22]), the news cycle is still controlled by the big news corporations. The three most significant outlets in U.S. (i.e., Wall Street Journal, USA Today and New York Times) had a circulation of over 5 million users (which include digital subscribers); any of them counting at least one order of magnitude more readers than the next closest competitor [22]. With regards to advertising on Internet, the author concludes that news outlets had to rely even harder on this source of income: on-line subscription revenue does not cover the previous earnings made from selling print newspapers. So, the content has became more profit driven with a shift to soft-news and corporate-friendly reports [22]. On the same note, Pew Research Center reported that nowadays up to 93% of U.S. adults consume some news online [23], and to do so they use official news orga- nizations websites and social media in equal shares (36% vs. 35% respectively) [24]. However, regardless of the path they use to get to news, readers overwhelmingly favor professional news organizations to get their news (76%) [25]. With the increas- ingly important role of social media in the news system, news outlets have again Elejalde et al. Page 5 of 19 adapted by embracing the new platform and now they are able to create original content for them (i.e., Facebook's instant articles[1] allows any publisher to create a piece of news directly in the Facebook platform). This move is also deeply motivated by the market and the task to increase advertising revenue. In 2016 digital adver- tising constituted approximatively 37% of all advertising revenue (not just news outlets), and Facebook along comprises for 35% of digital advertising revenue [23]. More specifically, in [26], the authors analyze the dynamics of news and journalism on the Twitter platform. They found that 0.8% of the tweets are news media related. This gives an idea of how significant are news media to Twitter. They also report, confirming the results of Robinson [21], that the traditional notion of gatekeeping and news production have not changed, and large news organizations still control what is newsworthy. Moreover, they show that news entities do not use the social media to engage with their audience but rather as a way for content dissemination (mostly by redirecting users to their own websites). Also, they find difference in interest (topic-wise) between Twitter users and news outlets. This difference of focus gives some evidence to the agenda-setting behavior of the news industry, reinforcing the hypothesis of a profit-driven system, instead of an informative one. 3 Data To create our database of news outlets, we used different sources, with Poderopedia's "influence" database [27] and Wikepedia [28] as our baseline, manually adding other news outlets in Chile. Our database contains 403 active accounts. An account is considered active if it tweets at least once a month. We enriched the profile of each outlet by adding relevant information such as geographic location, scope, Twitter account, and number of Twitter followers. The Twitter's API allows to automatically access the flow of tweets and query the system for user profiles, followers and tweeting history. This data availability makes it possible to explore the behavior and interactions of personal and institutional accounts, developing and testing social theories at a scale that was unfeasible few years ago. This is the closest thing we have to a record of the every-day life of over 300 million people (Twitter reported 328 million monthly active users in the first quarter of 2017 [29]). Chile ranks among the top-10 countries regarding the average number of Twitter users per 1000 individuals [30]. Because of the massive adoption of Twitter and the strong presence of the news media on the social networks, we use the Twitter follow- ers as a proxy for the actual audience of a news outlet. For our analysis, we download the user's profile on Twitter for each follower of the outlets in our database. We collected the profile of 4,943,351 unique users. Each user may simultaneously follow more than one news outlet. We decided to use the commune as our location unit given that this is the smaller political division in Chile, but at the same time, it is big enough to create both a statistical and popularly perceived socioeconomic profile at the population level. We obtained the total population of each commune and other demographic indices from the National Institute of Statistics (INE) [31]. The demographic indices were already aggregated by commune. We also needed information on the socioeconomic [1]https://instantarticles.fb.com/ Elejalde et al. Page 6 of 19 development of each zone. This kind of information is harder to obtain. The most reliable source is the national census. The problem is that censuses are very expen- sive and therefore are performed very infrequently (sometimes more than a decade apart - last completed valid census performed in Chile was in 2002)[2]. Instead, we use the data from the National Socio-Economic Characterization Survey (CASEN) from 2013[3] [33]. This study is conducted by the Ministry of Social Development in Chile. From the CASEN survey, we obtain the socioeconomic indicator at the level of a commune using the available expansion factor to calculate the weighted average income per household. Our last dimension has to do with the political leaning of the communes. To measure the political tendencies of each geographical area, we use the results from the presidential election. The Chilean Electoral Service [34] provides detailed infor- mation district-wise on the Chilean presidential elections since 1989 (that is, since Chile's return to democracy after the dictatorship of Augusto Pinochet). To help understand the collected data, we represent in Figure 1 the geographic distribution of each dimension for the most populated region of the country (i.e., Santiago). Note that most of the news outlets are located in the city center (Figure 1b) and surrounded by very densely populated areas (Figure 1a). Also, Figure 1c shows a difference in the income level between communes from East to West (which coincides with the popular perception). Finally, more populated and urbanized areas show a right-leaning political predominance. While areas farther from the city center and mostly rural show the opposite tendency (see Figure 1d). 4 Methods 4.1 Geographic targeting We first use the Gravity Model to identify how much of news coverage can be explained by the geographic factors of distance and population. For this we use the population and location of both the source of the medium and the target area. Equation 1 represents this relation. F j i = Pi ∗ Pj Dij (1) Here Pi is the population of the commune i, and Pj is the population of the commune in which outlet j is located. Dij represents the distance between the two communes. Then, F j i should give us a value that represents the expected number of followers that outlet j will have in the commune i. We run the model for each news outlet so we can analyze the geographic targeting behaviour for different types of media. For this study, we manually locate each news outlets in its source commune. The location may be determined by the intended audience if the name of the commune is in the name of the outlets (e.g., soyConcepcion is assigned to Concepcion city) [2]There was another census in 2012, but it was methodologically flawed, with prob- lems in coverage, and a supposed manipulation of some of the key indices [32]. [3]There is a CASEN survey from 2015 but the expansion factor for the communes is not complete (not even for the communes in Santiago) Elejalde et al. Page 7 of 19 or by the location of its headquarters. At the intra-country level, big news media companies may have more than one headquarter, however in most cases they either work under a different name (with a more "local" name) or report directly to the central headquarters which ultimately define the editorial line. For example, Soy Concepcion is owned by the El Mercurio Group, which is also the group that owns one of the largest newspapers of the capital region (also called El Mercurio). Finally, for every pair of communes we use their estimated populations (obtained from the INE [31]) and GPS coordinates. We calculate the direct distance between them using the Haversine formula. We represent each outlet j as a vector F j. The elements of F j are the predicted proportion of followers in each commune for outlet j obtained from the Gravity Model. We also create a vector T j for each outlet with the actual number of Twitter followers on each commune i obtained from our ground-truth (see Section 4.1.1 below). Using the two vectors that represents each outlet we calculate the Pearson product-moment correlation coefficients. This coefficient will give us, for each news outlet, an idea of how much of the distribution of readers can be attributed to the geographic dimension. 4.1.1 Geolocation of the followers Regarding the location of the Twitter followers, there is an extensive body of work that focuses on geo-tagging Twitter users [35, 36, 37]. Most of this work can be divided into two groups according to their approach: content-based and network- based. Methods based on content can be further subdivided into those that use a gazetteer [38], as in our case, to find direct references to geographic places and those based on Language Models that try to learn a probabilistic text model [39]. The performance of the former depends heavily on the quality of the used dictionary. The latter may achieve high precision for the geo-localization of users at a country level, or even within country regions or cities [40, 41]. However, to achieve a good performance at a finer grain classification, such as commune/neighborhood level, massive corpora of social media annotation is required [37]. On the other hand, the geo-localization of users based on their network (based on the assumption that users are more likely to interact with other users that are geographically closer to them) are more accurate at a finer level [42, 43]. The problem is that crawling the connections of several million users and dealing with the corresponding graph is time consuming and computationally intensive. In this paper we decided to test our hypothesis using only the users that we were able to geolocate based on their profile's location field. We use these as a sample of the population. The cumulative number of followers per commune in our sample is highly correlated with the actual population distribution (r(343) = .61, p < .01). So, we will use this information to model news outlets coverage in our database. To find the accounts that are following more than one outlet we use the identifier from each user's profile on Twitter. We use only those profiles that have a non- empty location field, which brings our list down to 1,579,068 accounts (31% of the initial amount). In [44] the authors analyze the nature of the location field in the Twitter profile. Given that this is an open text field, users not always enter a valid (or even geo- graphic) information. So, a pre-processing of these data is in order if we are making any study involving geolocation of the users based on this field. Elejalde et al. Page 8 of 19 In our remaining 31%, some of the users have GPS coordinates, and others have a text description of their location. Since the text description is a free text entered by the user, it ranges from an exact postal address to a completely useless text (e.g., "The milky way"). Using a gazetteer, we could extract 996,326 users with a recognizable location, which represents the 20% of the initial amount. We tried to assign each user to a commune with a given level of confidence. For the users with a pair of GPS coordinates, we used a shape-file [45] of the communes of Chile to find the one that enclosed the point. Only 4,829 of the users had GPS coordinates. The users with a text description making explicit mention of a commune were assigned to that commune. For those who mentioned only a province or a region, we could allocate them in the city/commune capital of that region. Given that these cities have the most prominent population density in the area, we would maximize the chance to be correct when making a guess. Nevertheless, we choose to work only with users for which we have high confidence in their location, namely: those with GPS coordinates or explicit mention of a commune. Thus, our final list contains 602,810 users, which is over 12% of the total number of unique followers (Table 1 summarizes the followers). 4.2 Audience-targeting model According to the PM and PS models, direct targeting of specific sectors of the population shape the distribution of news. If motivated by a profit-driven model of the media system, this targeting may be based in socioeconomic and/or political characteristics of the intended audience. We use a regression model to study the influence of the different features that represent the dimensions in our hypothesis, namely the socioeconomic and political characteristics of the communes that may attract profit-driven media coverage. We try to model the ranking of communes for each outlet based on the share of followers from each commune. We include the geographic factor in our model to measure its influence and to keep a reference. We use as the geographic feature only the distance from the commune to the news source, given that the actual population is to closely related to our target variable (a function on the number of followers). We estimate the socioeconomic level of an area as its expected household income. Meanwhile, for the political factor, we use the right/left-leaning of the commune (see section 3). To calculate the political factor per commune, we first aggregated the raw num- ber of votes receives by each party on each commune in the past three elections. We manually annotated each political party as left-wing, right-wing or centrist ac- cording to their self-declared position. Political parallelism on the media system is seen when the media outlets are popularly perceived as leaned to one broad side in the political spectrum (not necessarily linked to a political party but rather to a political range) [46]. So, we aggregated the votes for all parties that have a similar political ideology. With this, we measure how "left-leaning" or "right-leaning" is a commune. The data in all three dimensions was aggregated at the level of communes and normalized by calculating the z − score of each area on each feature. Elejalde et al. Page 9 of 19 For the model we use a random forest regressor [47] (implemented in the module RandomForestRegressor within the python library scikit-learn). This estima- tor is based on classifying decision trees. Models based on decision trees are less susceptible to overfitting, considering that our training sets are relatively small (for each newspaper we only have as many samples as communes with a valid entry). We evaluate the model using a random shuffle cross validation that leaves 20% of the dataset for testing, and trains the regressor in the remaining 80%. Each experiment is repeated 100 times and the average score and standard deviation are reported. We measure the quality of the fit with the explained variance. We also measure the explanatory power of each individual dimension on the media coverage. For this, we calculate the Kendall-Tau correlation of the corresponding feature against the number of followers per commune for each news outlet. The results of these measurements should give information on the marketing strategy of different outlets. 4.2.1 Chilean national soccer team followers To validate the results and ensure that they are peculiar to the online media ecosys- tem and not an artifact of the social media attention dynamics as a whole, we repeat the same experiment using a different topical dataset. In particular, we gather data on the Twitter followers for the soccer players that were part of the Chilean national football[4] team in the "Copa America Centenario 2016" tournament. We expect the coverage variable in a sport-celebrity fans scenario to be influenced by different as- pects and, consequently, the link to the investigated features being weaker. We download the Twitter's profile of 6,568,769 unique users that follow at least one of the 21 players for which we were able to find an official Twitter account. From these, only 2,434,183 had a non-empty location field. We followed the same methodology for the geolocation of these user. We found 540,828 users that match a valid location in Chile. Out of the valid users, only 2,041 had a GPS set of coordinates, and 381,166 did explicit reference to a commune. This gave us a total of 383,207 unique followers that we were able to assign with high confidence to one of the 346 communes in Chile. This is comparable with the 602,810 users that we will use as our sample of followers of the news outlets. In this new dataset, the number of follower per commune is also strongly correlated with the actual population distribution of Chile (r(344) = .66, p < .01). So, it is comparable in size to our newspapers-followers dataset (see Table 1) and it is a representative sample of the actual Chilean population. 5 Results Our primary task in this work is to approximate the distribution of the audience of the online media based on the geopolitical and socioeconomic characteristics of an area. As discussed above, multiple aspects of a given population can become factors in the news outlets' audience-targeting strategy. To better understand the media coverage, we first study how this is correlated to geographic elements as predicted by the Gravity Model. To further improve our predictive and explanatory capability, in a second step, we fit a regression model that, besides the geographic feature, also [4]"Soccer", in the US dialect. Elejalde et al. Page 10 of 19 takes into account the political leaning and income level of the communes in the most populated region of the country. 5.1 Gravity Model With the gravity model we want to characterize the news attention as a function of population size and distance from the media source. As we mention before, we model the source as the commune where the headquarter of the news outlet is located or based on the name of the outlet. We represent each outlet as a vector F j with the expected number of followers in each commune obtained from the Gravity Model. We also created a vector T j for each outlet with the actual number of followers on each commune i obtained for our ground-truth. Using the two vectors that represents each outlet we calculate the Pearson correlation coefficients. In Figure 2a we can see the distribution of the correlation coefficients. We can see that the coverage bias of a big number of outlets can be almost entirely explained just by the geography. Actually, half the outlets correlate over 0.7. However, there is an important number of outlets for which the geographic bias explains very little or none of their observed coverage. Table 2 shows some stats that help to better describe the characteristics of the news outlets with the lowest and highest correlation. Not surprisingly, the group that falls farther from the predicted coverage is dominated by the newspapers in the capital city (i.e., Santiago) and with a national scope. These are expected to be the ones with the most prominent political and socioeconomic bias, given that they are the most influential and the ones that dominate news production. Their leading position also ensures that they receive the biggest share in the investment of advertisers. Hence, these outlets are the most exposed to external pressures. On the other hand, news outlets with a local scope behave as described by the Gravity Model, at least in average. Figures 2b and 2c show the distribution of the correlation for the outlets with a local and national scope respectively. The figures illustrate the behavioral difference of these two classes of outlets. From the previous results, we can conclude that geographic bias is not enough to describe the nature of the news media. If we look for example at the communes Lo Prado [48] and San Miguel [49], they have a similar population and are situated at a similar distance from the center of Santiago, where an important number of news outlets (local and national) are located. If we take only these news outlets located in the center of Santiago, the average difference in the expected number of followers between the two communes according to the Gravity Model is just over 1%. In other words, based only on geographic factors these communes should be virtually indistinguishable. But, if we look at the actual number of followers for the same set of outlets, the average difference is almost 250%, with an overwhelming dominance of followers from San Miguel. Moreover, a general query in the Twitter API for tweets geo-located near "Lo Prado, Chile" during August 2017, gives almost 100,000 unique users, while the same query for tweets near "San Miguel, Chile" throws only 61,165 unique users. Thus, the difference in news outlets' followers cannot be thought as the result of a disparity in Twitter penetration. One possible factor that may influence this striking contrast is the gap in socioeconomic conditions and deprivation levels between the two communes. Lo Prado, despite being located within the capital city, Elejalde et al. Page 11 of 19 is ranked in the top ten of the poorest communes of Chile [50]. On the other hand, San Miguel, even though it is a predominantly residential commune, it is also an important economic/industrial pole of the city. In fact, San Miguel ranks in the 40th position out of 93 communes in the Index of Urban Quality of Life for Chile [50]. Thus, the hypothesis of our theoretical models in the political economy of the mass medial [1, 2] supports the idea that the socioeconomic characteristics of a sector can make its population more or less attractive to the media. 5.2 Filtering the data Given that we are analyzing geographic coverage and its relation to socioeconomic and political factors, we have to take into account the specific characteristics of Chile. From every point of view, Chile is a heavily centralized country. The previous results detailed in Table 2 give evidence of this. According to a study from 2013 [51], in proportion to its size, population, and economic development, Chile is the most centralized country in Latin America. The data obtained from the INE [31] gives us a total estimated population of 17.9 million people for the entire country, out of which 7.4 million (41%) are located in the Metropolitan Region (where its capital, Santiago, is located). If we also add that this is the smallest (in area) of the 15 regions that compose Chile, we have a very dense population area. Only for its geographic and demographic characteristics, Santiago is already a desirable market for the media based on Proposition 4 of Prat and Stromberg [2]. Now, on the political side, each region in Chile is headed by an Intendente (equiv. Mayor), but they are appointed and respond directly to the president. Moreover, members of the House of Representatives who legislate on behalf of the different districts of the country reside in Santiago. This organization concentrates almost all the political power in this one region. In the same way, according to the annual report published by the Central Bank of Chile for 2016 [52], the Metropolitan Region participated with 46% of the GDP (5x the next highest contribution). With this heavily concentrated power in all spheres, and based on our set of hypothesis, the capital of Chile matches all the conditions needed by a population to receive an extensive media coverage. Consequently, based on our results of the Gravity Model, we will focus on the community of outlets identified as the least influenced by the geographic bias. That is, we filtered our database to keep only those news outlets (locals and national) with headquarter in the capital. The centralization of the Chilean population it is also perceived in our collection of followers: out of 15 regions, 36.9% of our geolocated followers are in the Metropolitan Region. To minimize the noise in our model, we decided to limit the study of the coverage only to the communes in Santiago. With 51 communes and a wide range of socioeconomic conditions, the Metropolitan Region offers a good case of study on its own. To further strengthen the signal, we also limited the analysis to the 25 news outlets with the highest number of followers. 5.3 Regression Model To extend our model and study the influence of other factors such as the political and socioeconomic characteristics in the distribution of news media followers, we use a regression model. As mention before, our target variable is, given a news Elejalde et al. Page 12 of 19 outlet and a commune, the ranking position based on the number of followers of that communes for that outlet. We include three features in our model: right-leaning, representing the polit- ical dimension; income, representing the socioeconomic dimension; and distance, representing the geographic dimension. In Table 3 we show the Pearson correlation between our three features (using the filtered data). One thing to notice is the rel- atively high correlation between the expected income of an average household and the political leaning of the area where it is located. In Chile (and Latin America in general), right-conservative political parties are popularly associated with wealthy people. At least in the last few year, left-leaning parties tend to be more populists. Using these features, our trained model is able to represent the mass media behav- ior with high precision. The results of the regression indicate the three predictors explained on average up to 96.3% (SD = 0.005) of the variance in cross-validation. Figure 3 shows the learning curve for the selected model. We were also interested in modeling the coverage behavior of each individual outlet to see how they fit with respect to these three dimensions. To do this, we used the selected features to create a regression model for each news outlet. This model is then used in the same way. That is, we predict their audience-based ranking of the communes in Santiago but using data related only to the selected outlet. The results, shown in Figure 4, confirm that with the selected features, the regressors are able to approximate the distribution of followers (M = 0.82, SD = 0.03). We also studied the ranking of the communes in relation to each feature. We used Kendall's Tau (KT) correlations to have an indication of how strong is the influence of each factor in the prediction. Figures 5a, 5b and 5c show the distribution of the KT correlation for the top 25 news outlets in Santiago with respect to the communes' political leaning, expected income and distance to the origin, respectively. Results are shown regarding their absolute values because the direction of impact is not important for our model. For example, if a news outlet favors a commune based on the area being right-leaning, for our model this is as telling as another news outlet disregarding the commune for the same reason. In both cases, the outlets are biased based on political factors. The results show that the behavior of news outlets is very similar in terms of the discriminating influence of these three dimensions in the news coverage, at least within this group. In figure 6 we show a comparison of the KT correlation coefficient for all three dimensions for each of the top 25 news outlets. This comparison can be used as a characterization/profiling of each outlet's coverage behavior. For example, the coverage of Radio Cooperativa (cooperativa) [53] seems to be driven by political and economic factors, with practically no attention to the location of the commune. This is a radio station with a national scope. According to a survey conducted in 2015, it is the second in audience in the region of Santiago [54] and the first one among people with the highest income (last quantile). Moreover, its editorial line is "popularly perceived" to be associated to the Christian Democratic Party [53, 18]. Actually, from the early 70's until the late 90's the radio was directly owned by this party (currently belongs to El Mercurio Group). This profile coincides with the characterization reflected by our model. On the other hand, El Quinto Poder (elquintopoder ) [55] is an online news website/community where any member can Elejalde et al. Page 13 of 19 contribute with its column. This newspaper follows the concept of citizen journal- ism popularized by sites like http://www.ohmynews.com/. Its editorial line and community rules explicitly prohibit any content that is aimed at a personal or in- stitutional gain. In the same way, political opinions can only be expressed through personal profiles (rather than an organization profile). In our model, for this news- paper the influence from the political and economic factors are equated, but also the geographic dimensions is the highest within these top 25 outlets. Just as a comparison, we repeat the analysis, this time filtering the dataset to keep only the top 25 "newspapers" in Santiago - i.e., excluding radio station, TV channels, etc. (see figure 7). Here, for example, it is easy to distinguish newspapers with a local scope, such as portaldemeli or betazeta. For those, the influence of the geographic factor is higher than that of the economic and even the political features. Actually, in the case of portaldemeli (a small commune's local digital newspaper), the economic factor is almost non-existing. To confirm that the results adhere to the news media ecosystem and do not mimic a behavior common to the social media sphere as a whole, we repeat the experiments on a different topical domain, namely the followers of a group of football players (see section 4.2). We filtered the data to keep only football players that were born, play or live in Santiago (this condition matched six players). We also kept only the followers that were geolocated in one of the 51 communes of the capital region. The regression model trained with the three selected features, on average, is able to explain only 84% (SD = 0.06) of the variance in cross validation. Although the model also gives a good fit for this data, it is clearly less explanatory than for the news outlets (over 10% lost of precision compared to the news outlets). Notice that it is very difficult, if not impossible, to find a public/popular figure for which the followers are not influenced by neither of these three factor. So, the results must be evaluated relative to each other. Another way to differentiate the two datasets is by comparing the individual influence of each dimension. We calculated the KT correlation coefficient for all three dimensions for each of the top 6 players (see figure 8). We found that, compared with the news outlets, the difference in the average correlation is statically significant for all three features (right-leaning: t = 8.31, p < .001; income: t = 7.93, p < .001; distance t = 2.39, p = .03). We can also see that the profile obtained for each individual player (shown in the shaded area in figure 6) differs from that of the news outlets. In this case, football players tend to have a comparatively stronger influence from the geographic factor and politics plays a lesser role. The found differences between the two datasets indicate that the distribution of followers for the news outlets is not entirely determined by the social media substrate but is defined by the characteristics of the entities. In general, our results support the idea of a media system entirely motivated by economic interest as described by the theoretical models that prompted the current study. This profit-driven media system seems to promote selective coverage that targets specific segments of the population based on the "quality" of the readership. Notice that a relationship between these features (geographic, social and economic) and media reach is, of course, not a direct proof of a causal relation. However, Elejalde et al. Page 14 of 19 we assume that there is a natural order of information demand and supply: news media models usually presume that readers get some value from the news they read (e.g., entertainment or arguments to decide on a private action) [56, 2, 57]. In other words, we consider that people following a newspaper account are interested in the "editorial line" of that newspaper. This means that the news outlet is creating content that is attractive to a specific audience. 6 Conclusions This work presents a method to characterize the news outlets in the media system based on the geographic, socioeconomic and political profile of their audiences. Under the assumption of a natural order of information demand and supply (i.e., readers gets some value from the news [57]), this modeling of the media can imply a conscious targeting of some specific public by catering to their preferences. Using data from multiple sources we found that news outlets systematically prefer followers from densely populated areas with a specific socioeconomic profile. The political leaning of the commune proved to be the most discriminating feature on the prediction of the level of readership ratings. These findings support the theoretical claim that describe the news media outlets as profit-driven companies [1, 2]. Although our model seems to generalize quite well and lends evidence to the hypotheses, we recognize that the methods have some limitations. First, we are restricted to users that we are able to geo-locate using the location field from the Twitter profile. A more sophisticated method of location could increase the number of valid users and maybe increase the precision of the model for other regions. A second limitation comes from the fact that the political and economic dimension seem to be closely related. This prevents us from creating a characterization of the outlets that better reflect the actual preference for a population with either a certain political profile or a socioeconomic range, but not both. The entanglement of these two dimensions may be due to the reality of the studied country. Besides the limitations in the location of the users, the choice to use Twitter followers as a proxy for the audience of the news outlet may introduce some bias and noise to our study. For example, it is difficult to determine the actual demographics of the population in the social media [58]. An alternative method to effectively define the actual audience of the news outlets (e.g., monitoring the passive and active traffic on the selected Twitter accounts or websites) could complement our method and improve the predictive capability of our model in areas with a weaker signal (e.g., beyond the Metropolitan Region). This is left for future work. In summary, the results seem to support the hypothesis that outlets focus on reaching and acquiring an audience with a higher "quality", that can be latter sell to advertisers. This type of media system neglect areas of low population (e.g., rural communes) and high deprivation levels, causing these to be underserved and underrepresented in the news coverage. In turn, this creates a full cycle when public policies and politicians overlook sectors of the population that are less informed and hence, are less likely to influence the status quo of the political elite. We often say that outlets are "biased". Thus, it is important to define what it means for these companies to be biased to: one example, and the assumption of our work, is that news outlets are businesses, and as such are motivated by economic Elejalde et al. Page 15 of 19 interests. If we think of news outlets as a profit-oriented business, we notice that they are perfectly rational in their effort to select content that generates a greater return (a generalization of the "sex sells" maxim). It is only when we try to hold on to the traditional view of news outlets as servers of the common good and advocates of democracy that the concept of bias becomes relevant again. Whatever the case, given the influence that news outlets have in society, we should be well aware of their behavior to be able to appropriately process the information they distribute. 7 Declarations Availability of data and material Twitter's term of service do not allow redistribution of Twitter content but query terms used are included in the manuscript. Using this information, interested researchers can recreate the underlying dataset. Competing interests The authors declare that they have no competing interests. Funding The authors acknowledge financial support from Movistar - Telef´onica Chile, the Chilean government initiative CORFO 13CEE2-21592 (2013-21592-1-INNOVA PRODUCCION2013-21592-1), Conicyt PAI Networks (REDES170151) "Geo - Temporal factors in disease spreading and prevention in Chile" (LF). This work was also supported in part by the doctoral scholarships of CONICYT-PCHA No. 63130228 (EE). Author's contributions All authors contributed equally to this work. Acknowledgements Author details 1Department of Computer Science, University of Concepcion, Concecpci´on, Chile. 2Data Science Institute, Universidad del Desarrollo, Santiago, Chile. 3Telef´onica R&D, Santiago, Chile. 4University of Turin, Turin, Italy. References 1. Herman, E.S., Chomsky, N.: Manufacturing Consent: the Political Economy of the Mass Media, 2nd. edn. Pantheon Books, New York, NY (2002). https://books.google.cl/books?id=Up5sAAAAIAAJ 2. Prat, A., Stromberg, D.: The political economy of mass media. In: Acemoglu, D., Arellano, M., Dekel, E. (eds.) Advances in Economics and Econometrics, pp. 135–187. Cambridge University Press, ??? (2011). https://doi.org/10.1017/cbo9781139060028.004 3. Zipf, G.K.: Some determinants of the circulation of information. The American Journal of Psychology 59(3), 401–421 (1946) 4. Zipf, G.K.: The P1P2/D hypothesis: on the intercity movement of persons. American Sociological Review 11(6), 677–686 (1946) 5. Pew Research Center for the People & the Press: Too much celebrity news, too little good news. U.S. Politics & Policy. Pew Research Center (2007). Available from: http://www.people-press.org/2007/10/12/too-much-celebrity-news-too-little-good-news/ [Accessed 02-Jan-2018] 6. Pew Research Center for the People & the Press: Haiti, snowstorms, economy vie for public's attention. The State of the News Media. Journalism & Media. Pew Research Center (2010). Available from: http://www.people-press.org/2010/02/17/haiti-snowstorms-economy-vie-for-publics-attention/ [Accessed 02-Jan-2018] 7. Hamilton, J.T.: All the News That's Fit to Sell: How the Market Transforms Information Into News. Princeton University Press, Princeton, New Jersey (2004). http://www.jstor.org/stable/j.ctt7smgs 8. Wikipedia: Native Advertising. Wikipedia, The Free Encyclopedia. Available from: https://en.wikipedia.org/wiki/Native_advertising [Accessed 12-August-2017] (2017) 9. Fletcher, P.: Native advertising will provide a quarter of news media revenue by 2018. Forbes (2017). Available from: https://www.forbes.com/sites/paulfletcher/2016/11/30/native-advertising-will-provide-a-quarter-of-news-media-revenue-by-2018/#75950afa2d0c [Accessed 12-August-2017] 10. Reinikka, R., Svensson, J.: Fighting corruption to improve schooling: Evidence from a newspaper campaign in uganda. Journal of the European Economic Association 3(2-3), 259–267 (2005) 11. Keefer, P., Khemani, S.: Democracy, public expenditures, and the poor: Understanding political incentives for providing public services. The World Bank Research Observer 20(1), 1–27 (2005) 12. Eagle, N., Macy, M., Claxton, R.: Network diversity and economic development. Science 328(5981), 1029–1031 (2010) 13. Smith, C., Quercia, D., Capra, L.: Finger on the pulse: Identifying deprivation using transit flow analysis. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work. CSCW '13, pp. 683–692. ACM, New York, NY, USA (2013). http://doi.acm.org/10.1145/2441776.2441852 14. Park, S., Kang, S., Chung, S., Song, J.: A computational framework for media bias mitigation. ACM Trans. Interact. Intell. Syst. 2(2), 8–1832 (2012) Elejalde et al. Page 16 of 19 15. Gentzkow, M., Shapiro, J.M.: What drives media slant? evidence from u.s. daily newspapers. Econometrica 78(1), 35–71 (2010) 16. Zhou, D.X., Resnick, P., Mei, Q.: Classifying the political leaning of news articles and users from user votes. In: Proceedings of the International AAAI Conference on Web and Social Media (2011). http://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2782 17. Sudhahar, S., Lansdall-Welfare, T., Flaounas, I., Cristianini, N.: Electionwatch: Detecting patterns in news coverage of us elections. In: Proceedings of the Demonstrations at the 13th Conference of the European Chapter of the Association for Computational Linguistics. EACL '12, pp. 82–86. Association for Computational Linguistics, Stroudsburg, PA, USA (2012). http://dl.acm.org/citation.cfm?id=2380921.2380938 18. Elejalde, E., Ferres, L., Herder, E.: On the nature of real and perceived bias in the mainstream media. PLOS ONE 13(3), 0193765 (2018) 19. Bahamonde, J., Bollen, J., Elejalde, E., Ferres, L., Poblete, B.: Power Structure in Chilean News Media. ArXiv e-prints (2017). 1710.06347 20. Mullen, A.: The propaganda model after 20 years: Interview with edward s. herman and noam chomsky. Westminster Papers in Communication and Culture. 6(2), 12–22 (2009) 21. Robinson, P.: The Propaganda Model: Still Relevant Today?, pp. 77–96. Palgrave Macmillan UK, London (2015). http://dx.doi.org/10.1007/978-1-137-32021-6 5 22. Edmonds, R., Guskin, E., Rosenstiel, T., Mitchell, A.: Newspapers: Building digital revenues proves painfully slow. The State of the News Media. Journalism & Media. Pew Research Center (2012). Available from: http://assets.pewresearch.org/wp-content/uploads/sites/13/2017/05/24141622/State-of-the-News-Media-Report-2012-FINAL.pdf [Accessed 20-May-2016] 23. Stocking, G.: Digital news fact sheet. The State of the News Media. Journalism & Media. Pew Research Center (2017). Available from: http://www.journalism.org/fact-sheet/digital-news/ [Accessed 20-January-2018] 24. Mitchell, A., Gottfried, J., Shearer, E., Lu, K.: How americans encounter, recall and act upon digital news. Analysis. Journalism & Media. Pew Research Center (2017). Available from: http://www.journalism.org/2017/02/09/how-americans-encounter-recall-and-act-upon-digital-news/ [Accessed 20-January-2018] 25. Mitchell, A., Gottfried, J., Barthel, M., Shearer, E.: Pathways to news. The Modern News Consumer. Journalism & Media. Pew Research Center (2016). Available from: http://www.journalism.org/2016/07/07/pathways-to-news/ [Accessed 20-January-2018] 26. Malik, M.M., Pfeffer, J.: A macroscopic analysis of news content in twitter. Digital Journalism 4(8), 955–979 (2016) 27. Poderopedia. Poderomedia Foundation: Mapa de Medios. Available from: http://apps.poderopedia.org/mapademedios/index/ [Accessed 12-May-2017] (2016) 28. Wikipedia: Medios de comunicaci´on en Chile. Wikipedia, The Free Encyclopedia. Available from: https://es.wikipedia.org/wiki/Medios_de_comunicaci%C3%B3n_en_Chile [Accessed 12-August-2017] (2017) 29. Trefis Team: Twitter's surprising user growth bodes well for 2017. Forbes (2017). Available from: https://www.forbes.com/sites/greatspeculations/2017/04/27/twitters-surprising-user-growth-bodes-well-for-2017/#151668952e11 [Accessed 22-August-2017] 30. Mocanu, D., Baronchelli, A., Perra, N., Gon¸calves, B., Zhang, Q., Vespignani, A.: The twitter of babel: 31. Mapping world languages through microblogging platforms. PLoS ONE 8(4), 61981 (2013) INE: Demogr´aficas vitales. Instituto Nacional de Estad´ısticas de Chile (INE). Available from: http://www.ine.cl/canales/chile_estadistico/familias/demograficas_vitales.php [Accessed 12-December-2017] (2013) 32. Bravo, D., naga, O.L., Mill´an, I., Ruiz, M., Zamorano, F.: Informe final comisi´on externa revisora del censo 2012. Technical report, PNUD, Santiago, Chile (2013). Available from: http://www.cl.undp.org/content/dam/chile/docs/pobreza/undp_cl_pobreza_informe_censo_2013.pdf?download [Accessed 18-Feb-2018] 33. Social, O.: Encuesta de Caracterizaci´on Socioecon´omica Nacional (CASEN) 2013. Minesterio de Desarrollo Social (Gobierno de Chile). Available from: http://observatorio.ministeriodesarrollosocial.gob.cl/casen-multidimensional/casen/casen_2013.php [Accessed 12-December-2017] (2015) 34. SERVEL: Elecciones Presidenciales 1989 al 2013 por Circunscripci´on Electoral. Servicio Electoral de Chile. Available from: https://www.servel.cl/elecciones-presidenciales-1989-al-2013-por-circunscripcion-electoral/ [Accessed 12-August-2017] (2017) 35. Ozdikis, O., Oguztuzun, H., Karagoz, P.: A survey on location estimation techniques for events detected in twitter. Knowl. Inf. Syst. 52(2), 291–339 (2017) 36. Ajao, O., Hong, J., Liu, W.: A survey of location inference techniques on twitter. J. Inf. Sci. 41(6), 855–864 (2015) 37. Kordopatis-Zilos, G., Papadopoulos, S., Kompatsiaris, I.: Geotagging text content with language models and feature mining. Proceedings of the IEEE 105(10), 1971–1986 (2017) 38. Amitay, E., Har'El, N., Sivan, R., Soffer, A.: Web-a-where: Geotagging web content. In: Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. SIGIR '04, pp. 273–280. ACM, New York, NY, USA (2004). http://doi.acm.org/10.1145/1008992.1009040 39. Serdyukov, P., Murdock, V., van Zwol, R.: Placing flickr photos on a map. In: Proceedings of the 32Nd International ACM SIGIR Conference on Research and Development in Information Retrieval. SIGIR '09, pp. 484–491. ACM, New York, NY, USA (2009). http://doi.acm.org/10.1145/1571941.1572025 40. Cheng, Z., Caverlee, J., Lee, K.: You are where you tweet: A content-based approach to geo-locating twitter users. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management. Elejalde et al. Page 17 of 19 (a) Population (b) Average distance to news outlets (c) Income (d) Right-leaning Figure 1: Summary of four different metrics for Chile. From left to right, top to bottom: population, distance, income and political-leaning CIKM '10, pp. 759–768. ACM, New York, NY, USA (2010). http://doi.acm.org/10.1145/1871437.1871535 41. Ryoo, K., Moon, S.: Inferring twitter user locations with 10 km accuracy. In: Proceedings of the 23rd International Conference on World Wide Web. WWW '14 Companion, pp. 643–648. ACM, New York, NY, USA (2014). http://doi.acm.org/10.1145/2567948.2579236 42. Backstrom, L., Sun, E., Marlow, C.: Find me if you can: Improving geographical prediction with social and spatial proximity. In: Proceedings of the 19th International Conference on World Wide Web. WWW '10, pp. 61–70. ACM, New York, NY, USA (2010). http://doi.acm.org/10.1145/1772690.1772698 43. Kong, L., Liu, Z., Huang, Y.: Spot: Locating social media users based on social network context. Proc. VLDB Endow. 7(13), 1681–1684 (2014) 44. Hecht, B., Hong, L., Suh, B., Chi, E.H.: Tweets from justin bieber's heart: The dynamics of the location field in user profiles. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI '11, pp. 237–246. ACM, New York, NY, USA (2011). http://doi.acm.org/10.1145/1978942.1978976 45. Albers, C.: Mapas de las Provincias y Regiones de Chile. Cartograf´ıa Rulamahue. Available from: http://www.rulamahue.cl/ [Accessed 18-October-2017] (2016) 46. Hallin, D.C., Mancini, P.: Comparing Media Systems: Three Models of Media and Politics. Communication, Society and Politics. Cambridge University Press, ??? (2004). https://books.google.it/books?id=954NJChZAGoC 47. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001) 48. Wikipedia: Lo Prado. Wikipedia, The Free Encyclopedia. Available from: https://es.wikipedia.org/wiki/Lo_Prado [Accessed 12-August-2017] (2017) 49. Wikipedia: San Miguel (Chile). Wikipedia, The Free Encyclopedia. Available from: https://es.wikipedia.org/wiki/San_Miguel_(Chile) [Accessed 12-August-2017] (2017) 50. Orellana, A.: Icvu 2017: ´ındice de calidad de vida urbana. comunas y ciudades de chile. Technical report, Instituto de Estudios Urbanos y Territoriales. Pontificia Universidad Cat´olica de Chile, Santiago, Chile (2017). Available from: http://fadeu.uc.cl/images/noticias/2017/05.Mayo/Presentacion_ICVU_2017_.pdf [Accessed 10-January-2018] 51. von Baer, H., Torralbo, F.: Chile descentralizado y desarrollado: Fundamentos y propuestas para construir una pol´ıtica de estado en descentralizaci´on y desarrollo territorial en chile. 95 propuestas para un Chile mejor (2013). Available from: http://95propuestas.cl/site/wp-content/uploads/2013/05/chile-descentralizado-y-desarrollado-heinrich-von-baer-y-felipe-torralbo.pdf [Accessed 10-January-2018] 52. de Chile, B.C.: Cuentas Nacionales de Chile. PIB Regional 2016. Available from: http://www.bcentral.cl/documents/20143/32019/CCNNPIB_Regional2016.pdf [Accessed 30-December-2017] (2017) 53. Wikipedia: Radio Cooperativa (Chile). Wikipedia, The Free Encyclopedia. Available from: 54. https://es.wikipedia.org/wiki/Radio_Cooperativa_(Chile) [Accessed 30-December-2017] (2017) Ipsos: Ranking General de Audiencia Gran Santiago. Ipsos Radio 2016. Available from: http://www.ipsos.cl/ipsosradioalaire/pagdos.htm [Accessed 30-December-2017] (2015) 55. Fundaci´on Democracia y Desarrollo: El Quinto Poder. FD+D. Available from: http://www.elquintopoder.cl/ [Accessed 30-December-2017] (2010) 56. Anderson, S.P., McLaren, J.: Media mergers and media bias with rational consumers. Journal of the European Economic Association 10(4), 831–859 (2012) 57. Besley, T., Prat, A.: Handcuffs for the grabbing hand? media capture and government accountability. American Economic Review 96(3), 720–736 (2006) 58. Cesare, N., Grant, C., Nsoesie, E.O.: Detection of user demographics on social media: A review of methods and recommendations for best practices. CoRR abs/1702.01807 (2017) Figures Tables Elejalde et al. Page 18 of 19 (a) All news outlets (b) Local news outlets (c) National news out- lets Figure 2: Distribution of the correlation coefficients (Gravity Model vs. Ground-Truth). First we show the distribution for all outlets in our database and them the distribution for two separate classes: Local-scope and National-scope news outlets Figure 3: Learning curve of the Random Forest regressor model for the top 25 news outlets in Santiago. Each step represents the average of 100 iterations of shuffle split cross-validation with 20% of the data for validation. Table 1: Summary of news outlets and football players followers on Twitter. Unique users Users w/ non-empty location Users w/ useful location Users w/ GPS coord Users w/ high confidence location # Outlets' Followers # Players' Followers 6,568,769 (100%) 2,434,183 (37%) 540,828 (8%) 2,041 (0.03%) 383,207 (6%) 4,943,351 (100%) 1,579,068 (31%) 996,326 (20%) 4,829 (0.1%) 597,981 (12%) Table 2: Stats about the news outlets' correlation coefficients. Category Outlets w/ nacional scope w/ local scope located in Santiago w/ nacional scope & located in Santiago Total 402 133 269 156 126 ρ > 0.7 203 23 180 29 18 ρ < 0.2 141 94 47 108 93 Table 3: Correlation between features Feature right-leaning income distance right-leaning 1.00 0.59 -0.48 income 0.59 1.00 -0.35 distance -0.48 -0.35 1.00 Figure 4: Explained variance using the regressor model for the top 25 news outlets in Santiago. (a) Number of follow- ers vs. Right-leaning (b) Number of follow- ers vs. Avg. Income (c) Number of follow- ers vs. Distance Figure 5: Distribution of the KT correlation for communes in the Metropolitan Region for the top 25 news outlets. Figure 6: KT correlation for communes in the Metropolitan Region for the top 25 news outlets. Each feature is correlated with the number of followers' ranking Elejalde et al. Page 19 of 19 Figure 7: KT correlation for communes in the Metropolitan Region for top 25 newspapers. Each feature is correlated with the number of followers ranking Figure 8: KT correlation for communes in the Metropolitan Region com- paring News Outlets and Football players behaviour. Each feature is corre- lated with the number of followers' ranking of the corresponding dataset.
1901.03829
1
1901
2019-01-12T09:05:34
Predicting Diffusion Reach Probabilities via Representation Learning on Social Networks
[ "cs.SI", "cs.LG", "stat.ML" ]
Diffusion reach probability between two nodes on a network is defined as the probability of a cascade originating from one node reaching to another node. An infinite number of cascades would enable calculation of true diffusion reach probabilities between any two nodes. However, there exists only a finite number of cascades and one usually has access only to a small portion of all available cascades. In this work, we addressed the problem of estimating diffusion reach probabilities given only a limited number of cascades and partial information about underlying network structure. Our proposed strategy employs node representation learning to generate and feed node embeddings into machine learning algorithms to create models that predict diffusion reach probabilities. We provide experimental analysis using synthetically generated cascades on two real-world social networks. Results show that proposed method is superior to using values calculated from available cascades when the portion of cascades is small.
cs.SI
cs
Predicting Diffusion Reach Probabilities via Representation Learning on Social Networks Furkan Gursoy Ahmet Onur Durahim [email protected] [email protected] Dept. of Management Information Systems Bogaziçi University Istanbul, Turkey Abstract Diffusion reach probability between two nodes on a network is defined as the probability of a cascade originating from one node reaching to another node. An infinite number of cascades would enable calculation of true diffusion reach probabilities between any two nodes. However, there exists only a finite number of cascades and one usually has access only to a small portion of all available cascades. In this work, we addressed the problem of estimating diffusion reach probabilities given only a limited number of cascades and partial information about underlying network structure. Our proposed strategy employs node representation learning to generate and feed node embeddings into machine learning algorithms to create models that predict diffusion reach probabilities. We provide experimental analysis using synthetically generated cascades on two real-world social networks. Results show that proposed method is superior to using values calculated from available cascades when the portion of cascades is small. Keywords Social Networks · Information Networks · Representation Learning · Influence Maximization 1 Introduction Social networks play an increasingly important role in our daily lives, and in the world in general. Politics, business, and other matters of our lives are significantly shaped by social influence that we are exposed to via the social networks we are part of. The world has evolved to be a place where information can spread very quickly and easily through cascades. Information cascades in social networks can be modeled by stochastic models such as Markov random fields (Domingos & Richardson, 2001), Independent Cascade Model (ICM), Linear Threshold Model (LTM) (Kempe, Kleinberg, & Tardos, 2003), or deterministic models such as Deterministic LTM (Gursoy & Gunnec, 2018). In this work, we employ ICM which is one of the most commonly studied diffusion model in the literature. Independent Cascade Model (ICM) assumes that diffusion time steps are discrete. At any time, a node can be either active (i.e., influenced) or inactive. An active node may attempt to activate a neighboring inactive node only once, and a node cannot become inactive later once it is active (i.e., a progressive model). The process starts with some initially active nodes which serve as the seed nodes. A node v that is activated at time t tries to activate Citation: Gursoy, F., & Durahim, A. O. (2018). Predicting Diffusion Reach Probabilities via Representation Learning on Social Networks. Proceedings of the 5th International Management Information Systems Conference. doi:10.6084/m9.figshare.7565894 1 Figure 1: Independent Cascade Model its inactive neighbor nodes at time t + 1. The attempt is successful with probability pvu. The process runs until the time step where no more nodes get activated. Figure 1 illustrates the diffusion process in ICM. B is selected as the seed node and activated at t = 0. It then attempts to activate its neighbors. A, C, and E have activation probabilities of pBA, pBC, and pBE respectively. At t = 1, only A is activated by B; and B cannot activate any of its neighbors anymore. A then proceeds to activate D in a similar fashion. After D attempts to activate its neighbors and activate G, the diffusion terminates since there does not remain any active node which can attempt to activate neighbors. Diffusion reach probability between two nodes can be defined as the probability of the cascade originating from a node reaching to the other node, by traversing the nodes between them if there are any. An infinite number of cascades would enable calculation of diffusion reach probabilities, however there exists only a finite number of cascades, and in general only a limited portion of them are accessible. Predicting such probabilities is, therefore, a nontrivial problem. Machine learning might be utilized in such prediction tasks. However, most machine learning algorithms require input data to be in a tabular form in which rows represent cases and columns represent feature space. The choice of the feature set has a significant effect on the performance of a machine learning model. Hence, a considerable amount of effort is actually spent on engineering better features. Representation learning is a way of automatically discovering important features which replaces the time consuming manual feature engineering. Representation learning in social networks is concerned about finding learning methods which can embed nodes to a latent space in a way that the resulting embeddings contain maximum information within a reasonable dimensionality. These learned latent features then can be used in machine learning tasks. 2 Related Work Apart from the earlier matrix factorization methods, seminal algorithm of Perozzi, Al-Rfou, & Skiena (2014) named DeepWalk paved the way for most of the future studies. DeepWalk is a random walk-based method, to learn latent representations of vertices in a network by optimizing the probability of nodes occurring in the same random walk using gradient descent. Tang et al. (2015) proposed Large-scale Information Network Embedding (LINE) which considers first-order proximity (i.e., sharing a tie) in addition to second-order proximity (i.e., sharing the neighborhood). This way, LINE improved DeepWalk which only considers second-order proximity. Improving this line of work even further, Grover & Leskovec (2016) proposed node2vec which generates biased 2 random walks by trading-off between depth-first search and breadth-first search. Hence, node2vec is able to discover a more diverse neighborhood structure. There are number of other studies which considers context of links and nodes (Tu, Liu, Liu, & Sun, 2017), node attributes (Huang, Li, & Hu, 2017); or focuses on developing a meta-strategy (Chen, Perozzi, Hu, & Skiena, 2017). On the other hand, Tu, Zhang, Liu & Sun (2016) and Wang, Cui, & Zhu (2016) develop semi-supervised representation learning algorithms. Another line of work in representation learning is concerned specifically with its applications related to information diffusion in social networks. Works of Bourigault, Lamprier, & Gallinari (2016) and Li, Ma, Guo, & Mei (2017) are among such studies which aims to predict diffusion probabilities or make use of existing information diffusion cascades in creating latent representations. Overall, the use of representation learning for information diffusion in social networks is a promising field. There is an ample space for development of more sophisticated algorithms, extending the existing problems to cover different problem settings, and applications of those methods in different fields including interdisciplinary works. 3 Methodology The main objective of this study is to predict the probability of a new diffusion cascade, on a given a directed social network G(V, E), originating from a node u reaching to any other node v given partial information on underlying network structure, only the connections and directions but not the strengths, and limited number of cascades on the actual network. Here, the ith cascade, Ci, contains timestep-node pairs (t, Vt) where Vt contains nodes v ∈ Vt that are activated at time t. 3.1 Dataset Generation Diffusion cascades are synthetically created under ICM using real-world graph datasets. Email-Eu-core (Leskovec, Kleinberg, & Faloutsos, 2007) is a directed network generated from internal email data of a large European research institution. There is an edge (u, v) in the network if person u sent person v an email. Bitcoin Alpha (Kumar, Spezzano, Subrahmanian, & Faloutsos, 2016) is the who-trusts-whom directed network of people who trade using Bitcoin on a platform called Bitcoin Alpha. Number of nodes and links for each network is shown in Table 1. Diffusion cascades are created in the following way. We assign activation probabilities puv, the probability that node u activates node v, randomly between 0 and a selected value maxp. Then, for each node v ∈ V , number r of cascades are initiated by activating v. The diffusion takes place according to the ICM. In this way, total of V r cascades are generated for each dataset. Note that, the activation probabilities which are assigned for generating diffusion cascades are assumed to be unknown in the rest of the study. As far as the rest of the study concerns, the cascades are treated to be generated by some unknown processes or taken from real-world cascades. Table 1: Graphs used in the study Email-Eu-core Bitcoin Alpha # of nodes # of links 25,571 24,186 1005 3783 3 Algorithm 1 Actual Diffusion Probability Calculation Input: C: a cascade list where C[i][j][k] is the kth node activated at time j for the cascade i, x: number of cascades, y: number of timesteps a particular cascade diffuses for, z: number of nodes a cascade contains at a particular timestep, r: number of cascades for each node for j = 1 to y do for k = 1 to z do M [C[i][1][1]], [C[i][j][k]]+ = 1 1: M ← a zero matrix to count how many times each node appeared in all cascades for given seed nodes 2: for i = 1 to x do 3: 4: 5: 6: 7: 8: end for 9: for i = 1 to V do 10: 11: 12: 13: end for Output: A, where A[i, j] is the actual diffusion probability from node i to node j for j = 1 to V do A[i, j] = M [i, j]/r end for end for end for 3.2 Proposed Method Our proposed method aims to predict diffusion probabilities between any two nodes regardless of whether they are neighbors or not. Thus, to measure accuracy, we need actual and predicted values. The actual diffusion probability between u and v is assigned as P (vV∗,0 = {u}) that is the probability of v occurring in a cascade started from u. The algorithm for calculating actual reach probabilities is given in Algorithm 1. Note that, as r approaches to infinity, our actual values approach to their true values. Therefore, it is important to make the distinction between true values, actual values, label values, and predicted values. Actual values are indeed estimations of true values. Since we assume that we can not precisely know the true activation values, computing the actual values from all generated cascades allows us to obtain some accuracy scores by comparing them with the predicted values. Label values, on the other hand, are calculated using only a portion of all cascades and used in training of the model. Label values are calculated in the same way as actual values. The node embeddings are generated by node2vec algorithm. Given a node embedding ev for node v and node embedding eu for node u, link embedding evu is created by concatenating ev and eu. Note that, link embeddings are created for every node pair regardless of whether they are neighbors in the network or not. Machine learning models from Python's scikit-learn library are then used to train the models. Link embeddings are used as features and corresponding label probabilities are used as target values. There are as much as V (V − 1) link embeddings since there is an embedding for each node pair. The source code and datasets employed in this study are available at furkangursoy.github.io 4 Experimental Results For each graph, two cascade sets are generated: one with random activation probabilities between 0 and 0.05, and the other one with probabilities between 0 and 0.1. Therefore, we obtain a total of 4 different cascade sets. Each cascade set contains V r different cascades where r = 20 for the purposes of our experimental analysis. For each cascade set, label values are calculated based on portions of all cascades in the given cascade set. 10%, 20%, 40%, and 60% of all cascades are considered. The cascades are selected randomly from all cascades, resulting in different number of cascades for different seed nodes. This effectively results in 4 different sets of 4 label values (e.g., diffusion probabilities) for each cascade set. The intuition behind this is that; one has access only to a portion of all information cascades in real life. In total, we obtain 16 datasets to train our machine learning models. Parameters of node2vec are set as follows: directed network, 128 dimensions (i.e., number of latent features), walk length of 20, and window size of 5. Performance results are measured by Mean Absolute Error (MAE) and presented in Table 2. In the table, BM is an abbreviation for Benchmark and its value is calculated by comparing label values with actual probabilities. GrdBst is an abbreviation for Gradient Boosting, MLP is an abbreviation for Multilayer Perceptron. Performances of GrdBst and MLP is calculated by comparing predicted values with actual probabilities. Since it takes excessively long time for GrdBst to train, GrdBst experiments are not performed for Bitcoin Alpha. Table 2: Performance Results (MAE scores) Activation Prob. Cascade Portion BM GrdBst MLP (0, 0.05) (0, 0.1) 10% 20% 40% 60% 10% 20% 40% 60% Email-Eu-core Bitcoin Alpha BM MLP 0.0874 0.0538 0.0592 0.0013 0.0017 0.0667 0.0508 0.0514 0.0012 0.0015 0.0419 0.0498 0.0478 0.0009 0.0012 0.0272 0.0492 0.0460 0.0006 0.0014 0.1860 0.1118 0.1445 0.0210 0.0176 0.1219 0.0992 0.1055 0.0177 0.0164 0.0707 0.0959 0.0850 0.0118 0.0163 0.0459 0.0952 0.0867 0.0076 0.0175 If the portion rate was 100%, Benchmark error would be zero by definition. Accordingly, as the ratio of available cascades increases, performance of Benchmark gets better. However, when the available portion of cascades is smaller, machine learning algorithms perform better than the benchmark; which confirms our hypothesis that information extracted from the underlying network structure helps in predicting the diffusion reach probabilities in case of having only a portion of all cascades. In experiments for Email-Eu-core dataset, when 10% of cascades are available, error rate of GrdBst is 38% to 40% lower than error rate of BM whereas error rate of MLP is 22% to 32% lower. When available cascade portion is 20%, error rates of GrdBst and MLP are 19% to 24% and 14% to 23% lower than error rate of BM, respectively. Similar results hold for experiments on Bitcoin Alpha network when activation probabilities are set between 0 and 0.1. In both networks, when available portion of cascades increases beyond 40%, Benchmark begins to outperform our strategy. The experiments on Bitcoin Alpha with activation probabilities between 0 and 0.1 seem to be an exception among all experimental results. Therefore, as desired, our strategy works well for the cases where number of cascades is limited. When performances of GrdBst and MLP methods are compared in Email-Eu-core experiments, it can be seen that MLP has a more varying performance compared to GrdBst when available cascade portions change. Thus, the performance of GrdBst is less dependent on the portion of cascades whereas performance of MLP is influenced more by it. MLP outperforms GrdBst when there is a larger number of cascades, however; in the cases where MLP performs better than GrdBst, BM outperforms both. Experiments are performed on a computer with Intel Xeon CPU @ 2.40 GHz, and 64 GB memory. The average runtimes for training the learning models is given in Table 3. In addition to differences between the two algorithms, runtime of MLP is shorter since it works in parallel whereas GrdBst works on a single core. On the other hand, the large runtime differences between the two graphs are due to the size of the training data. Number of rows in the training data is proportional to the square of number of nodes. Accordingly, training data from Bitcoin Alpha has approximately 14 times more rows compared to that of Email-Eu-core. 5 Table 3: Runtime Results Email-Eu-core MLP Bitcoin Alpha MLP GrdBst ≈ 2 hours ≈ 10 minutes > 1 day ≈ 2.5 hours GrdBst 5 Conclusion In this work, we proposed a strategy which utilizes representation learning for predicting diffusion reach probabilities between nodes using the available cascade information on the network. Our work is novel in a sense that it aims to predict diffusion probabilities between any nodes regardless of whether they are neighbors or not, in comparison to previous literature where probabilities between neighboring nodes are of concern. Also, utilization of representation learning in diffusion probability prediction is, to the best of our knowledge, a novel strategy. Experimental analyses showed that MAE of our method is up to 40% lower than that of the benchmark when available portion of cascades is 10%, and up to 24% lower when portion of cascades is 20%. Hence, our novel strategy stands out as a promising method in predicting diffusion reach probabilities when only partial information about cascades and underlying network structure is available. Once the diffusion probabilities between all nodes are predicted, one can utilize this information to estimate diffusion cascades and design viral marketing campaigns accordingly. For instance, in deciding which seed set to hire among the candidate seed sets for an influencer marketing campaign in an online social network, the marketers can compare the estimated future cascades originated from these different seed sets. This can also be used in targeted campaigns where the final cascades are compared based on desired characteristics the nodes in those cascades have. Furthering the current work, we plan to improve on two aspects of this methodology. First, generation of link embeddings can be improved in a way that the latent representation contain more and better suiting information for the problem of diffusion reach probability prediction. Second, created models can be improved by experimenting with variety of machine learning algorithms as well as by designing a better training data (e.g., in terms of imbalance). Moreover, scalable methods should be developed to accommodate larger networks. 6 Acknowledgement This research was partially supported by Bogazici University Research Fund (BAP), Project Number: 15N03SUP2. 6 References Bourigault, S., Lamprier, S., & Gallinari, P. (2016). Representation learning for information diffusion through social networks. Proceedings of the Ninth ACM International Conference on Web Search and Data Mining - WSDM 16. Chen, H., Perozzi, B., Hu, Y., & Skiena, S. (2017). HARP: hierarchical representation learning for networks. arXiv preprint arXiv:1706.07845. Domingos, P., & Richardson, M. (2001). Mining the network value of customers. Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 01. Grover, A., & Leskovec, J. (2016). Node2vec: Scalable feature learning for networks. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 16. Gursoy, F., & Gunnec, D. (2018). Influence maximization in social networks under deterministic linear threshold model. Knowledge-Based Systems. Huang, X., Li, J., & Hu, X. (2017). Accelerated attributed network embedding. Proceedings of the 2017 SIAM International Conference on Data Mining, 633-641. Kempe, D., Kleinberg, J., & Tardos, É. (2003). Maximizing the spread of influence through a social network. Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 03. Kumar, S., Spezzano, F., Subrahmanian, V. S., & Faloutsos, C. (2016). Edge weight prediction in weighted signed networks. 2016 IEEE 16th International Conference on Data Mining (ICDM). Leskovec, J., Kleinberg, J., & Faloutsos, C. (2007). Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data, 1(1). Li, C., Ma, J., Guo, X., & Mei, Q. (2017). DeepCas: an end-to-end predictor of information cascades. Proceedings of the 26th International Conference on World Wide Web - WWW 17. Perozzi, B., Al-Rfou, R., & Skiena, S. (2014). Deepwalk: Online learning of social representation. Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 14. Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., & Mei, Q. (2015). Line: Large-scale information network embedding. Proceedings of the 24th International Conference on World Wide Web - WWW 15. Tu, C., Liu, H., Liu, Z., & Sun, M. (2017). CANE: Context-aware network embedding for relation modeling. Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Tu, C., Zhang, W., Liu, Z., & Sun, M. (2016, July). Max-Margin DeepWalk: Discriminative learning of network representation. In IJCAI (pp. 3889-3895). Wang, D., Cui, P., & Zhu, W. (2016, August). Structural deep network embedding. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1225-1234). ACM. 7
1711.05315
1
1711
2017-11-14T21:16:00
Ranking of nodes of networks taking into account the power function of its weight of connections
[ "cs.SI", "cs.NI", "physics.soc-ph" ]
To rank nodes in quasi-hierarchical networks of social nature, it is necessary to carry out a detailed analysis of the network and evaluate the results obtained according to all the given criteria and identify the most influential nodes. Existing ranking algorithms in the overwhelming majority estimate such networks in general, which does not allow to clearly determine the influence of nodes among themselves. In the course of the study, an analysis of the results of known algorithms for ranking the nodes of HITS, PageRank and compares the obtained data with the expert evaluation of the network. For the effective analysis of quasi-hierarchical networks, the basic algorithm of HITS is modified, which allows to evaluate and rank nodes according to the given criteria (the number of input and output links among themselves), which corresponds to the results of expert evaluation. It is shown that the received method in some cases provides results that correspond to the real social relation, and the indexes of the authorship of the nodes - pre-assigned social roles.
cs.SI
cs
Ranking of nodes of networks taking into account the power function of its weight of connections Soboliev A.M. 1, Lande D.V. 2 1 Post-graduate student of the Institute for Special Communications and Information Protection 2 Institute for Special Communications and Information Protection of NTUU «KPI named. Igor of NTUU «KPI named. Igor Sikorsky» [email protected], [email protected] Sikorsky» Abstract. To rank nodes in quasi-hierarchical networks of social nature, it is necessary to carry out a detailed analysis of the network and evaluate the results obtained according to all the given criteria and identify the most influential nodes. Existing ranking algorithms in the overwhelming majority estimate such networks in general, which does not allow to clearly determine the influence of nodes among themselves. In the course of the study, an analysis of the results of known algorithms for ranking the nodes of HITS, PageRank and compares the obtained data with the expert evaluation of the network. For the effective analysis of quasi-hierarchical networks, the basic algorithm of HITS is modified, which allows to evaluate and rank nodes according to the given criteria (the number of input and output links among themselves), which corresponds to the results of expert evaluation. It is shown that the received method in some cases provides results that correspond to the real social relation, and the indexes of the authorship of the nodes - pre-assigned social roles. Keywords: quasi-hierarchical networks of social nature, network subjects, ranking algorithm, HITS method, PageRank method, nodes ranking, matrix, F-measure, expert evaluation. 1. Introduction At present, when social networks are a component of society and are one of the mechanisms of influence on it, it is necessary to clearly understand all the possible risks that arise from it and be prepared for serious consequences in case of careless attitude to this situation. The expression "social networks" not only relates to social networks from the Internet, which are used as a means of communication, but also all communications that occur between people (social entities) for the transmission of information. Also, it should be noted that the social network should be understood as a network, the nodes of which are social subjects (social subject), and contacts - contacts that are accompanied by the exchange of information between them. By definition, a quasi-hierarchical network should be considered a network that is close to the hierarchical network, but its hierarchy is violated by a small number of additional links. 2. The purpose of the work The purpose of this work is to describe and evaluate the effectiveness of the proposed algorithm for ranking nodes of quasi-hierarchical networks of social nature, based on the modification of the known HITS algorithm in comparison with other algorithms for ranking nodes in the networks. When ranking a social network, one must understand the process of organizing nodes (social entities) on a specific basis, which allows one to determine the influence of the given nodes among themselves. For visual representation, this network is represented in the form of a directed graph, in which nodes are markers of subjects (social network profiles, telephone numbers, electronic mailboxes, etc.), and the links are directed to the links that occur between them. For a mathematical representation, such a graph is depicted in the form of a matrix of adjacent nodes and the value in the cell of the matrix reflects the number of directed bonds. To determine the impact of the nodes and to demonstrate the use of the Hyperlink- Induced Topic Search (HITS), consider a conventional hierarchical network of 6 nodes (Figure 1), to which each node will calculate the coefficients of auth and hub. Fig. 1. Hierarchical network Let us show the connections between nodes in the form of an adjacency matrix: , ] [ After the transposition we obtain the following matrix: , ] [ To calculate auth and hub of the basic HITS algorithm for data presented in the form of matrices, we use the following iterative formulas [Amy N. Langville, Carl D. Meyer, 2006]: ( ) ( ) ( ) ( ) , Where ( ) ( ) - vectors containing coefficients of auth and hub for each iteration k, over a certain number of repetitions. We modify the above-mentioned formulas to ensure the ability to count auth and hub indices independently of each other [Amy N. Langville, Carl D. Meyer, 2006]: ( ) ( ) ( ) ( ) For initialization of the formulas under the initial matrices ( ) ( )we use single vectors: ] [ ] [ ] [ ] [ ] [ ] [ ( ) ( ) ] [ [ ] ] [ [ ] [ ] [ ] From the results of nodes ranking by the basic HITS algorithm we will conclude that the fifth node contains the most relevant information, and nodes numbered 2 and 4 are the most portable, that is, they have a link to the node that contains the most useful information for a given search. The considered graph consists of a small number of links, and in this case, it is possible to visualize it and make the assumption that the most influential in this network is node number 5, since it has the largest number of input and output links. According to the HITS algorithm, two nodes are calculated for each network node:  mediation indicator (hub);  index of authorship (auth). The mediation rate of the hub Ai of the node Aj of the network, consisting of n nodes, is equal to the sum of the values of the authorship of the nodes to which it refers: ∑ The given formulas give a fast convergent iterative algorithm for calculating hub and auth for all nodes in the network. At a time when it comes to more complex networks (large-scale networks), where the number of nodes can be more than 1000 (large organizations, etc.), it is almost impossible without the special algorithms of the assumptions of the social actors that act as leaders of different rank [Lande D.V., Nechaev A.O., 2015]. Scale-free networks have the characteristic such as the distribution of nodes, which is defined as the probability that a node has a degree (the node's degree is the number of edges associated with that node). It is the networks with the indicative distribution of node degrees called scale-free, which are most often observed in real-life large networks. It should be noted that the number of links in the quasi-hierarchical networks of social nature is equal to the number of nodes and this statement can be represented in the following mathematical form: ( ) Where - the number of connections in the network, - the number of nodes in the network. If, when considering the quasi-hierarchical networks of social nature, there is a clear (and also significant) one-way communication, then even there is no question as to which of the pairs of nodes has a higher rank. In these networks, there are three general variants of relations for a pair of nodes:    The subordinate leader; Knots of the same rank; Nodes of the lower rank have a direct connection with nodes of a higher rank. In the case where subject A is the head of subject B in the social network it is proposed to consider as the aggregate weight of factors, one of the criteria of which is the time indicator. It should be noted that the head is chaotic with the subordinates, if necessary, the task, and the subordinate with a certain regular frequency reports on the implementation of the completed assignment to the head. In assessing the characteristics of the number of links, there is the fact that the head is more often associated with subordinates, that is, the weight of the outgoing communication from the head must exceed the weight of the incoming connection [Lande D.V., Nechaev A.O., 2015]. It should be noted that only the generalized and most widespread template for subordinate and manager contacts is considered. In real work, this template can be supplemented in some cases by other specific characteristics, which will increase the effectiveness of the weight estimation of pairs of nodes contacts [Liu Y.Y., Jean- Jacques Slotine J.J., Barabasi A.L., 2012]. Occasionally, when a lower-level employee assists a higher-ranking employee in work processes, or a higher-ranking manager gives the employee a much lower level of hierarchy, this leads to the emergence of non-hierarchical links in such a network. Such cases, as a rule, are not much to consider the network as quasi-hierarchical. Meanwhile, the use of the basic HITS algorithm for ranking nodes in the above mentioned network may not provide the desired result, because even a weak and insignificant connection (if not taking into account its weight) can greatly affect the portability and authorship of nodes [Bargh JA, Chen M., 1996]. You can use PageRank algorithms to rank nodes in social networks: ( ) ( ) ∑ ( ) ( ) Where PR(A) - the PageRank weight for page A, d - the attenuation factor PR(Ti)- the PageRank weight of the page that points to page A, C(Ti)- the number of links from this page, n - the pages linking to page A. 3. Presentation of the main results For the mathematical realization of the iterative principle of ranking nodes in large quasi-hierarchical networks of social nature should be noted that the most influential on the network entity is the one who has the largest number of outbound connections with other network entities. To demonstrate and determine the effectiveness of nodes ranking, consider the quasi- hierarchical networks of social nature, which consists of 14 subjects (Figure 2), between which certain links are known to be distributed, and we use the above- mentioned algorithms and compare the results obtained with each other. When ranking the network algorithm HITS in the final result we get two parameters: auth and hub, which does not allow to reject the network at the same time according to two criteria. To solve this question, you must use a metric that combines information about auth and hub of our algorithm. It is by such a metric that we use the F-measure: ( ) Where ( ) - F-measure of node Aj network, hub Ai - mediation indicator auth Ai - index of authorship. Fig. 2. Quasi-hierarchical network of social character Table 1. Results of ranking of network nodes using PageRank algorithms and the basic HITS algorithm and expert assessment Expert evaluation (No. node) No. node PageRank No. node 1 2 3 9 5 11 4 12 10 13 6 14 7 8 2 11 1 3 9 6 10 13 7 14 12 8 5 4 0.167483 0.106627 0.089799 0.085644 0.076856 0.073306 0.067540 0.066458 0.063547 0.050122 0.042552 0.037723 0.037363 0.034981 2 11 9 3 5 6 12 1 10 13 14 7 4 8 HITS auth hub F 0.153005 0.128415 0.056011 0.092896 0.094262 0.086066 0.050546 0.050546 0.036885 0.043716 0.075136 0.013661 0.087431 0.031421 Having analyzed the obtained results of network ranking (Table 1), it is evident that the parameters of auth and hub are equal, since in the quasi-hierarchical networks of social nature basically there are feedback links between nodes and the basic algorithm of HITS does not provide the necessary result of ranking such networks. Also, comparing the results of the algorithms of HITS and PageRank with expert assessment data, it can be argued that in the basic form, the above-mentioned algorithms are ineffective for ranking nodes in the quasi-hierarchical networks of social nature. PageRank takes into account only inbound links and does not distinguish between such an entity as an intermediary, which has a significant impact on the overall result, since minor links in the network can radically change it. To adapt the method, it is proposed to use the modified HITS algorithm and, in calculating each indicator of the network nodes, take into account the weight of the ribs. At the same time, the uneven distribution of weight values may affect the reliability of the result, therefore their value must be reduced by multiplying by some monotonically increasing function, less steep than linear. Within the framework of the proposed algorithm, as a function, we use the modified HITS algorithm and modify the formulas by summing up the weight of the links between the nodes and from this follows: ∑ ∑ Where hub is the mediation rate of the node of the network, auth is the index of authorship of the node , is the weight of the links between the nodes and (respectively, between the nodes and )), is the degree. Table 2. Results of ranking of network nodes with modified PageRank algorithm and expert Expert evaluation (No. node) No. node 1 2 3 9 5 11 4 12 1 2 3 9 5 11 4 12 assessment HITS auth hub F 0.100370 0.787807 0.041181 0.020522 0.014123 0.006428 0.011803 0.007220 0.731910 0.059213 0.111308 0.029625 0.036793 0.022866 0.003188 0.001528 0.176532 0.110147 0.060119 0.024247 0.020411 0.010036 0.005020 0.002522 10 13 6 14 7 8 10 13 6 14 7 8 0.002461 0.001983 0.003320 0.002637 0.000097 0.000048 0.001232 0.001163 0.000620 0.000333 0.000212 0.000008 0.001642 0.001466 0.001044 0.000591 0.000134 0.000014 Having evaluated the results of the modified HITS algorithm at ( ) (Table 2) with expert assessment data, it can be argued that they coincide with each other and the modified HITS method is effective in the overall assessment in the quasi- hierarchical networks of social nature. For a detailed assessment of the network, it is necessary to analyze the obtained results of auth and hub with experts data, since even minor relationships can significantly affect the ranking of results and the identification of the most significant nodes in the network. Table 3. Results of ranking of network nodes with modified PageRank algorithm and expert assessment. Expert evaluation (No. node) No. node (auth) No. node (hub) 1 2 3 9 5 11 4 12 10 13 6 14 7 8 2 1 3 9 5 4 12 11 6 14 10 13 7 8 1 3 2 5 9 11 4 12 10 13 6 14 7 8 After studying the results (Table 3), it can be argued that the numbers of the most significant redirected nodes according to auth and hub are different from the results of the expert assessment and require the correction of degree a in the above formula. To evaluate the network, use the parameter and carry out a repeated study. Table 4. Results of ranking of network nodes with modified PageRank algorithms and expert assessment. HITS, HITS, No. node No. node (auth) (hub) 2 1 3 9 5 11 4 12 6 14 10 13 7 8 1 3 2 5 9 11 4 10 12 13 6 14 7 8 F 1 2 3 9 5 11 4 12 10 13 6 14 7 8 No. node No. node (auth) (hub) 1 2 3 9 5 11 12 4 6 14 13 10 7 8 1 3 2 5 9 11 10 4 13 12 6 14 7 8 F 1 3 2 9 5 11 4 12 10 13 6 14 7 8 Expert evaluation (No. node) 1 2 3 9 5 11 4 12 10 13 6 14 7 8 In the process of studying the results obtained in table 4 modified HITS algorithm, there is a significant difference in the calculated parameters and it is determined that when using the parameter , the modified method in a number of cases provides results that correspond to the real social relation and the auth is sufficiently accurate to show the hierarchical dependence of the subjects among themselves on the network . It should be noted that this modified algorithm with the value of the parameter was used to study twenty different quasi-hierarchical networks, and the obtained results of the indices corresponded to the given reality. Conclusions The concept of quasi-hierarchical networks of social character is introduced in the work and the nature of connections in such networks is investigated. The research of the efficiency of the basic and modified HITS algorithms for ranking of nodes of quasi-hierarchical networks of social character in comparison with the PageRank algorithm on the given network was conducted. In practical application it is shown that the modified algorithm provides in some cases the results that correspond to the real social relation, and the auth of the nodes - their hierarchical importance among themselves. Reference 1. 2. 3. 4. 5. Lande D.V., Nechaev A.O., Algorithm of ranking of nodes of quasi-hierarchical networks of social character // Problems of informatization and management: a collection of scientific works: Vip. 1 (49). - K.: NAU, 2015. - P. 46-50. Bargh JA, Chen M., Burrows L. Automaticity of Social Behavior: Direct Effects of Trait Construct and Stereotype Activation on Action // Journal of Personality and Social Psychology, 1996. - 71. - No. 2. - P. 230- 244 Kleinberg J. Authoritative sources in a hyperlinked environment // Proceedings of the ACMSIAM Symposium on Discrete Algorithms, Philadelphia, PA, 1998. - P. 668- 677. Liu Y.Y., Jean-Jacques Slotine J.J., Barabasi A.L. Control centrality and hierarchical structure in complex networks // PLOS ONE, 2012. - 7. - No. 9. - P. - e44459 (1-7). Amy N. Langville, Carl D. Meyer, Google's PageRank and Beyond: The Science of Search Engine Rankings, 2006, - P.115-121.
1110.1349
1
1110
2011-10-06T18:47:49
Supporting the Curation of Twitter User Lists
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
Twitter introduced lists in late 2009 as a means of curating tweets into meaningful themes. Lists were quickly adopted by media companies as a means of organising content around news stories. Thus the curation of these lists is important, they should contain the key information gatekeepers and present a balanced perspective on the story. Identifying members to add to a list on an emerging topic is a delicate process. From a network analysis perspective there are a number of views on the Twitter network that can be explored, e.g. followers, retweets mentions etc. We present a process for integrating these views in order to recommend authoritative commentators to include on a list. This process is evaluated on manually curated lists about unrest in Bahrain and the Iowa caucuses for the 2012 US election.
cs.SI
cs
Supporting the Curation of Twitter User Lists Derek Greene, Fergal Reid School of Computer Science & Informatics, University College Dublin, Ireland [email protected], [email protected] 1 1 0 2 t c O 6 ] I S . s c [ 1 v 9 4 3 1 . 0 1 1 1 : v i X r a Gavin Sheridan Storyful Dublin, Ireland [email protected] P´adraig Cunningham School of Computer Science & Informatics, University College Dublin, Ireland [email protected] Abstract Twitter introduced lists in late 2009 as a means of curating tweets into meaningful themes. Lists were quickly adopted by media companies as a means of organising content around news stories. Thus the curation of these lists is important, they should contain the key information gatekeepers and present a balanced perspective on the story. Identifying members to add to a list on an emerging topic is a delicate process. From a network analysis perspective there are a number of views on the Twitter network that can be explored, e.g. followers, retweets mentions etc. We present a process for integrating these views in order to recommend authoritative commentators to include on a list. This process is evaluated on manually curated lists about unrest in Bahrain and the Iowa caucuses for the 2012 US election. 1 Introduction Media outlets that leverage the content produced by users of social media sites can now break or cover stories as they evolve on the ground, in real time (e.g. videos, photographs, tweets). However, a signicant issue arises when trying to (a) identify content around a breaking news story in a timely manner (b) monitor the proliferation of content on a certain news event over a period of time, and (c) ensure that content is reliable and accurate. Storyful1 is a social media news agency established in 2009 with the aim of filtering news, or newsworthy content, from the vast quantities of noisy data that streams through social networks. To this end, Storyful invests significant time into the manual curation of content on social media networks, such as Twitter and YouTube. In some cases this involves identifying "gatekeepers" who are prolific in their ability to locate, filter and monitor news from eyewitnesses. Twitter users can organise the users they follow into Twitter lists. Storyful maintains lists of users relevant to a given news story, as a means of monitoring breaking news related to that story. Often these stories generate community-decided hashtags (e.g. #occupywallstreet) -- but even with small news events, using such hashtags to track the evolution of a story becomes difficult. Spambots quickly intervene, while users with no proximity (in space, time or expertise) to the news story itself drown out other voices. Manual curation of lists is one way to overcome this problem, but is time consuming, and risks incomplete coverage. In order to support the list curation process, we propose methods for identifying the important users that form the "community" around a news story on Twitter. Specifically, given a small seed list of users supplied by a domain expert, we are interested in using network analysis techniques to expand this set to produce a user list that provides 1http://www.storyful.com 1 comprehensive coverage of the story. The motivation is that the members of this list will provide additional valuable content relating to the story. A number of authors have considered the related problem of producing personal recommendations for additional users to follow on Twitter, either by following user links or performing textual analysis of tweet content. Hannon et al. [3] proposed a set of techniques for producing personal recommen- dations on users to follow, based on the similarity of the aggregated tweets or "profiles" of users that are connected to the ego in the Twitter social graph. Such techniques have primarily relied on a single view of the network to produce suggestions. However, we can view the same Twitter network from a range of different perspectives. For instance, Conover et al. [2] performed an analysis of Twitter data based on references to other Twitter screen names in a tweet, while researchers have also looked at the diffusion of content via retweets to uncover the spread of memes and opinions on Twitter [2, 6]. The idea is that both mentions and retweets provide us with some insight of the differing interactions between microblogging users. In Section 2 we describe a set of recommendation criteria and network exploration methods used to support user list curation on Twitter. Rather than using a single view of the network to produce recommendations, we employ a multi-view approach that produces user rankings based on different graph representations of the Twitter network surrounding a given user list, and combines them using an SVD-based aggregation approach [10]. Information from multiple views is also used to control the exploration of the Twitter network -- this is an important consideration due to the limitations sur- rounding Twitter data access. To verify the accuracy of the resulting recommendations, in Section 3 we describe experiments performed on a previously-curated Twitter list relating to coverage of the Iowa caucuses in advance of the 2012 US Presidential Election. In Section 4 we investigate whether a "silo" effect arises in cases where a user list is expanded from an initial seed list with a strong bias towards a particular perspective on a story. We do this by evaluating the proposed recommendation techniques on subsets of a previously-curated list covering the current political situation in Bahrain. This study motivates further work in this area, which is discussed in Section 5. 2 Methods 2.1 Bootstrapping We now describe our proposed system for supporting user list curation. The initial input to the system is a seed list of one or more users that have been manually labelled as being relevant to a particular news story. Once a seed list has been supplied, the first operation of the system involves a bootstrapping phase, which retrieves follower ego networks around all seed list members. Other information regarding these users is also retrieved -- such as user list membership information and a limited number of tweets. The extent of the exploration process can be controlled by setting an upper limit for the number of links to follow and tweets to retrieve -- these parameters control the trade-off between network exploration depth and the number of queries required. The latter is an important consideration, not only in terms of running time, but also due to the fact that Twitter employs a quota system that limits the number of permitted API queries that can be made per hour. After the bootstrap phase, the system will have two disjoint lists for the news story. The core set contains curated Twitter accounts, initially this corresponds to the members of the seed list. The candidate set contains Twitter accounts that are not in the core set, but exist in the wider network around the core -- some of these users may potentially be relevant for curation, while others will be spurious. Initially this will consist of the new non-seed users that were found during the bootstrap phase. 2.2 Recommending Users In the subsequent recommendation phase, a ranked list of the r top users from the candidate set is produced. Firstly, we produce individual rankings using a number of criteria applied to different graphs, each representing a different view of the same network. The motivation is that each view potentially captures a different aspect of the relations between Twitter users around a given news story. We construct four different views: 2 1. Core friend graph: This is a directed graph which contains nodes representing all users in the core set, along with the non-core users who they follow. 2. Core mention graph: As an alternative network view, we analyse the non-core users men- tioned by the users in the core set. Specifically, an edge links from a core node A to a non-core node B if A has mentioned B in at least one tweet -- the weight of the edge corre- sponds to the number of tweets. The idea here is that this directed, weighted mention graph is a proxy for the dialogue between these Twitter users. 3. Core retweet graph: We also analyse retweeting activity by core users involving tweets originally posted by non-core users. This involves the construction of a weighted, directed graph, where an edge links from core node A to non-core node B if A has retweeted B's tweets at least once -- the weight of the edge corresponds to the number of retweets. 4. Weighted co-listed graph: Another alternative view, which has not been widely explored in the literature, is to look at relations based on the aggregation of co-assignments to Twitter user lists. At an aggregate level, this could be regarded as a form of crowd-sourced curation, where the assumption is that related pairs of users will be more frequently assigned to the same list than users who have dissimilar to one another. Based on this idea, we construct a weighted, undirected graph as follows. For each user list that has been identified, we measure the overlap w between the list's members and the core set using the Jaccard set similarity measure [4]. If w > 0 then, for each unique core/non-core pair of users in the user list, we create an edge between these two users with weight w. If an edge between the users already exists, we increment the weight on the edge by w. The criteria that we use on these graphs are as follows: 1. In-degree: A simple approach for directed graphs is to look at the in-degree centrality of each Twitter user. For weighted graphs, we calculate the sum of the weights on incoming edges. 2. Normalised in-degree: Using standard in-degree centrality can potentially lead to the se- lection of high-degree Twitter users who are not specialised in a particular geographic or topical area. Our solution has been to introduce a normalisation factor to reduce the impact of high degree nodes. The normalisation approach is similar to standard log-based TF-IDF term weighting functions that are widely applied in text mining to reduce the influence of frequently-occurring terms [7]. The normalised follower count value for the user u is defined as: nfc(u) = log (seed f ollowers(u)) · log (cid:18) max f ollowers (cid:19) all f ollowers(u) (1) where • seed f ollowers(u) = the number of users in the core set that follow the user u. • all f ollowers(u) = the total number of all users following the user u on Twitter. • max f ollowers = a scaling factor, defined to be the largest number of Twitter follow- ers among any of the core and non-core users. 3. HITS with priors: The HITS algorithm, originally proposed by [5], has been widely used to assign hub and authority scores to each mode in graph, depending upon its the topology. We can use the authority scores applied to a Twitter network to identify key users in that network. Since we wish to focus on authority relative to our pre-curated core list, we use the variation of HITS proposed by [9], which introduces prior probabilities for each node. Specifically, each of the m users in the core list is given an initial probability 1/m, while the other non-core nodes are given an initial probability of 0. Naturally, certain criteria are only meaningful when applied to certain graphs. For the purpose of the evaluations described in this paper, we use the following five combinations: • Normalised degree applied to the core friend graph. • HITS with priors applied to the core friend graph. • Weighted in-degree applied to the co-listed, mention, and retweet graphs. 3 Figure 1: Overview of curation support system, illustrating the workflow between the bootstrap, recommendation, and update phases. 2.2.1 Combining Rankings The various graph/criterion combinations can potentially produce rankings of users that differ sig- nificantly. To combine rankings, we use SVD-based aggregation, which has previously been shown to be effective for this task [10]. We construct a matrix X from the ranks (rather than the raw scores), with users on the rows and rankings on the columns. We then apply SVD to this matrix and extract the first left singular vector. The values in this vector provide aggregated scores for the users. By arranging these values in descending order, we can produce a final ranking of users. We select the top r users to form our list of user recommendations. Finally, we can also apply additional filtering of recommendations based on a minimum tweet count filter and a filter to remove users who have not tweeted within a given time period. After a set of recommendations has been generated, the ranked list of suggested users would be presented to a human curator, who could then select a subset to migrate to the core set (i.e. to augment the existing Twitter user list). The use of a "human in the loop" in the proposed system resembles the role of the oracle in active learning algorithms for classification [8]. 2.3 Network Exploration Once the core set has been modified, the system enters the update phase, which modifies the current copy of the network to reflect (a) changes in membership of the core set, and (b) any changes in the Twitter network since the last update (e.g. addition/removal of follower links, new tweets). Specifically, the network is explored using a process based both on the follower graph and also on tweet content: • For the current core set, retrieve their friend/follower links, user list memberships, and recent tweets for all set members (i.e. same process as in the bootstrap phase). • For the last set of recommended users who were not migrated to the core set, retrieve their friend/follower links, user list memberships, and recent tweets. • For the set of m users who were most frequently mentioned in tweets posted by the core set, retrieve their friend/follower links, user list memberships, and recent tweets. Again the extent of the exploration for each of the above can be controlled by setting maximum values for the number of links to follow and tweets to retrieve. Once the local copy of the network has been update, the data then feeds back to the recommendation phase and another iteration of the recommendation-selection-update process is executed. A visual overview of the complete curation system process is shown in Fig. 1. 3 Case Study 1: Iowa 3.1 Experimental Setup First, we evaluated the proposed recommendation system on a Twitter user list previously curated by Storyful, covering Iowa politics during the 2012 US Presidential Primaries2. At the time of 2http://twitter.com/#!/trailmix12/iowa 4 BootstrapCandidateSetRecommendUpdateRankedListCuratorCoreSet'SeedSetCandidateSet (a) Initial core set (b) Final core set Figure 2: Induced subgraph of the follower graph for the core set members in the Iowa dataset #1 after (a) the initial bootstrap phase, (b) six complete iterations. Larger nodes with a more saturated colour are indicative of nodes with a higher in-degree (i.e. users with more followers within the core set). Highlighted edges indicate reciprocated follower links between users. Layout positions are preserved for both figures. initial data collection -- 16 September 2011 -- this list contained 128 unique users. To evaluate the robustness of the user recommendation process, we use cross validation, randomly dividing the complete Iowa user list into four disjoint datasets, each containing 32 users. As an example, the subgraph induced by the core set on the follower graph of Iowa dataset #1 is shown in Fig. 2(a) -- the positions of nodes were calculated using the force directed layout implementation provided by Gephi [1]. In our experiments we applied the workflow shown in Fig. 1 to each of the sets individually for six recommendation-selection-update iterations after the initial bootstrapping phase. Note that no information was shared between the runs. The extent of network exploration during the update phase was controlled using the following constraints: • A maximum of up to 1,000 friend/follower links were retrieved per user at a given iteration. • A maximum of up to 1,000 user lists were retrieved per user at a given iteration. • A maximum of up to 1,000 tweets was retrieved per user at a given iteration. • Very high-degree users > 50, 000 friends and/or 50,000 followers were filtered. To generate recommendations, we used the views and criteria as described in Section 2. We filtered the recommendations to remove those users who had not tweeted in the previous two weeks and/or those who had posted fewer than 25 tweets in total. At each iteration we generated r = 50 recom- mendations -- by the final iteration, users were selected from a complete candidate set with average size of ≈ 62k users. At this stage, we had also collected an average ≈ 63k tweets and ≈ 138k follower links for each dataset. In place of a manual curator, after each complete iteration we auto- matically selected the top five highest ranked users (based on SVD aggregation) to add to the core set. The six iterations thus yielded 30 additional core users for each of the four sets. As an example, the final expanded core set for Iowa dataset #1 is shown in Fig. 2(b). It is interesting to observe that several high-degree nodes were added to the core set, such as the user @TerryBranstad, the official account of the Governor of Iowa. 3.2 Discussion Next, to quantitatively validate the relevance of the recommendations produced by our proposed techniques, we use two measures that are frequently used in information retrieval tasks: precision 5 RepRodRobertsTimAlbrechtIABethMalickiiowacciBruceBraleyTomLathamJason_SchultzdouglaswburnsIaHouserepubsIACaucus2012JoNBCNewsPaulYeagerITRwatchdogsamanthakampmanKimReynoldsIAcharlotte_ebyOskyNewsJoniScotterOneIowaiowadefenseRadioIowajennjarvisokayhendersonLauraBloomerIowans_Rockwford14275dmrcaucusFayetteIowaGOPIowaCaucusRepRodRobertsSCJBretHChrisHagenowTimAlbrechtIAMcKinleyforIowaDonMcDowellBethMalickiiowacciidavepricedesmoinesdemBruceBraleyKentSorensonwhoradioTomLathammattstrawnJason_SchultzdouglaswburnsIowaPoliticsJenniferJJacobsgrantyoung72JeneaneBeckKObradovichBNortheyIaHouserepubsNickAWagnerIACaucus2012JoNBCNewssmg_lynchJasonClayworthPaulYeagerITRwatchdogsamanthakampmanKimReynoldsIAIowaGOPercharlotte_ebyHouseChiefClerkReneeSchulteTerryBranstadDMRPoliticsOskyNewsIASenateGOPJoniScotterOneIowaiowadefenseRadioIowaSandy_GreinerTheBeanWalkerjennjarvisokayhendersonLauraBloomerIowans_Rockwford14275dmrcaucusFayetteIowaGOPIowaCaucus Iteration 1 2 3 4 5 6 Set 1 0.95 0.93 0.94 0.90 0.88 0.82 Set 2 0.97 0.98 0.96 0.94 0.93 0.92 Precision Set 3 0.97 0.95 0.96 0.96 0.93 0.89 Set 4 Mean 0.97 1.00 0.96 1.00 0.96 0.98 0.94 0.96 0.92 0.95 0.88 0.89 Set 1 0.27 0.30 0.34 0.37 0.39 0.40 Set 2 0.28 0.32 0.35 0.38 0.41 0.45 Recall Set 3 0.28 0.31 0.35 0.39 0.41 0.43 Set 4 Mean 0.28 0.29 0.32 0.33 0.35 0.36 0.38 0.39 0.41 0.42 0.43 0.43 Table 1: Precision and recall scores for four randomly-selected subsets of the Storyful Iowa user list, for six complete recommendation-selection-update iterations. and recall. The results for the four datasets across all six iterations are listed in Table 1. We observe that, in terms of recall, increasing the user list size by 30 accounts does not lead to a significant fall in precision -- average precision relative to the complete original list remains at 0.88 by iteration six. Meanwhile, recall increases steadily in all cases -- the average is 0.43. Note the maximum achievable recall by iteration six is 0.48 (i.e. 62 out of the 128 users are returned), and is lower in previous iterations. In general, we observe that the Iowa user list studied here consists of a relatively homogeneous group of users pertaining to a story with a relatively narrow focus -- the users are predominantly Republicans involved in the Iowa caucuses. Therefore, unlike the study in [2] which analysed Twitter relations across the entire country during 2010 US midterm elections, here a pronounced partisan divide is not evident. 4 Case Study 2: Bahrain 4.1 Experimental Setup For our second study, we analyse a dataset with significantly different characteristics. As a seed list we use a Twitter list covering the current political situation in Bahrain which was also manually curated by Storyful3. As of 27 September 2011, this list contained 51 users. A small number of these have a "loyalist" or "pro-government" stance, while the remaining users could be regarded as being either "non-loyalist", or "neutral" observers with an interest in Bahrain. This natural division in the seed list raises an interesting question -- does starting with a seed list that takes a particular stance on a given news story lead to the construction of localised network "silos", which may lead an automated system to give biased user recommendations? To investigate this, we generate recommendations based on a seed list Bahrain-L containing a subset of 14 users that have been putatively labelled as "loyalist". We ran four complete iterations using the same exploration constraints, filters, and selection mechanism used in the previous evaluation. This resulted in a core set containing 34 users, a candidate set of 51,114 users, 138,777 follower links, and 53,450 unique tweets. 4.2 Discussion Fig. 3(a) shows the subgraph induced by the original complete curated list of 51 users on the follower graph -- the split between the "loyalist" users and the other users is evident from the positions calcu- lated by force directed layout. In particular, the latter group of users form a densely connected core, while most of the "loyalist" nodes are not well-connected with the rest of the subgraph. Fig. 3(b) shows a subgraph induced by the union of the curated list, with the set of nodes selected based on the recommendation process using Bahrain-L alone as the seed set. We observe that none of the 37 "non-loyalist" nodes from the curated list were selected during the four iterations. In contrast, we see that the new users are closely connected with the other "loyalist" users, forming a second dense core. While we might expect this if recommendations were only generated based on follower links, recall that rankings based on mentions and retweets are also being aggregated to select new users. 3http://twitter.com/#!/storyfulpro/bahrain 6 (a) Initial core set (b) Final core set Figure 3: Follower graph for core set members in the Bahrain dataset after (a) the initial bootstrap phase, (b) four complete iterations. Blue nodes denote users in the original user list that are puta- tively labelled as "loyalist", while the remaining members of the user list are coloured green. The additional nodes that have been selected, based on recommendations using Bahrain-L as a seed list, are coloured red. In fact, the addition of these rankings appears to further compound the "silo" effect which is evident from Fig. 4.2. Our analysis suggests that there is little interaction on Twitter between users with differing stances on the political situation in Bahrain. On the one hand, this highlights weakness of the proposed recommendation techniques in the case of stories that are highly-polarised. Alternative criteria, which emphasise diversity over homogeneity, may provide a solution -- this is analogous to the attempts in active learning to identify diverse examples in order to widely cover the sample space [8]. On the other hand, these results also highlight the continued importance of the role of the curator in (a) selecting a suitably diverse seed list as a starting point, (b) actioning recommendations produced by the system. 5 Conclusions In this paper we have proposed a comprehensive approach for automating aspects of the Twitter list curation process, based on novel network exploration and multi-view recommendation techniques. In the evaluation in Section 3, we showed that, using different starting subsets of a manually-curated list, we can recall the original human annotations while maintaining high precision. Based on the observations made in Section 4, we suggest that the next major phase of our work will involve exploring the diffusion patterns of newsworthy multimedia resources (e.g. links to images and videos) in the network surrounding a user list. For instance, identifying users who are frequently early in retweet chains for such resources may help diversify user list recommendations in situations where the "silo" effect is pronounced, such as in the Bahrain case study. In future we also plan to apply the proposed recommendation and network exploration techniques beyond Twitter, looking at multiple views across several different social networks. A key issue here will be the generation of a reliable mapping between users on different networks. 7 Acknowledgments This work is supported by Science Foundation Ireland Grant No. 08/SRC/I140 (Clique: Graph & Network Analysis Cluster). The authors thank Storyful for their participation in the evaluations performed in this paper. References [1] M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for exploring and manipulating networks. In Proc. International AAAI Conference on Weblogs and Social Media (ICWSM'09), pages 361 -- 362, 2009. [2] M. D. Conover, J. Ratkiewicz, M. Francisco, B. Gonc¸alves, A. Flammini, and F. Menczer. Political polarization on twitter. In Proc. 5th Intl. Conference on Weblogs and Social Media (ICWSM'11), 2011. [3] J. Hannon, M. Bennett, and B. Smyth. Recommending twitter users to follow using content and collaborative filtering approaches. In Proc. 4th ACM conference on Recommender systems, pages 199 -- 206. ACM, 2010. [4] P. Jaccard. The distribution of flora in the alpine zone. New Phytologist, 11(2):37 -- 50, 1912. [5] J.M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM (JACM), 46(5):604 -- 632, 1999. [6] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, A. Flammini, and F. Menczer. Detecting and tracking political abuse in social media. In Proc. 5th International AAAI Conference on Weblogs and Social Media (ICWSM'11), 2011. [7] G. Salton and C. Buckley. Term weighting approaches in automatic text retrieval. Technical Report 87-881, Department of Computer Science, Cornell University, Ithaca, NY, USA, 1987. Technical Report 1648, University of [8] B. Settles. Active Learning Literature Survey. Wisconsin -- Madison, 2009. [9] S. White and P. Smyth. Algorithms for estimating relative importance in networks. In Proc. 9th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 266 -- 275. ACM, 2003. [10] G. Wu, D. Greene, and P. Cunningham. Merging multiple criteria to identify suspicious re- views. In Proc. 4th ACM Conference on Recommender Systems (RecSys'10), 2010. 8
1811.07746
2
1811
2018-11-20T21:37:51
An Empirical Assessment of the Complexity and Realism of Synthetic Social Contact Networks
[ "cs.SI", "cs.LG", "stat.ML" ]
We use multiple measures of graph complexity to evaluate the realism of synthetically-generated networks of human activity, in comparison with several stylized network models as well as a collection of empirical networks from the literature. The synthetic networks are generated by integrating data about human populations from several sources, including the Census, transportation surveys, and geographical data. The resulting networks represent an approximation of daily or weekly human interaction. Our results indicate that the synthetically generated graphs according to our methodology are closer to the real world graphs, as measured across multiple structural measures, than a range of stylized graphs generated using common network models from the literature.
cs.SI
cs
An Empirical Assessment of the Complexity and Realism of Synthetic Social Contact Networks* Kiran Karra1, Samarth Swarup2, and Justus Graham1 8 1 0 2 v o N 0 2 ] I S . s c [ 2 v 6 4 7 7 0 . 1 1 8 1 : v i X r a Abstract -- We use multiple measures of graph complexity to evaluate the realism of synthetically-generated networks of human activity, in comparison with several stylized network models as well as a collection of empirical networks from the literature. The synthetic networks are generated by integrating data about human populations from several sources, including the Census, transportation surveys, and geographical data. The resulting networks represent an approximation of daily or weekly human interaction. Our results indicate that the synthetically generated graphs according to our methodology are closer to the real world graphs, as measured across multiple structural measures, than a range of stylized graphs generated using common network models from the literature. I. INTRODUCTION Artificially generated graphs benefit from high demand in several application domains, wherever the phenomena of interest are driven by interactions between people, including health and medicine, communications, the economy, and national security. Lack of access to appropriate network data hampers the research community's ability to develop algo- rithms to analyze and gain insight from these transactional graph datasets. Due to the access restrictions to real network data, there is value in crafting methods of synthetically generated data which faithfully represent behaviors of real world processes. As such, many stylized methods for creating graphs with rigorously understood structural properties have been established, making collective steady progress towards better approximating structures of real world processes. Despite this progress, these relatively simple stylized methods aren't universally applicable and suffer from lack of realism for some applications. We are particularly interested in creating realistic graphs which represent a complex set of interrelated processes involving a common subset of actors (i.e., the coherent alignment of disparate subgraphs which have many vertices in common and which represent different types of underlying activity). We are also interested in the ability to embed various types of synthetic activities (subgraphs) into these larger "background" graphs to enable the advancement of subgraph detection algorithms on large and realistic datasets. This is also relevant to recent work *Distribution Statement A: Approved for Public Release, Distribution Unlimited. This work was supported in part by DARPA MAA Contract FA8750-17-C-0155 (NC082817-VT-GORDIAN); the views, opinions and/or findings expressed are those of the authors and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government; SS is additionally supported in part by DTRA CNIMS Contract HDTRA1-17-0118 and NIH Grant 1R01GM109718. 1Hume Center, Virginia Tech, Arlington, VA 22203, USA www.hume.vt.edu 2Biocomplexity Institute, Virginia Tech, Blacksburg, VA 20460, USA www.bi.vt.edu on adversarial social network analysis [1], [2], which could benefit from the application of realistic complex networks. Lastly, we are interested in graphs with high realism ac- cording to the particular domain of activity sought to be modeled by any given graph or collection of graphs. As a step towards achieving these objectives, we are examining the use of synthetic populations to generate realistic graphs. Synthetic population technology is widely used in a num- ber of domains. It involves developing a highly detailed and data-driven representation of the entire population of a region. The synthetic agents are imbued with demograph- ics, household structure, and activity patterns. The use of actual location data gives the synthetic populations a spatial structure that corresponds to the contingent spatial realities of the region being modeled. This leads to simulations that can be used to study specific phenomena as well as understand which aspects of a phenomenon generalize across regions. Synthetic social contact networks are constructed from synthetic populations by connecting synthetic agents who are spatiotemporally collocated in the model [3]. From initial applications in the transportation domain [4], this approach has expanded to studies in economic analysis [5], [6], epidemiology [7], [8], [9], land use planning [10], disaster response [11], and more [12], [13]. This has led to extensive evaluation and validation of the methodology and the synthetic population data that are generated [14], [15], [16]. This is also detailed in Section III. However there has been relatively little evaluation of the synthetic social contact networks that are generated from these populations (a few examples are [17], [18], [19], [20]). The goal of this paper is to evaluate the synthetic pop- ulation method for its ability to generate graphs that meet application needs of complexity and realism as described above. This paper focuses on the ability of this method to represent the characteristics of real world data as compared to stylized graph generation methods. We evaluate synthetic social contact graphs, stylized graphs based on probabilistic graph generation, and real world data from online network data repositories according to a robust number of data- agnostic graph features. Results are provided and suggestions for future research are outlined, particularly with regard to comparing against more nuanced datasets which represent complex behavior across multiple activity domains. The rest of this paper is organized as follows. Section II describes measures of graph complexity which were applied to all graphs to perform our analysis. Section III describes our synthetic graph generation methodology and resulting instances of graphs. Section IV describes the reference data used for comparison, including stylized graphs (classical methods) and real world graphs used for the analysis. Sec- tion V describes the evaluation methodology and analytical results. Finally, Section VI provides context for the results as a conclusion as well as several options for further research. II. MEASURES OF GRAPH COMPLEXITY N + d(cid:80) In this section, we discuss the measures of graph complex- ity that we compute in order to compare graphs generated by different methods in a data agnostic fashion. We compute eleven different measures of graph complexity, based on their efficacy to our problem, as well as their computability with respect to available open source packages. The features we compute, and their respective definitions are stated below. {ejk} ki(ki−1) : vj, vk ∈ Ni, ejk ∈ E, where ki is the out-degree of vertex-i, and Ni = {vj : eij ∈ E} is the set of out-neighbors of vertex-i [21]. The local clustering coefficient of a vertex is a measure of the tendency of that node to cluster (i.e. be connected) to other nodes. • Local Clustering Coefficient ci = P R(u) u∈Γ−(v) s(cid:54)=v(cid:54)=t∈V • Page Rank P R(v) = 1−d d+(u) , where Γ−(v) are the in-neighbors of v, d+(w) is the out- degree of w, and d is a dampling factor [22]. Page rank is one measure of the "importance" of a node, where importance is proportional to the in-degree of each node. • Betweenness Centrality CB(v) = (cid:80) σst(v) , where σst is the number of shortest paths from s to t, and σst(v) is the number of shortest paths from s to t that pass through v. [23]. Betweenness is a measure of the centrality of the nodes in the graph; nodes that are considered to be more between have more shortest paths that pass through them than less between nodes. , where dij is the dis- tance between nodes i and j [24]. Closeness is another measure of centrality, but differs from betweenness in that it is proportional to the sum of the shortest paths between the node of interest and all other nodes in the graph. • Closeness Centrality ci = 1(cid:80) • Vertex In Degree is the number of incoming connec- j dij σst tions into each node of the graph. • Vertex Out Degree is the number of nodes that this 4 − (cid:80) node connects to. 1 V (u,v)∈E HV N (G) = D(u, u) =(cid:80) • Von-Neumann Approximate Graph Entropy - 4dudv , where du = v∈V A(U, v) [25]. From Information The- ory, entropy is a measure of randomness, and thus loosely quantifies the complexity of the graph from a probabilistic perspective. • Structure Connectivity C = E − V + 1, where E is the number of edges and V is the number of vertices [26]. The structure connectivity is an easily computable coarse measure of the density of the graph. V (V −1) × 100, • Structure Connectedness Conn[%] = 2E where again E is the number of edges and V is the number of vertices [26]. The structure connectedness is also an easily computable coarse measure of the density of the graph. (cid:80)V (cid:80)V • Average Intersite Distance (cid:104)di(cid:105) = 2W V , where V is the number of vertices, and W is the Wiener number of the network. The Wiener number is defined as the sum of all distances in the network, and is computed by i,j=1 dij [26]. The average intersite distance W = 1 2 is a measure of how easily one vertex can reach another vertex. • Vertex = : Alog2A {N1(a1), N2(a2), . . . , Nk(ak)} and Ni(ai) represents the number of vertices with vertex degree ai [26]. The vertex distance information is a normalized measure of the entropy of the vertex degree distribution, and is another measure of the complexity of the graph. Distance i=1 ailog2ai, Information Ir(vd) ai where 1 For the clustering coefficient, page rank, betweenness, and closeness, we compute the defined feature for all nodes in the graph, and then sample the cumulative distribution function at probabilities [0.10, 0.25, 0.50, 0.75, 0.90] to capture the information given by the feature across all nodes in the graph. For the vertex degree computations, we compute the mean and standard deviation, and use both as features. This yields a total of 34 features per graph that are computed to compare the graphs with each other. A. Related work Earlier work on understanding the properties of synthetic social contact networks has taken two approaches. One is to develop mathematical approaches to understanding structural properties as they relate to properties of dynamics on the networks [18], [19]. The other is to compare the synthetic so- cial contact networks for different regions to understand the differences in their structural and dynamic properties [20], [17]. Barrett et al. [19] showed that there is a significant difference in how hard it is to shatter social networks as compared to infrastructural networks (transportation, power, and wireless radio networks), by examining the size of the largest component in the network as nodes are deleted in order of (residual) degree. Social networks were shown to be much more robust than the infrastructural networks. Eubank et al. [18] studied, among other things, the ex- pansion characteristics of synthetic social contact networks. They showed that these networks have high expansion rates, which implies that contagious processes such as infectious diseases would spread very quickly on these networks. Xia et al. studied differences in social contact networks generated according to different methods [20] and the dif- ferences between the networks generated for two different cities (Delhi and Los Angeles) [17]. They used both static and dynamic measures including degree distribution, tem- poral degree, vulnerability distribution, simulated epidemic curves, and the efficacy of two different epidemic mitigation interventions. Vulnerability is the probability that a node gets infected during an infectious disease outbreak. They showed significant differences due to the network generation methodology as well as across the two cities. Our contribution in this work differs from the earlier work in that we compute a larger set of structural features for the networks and do a comparison of synthetic social contact networks with real networks from the literature and also common stylized networks which are widely used in the literature. Validation: IPF provides a theoretical guarantee about the inferred joint distribution in a maximum entropy sense [29]. This means that the inferred joint distribution is as close as possible to the sample This step is further validated by comparing the distributions of variables in the synthetic population that were not included in the IPF procedure, with their corresponding marginal distributions as given by the ACS. III. SYNTHETIC NETWORK GENERATION Activity sequence assignment A synthetic social contact network is a representation of the interactions between people in a region due to colloca- tion. To construct this network, we first generate a synthetic population for the region by combining data from multiple sources as described below. The main datasets used are listed in Table I. DATA SETS USED FOR GENERATING SYNTHETIC POPULATIONS. TABLE I Data set American Community Survey (ACS) National Household Travel Survey (NHTS) HERE (formerly Navteq) Dun & Bradstreet (DnB) National Center for Education Statistics (NCES) Description Demographics, household structure Daily and weekly activity patterns Road networks and points of interest Business locations School locations The synthetic population generation process involves mul- tiple steps. Detailed descriptions can be found elsewhere [27]. We summarize each step below. The process is illus- trated in Figure 1. We generate the populations at the highest resolution allowed by publicly-available ACS data, which is the blockgroup. The Census Bureau does not release data at the block level publicly. Base population generation The American Community Survey provides demographic data in two forms. One is in the form of distributions over key demographic variables in a blockgroup, such as house- holder age, household income, household size, and more. We henceforth refer to these as the marginal distributions. The other is an anonymized 5% sample of the ACS records, known as the Public Use Microdata Sample (PUMS). To generate a collection of synthetic individuals and households for the blockgroup whose demographics match the ACS data, we use a statistical procedure known as Itera- tive Proportional Fitting (IPF) [28]. IPF creates a joint prob- ability distribution over the chosen demographic variables by combining the marginal distributions with the PUMS sample for the blockgroup. This distribution is then sampled the needed number of times (equal to the number of households in the blockgroup) and the corresponding households are copied over from the PUMS sample to create the synthetic population. Once the base population has been generated, every syn- thetic individual is assigned an activity sequence for every day of a typical week. This is done using the National Household Travel Survey (NHTS) dataset. NHTS provides a set of travel records associated with demographics, from a nationally-representative sample of respondents. We group the activity types represented in the data into five categories: home, work, shopping, other, and school. The last category also includes college activities. NHTS travel records are matched with synthetic indi- viduals using a two-stage fitted values approach [30]. In the first stage, we calculate multiple summary statistics from the travel sequences, such as the fraction of the day spent in various activities (home, work, school, etc.). We then fit a regression to these summary statistics using the demographics as the independent variables. In the second stage, this learned model is used to predict the same summary statistics for the synthetic households. We then find the closest NHTS survey household for each synthetic household and assign the corresponding activity sequences to the synthetic household. Closeness between synthetic and survey households is defined using, e.g., Ma- halanobis distance between the fitted values of the summary statistics for the survey household and the predicted values for the synthetic households. The use of fitted values to evaluate the distance ensures that if two households have identical demographics, their distance is zero. We repeat the method for each day of the week. At the end of this process, every synthetic individual has a meaningful weekly activity sequence assigned to it. Since the NHTS records include household structure, and we match an NHTS household to a synthetic household, intra-household correlations between activities are also preserved. Validation: Validation is done by comparing the aggregate distributions of time spent in various activities, broken down by demographics such as age and gender. For instance, the method reproduces the increasing trend of time spent at home with age (i.e., older people spend more time at home), as well as the gender difference between time spent at home (women spend more time at home on average). See [30] for further details. Activity location assignment The previous step results in a synthetic population with demographics accurate to the blockgroup level and weekly activity sequences assigned to each individual. In this step, we assign geographical locations to each activity. This is Fig. 1. An illustration of the synthetic population and contact network generation methodology divided into a procedure for home location assignment and a procedure for assigning locations for all other activity types. To construct home locations for the synthetic households, we combine road network data from HERE with Census Bureau data on distributions of residential building types in each blockgroup and the blockgroup shapefiles. Residence locations are constructed along the sides of the roads within the blockgroup. The kind of residence (single-family home, duplex, small or large apartment build- ing) is chosen based on the road category. For instance, single-family residence locations are chosen along smaller roads and larger apartment buildings are chosen alongside larger roads. Synthetic households are allocated residences iteratively until all households have been assigned a home location. Once home locations have been assigned, locations for other activity types are assigned using a gravity model [31]. Locations are first assigned for the so-called anchor activities (work and school). The gravity model chooses locations with probabilities proportional to their capacities and inversely proportional to the square of the distance. To make the computation tractable, a cutoff of 50 miles is assumed. taking into account Then the locations for shopping and other activities are the locations of the anchor chosen, activities both before and after these activities. Thus, if a synthetic person's activity schedule involves going shopping between work and home activities, the shopping location is likely to be chosen inbetween the work and home locations. Validation: This step has been validated in multiple ways. The most direct validation has been through estimating trip counts between traffic analysis zones and comparing with data [8]. Beckman et al. also validated the mobility model indirectly by developing a model of cell phone network traffic and comparing measure of the traffic with data [32]. They also showed that the distribution of distances traveled is a power law, which matches other estimates in the litera- ture [33]. Social contact network construction The synthetic population generation methodology results in a bipartite person-location network where the edges indi- cate the locations that the persons visit, annotated with the start-time and duration of the visit. In what follows below, we are using a synthetic social contact network for Montgomery County, VA, USA, which is openly available [34]. From the bipartite network, we extract the induced person- person social contact network, where two persons might have an edge between them if they are at the same location for an overlapping period of time. The resulting network containing 63129 nodes and 45544774 edges, giving us an average degree of 1442.92. The degree distribution is shown in Figure 2. Fig. 2. Degree distribution of the social contact network, assuming that all persons who could come into contact with each other based on collocation, actually do. We also plot the distribution of durations of contact in this network, rounded up to half-hour intervals. This is shown in Figure 3. This shows us that there are two distinct regimes 200040006000800010000Degree110Number of nodes of interaction in this model, with an inflection point at 50 hours of contact per week. We see that while the contact duration distribution looks qualitatively similar to the full network, the degree distribu- tion now exhibits a power-law-like tail (Figure 4 is plotted on a log-log scale), while the degree distribution for the full network has an exponential character (Figure 2 is plotted on a log-linear scale). Fig. 3. Distribution of contact durations, rounded to the nearest half hour. However, it is reasonable to assume that not all persons who visit a given location come into contact with each other. For example, we tend to interact with a subset of co-workers within the same building. If we go to a shopping mall, we actually interact with very few other people who are there. Therefore, in what follows, we assume that the probability that two persons come into contact depends on the kind of activity they are engaged in. We introduce five probabilities, P HOM E, P W ORK, P SHOP P IN G, P OT HER, P SCHOOL, corresponding to the probability that an in- duced edge in the person-person network corresponding to that activity is kept. We use different values for these probabilities to generate multiple social contact networks and examine their structure. If all probabilities are 1.0, then all the induced edges are kept, and we obtain the network above. However, if we assume probabilities to be, e.g., {1.0, 0.01, 0.01, 0.01, 0.1} (in the order the variables are listed above), we obtain a network with 2559061 edges, with an average degree of 81.17. The degree distribution and contact duration distribution for this network are shown in Figures 4 and 5 below. Fig. 5. Distribution of contact durations, rounded to the nearest half hour for the social contact network with contact probabilities {1, 0.01, 0.01, 0.01, 0.1} for home, work, shopping, other, and school activities, respectively. Thus, by sampling edges representing different activity types with different probabilities, we can generate multiple social contact networks that exhibit different structural prop- erties. Table II lists the networks we have generated using different sampling probabilities. In addition to the full induced person-person network, we create networks which have each activity type in isolation. We also create networks with reasonable choices of the probabilities, denoted as G1 − G4 in Table II. TABLE II SYNTHETIC SOCIAL CONTACT NETWORKS. PROBABILITIES ARE LISTED IN THE ORDER HOME, WORK, SHOPPING, OTHER, SCHOOL. Name Full Home Work Shopping Other School G1 G2 G3 G4 Probabilities {1, 1, 1, 1, 1} {1, 0, 0, 0, 0} {0, 0.01, 0, 0, 0} {0, 0, 0.01, 0, 0} {0, 0, 0, 0.01, 0} {0, 0, 0, 0, 0.01} {1, 0.01, 0, 0, 0.01} {1, 0.01, 0.01, 0, 0.01} {1, 0.01, 0.01, 0.01, 0.01} {1, 0.01, 0.01, 0.01, 0.1} Avg. degree 1442.92 3.7 17.83 7.36 6.28 17.29 26.11 31.02 35.69 81.17 IV. GRAPHS FOR COMPARISON Three broad groups of network generation methods are compared: synthetic social contact networks described in Section III, stylized graphs, and real world networks. A. Stylized Networks Fig. 4. Degree distribution of the social contact network, assuming contact probabilities to be {1, 0.01, 0.01, 0.01, 0.1} for home, work, shopping, other, and school activities, respectively. A collection of stylized networks were chosen to exercise structural variety among the various metrics chosen for eval- uation. These network types are trivially generated in extant 050100150200250300Half hours of contact / week110102103104105106107Number of edges1101001000Degree110102103Number of nodes050100150200250300Half hours of contact / week110102103104105106Number of edges graph analysis software packages such as NetworkX [35]. In order to provide a meaningful basis for comparison, these graphs were generated with parameters chosen according to Table III to ensure that average degree fell within a similar range to the synthetic social contact networks as well as the real world data chosen from various domains. Network size (i.e. node count), n, was chosen to provide computational tractability while also providing sufficient depth to accommodate a range of average degrees found in comparable real world networks. Of note, while the node count in stylized networks is greater than in real world networks, these sizes were chosen to provide enough data for robust statistics; node count also would not affect the metrics under consideration, ceteris paribus. In total, there are three average degree settings used for the four different stylized graph generation methods, yielding twelve total stylized graphs. TABLE III STYLIZED NETWORKS GENERATED PARAMETERS. Avg. Degree Erdos-R´enyi Newman-Watts Random-Regular Powerlaw-Cluster n p n k p n d n m p 15 10000 0.0015 10000 10 0.50 10000 10000 7 8 0.50 40 10000 0.0004 10000 27 0.54 10000 20 10000 20 0.50 65 10000 0.0065 10000 43 0.50 10000 32 10000 33 0.50 Erdos-R´enyi graphs are widely used for the study of ran- dom graphs in the field of graph theory; they are constructed simply by defining the number of nodes n and assigning a constant probability p for all node pairs, which defines the probability of an edge occurring between two randomly selected nodes. While foundational, Erdos-R´enyi graphs tend not to structurally achieve the degree distribution often found in real world graphs. More specifically, the degree distribution follows a Poisson, while real world graphs tend to follow a power law [36]; thus other methods are included in this analysis. Newman-Watts graphs modify the nature of random chance by mimicking "small world" behaviors found in real social networks, thereby emphasizing local structure. Newman-Watts graphs raise the probability of two nodes being connected in certain locales while suppressing the probability of two nodes chosen at random being connected [37]. The parameters defining the Newman-Watts model are n, the number of nodes in the network, k, the number of neighbors that each node is connected to in a ring topology, and p, the probability of adding a new random (or shortcut) edge for each node. Random-Regular graphs are bound to the restriction of being regular, such that each node has the same exact degree; this differs from the Erdos-Renyi model in which the distribution follows a Poisson model [36]. The parameters defining the Random-Regular model are n, the number of nodes in the network, and d, the degree of each node, under the constraint that n × d be an even number. Powerlaw-Cluster graphs are constructed to preserve the notion found in real world networks regarding the existence of "hubs", which while rare have enormous degree. The specific implementation of this graph combines the afore- mentioned power-law degree distribution (the existence of high degree hubs) with the local clustering notions from the Watts model above [38]. The parameters defining the Powerlaw-Cluster graphs are n, the number of nodes in the network, m, the number of random edges to add for each new node, and p, the probability of adding an edge to form a triangle after adding an initial random edge. B. Real World Networks Real world networks fall along two broad categories: so- cial and other. Given that the synthetic social contact graphs detailed in Section III are most closely related to social interaction, it is reasonable to overweight social networks in selecting real data. Notably, the average degree of these social networks spans a wide range, from 7 to 209, yet these social graphs (and others available in the open) tend to the range from 15 to 75, thus the basis for parameterizing stylized graphs at the intervals in Table III. The analysis includes other graphs as well for diversity of analysis based on type of underlying activity, as well as much larger average node degree, as can be seen in the economic datasets. A brief description of the real world networks used in this evaluation are shown in Table IV. TABLE IV REAL WORLD NETWORK PARAMETERS. D IS THE AVERAGE DEGREE. Name econ-beaflw econ-beause piston email-EU-core p2p-Gnutella08 Type other other other social social Vertices 507 507 2K 1005 6301 Edges D 53K 209 174 44K 96 98K 50 25571 20777 7 V. EVALUATION METHODOLOGY, RESULTS, AND DISCUSSION To compare the five empirical graphs, twelve stylized graphs, and eight synthetic social contact graphs, we chose a heuristic set of features which sought to provide robust characterizations as well as computationally tractability. The features that were computed on each graph were described above in Section II, using the graph-tool computational framework [39]. After computing the features, clustering was performed in order to examine whether the generated graphs could be separated based on the computed features of each graph. K-Means clustering was used, with the number of clusters equaling the number of graph types that were generated, in this case, six [40]. The features were then reduced to two dimensions using PCA as the dimensionality reduction [41] for visualization purposes. Figure 6 represents the results of the clustering and PCA. In it, the various colors represent the K-Means clustering output, while the various marker shapes represent the true graph type, from a graph generation perspective. Fig. 6. We show the 34 dimensional representation of the graph reduced to two dimensions using PCA, where the marker types represent the true underlying graph generation mechanism as shown in the associated legend, and the colors represent the K-Means clusterer's prediction of the type of graph generation mechanism. It is seen that the clusterer cannot distinguish between the multichannel Agent-Synthetic graphs, G1 - G4, from real world network data. All stylized graphs are easily distinguished from the Agent- Synthetic approach, although they are confused amongst themselves. The key results indicate that the synthetic population- based graphs (referred to as Agent-Synthetic in Figure 6) are generally more similar to the real-world graphs than the stylized graphs. Within each of the three broad graph classes, measures of similarity vary: the synthetic graphs (of both classes) tend to be more broadly distributed while the real world graphs are narrowly distributed. In fact, the real-world graphs, despite having an enormous variance of average degree, are clustered very tightly in Figure 6. Also of note, while the stylized graphs are pushed away from the real world graphs almost entirely in the X dimension, the agent-synthetic graphs gain distance almost entirely in the Y dimension. We suggest this Y-axis distribution needs to be accounted for through additional interpretation, but we can conclude that the agent-synthetic graphs provide a more advantageous approximation to the real world graphs than the stylized counterparts. Additional nuance should be used when evaluating these results, based on the underlying type of activity that is being modeled. Within the agent-synthetic networks, it is seen that the graphs labelled Work, School, Other, Shopping, and Home are actually models of only a single type of underlying transaction. The real world networks also only model a single type of underlying transaction. G1-G4 graphs however jointly model the same entities performing different types of transactions all within the same graph. Moreover, as one can see from Table II that G1 models the fewest channels as the third and fourth elements (representing Shopping and Other, respectively) are zeroed out. As we transition from G1 to G4 in ascending order, either more elements become non-zero, or, the value of an element is raised. For example, from G1 → G2, the third element goes from 0 to 0.01. From G2 → G3, the fourth element goes from 0 to 0.01. From G3 → G4, the fifth element goes from 0.01 to 0.1. These increases correspond to magnitude along the Y axis in this high dimensional space. Summarily, when the underlying graph is normalized to represent only single underlying activity types, then the agent-synthetic data provides a better representation of real data from similar domains (e.g. social network data). As the agent-synthetic data accumulate greater complexity through adding additional underlying activity types (i.e. simulate a combination of resources into a coherent graph), the distance grows along the Y axis, implying that while the data is less similar to the real world networks, it is dissimilar in a way different than the stylized networks. A final observation is that while the distance between the real world graphs and G1 - G4 is greater than with the individual networks Work, School, etc., the clustering algorithm assigned G1 - G4 into the same cluster as the real world graphs, as shown in Figure 6. An outlier worth addressing is that of the Home graph. Figure 6 shows that in both the two dimensional reduced space, as well as the clustered space, this graph is closer to the stylized graphs than the real-world graphs. We note that this graph is a collection of largely disconnected components and has low node degree with low degree variance and therefore appears similar to a regular graph. VI. CONCLUSION We have presented a comparison of multiple synthetic social contact networks with real network data from the liter- ature as well as multiple stylized graph generation methods, along several structural measures. We conclude that the synthetic population-based method for generating graphs has quantifiable advantages over styl- ized methods, particularly in its ability to approximate the characteristics of real world graphs in a limited number of domains. The reliability of this conclusion is qualified however by some room for improvement in experimental design and further research to either corroborate or erode this conclusion. To bolster the reliability of these results, future research should aim to include a larger and more varied assortment of real world graphs from both the social network domain as well as others for comparison on the basis of multiple types of underlying activity. Moreover, future research should aim to be inclusive of other graph generation methods such as "Structure-driven Models" (e.g. Kronecker, dK-Graphs) and Intent-driven Models (e.g. Random Walk and Nearest Neighbor) [36]. In such research, attention should be given to scalability of graph feature computation. The current results are also not completely evaluated: we have not attempted to define which features most powerfully cause separation or similarity of the graphs under analysis. Furthermore, there are additional implementations of mea- sures of entropy or similarity which may prove useful at capturing the nature of real world graphs versus synthetic ones. Future research should strive to collect and evaluate data which represents multiple underlying types of activity carried out by common vertices. As described above, the G1 - G4 graphs are a combination of graphs in which a large majority of the nodes exist in all subgraphs. Retrieving real world networks which remain faithful to such a complex set of data are difficult to acquire, but will be useful for comparing the utility of G1 - G4 against stylized counterparts for multi- channel graphs. This work can also be extended to take into account dynamical measures, as discussed in the related work section, such as vulnerability and expansion, which provide insight into the realism of dynamical processes on networks. ACKNOWLEDGMENTS We acknowledge the Hume Center and the Biocomplexity Institute at Virginia Tech, as well as DARPA for their support in this research. REFERENCES [1] T. P. Michalak, T. Rahwan, and M. Wooldridge, "Strategic social network analysis," in Proc. AAAI, 2017. [2] M. Waniek, T. Michalak, T. Rahwan, and M. Wooldridge, "Hiding individuals and communities in a social network," arXiv:1608.00375v1 [cs.SI], 2016. [3] S. Eubank, V. S. A. Kumar, M. V. Marathe, A. Srinivasan, and N. Wang, "Structural and algorithmic properties of massive social networks," in Proceedings of the 15th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2004, pp. 718 -- 727. [4] R. J. Beckman (Ed.), "TRansportation ANalysis SIMulation System (TRANSIMS): The Dallas-Ft. Worth case study," Los Alamos National Laboratory, Tech. Rep. LAUR-97-4502, 1997. [5] R. L. Axtell, "120 million agents self-organize into 6 million firms: A model of the U.S. private sector," in Proc. AAMAS, 2016. [6] D. Ballas, G. Clarke, and J. Dewhurst, "Modelling the socio-economic impacts of major job loss or gain at level: a spatial microsimulation framework," Spatial Economic Analysis, vol. 1, no. 1, pp. 127 -- 146, 2006. the local [7] N. Parikh, M. Youssef, S. Swarup, and S. Eubank, "Modeling the effects of transient populations on epidemics in Washington DC," Scientific Reports, vol. 3, p. Article 3152, Nov 2013, pMCID: PMC3818653. [8] S. Eubank, H. Guclu, V. S. A. Kumar, M. Marathe, A. Srinivasan, Z. Toroczkai, and N. Wang, "Modelling disease outbreaks in realistic urban social networks," Nature, vol. 429, pp. 180 -- 184, May 2004. [9] S. Swarup, J. M. Gohlke, and J. R. Bohland, "A microsimulation model of population heat exposure," in Proceedings of the 2nd International Workshop on Agent-based Modeling of Urban Systems (ABMUS), Sau Paulo, Brazil, 2017. [10] P. Waddell, "UrbanSim: Modeling urban development for land use, transportation, and environmental planning," Journal of the American Planning Association, vol. 68, no. 3, pp. 297 -- 314, 2002. [11] N. Parikh, H. G. Hayatnagarkar, R. J. Beckman, M. V. Marathe, and S. Swarup, "A comparison of multiple behavior models in a simulation of the aftermath of an improvised nuclear detonation," Autonomous Agents and Multi-Agent Systems, Special Issue on Autonomous Agents for Agent-Based Modeling, vol. 30, no. 6, pp. 1148 -- 1174, 2016. [12] K. L. Edwards and G. P. Clarke, "The design and validation of a spatial microsimulation model of obesogenic environment for children in Leeds, UK: SimObesity," Social Science & Medicine, vol. 69, pp. 1127 -- 1134, 2009. [13] E. J. Wegman and Y. H. Said, "A social network model of alcohol behaviors," in Social Computing and Behavioral Modeling, H. Liu and al., Eds. Springer Science + Business Media, LLC, 2009, pp. 236 -- 243. [14] K. Muller and K. W. Axhausen, "Population synthesis for microsim- ulation: State of the art," in The 10th Swiss Transport Research Conference (STRC), August 2010. [15] J. Y. Guo and C. R. Bhat, "Population synthesis for microsimulation the travel behavior," Transportation Research Record: Journal of Transportation Research Board, vol. 2014, pp. 92 -- 101, 2007. [16] C. Elbers, J. O. Lanjouw, and P. Lanjouw, "Micro-level estimation of poverty and inequality," Econometrica, vol. 71, no. 1, pp. 355 -- 364, 2003. [17] H. Xia, J. Chen, M. V. Marathe, and S. Swarup, "Comparison and validation of synthetic social contact networks for epidemic modeling (extended abstract)," in Proceedings of The Thirteenth International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Paris, France, May 2014. [18] S. Eubank, V. S. A. Kumar, M. Marathe, A. Srinivasan, and N. Wang, "Structure of social contact networks and their impact on epidemics," AMS-DIMACS Special Volume on Epidemiology, 2006. [19] C. L. Barrett, S. Eubank, V. S. A. Kumar, and M. V. Marathe, "Under- standing large-scale social and infrastructure networks: A simulation- based approach," SIAM News, vol. 37, no. 4, May 2004. [20] H. Xia, C. L. Barrett, J. Chen, and M. V. Marathe, "Computa- tional methods for testing adequacy and quality of massive synthetic proximity social networks," in Proceedings of the 2013 IEEE 16th International Conference on Computational Science and Engineering, 2013, pp. 1113 -- 1120. [21] D. J. Watts and S. H. Strogatz, "Collective dynamics of small- worldnetworks," nature, vol. 393, no. 6684, p. 440, 1998. [22] L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation ranking: Bringing order to the web." Stanford InfoLab, Tech. Rep., 1999. [23] U. Brandes and C. Pich, "Centrality estimation in large networks," International Journal of Bifurcation and Chaos, vol. 17, no. 07, pp. 2303 -- 2318, 2007. [24] T. Opsahl, F. Agneessens, and J. Skvoretz, "Node centrality in weighted networks: Generalizing degree and shortest paths," Social networks, vol. 32, no. 3, pp. 245 -- 251, 2010. [25] L. Bai and E. R. Hancock, "Graph kernels from the jensen-shannon divergence," Journal of mathematical imaging and vision, vol. 47, no. 1-2, pp. 60 -- 69, 2013. [26] D. Bonchev, "Complexity analysis of the yeast proteome network," Chemistry and Biodiversity, vol. 1, pp. 312 -- 326, 2004. [27] A. Adiga, A. Agashe, S. Arifuzzaman, C. L. Barrett, R. J. Beckman, K. R. Bisset, J. Chen, Y. Chungbaek, S. G. Eubank, S. Gupta, M. Khan, C. J. Kuhlman, E. Lofgren, B. L. Lewis, A. Marathe, M. V. Marathe, H. S. Mortveit, E. Nordberg, C. Rivers, P. Stretz, S. Swarup, A. Wilson, and D. Xie, "Generating a synthetic population of the United States," Network Dynamics and Simulation Science Laboratory, Tech. Rep. NDSSL 15-009, 2015. [28] R. J. Beckman, K. A. Baggerly, and M. D. McKay, "Creating syn- thetic base-line populations," Transportation Research A -- Policy and Practice, vol. 30, pp. 415 -- 429, 1996. [29] C. T. Ireland and S. Kullback, "Contingency tables with given marginals," Biometrika, vol. 55, no. 1, pp. 179 -- 188, Mar. 1968. [30] K. Lum, Y. Chungbaek, S. G. Eubank, and M. V. Marathe, "A two-stage, fitted values approach to activity matching," International Journal of Transportation, vol. 4, no. 1, pp. 41 -- 56, 2016. [31] S. Erlander and N. F. Stewart, The Gravity Model in Transportation Analysis: Theory and Extensions. Utrecht, The Netherlands: VSP, 1990. [32] R. Beckman, K. Channakeshava, F. Huang, J. Kim, A. Marathe, M. Marathe, G. Pei, S. Saha, and A. K. S. Vullikanti, "Integrated multi- network modeling environment for spectrum management," IEEE Journal on Selected Areas in Communications, vol. 31, no. 6, pp. 1158 -- 1168, June 2013. [33] M. C. Gonz´alez, C. A. Hidalgo, and A.-L. Barab´asi, "Understanding human mobility patterns," Nature, vol. 453, pp. 779 -- 782, June 5 2008. [34] S. Swarup, S. Eubank, and M. Marathe, "Computational epidemiology as a challenge domain for multiagent systems," in Proceedings of the Thirteenth International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Paris, France, May 2014. [35] NetworkX developer team, "Networkx," 2014. [Online]. Available: https://networkx.github.io/ [36] S.-H. Lim, S. M. Lee, S. Powers, M. Shankar, and N. Imam, "Survey of approaches to generate realistic synthetic graphs," 2015. [37] M. E. Newman and D. J. Watts, "Renormalization group analysis of the small-world network model," Physics Letters A, vol. 263, no. 4-6, pp. 341 -- 346, 1999. [38] P. Holme and B. J. Kim, "Growing scale-free networks with tunable clustering," Physical review E, vol. 65, no. 2, p. 026107, 2002. [39] T. P. Peixoto, "The graph-tool python library," figshare, 2014. [Online]. Available: https://graph-tool.skewed.de [40] S. Lloyd, "Least squares quantization in pcm," IEEE transactions on information theory, vol. 28, no. 2, pp. 129 -- 137, 1982. [41] S. Wold, K. Esbensen, and P. Geladi, "Principal component analysis," Chemometrics and intelligent laboratory systems, vol. 2, no. 1-3, pp. 37 -- 52, 1987.
1704.02042
1
1704
2017-04-06T23:02:08
Tactics and Tallies: A Study of the 2016 U.S. Presidential Campaign Using Twitter 'Likes'
[ "cs.SI" ]
We propose a framework to measure, evaluate, and rank campaign effectiveness in the ongoing 2016 U.S. presidential election. Using Twitter data collected from Sept. 2015 to Jan. 2016, we first uncover the tweeting tactics of the candidates and second, using negative binomial regression and exploiting the variations in 'likes,' we evaluate the effectiveness of these tactics. Thirdly, we rank the candidates' campaign tactics by calculating the conditional expectation of their generated 'likes.' We show that while Ted Cruz and Marco Rubio put much weight on President Obama, this tactic is not being well received by their supporters. We demonstrate that Hillary Clinton's tactic of linking herself to President Obama resonates well with her supporters but the same is not true for Bernie Sanders. In addition, we show that Donald Trump is a major topic for all the other candidates and that the women issue is equally emphasized in Sanders' campaign as in Clinton's. Finally, we suggest two ways that politicians can use the feedback mechanism in social media to improve their campaign: (1) use feedback from social media to improve campaign tactics within social media; (2) prototype policies and test the public response from the social media.
cs.SI
cs
Tactics and Tallies: A Study of the 2016 U.S. Presidential Campaign Using Twitter 'Likes' Yu Wang Political Science University of Rochester Rochester, NY, 14627 [email protected] Xiyang Zhang Psychology Beijing Normal University Beijing, 100875 [email protected] Jiebo Luo Computer Science University of Rochester Rochester, NY, 14627 [email protected] Abstract We propose a framework to measure, evaluate, and rank cam- paign effectiveness in the ongoing 2016 U.S. presidential election. Using Twitter data collected from Sept. 2015 to Jan. 2016, we first uncover the tweeting tactics of the candidates and second, using negative binomial regression and exploit- ing the variations in 'likes,' we evaluate the effectiveness of these tactics. Thirdly, we rank the candidates' campaign tac- tics by calculating the conditional expectation of their gener- ated 'likes.' We show that while Ted Cruz and Marco Rubio put much weight on President Obama, this tactic is not being well re- ceived by their supporters. We demonstrate that Hillary Clin- ton's tactic of linking herself to President Obama resonates well with her supporters but the same is not true for Bernie Sanders. In addition, we show that Donald Trump is a major topic for all the other candidates and that the women issue is equally emphasized in Sanders' campaign as in Clinton's. Finally, we suggest two ways that politicians can use the feed- back mechanism in social media to improve their campaign: (1) use feedback from social media to improve campaign tac- tics within social media; (2) prototype policies and test the public response from the social media. Introduction Figure 1: Selected tweets Donald Trump (R) posted on February 9th. Twitter is playing an important role in connecting the pres- idential candidates with voters (Sanders 2016). Between September 18, 2015 and January 23, 2016, Hillary Clin- ton posted 1316 tweets, Bernie Sanders 1698 tweets, Donald Trump 2533 tweets, Ted Cruz 1309 tweets, and Marco Rubio 908 tweets.1 These tweets constitute a valuable data source because they are explicitly political in nature, they are many, and, importantly, they carry feedback information from the voters in the form of 'likes.' In this paper, we solve two problems. We first study the tweeting tactics in the tweets: we analyze who are men- tioned in these tweets and what issues are raised. We then use negative binomial regression to evaluate the effective- ness of these tactics by exploiting the variations in 'likes,' which we refer to as tallies. Our study focuses on the five c (cid:13) 2017, Yu Wang ([email protected]), 1We do not count retweets, as retweets do not have as a feature Copyright Xiyang Zhang, Jiebo Luo. All rights reserved. the number of 'likes.' leading candidates: Hillary Clinton (D), Bernie Sanders (D), Donald Trump (R), Ted Cruz (R), Marco Rubio (R).2 Figure 1 shall illustrate our points well. It shows three tweets that Donald Trump posted on February 9th, 2016, all of which are political in nature. The first tweet talks about drugs. The second tweet raises the issue of Oba- maCare and points towards President Obama (D).3 The third tweet is about the ISIS. Trump supporters responded to these three tweets differently, assigning to the third tweet the most 'likes' and to the second tweet the fewest 'likes.' By con- necting topics with responses, we are therefore able to infer the effectiveness of the tactics. Our approach has a distinct advantage over polls. Individ- 2This selection is based on both polling results and on candi- dates' performance in the Iowa caucus. 3Throughout, we follow the convention that Republican candi- dates are marked with (R) and Democratic candidates are marked with (D). uals surveyed in polls may not actually turn out to vote and even if they do vote they might change their mind and vote differently. By contrast, our data is built on strong revealed preference. Individuals voluntarily express their preferences, and thus the estimates we obtain are more reliable. We organize our paper as follows. Section 2 presents re- lated work. Section 3 introduces the dataset US2016 and the methodology. Section 4 presents the tactics we uncover from the tweets. Section 5 evaluates these tactics. Section 6 ranks the campaign effectiveness of the five candidates. Section 7 concludes. Related Work Our work builds upon previous research in electoral studies in political science and behavioral studies based on social media. Political scientists have long studied the effects of cam- paigns and public debates. Many studies have found that campaign and news media messages can alter voters' be- havior (Riker 1986; Iyengar and Kinder 1987). According to Gabriel S. Lenz, public debates help inform some of the vot- ers about the parties' or candidates' positions on the impor- tant issues (Lenz 2009). In our work, we assume that tweets posted by the presidential candidates reveal their policy po- sitions in various dimensions and that supporters reveal their policy preference by deciding whether or not to 'like' the tweets. In a related strand, researchers have found that gender constitutes an important factor in voting behavior. One com- mon observation is that women tend to vote for women, which political scientists refer to as gender affinity effect (King and Matland 2003; Dolan 2008). In our work, we test whether the women issue is emphasized in Hillary Clinton's campaign and evaluate its effectiveness. There are also a large number of studies on using so- cial media data to analyze and forecast election results. Di- Grazia et al. (DiGrazia et al. 2013) find a statistically sig- nificant relationship between tweets and electoral outcomes. MacWilliams (MacWilliams 2015) suggests that a candi- date's number of 'likes' in Facebook can be used for mea- suring a campaign's success in engaging the public. Accord- ing to Williams and Gulati (Williams and Gulati 2008), the number of Facebook fans constitutes an indicator of candi- date viability. According to O'Connor et al. (O'Connor et al. 2010), tweets with sentiment can potentially serve as votes and substitute traditional polling. Gayo-Avello, Metaxas and Mustafaraj (Gayo-Avello, Metaxas, and Mustafaraj 2011), on the other hand, report unsatisfactory performance of such predictions and advocate that scholarly research should be accompanied with a model explaining the predicative power of social media. Substantively, our paper is closely related to two existing studies of the 2016 U.S. presidential election. Wang, Li and Luo (Wang, Li, and Luo 2016b) study the growth pattern of Donald Trump's followers. Wang, Li and Luo (Wang, Li, and Luo 2016a) use Twitter profile images to study and com- pare the demographics of the followers of Donald Trump and Hillary Clinton. The authors also study the effects of public debates on the number of Twitter followers. Our work uses both the number of candidate followers (as a control variable) and the number of 'likes' (as the dependent vari- able). Our contribution is to infer tactic effectiveness from these 'likes." There are also quite a few studies modeling individual be- haviors on social media. Lee et al. (Lee et al. 2015) model the decision to retweet, using Twitter user features such as agreeableness, number of tweets posted, and daily tweeting patterns. Mahmud, Chen, and Nichols (Mahmud, Chen, and Nichols 2013) model individuals' waiting time before reply- ing to a tweet based on their previous replying patterns. Our study models the number of 'likes' that candidates' tweets receive. Our innovation is to use tweet-specific features in- stead of individual-specific features, as is done in the above- cited literature. A closely related work is Wang, et al. (Wang et al. 2016), which uses Latent Dirichlet Allocation (LDA) to extract tweet topics and models supporter preferences. In this paper, we reply on domain knowledge and search for specific topics using predefined keywords. As a result, we will have definitive labels. Data and Methodology We use the dataset US2016, constructed by us with Twitter data. The dataset contains a tracking record of the number of followers for all the major candidates in the 2016 presi- dential race, including Hillary Clinton (D), Bernie Sanders (D), Donald Trump (R), Ted Cruz (R), and Marco Rubio (R). The dataset spans the entire period between September 18th, 2015 and January 23th, 2016, and covers four Democratic debates and four Republican debates. Dependent variable Our dataset US2016 contains all the tweets that the five candidates posted during the same period and the number of 'likes' that each tweet has received. In Table 1, we report the summary statistics of the dependent variable: 'likes.' Table 1: Summary statistics Mean Variable Std. Dev. Min. Max. N Hillary Clinton 1702.454 1682.262 120 19935 1316 Bernie Sanders 2792.472 2748.807 204 44267 1698 Donald Trump 3757.479 2900.289 730 32652 2533 7991 1309 Ted Cruz Marco Rubio 4856 908 437.015 367.976 553.396 511.606 8 3 To visualize these tallies, we plot the density distribu- tion for each candidate, grouped by party affiliation. We align the x axis so that it is easy to compare the distribu- tion both across candidates and across parties. We observe that in the Democratic party, Sanders' tweets tend to receive more 'likes' than Clinton's tweets. Among Republican can- didates, Trump's tweets receive more 'likes' than Cruz and Rubio. Equally important, we observe large variations in the distribution for all the candidates. Explanatory Variables We believe part of the variations can be attributed to the topics embedded in the tweets: a more preferred topic gener- ates more 'likes.' To operationalize this idea, we first multi- label each tweet for the following individual-based topics: Figure 2: Distribution of 'Likes' in Log units. President Obama (D), Hillary Clinton (D), Bernie Sanders (D), Martin O'Malley (D), Donald Trump (R), Ted Cruz (R), Marco Rubio (R), Jeb Bush (R), Ben Carson (R), Rand Paul (R), John Kasich (R), and Chris Christie (R).4 We then multi-label each tweet for issue-based topics: ISIS, immigra- tion, Iran, women, education, drugs, gun control, abortion, economy and the Wall Street.5 Topic features are binary. We derive these features using keyword matching. For example, we assign to the Obama topic 1 for tweets that contain "Obama" and assign 1 to the Rubio topic for tweets containing "marcorubio" (case- sensitive) or "Rubio." For issue topics, we first transform the tweets to lowercase before the matching procedure. For example, we assign 1 to the abortion topic for tweets that either contain "abortion" or "planned parenthood." Control Variables Following Wang, et al. (Wang et al. 2016), we control for the number of followers that each candidate has on Twitter. Intuitively, the more followers the candidate has the more 'likes' his or her tweets shall receive, as followers are more likely to notice the tweets posted by these candidates. On Figure 3, we report the growth of followers for the five can- didates under study. In addition to the number of followers, we also control for three tweet-specific features: the length of the tweet calcu- lated as the number of words, whether the tweet contains a hyperlink, which is binary, and whether the candidate men- tions himself or herself in the message.6 4By the end of the New Hampshire primary, Martin O'Malley 5The poll selection performance. For (D), Rand Paul (R), and Chris Christie (R) have quit the race. based refer the http://elections.huffingtonpost.com/pollster#2016-primaries. Our selection of political issues follows the Bing Political Index. Available at https://blogs.bing.com/search/2015/12/08/the-bing- 2016-election-experience-how-do-the-candidates-measure-up/. political poll figures data, on to is please 6Note that here we treat candidates' self-referencing behavior of Figure 3: Growth of Candidates' Twitter Followers. Negative Binomial Regression Negative Binomial regression is the main workhorse in our study. Our dependent variable 'likes' is count data. In our MLE estimation, we formulate the link functions and the log-likelihood as follows (Greene 2008): µ = exp(β0 + β1Follower Count + β2Tweet Length + β3Hyperlink + β4Self Referencing + γγγ · Political Figures + θ · Political Issues + ν) eν ∼ Gamma(1/α, α) p = 1/(1 + αµ) m = 1/α lnL = n X j=1 [ln(Γ(m + yj) − ln(Γ(yj + 1)) − ln(Γ(m)) + mln(pj) + yjln(1 − pj)] where Follower Count is the number of Twitter followers (in millions) averaged over the day when the tweet is posted, Tweet Length is the number of words that the tweet contains. Hyperlink is binary and is 1 if the tweet contains an external link. Political Figures is a vector of 11 binary variables. The binary variable is 1 when the political figure is mentioned in the tweet and is 0 otherwise. Political Issues is a vector of 10 binary variables. The binary variable is 1 when the political issue is raised in the tweet and is 0 otherwise. Lastly, α is a measure of dispersion of the data. Forward-Stepwise Selection Out of the total 21 features, we select the top five top- ics using the Forward-Stepwise selection algorithm (Hastie, Tibshirani, and Friedman 2013). Such a selection allows us to uncover the most important topics and to order them ac- cordingly.7 as a control variable rather than as a distinct topic. 7While we use loglikelihood as our selection criterion, using the Akaike information criterion (AIC) would yield exactly the same result, as AIC = 2k - 2loglike. 8 8 10 10 Democrats 6 Republicans 6 4 4 Clinton Sanders 2 2 Trump Cruz Rubio .6 .2 .4 Density 0 0 .6 .4 Density .2 0 0 Trump Cruz Rubio 4 followers (million) 2 Clinton Sanders 4 followers (million) 2 Jan 21, 2016 Jan 09, 2016 Dec 29, 2015 Dec 17, 2015 Dec 06, 2015 Nov 24, 2015 Nov 13, 2015 Nov 01, 2015 Oct 20, 2015 Oct 09, 2015 Sep 27, 2015 Sep 16, 2015 Jan 21, 2016 Jan 09, 2016 Dec 29, 2015 Dec 17, 2015 Dec 06, 2015 Nov 24, 2015 Nov 13, 2015 Nov 01, 2015 Oct 20, 2015 Oct 09, 2015 Sep 27, 2015 Sep 16, 2015 0 0 Timeline of Follower Growth 6 6 Forward-Stepwise Selection (S, k) 1: Add in control variables; 2: Initialize the topic set S = {topici,∀i}; 3: Initialize the selection set to S∗ = ∅; 3: for i from 1 to k: // k≤ S; topic= argmax logPr(Θy, topic ∈ S); 4: 5: S∗ = S∗ ∩ {topic}; 6: S = S\{topic}; 7: end for; and Donald Trump, with President Obama being a distant third.8 Other political figures barely receive attention. In Figure 5, we present the histogram of the individual- based tweet topics for Trump, Cruz and Rubio. One sharp contrast among the three candidates is that Donald Trump virtually engages with all the political figures, whereas Ted Cruz and Marco Rubio focus their attacks on President Obama and Hillary Clinton.9 Tactic Evaluation dates' tactics: We propose the following metric to measure the candi- Eval(i) =Xj f (j)p(ji,X I(j) > 0) where i denotes candidate, j denotes topic, f(j) denotes the marginal effects of topic j that we derive using negative bi- nomial regression, and p(j-i,P I(j) > 0) denotes the con- ditional probability of candidate i engaging in topic j given the candidate is raising at least one topic. We learn this con- ditional distribution from the tweets. Tactics In this section, we report on the tactics that we uncover from the candidates' tweets. We first present the tactics with re- gard to political figures and then present tactics on policy issues. We follow the convention to color Democrats blue and Republicans red. Whenever possible, we draw refer- ences from the political science literature. Political Figures Figure 4: Distribution of Tweets on Political Figures for Hillary Clinton and Bernie Sanders. In Figure 4, we present the histogram of the individual- based tweet topics. One immediate observation is that Hillary Clinton focuses on Donald Trump and President Obama, and that Bernie Sanders focuses on Hillary Clinton Figure 5: Distribution of Tweets on Political Figures for Donald Trump, Ted Cruz and Marco Rubio. Political Issues In Figure 6, we report on the political issues that Demo- cratic candidates focus on. Hillary Clinton focuses on the women issue and on gun control; Bernie Sanders focuses on the economy, the Wall Street, and education. Putting women at the center of her campaign is one of the key strategies in Hillary Clinton's campaign.10 Passing tougher gun control regulations is also high on her agenda, as Clinton tries to follow President Obama who has been pushing for gun controls. Bernie Sanders is less progressive 8Note that while Clinton's focus is on both Trump and President Obama, she is attacking Trump while embracing President Obama. This is not immediately readable from the histogram. 9For a discussion of Marco Rubio's attacks on President http://abcnews.go.com/Politics/marco- Obama, rubio-defends-repeated-attack-president-obama- republican/story?id=36760445. please see. 10For a detailed historical discussion and a compari- the White House in 2008, see son with Clinton's bid for http://thehill.com/homenews/campaign/219058-hillary-clinton- puts-womens-rights-at-center-of-her-agenda. Clinton Christie Kasich Rubio Paul Carson Jeb Cruz Trump OMalley Sanders Clinton Obama Sanders Christie Kasich Rubio Paul Carson Jeb Cruz Trump OMalley Sanders Clinton Obama 010203040 Frequency 01020304050 Frequency Trump Christie Kasich Rubio Paul Carson Jeb Cruz Trump OMalley Sanders Clinton Obama Cruz Christie Kasich Rubio Paul Carson Jeb Cruz Trump OMalley Sanders Clinton Obama Rubio Christie Kasich Rubio Paul Carson Jeb Cruz Trump OMalley Sanders Clinton Obama 0200 Frequency 0100 Frequency 0100 Frequency Figure 6: Distribution of Tweets on Political Issues for Hillary Clinton and Bernie Sanders. on that issue. As New York Times writes, Sanders' mixed record on gun controls is one of his major vulnerabilities in the campaign.11 Our data shows that Sanders' strategy is to avoid this issue. In Figure 7, we report on the political issues that Re- publican candidates focus on. Trump's most frequent topic is immigration, which is not surprising given Trump is the original proposer for constructing a wall between the United States and Mexico. For Ted Cruz and Marco Rubio, it is the ISIS. The overall pattern is that the Republican candidates focus on foreign affairs, and the Democrats focus on domes- tic affairs. Tallies In this section, we first use negative binomial regression to connect these tactics to the tallies of 'likes' and measure which tactic fairs best in terms of generating 'likes.' Sec- ondly, we use Forward-Stepwise selection to select and rank the top 5 salient topics for the candidates. Negative Binomial regression We report the estimated coefficients in Table 2. Each col- umn represents one candidate and each row represents one topic or one control variable. Cells are missing when candi- dates do not discuss the corresponding topic (represented by rows). We shall only interpret a few highlights here, but our re- sults are much richer. First, we find the mention of Presi- dent Obama increases the number of 'likes' for Clinton but not so for Sanders. This is strategically important when it comes to how candidates position themselves. While Pres- ident Obama has not explicitly endorsed either Clinton or Figure 7: Distribution of Tweets on Political Issues for Don- ald Trump, Ted Cruz and Marco Rubio. Sanders 12, voters tend to identify him more with the former Secretary of State than with Senator Sanders. Now in retro- spect, Sanders' strategy of downplaying President Obama in his campaign is wise. We also observe that focusing on attacking President Obama does not serve Cruz or Rubio well. This is an im- portant discovery, because, unlike Sanders, both these candi- dates are investing heavily on the Obama topic. And we are showing this strategy is not generating many 'likes' among their supporters. On the ISIS issue, our results show that all the Republican candidates are drawing more 'likes,' and that neither Demo- cratic candidate wins on this issue. On immigration, Don- ald Trump (R) is clearly the winner. Hillary Clinton (D) and Bernie Sanders (D) both suffer on this topic. It is therefore no accident that the most frequent issue topic in Trump's campaign is immigration: it serves him well. For Donald Trump (R), our results are consistent with (Wang et al. 2016), which finds that Trump supporters re- spond well to attacks on Democrats but less positively to- wards attacks on fellow Republicans, such as Jeb Bush. Our study shows that the result still holds at individual level and suggests that Trump should shift his attention away from fel- low Republicans and focus more on Democrats. For Rubio (R), one topic that resonates particularly well and sets himself apart from others is abortion. During the eighth Republican debate, Rubio attacks Clinton (D) and 11http://www.nytimes.com./politics/first- draft/2016/01/08/obamas-pledge-on-gun-control-leaves-bernie- sanders-with-something-to-prove/? r=0. 12This is stated by the White House Chief of Staff Denis McDonough. Available at http://www.reuters.com/article/us-usa- election-obama-idUSKCN0UO0L720160110. Sanders Wall Street Economy Abortion Gun Control Drugs Education Woman Iran Immigration ISIS 0 020406080 Frequency Wall Street Economy Abortion Gun Control Drugs Education Woman Iran Immigration ISIS Clinton 100 50 Frequency Wall Street Economy Abortion Gun Control Drugs Education Woman Iran Cruz Wall Street Economy Abortion Gun Control Drugs Education Woman Iran Rubio Immigration Immigration ISIS ISIS Wall Street Economy Abortion Gun Control Drugs Education Woman Iran Immigration ISIS Trump 033 Frequency 031 Frequency 015 Frequency Likes Followers Length Http Obama Clinton Sanders OMalley Jeb Table 2: Negative Binomial Regression Clinton Sanders Trump Cruz Rubio (0.34) (0.087) (0.023) 0.30∗∗∗ 0.43∗∗∗ 0.57∗∗∗ 3.88∗∗∗ 3.48∗∗∗ (0.072) (0.61) -0.015∗∗∗ -0.0062 0.015∗∗∗ 0.056∗∗∗ 0.071∗∗∗ (0.0040) (0.0037) (0.0018) (0.0040) (0.0075) -0.27∗∗∗ -0.52∗∗∗ 0.11∗∗∗ 0.44∗∗∗ 0.45∗∗∗ (0.045) (0.083) 0.12 0.33∗ (0.15) (0.15) 0.37∗ -0.45∗∗∗ (0.039) (0.17) 0.084 (0.34) (0.061) (0.025) 0.13 0.39∗∗∗ (0.070) (0.13) 0.28∗∗∗ 0.91∗∗∗ (0.046) (0.25) 0.19 (0.14) 0.39 (0.28) (0.036) -0.16 (0.27) 0.28 (0.14) 0.67∗∗∗ (0.14) -0.19 (0.66) (0.15) Christie ISIS Trump Cruz Carson Rubio Kasich Rand Paul 0.67 (0.39) (0.051) 0.88 (0.78) 0.20 (0.33) -0.32∗ (0.13) 0.33 (0.38) -0.30 (0.66) -0.52 (0.38) 1.34∗ (0.66) 0.075 (0.46) -0.73 (0.49) 0.43∗∗∗ 1.10∗∗∗ -0.34∗∗∗ 1.12∗∗∗ (0.13) (0.24) -0.17 (0.66) 2.62∗ (0.021) (1.10) -0.096 -0.52∗∗∗ 1.89∗ (0.78) (0.063) 0.79 -0.25∗∗ (0.56) (0.078) -0.11∗ -3.00∗ (1.36) (0.047) -1.00∗∗ -0.12 (0.066) (0.31) -0.11 (0.10) 0.028 (0.20) -0.42∗ (0.16) 0.48∗∗∗ 0.50∗∗∗ 1.18∗∗∗ -0.011 (0.29) (0.12) (0.15) -0.17 0.18∗ Immigration -0.40∗∗ (1.10) (0.090) (0.14) 0.063 0.22 0.15 (0.14) (0.30) (0.32) -0.23 -0.042 0.24∗∗∗ 0.48∗∗∗ (0.64) (0.10) (0.096) (0.071) 0.53 0.65∗ 0.30∗∗∗ -0.14 (0.29) (0.78) (0.085) (0.14) -0.76 0.083 0.023 (0.12) (0.21) (0.48) 0.19 0.62∗∗∗ 0.61∗∗ 0.12 (0.25) (0.18) (0.073) (0.20) 0.13 0.077 0.36 (0.30) (0.20) (0.15) 0.11 -0.23∗∗ -0.27∗ (0.55) (0.074) (0.11) -1.72∗ -0.19∗ -0.63∗∗∗ (0.18) (0.79) (0.077) 6.59∗∗∗ 7.79∗∗∗ 5.23∗∗∗ 2.54∗∗∗ 0.91 (0.35) (0.22) (0.59) 0.44∗∗∗ 0.43∗∗∗ 0.23∗∗∗ 0.60∗∗∗ 1.20∗∗∗ (0.016) (0.050) -0.83∗∗∗ -0.85∗∗∗ -1.48∗∗∗ -0.51∗∗∗ 0.19∗∗∗ (0.037) (0.041) 1306 (0.14) -0.41 (0.22) 0.073 (0.17) 0.27 (0.26) -0.021 (0.28) 0.39 (0.40) 1.30∗∗ (0.49) 1.00∗ (0.49) 0.041 (0.15) -0.64 (0.48) (0.028) 2445 (0.037) 1252 (0.032) 1688 Gun Control Wall Street Education (0.014) (0.006) (0.022) (0.11) (0.12) α ln(α) Economy Abortion Iran Women Drugs Constant 21568.1 29468.6 42921.2 17215.4 11979.5 889 Observations AIC Standard errors in parentheses ∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001 Sanders (D) for not raising the issue during the Democratic debates.13 This criticism is consistent with our data: both Clinton and Sanders have downplayed the topic of abortion. Rubio is also strategically right in emphasizing his pro-life stance, when he explains that he would rather lose an elec- tion than be wrong about abortion. Our study shows that the topic of abortion resonates well with Rubio's supporters. To numerically evaluate the effectiveness of each topic for each candidate, we calculate the marginal effects of that topic, while holding all other variables to their mean. We then plot the estimates with 95% confidence intervals in Fig- ures 8-12. They are reported at the end of the paper. Using likelihood ratio test on α, we are further able to confirm the existence of over-dispersion, and thus confirm that negative binomial regression is more appropriate than Poisson regression. Topic Selection We use the Forward-Stepwise selection algorithm to se- quentially select the five most salient topics for each can- didate. The selected topics are the ones that influence the number of 'likes' the most. We present the results in Tables 3 and 4. Table 3: Topic Selection (D) Topic Clinton Topic Sanders Likes 1 2 3 4 5 Constant α Constant Trump Women Economy Wall Street 0.42∗∗∗ (0.13) -0.27∗ (0.11) -0.65∗∗∗ (0.17) 0.23∗∗ (0.070) Immigration -0.39∗∗ (0.14) 6.66∗∗∗ (0.34) 0.44∗∗∗ (0.016) -0.82∗∗∗ (0.037) 1306 21556.7 N AIC Standard errors in parentheses ∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001 Gun Trump Women 1.10∗∗∗ (0.15) 0.54∗∗∗ (0.092) 0.62∗∗∗ (0.18) Education 0.29∗∗∗ (0.085) Economy -0.25∗∗∗ (0.075) 7.81∗∗∗ (0.11) 0.43∗∗∗ (0.014) -0.84∗∗∗ (0.032) 1688 29473.3 Our study shows that Donald Trump (R) is on the top-5 list of all other candidates. It also shows that the ISIS topic is on the top lists of all the Republican candidates but is not prioritized either by Clinton or Sanders. Women is an important topic for Hillary Clinton (D). But it ranks even higher for Bernie Sanders (D). This is consistent with the exit poll results after the New Hampshire primary, in which Sanders won more women votes than Clinton and 69% of 13http://www.npr.org/sections/thetwo- way/2016/02/06/465880648/the-8th-republican-debate-in-100- words-and-3-videos. women under 45 backed Sanders.14 Table 4: Topic Selection (R) Topic Trump Topic Cruz Topic Rubio Obama 0.39∗∗∗ Trump 1.10∗∗∗ ISIS Clinton0.30∗∗∗ Clinton 0.92∗∗∗ Trump (0.070) (0.045) 0.49∗∗∗ ISIS (0.12) (0.24) 1.20∗∗∗ (0.29) 2.56∗ (0.25) (1.11) 0.49∗∗∗ Abortion 1.26∗ (0.50) (0.14) 1.50∗ (0.64) Cruz Economy0.97 ISIS Gun Likes 1 2 3 4 5 Const. α Const. Educt. 0.79∗∗ Rubio 0.65 (0.28) 0.56∗∗ (0.20) 5.26∗∗∗ (0.11) 0.23∗∗∗ (0.006) -1.46∗∗∗ (0.028) 2445 42936.5 (0.39) Immigt.-0.42 (0.22) 2.51∗∗∗ (0.21) 0.60∗∗∗ (0.022) -0.51∗∗∗ (0.037) 1252 17205.2 N AIC Standard errors in parentheses ∗ p < 0.05, ∗∗ p < 0.01, ∗∗∗ p < 0.001 (0.50) 0.50 (0.57) 1.22∗∗∗ (0.050) 0.20∗∗∗ (0.041) 889 11974.0 Tactic Evaluation In this section, we evaluate the candidates' tactics by con- necting their tweeting tactics and the 'likes' tally. We just observed that Donald Trump (R) is receiving many 'likes' for his comments on President Obama (D) and Hillary Clin- ton (D), but meanwhile he is also spending much time at- tacking Jeb Bush and Marco Rubio, which is not generating positive response. Senator Sanders (D), almost knowingly, avoids talking about President Obama to his benefits but his focus on the Wall Street is not generating positive response. To solve this problem, we provide a unified approach to evaluate and rank the candidates' tactics, using the metric proposed in Section 3. Eval(i) =Xj f (j)p(ji,X I(j) > 0) In Table 5, we report the evaluation results. Our calcu- lation suggests that Sanders, who cunningly avoids talking about President Obama and focuses on Trump instead, has the best performing tactic. Hillary Clinton comes last. This can be attributed to the fact that women issue and gun control issue, which she invests heavily in, is not generating many 'likes.'15 14http://abcnews.go.com/PollingUnit/voted-live-hampshire- primary-exit-poll-analysis/story?id=36805930. 15After her defeat in the New Hampshire primary, Clinton started to consider adjusting her strategies. For details, please see http://www.wsj.com/articles/hillary-clinton-cast-in-underdog- role-as-new-hampshire-votes-1455041196#livefyre-comment. Table 5: Tactic Evaluation Candidate Sanders Trump Rubio Cruz Clinton Score 295.46 236.63 147.69 117.88 89.81 Party D R R R D Rank 1 2 3 4 5 Conclusions We have presented a framework to measure, evaluate and rank the campaign effectiveness. We have studied the tac- tics and tallies of the ongoing 2016 U.S. presidential elec- tion. Using Twitter data collected from Sept. 2015 to Jan. 2016, we have uncovered the tweeting tactics of the can- didates and second we have evaluated the effectiveness of the candidates' tactics using negative binomial regression and exploiting the variations in 'likes.' We have also applied the Forward-Stepwise selection algorithm to select the most salient topics for the candidates. Lastly, we have calculated the expected number of 'likes' that each tactic is generating and ranked them. We observe that while Ted Cruz and Marco Rubio put considerable weight on President Obama, their tactics are not well received by their supporters. We also demonstrate that Hillary Clinton's tactic of linking herself to President Obama resonates well with her supporters but it is not so for Bernie Sanders. We also show that Trump is now a ma- jor topic for all the other presidential candidates and that the women issue is equally, if not more so, emphasized in Sanders' campaign as in Clinton's. Our study shows two possible ways that politicians can use the feedback mechanism in social media to improve their campaign: (1) use feedback from social media to improve campaign tactics within social media; (2) prototype policies and test the public response from the social media. References DiGrazia, J.; McKelvey, K.; Bollen, J.; and Rojas, F. 2013. More tweets, more votes: Social media as a quantitative in- dicator of political behavior. PLoS ONE. Dolan, K. 2008. Is There a Gender Affinity Effect in Ameri- can Politics? Information, Affect, and Candidate Sex in U.S. House Elections. Political Research Quarterly. Gayo-Avello, D.; Metaxas, P. T.; and Mustafaraj, E. 2011. Limits of Electoral Predictions Using Twitter. In Proceed- ings of the Fifth International AAAI Conference on Weblogs and Social Media. Greene, W. 2008. Functional forms for the negative bino- mial model for count data. Economic Letters (99):585–590. Hastie, T.; Tibshirani, R.; and Friedman, J. 2013. The Ele- ments of Statistical Learning. Springer, 2nd edition. Iyengar, S., and Kinder, D. 1987. News That Matter: Tele- vision and American Opinion. University of Chicago Press. King, D. C., and Matland, R. E. Sex and the Grand Old Party: An Experimental Investigation of the Ef- 2003. fect of Candidate Sex on Support for a Republican Candi- date. American Politics Research. Lee, K.; Mahmud, J.; Chen, J.; Zhou, M.; and Nichols, J. 2015. Who will retweet this? detecting strangers from twit- ter to retweet information. ACM Transactions on Intelligent Systems and Technology 6(3):1–25. Lenz, G. S. 2009. Learning and Opinion Change, Not Prim- ing: Reconsidering the Priming Hypothesis. American Jour- nal of Political Science. MacWilliams, M. C. 2015. Forecasting Congressional Elec- tions Using Facebook Data. PS: Political Science & Politics 48(04). Mahmud, J.; Chen, J.; and Nichols, J. 2013. When will you answer this? estimating response time in twitter. In Pro- ceedings of the Seventh International AAAI Conference on Weblogs and Social Media. O'Connor, B.; Balasubramanyan, R.; Routledge, B. R.; and Smith, N. A. 2010. From Tweets to Polls: Linking Text Sentiment to Public Opinion Time Series. In Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media. Riker, W. H. 1986. The Art of Political Manipulation. Yale University Press. Sanders, B. 2016. Our Revolution: A Future to Believe In. Thomas Dunne Books. Wang, Y.; Luo, J.; Li, Y.; and Hu, T. 2016. Catching Fire via 'Likes': Inferring Topic Preferences of Trump Followers on Twitter. In Proceedings of the 10th International AAAI Conference on Web and Social Media (ICWSM-16). Wang, Y.; Li, Y.; and Luo, J. 2016a. Deciphering the 2016 U.S. Presidential Campaign in the Twitter Sphere: A Com- parison of the Trumpists and Clintonists. In Proceedings of the 10th International AAAI Conference on Web and Social Media (ICWSM-16). Wang, Y.; Li, Y.; and Luo, J. 2016b. To Follow or Not to Follow: Analyzing the Growth Patterns of the Trumpists on Twitter. In Workshop Proceedings of the 10th International AAAI Conference on Web and Social Media. Williams, C. B., and Gulati, G. J. 2008. The Political Im- pact of Facebook: Evidence from the 2006 Midterm Elec- tions and 2008 Nomination Contest. Politics & Technology Review, March, 11-21. Politics & Technology Review. Figure 9: Topic Effects of Sanders's Tweets. Figure 10: Topic Effects of Trump's Tweets. Figure 11: Topic Effects of Cruz's Tweets. Figure 8: Topic Effects of Clinton's Tweets. Figure 12: Topic Effects of Rubio's Tweets.
1804.02233
2
1804
2018-04-16T11:53:56
Forex trading and Twitter: Spam, bots, and reputation manipulation
[ "cs.SI", "cs.CL", "cs.CY", "econ.TH" ]
Currency trading (Forex) is the largest world market in terms of volume. We analyze trading and tweeting about the EUR-USD currency pair over a period of three years. First, a large number of tweets were manually labeled, and a Twitter stance classification model is constructed. The model then classifies all the tweets by the trading stance signal: buy, hold, or sell (EUR vs. USD). The Twitter stance is compared to the actual currency rates by applying the event study methodology, well-known in financial economics. It turns out that there are large differences in Twitter stance distribution and potential trading returns between the four groups of Twitter users: trading robots, spammers, trading companies, and individual traders. Additionally, we observe attempts of reputation manipulation by post festum removal of tweets with poor predictions, and deleting/reposting of identical tweets to increase the visibility without tainting one's Twitter timeline.
cs.SI
cs
Forex trading and Twitter: Spam, bots, and reputation manipulation Igor Mozetic1, Peter Gabrovsek2, Petra Kralj Novak1 1 Department of Knowledge Technologies, Jozef Stefan Institute, Ljubljana, Slovenia 2 Faculty of Computer and Information Science, University of Ljubljana, Slovenia Correspondence: [email protected] Abstract Currency trading (Forex) is the largest world market in terms of volume. We analyze trading and tweeting about the EUR-USD currency pair over a period of three years. First, a large number of tweets were manually labeled, and a Twitter stance classification model is constructed. The model then classifies all the tweets by the trading stance signal: buy, hold, or sell (EUR vs. USD). The Twitter stance is compared to the actual currency rates by applying the event study methodology, well-known in financial economics. It turns out that there are large differences in Twitter stance distribution and potential trading returns between the four groups of Twitter users: trading robots, spammers, trading companies, and individual traders. Additionally, we observe attempts of reputation manipulation by post festum removal of tweets with poor predictions, and deleting/reposting of identical tweets to increase the visibility without tainting one's Twitter timeline. 1 1 Introduction Foreign exchange market (Forex) is a global decentralized market for trading with currencies. The daily trading volume exceeds 5 trillion USD, thus making it the largest market in the world. In this paper we analyze three sources of data, over a period of three years (from January 2014 to December 2016) [6]: • the actual EUR-USD exchange rates, • financial announcements provided by the central banks (ECB and FED) and governments that influence both currencies (called "events"), and • tweets related to both currencies and their exchange. We focus on potential missinformation spreading and manipulations on Twitter. The main issue is: What is the ground truth? We address this problem by moving out of the social network system and by observing another, financial market system. Actual financial gains in the market provide clues to potential manipulations in the social network. We relate both systems by applying and adapting the "event study" methodology [9]. The currency announcements are events which are expected to influence the EUR-USD exchange rate. If the event signal (buy, hold, or sell) is properly recognized then some actual financial returns can be made in the hours (or days) after the event. In contrast to classical event studies, we categorize events on the basis of sentiment (properly called "stance") of relevant Twitter users. In our previous work, we already analyzed the effects of Twitter stance on stock prices (30 stocks from the Dow Jones index) [7, 14]. We showed that the peaks of Twitter activity and their polarity are significantly correlated with stock returns. In this paper, we show that, for certain classes of Twitter users, returns after the events are 1Presented at MIS2: Misinformation and Misbehavior Mining on the Web, Workshop at WSDM-18, Marina Del Rey, CA, USA, February 9, 2018. 8 1 0 2 r p A 6 1 ] I S . s c [ 2 v 3 3 2 2 0 . 4 0 8 1 : v i X r a 1 statistically significant (albeit small). And we can also identify differences in returns after the potential manipulations of Twitter feed. The paper is organized as follows. In section 2 we specify how the Forex tweets were collected, a subset manually annotated, and a stance classification model constructed. Section 3 provides simple rules to identify different classes of Twitter users (such as trading robots, spammers, and actual traders). We show that there are large differences in Twitter stance between these users. Section 4 describes the event study methodology in some detail, as needed to understand the subsequent results. We show significant differences in cumulative abnormal returns between the different user groups. In section 5 we address potential manipulations of the user Twitter feed with a tentative goal to improve her/his reputation and visibility. We focus on the tweets that were deleted after we originally collected them, and analyze different reasons for this post festum deletions. We conclude with the ideas for further work and enhancements of the preliminary, but promising, results presented so far. 2 Twitter stance model Tweets related to Forex, specifically to EUR and USD, were acquired through the Twitter search API with the following query: "EURUSD", "USDEUR", "EUR", or "USD". In the period of three years (January 2014 to December 2016) almost 15 million tweets were collected. A subset of them (44,000 tweets) was manually labeled by knowledgeable students of finance. The label captures the leaning or stance of the Twitter user with respect to the anticipated move of one currency w.r.t. the other. The stance is represented by three values: buy (EUR vs. USD), hold, or sell. The tweets were collected, labeled and provided to us by the Sowa Labs company (http://www.sowalabs.com). The labeled tweets were generalized into a Twitter stance model. For supervised learning, variants of SVM [16] are often used, because they are well suited for large scale text categorization, are robust, and perform well. For Forex tweets, we constructed a two plane SVM classifier [11, 12]. The two plane SVM assumes the ordering of stance values and implements ordinal classification. It consists of two SVM classifiers: One classifier is trained to separate the 'buy' tweets from the 'hold-or-sell' tweets; the other separates the 'sell' tweets from the 'buy-or-hold' tweets. The result is a classifier with two hyperplanes that partitions the vector space into three subspaces: buy, hold, or sell. During classification, the distances from both hyperplanes determine the predicted stance value. The stance classifier was evaluated by 10-fold blocked cross-validation. Since tweets are time-ordered, they should not be randomly selected into individual folds, but retained in blocks of consecutive tweets [3]. The results of performance evaluation are in Table 1. Note that the F1 measure considers just the 'buy' and 'sell' classes, as is common in the three-valued sentiment classification evaluations [11]. Table 1. Evaluation results of the Twitter stance model. Measure Accuracy F1(buy, sell) Value 0.811 ± 0.014 0.810 ± 0.014 3 Twitter user groups Different types of Twitter users have very different intentions regarding their impact and message they want to spread. In recent years, specially automated robots became increasingly influential. To properly estimate the relation between the Forex market and tweetosphere, it is important to focus on relevant Twitter users, i.e., Forex trading companies and individual traders. In related work, it was already shown that bots exercise a profound impact on content popularity and activity on Twitter. For example, Gilani et al. [8] implemented a simple bot detection mechanism based on click frequency and user agent strings. To classify users into three categories (organizations, 2 journalists/media bloggers, and individuals), De Choudhury et al. [5] trained an automatic classifier. An alternative approach is to detect communities in a retweet network, e.g., [4, 15]. It turns out that it is easy to identify Forex trading robots. Their tweets (t(bots)) all start with one of the eighth patterns (such as "Closed Buy", "Sell stop", ...). The Forex Twitter users can then be classified into one of the four groups by the following simple rules: • Trading robots: t(bot)rate > 0.75 • Spam/scam/advertisements: tweets > 1000 & retweetedratio < 0.01 • Trading companies: daysactive > 30 & trate > 0.5 & retweetedratio > 0.25 • Individual traders: daysactive > 30 & retweetedratio > 0.05 where trate = tweets/daysactive indicates the daily activity of the user, and retweetedratio = retweeted/tweets is the proportion of the user tweets that were retweeted by others. Figure 1 shows the proportions of different Twitter user groups and their tweets in our dataset. We can see that more than half of the users are individuals, but that the trading robots produce by far the largest fraction of Forex tweets. Fig 1. Proportions of Twitter accounts and tweets for different user groups. There are also considerable differences in the stance between different user groups. Figure 2 shows that trading robots produce almost exclusively polarized tweets (no 'hold' tweets). On the other hand, spammers (without robots) are predominantly neutral (relatively few 'buy' or 'sell' tweets). The groups we focus on, trading companies and individuals, are more opinionated than spammers. It is interesting that in their tweets the 'sell' signal is prevailing, probably due to the downward trend of EUR vs. USD in the last three years. 3 Fig 2. Twitter stance distribution of different user groups (bars show the proportion of tweets). Trading robots produce almost exclusively polarized tweets while spammers are predominantly neutral. 4 Event study An event study captures the impact of external events on the market returns. External events that we consider here are the currency related announcements by the central banks (FED and ECB) and governments (around 750 in the three years). In an event study, Cumulative Abnormal Return (CAR) is defined as a measure of return which exceed the overall market return. Specifically: • Market model corresponds to the overall market movement before the event. In our case, we use a linear regression of 30 days currency ratios prior to the event. The market model price is then subtracted from the actual currency price (at one minute resolution) to get the abnormal price (pab): pabi = pi − k ∗ i where pi is actual price at time i after the event. • Abnormal return is computed as a relative (abnormal) price change: rabi = pabi+1 − pabi pabi • Cumulative abnormal return (CAR) measures aggregated returns over longer periods of time i: CAR = n(cid:88) rabi The other essential component of an event study is determining the type of event in terms of its expected impact on the price. In stock market, typically Earnings Announcements are studied. If an announcement exceeds prior expectations of analysts, it is classified as positive, and stock prices are i=0 4 expected to rise. An event study combines announcements about several stocks, over longer period of time, and computes the average CARs in the days or hours after the announcements. In our case, we do not consider expectation of the analysts, but instead use the stance of the Forex Twitter users regarding the EUR vs. USD exchange rate. We consider all tweets in one hour after the announcement, and aggregate their stance to categorize the event. Then we compute the CARs for up to one day after the event, at one minute resolution. If Twitter stance correctly predicts the exchange rate movement then there should be some tangible returns (CARs) in the hours after the event. Figure 3 shows returns, aggregated over all 750 events, for different Twitter user groups. The expected result is visible for trading companies (bottom-left chart). For 'buy' events (we buy EUR at time 0) CARs are positive (return is around 0.1%, small but significant), for 'sell' events (we sell EUR at time 0) CARs are negative , and for 'hold' events (no transaction) CARs are around zero. Similar results are obtained for individual traders (bottom-right chart), but the separation of events is not as clear as for trading companies. Fig 3. Cumulative abnormal returns (CARs) for different user groups. The events are classified as 'buy', 'hold', or 'sell' according to the cumulative Twitter stance in one hour after the event. The event is announced at lag = 0. CARs are computed at one minute resolution, for up to one day (1440 minutes) after the event. On the other hand, trading robots and spam users (top two charts in Figure 3) show no useful correlation between the Twitter stance and CARs. As a consequence, we conclude that it is important to properly identify them and eliminate their tweets from any trading strategy based on Twitter. 5 5 Reputation manipulation Here we focus on another aspect of Twitter misuse for potential manipulation: post festum deletion of tweets by the Twitter user. What are the reasons for users to delete their tweets? Previous research addressed prediction of malicious or deleted tweets [1, 10, 13], and identification of deleted and suspicious accounts [17]. On one hand, some authors show that typos and rephrasing are among the major causes for deleting tweets [1]. On the other hand, other authors found that in deleted tweets, a significantly higher fraction of the vocabulary consists of swear words, and markers that indicate anger, anxiety, and sadness [2]. Fig 4. Fractions of tweets deleted for different user groups. We verified which of the tweets that were collected during the three years in near real time, still exist. It turns out that in our dataset, 4.7% (689,658) posts were post festum deleted by the users. Different user groups exhibit different patterns of deletion. A histogram in Figure 4 shows fractions of tweets deleted by different user groups. The majority of users do not delete their own tweets at all (peak at 0). At the other extreme (100), there is about 5% of the users who deleted their accounts and all their tweets. But the really interesting are the trading companies, where only one third of them does not delete tweets, and more than half of them delete up to 10% of their tweets. We focus on the deleted tweets by trading companies and individual traders and search for signs of reputation manipulations. A breakdown of deleted tweets for both groups in terms of different stances is in Table 2. User group Trading companies Individual traders Buy Hold Sell 453 (2.3%) 3,285 (2.4%) 1,297 (2.4%) 4,438 (4.1%) 35,915 (7.3%) 11,572 (5.5%) Table 2. The number of deleted tweets of different stance. 6 5.1 Deleting tweets to increase CARs One reason for companies and individuals to delete their tweets might be to create an image of their capabilities to predict the market. For example, one can post two contradictory tweets at the same time: EUR will go up, and EUR will go down. After the market shows the actual EUR move, the incorrect prediction is deleted, and the user's timeline shows his forecasting insight. We compare the results of the event study before and after the tweets were deleted. Figure 5 shows CARs for trading companies and individual traders after removing their deleted tweets. At this point, we can report only negative results, i.e., there is no increase of CARs, and the 'hold' events are further away from the zero line than in Figure 3. Fig 5. Cumulative abnormal returns (CARs) for trading companies and individual traders, after removing the tweets that were post festum deleted by the user. 7 5.2 Analyzing trading companies We analyze deleted tweets of 189 (out of 195) Twitter users categorized as trading companies that have active Twitter accounts (by deleting an account, all the tweets from that account are also deleted). The 189 companies deleted 3,741 tweets. Among them, four deleted all Forex related tweets from their profile while the accounts are still active, 8 users deleted between 10% and 40% of their tweets, 33 users deleted between 1% and 5% of their tweets, and only 68 did not delete any tweets. The deleting behaviour of trading companies is shown in Figure 6. Note that the majority (76% of the trading companies) deleted less than 1% of their tweets. Note also that there are no trading companies that delete between 5 and 10% of their tweets. We analyze the deleted tweets and focus on criteria that might indicate reputation manipulation. Fig 6. The fractions of deleted tweets (altogether 3,741 tweets) for the 189 trading companies. Out of the 3,741 deleted tweets, 3,611 are unique (same author and identical text) while 130 tweets are deleted more than once. An extreme case is a tweet (advertising easy and safe profit) which is deleted 46 times (same author and identical text). The deleting and reposting of identical tweets is one form of increasing visibility without tainting the author's Twitter timeline. A tweet that is deleted and posted again appears several times in the user's followers feed while it appears just once in the authors timeline. This can be therefore considered a kind of reputation manipulation. Out of the 93 tweets that were deleted and reposted, 50 were deleted and reposted once while the rest were deleted and reposted several times. The 746 'recommendation' tweets that were deleted afterward point to a potential reputation manipulation by deleting the bad recommendations. The breakdown of deleted tweets is shown in Figure 7. One of the major reasons to delete tweets are typos and rephrasing [1]. In these cases, a very similar tweet to the deleted tweet is posted again. We check for each of the 3,575 tweets that were deleted once and not reposted, if they were deleted due to a typo. We define typo as a reason of tweet deletion if the tweet is: • posted by the same author, • within the three next tweets after the deleted one, • with a very similar text (1 < Levenshtein distance < 4), • and the difference is not in the URLs present in the tweet. We found that 122 deleted tweets were reposted with changes so small that indicate typos. 8 Fig 7. A breakdown of deleted tweets by trading companies. Another category of deleted tweets are retweets. If retweets are deleted, it is usually because the original tweets were deleted. In our dataset, 406 retweets are deleted. We check the remaining 3,437 tweets for the use of vocabulary specific for trading: long, short, bear, bull, bearish, bullish, resistance, support, buy, sell, close. We identify 746 tweets that are recommendations for trading (manually confirmed). This is another kind of possible reputation manipulation: a tweet with recommendation is posted and afterwards, if the recommendation turns out to be spurious, the tweet is deleted. The author's Twitter timeline then falsely appears as if following his recommendations would yield profit. We inspect a specific Twitter account from the category trading companies that posted more than 500 tweets and deleted between 10% and 40% of them. The identity of the account cannot be revealed due to the privacy issues. The tweets deleted fall into the following categories: • Reposts: 91, 60 of them are advertisements (e.g., subscribe for analysis), • Links (to recommendations): 17, • Recommendations: 11, • Retweet: 1 (if the original tweet is deleted, retweets are also deleted). We manually checked each of the 11 recommendations that were deleted. In all the cases, the recommendations turned out to be bad, i.e., an investor would loose money. An (anonymized) example of a bad recommendation post is the following: "@user mention while daily candle is above 1.xyz we are bullish on $EURUSD." while in the actual Forex market, EUR went down. This user used both types of reputation manipulation: deleting poor recommendations, and deleting/reposting of identical tweets to increase their visibility. The percentage of deleted poor predictions is small compared to all the deleted tweets and compared to all the posted tweets. We speculate that the manipulation by tweet deletion needs to be subtle to go unnoticed by the users' followers. However, even a subtle reputation burst in a domain as competitive as Forex trading can bring major benefits to the deceptive user. 9 6 Conclusions This is an initial study of potential misuses of Twitter to influence the public interested in Forex trading. We identify different types of Twitter accounts that are posting tweets related to the EUR-USD currency exchange. We show that there are considerable differences between them in terms of Twitter stance distribution and CARs. If we eliminate trading robots and spam, we find significant correlations between the Twitter stance and CARs (the returns are small, but the Forex market has very low trading costs). The remaining posts come from the Forex trading companies and individual traders. We further analyze the reasons for post festum deleting of tweets. Some reasons are harmless (such as correcting typos), but some show indications of reputation busting. We consider this a promising direction for further, more in-depth analysis. Acknowledgements The authors acknowledge financial support from the H2020 FET project DOLFINS (grant no. 640772), and the Slovenian Research Agency (research core funding no. P2-103). References 1. Hazim Almuhimedi, Shomir Wilson, Bin Liu, Norman Sadeh, and Alessandro Acquisti. Tweets are forever: a large-scale quantitative analysis of deleted tweets. In Proceedings of the 2013 conference on Computer supported cooperative work, pages 897 -- 908. ACM, 2013. 2. Parantapa Bhattacharya and Niloy Ganguly. Characterizing deleted tweets and their authors. In ICWSM, pages 547 -- 550, 2016. 3. V. Cerqueira, L. Torgo, J. Smailovi´c, and I. Mozetic. A comparative study of performance estimation methods for time series forecasting. In Proc. 4th Intl. Conf. on Data Science and Advanced Analytics, pages 529 -- 538. IEEE, 2017. 4. D. Cherepnalkoski and I. Mozetic. Retweet networks of the European Parliament: Evaluation of the community structure. Applied Network Science, 1:2, 2016. 5. Munmun De Choudhury, Nicholas Diakopoulos, and Mor Naaman. Unfolding the event landscape on twitter: classification and exploration of user categories. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, pages 241 -- 244. ACM, 2012. 6. P. Gabrovsek. Analysis of relations between currency market and social networks, MSc thesis, University of Ljubljana, Slovenia, 2017. 7. P. Gabrovsek, D. Aleksovski, I. Mozetic, and M. Grcar. Twitter sentiment around the Earnings Announcement events. PLoS ONE, 12(2):e0173151, 2017. 8. Zafar Gilani, Reza Farahbakhsh, and Jon Crowcroft. Do bots impact twitter activity? In Proceedings of the 26th International Conference on World Wide Web Companion, pages 781 -- 782. International World Wide Web Conferences Steering Committee, 2017. 9. A Craig MacKinlay. Event studies in economics and finance. Journal of economic literature, pages 13 -- 39, 1997. 10. Juan Martinez-Romo and Lourdes Araujo. Detecting malicious tweets in trending topics using a statistical analysis of language. Expert Systems with Applications, 40(8):2992 -- 3000, 2013. 11. I. Mozetic, M. Grcar, and J. Smailovi´c. Multilingual Twitter sentiment classification: The role of human annotators. PLoS ONE, 11(5):e0155036, 2016. 10 12. I. Mozetic, L. Torgo, V. Cerqueira, and J. Smailovi´c. How to evaluate sentiment classifiers for Twitter time-ordered data? PLoS ONE, 13(3):e0194317, 2018. 13. Sasa Petrovic, Miles Osborne, and Victor Lavrenko. I wish i didn't say that! Analyzing and predicting deleted messages in twitter. arXiv preprint arXiv:1305.3107, 2013. 14. G. Ranco, D. Aleksovski, G. Caldarelli, M. Grcar, and I. Mozetic. The effects of Twitter sentiment on stock price returns. PLoS ONE, 10(9):e0138441, 2015. 15. B. Sluban, J. Smailovi´c, S. Battiston, and I. Mozetic. Sentiment leaning of influential communities in social networks. Computational Social Networks, 2:9, 2015. 16. Vladimir N. Vapnik. The Nature of Statistical Learning Theory. Springer, 1995. 17. Svitlana Volkova and Eric Bell. Identifying effective signals to predict deleted and suspended accounts on twitter across languages. In ICWSM, pages 290 -- 298, 2017. 11
1507.08364
1
1507
2015-07-30T03:25:54
Reconstruction of Graph Signals through Percolation from Seeding Nodes
[ "cs.SI", "cs.IT", "cs.IT" ]
New schemes to recover signals defined in the nodes of a graph are proposed. Our focus is on reconstructing bandlimited graph signals, which are signals that admit a sparse representation in a frequency domain related to the structure of the graph. Most existing formulations focus on estimating an unknown graph signal by observing its value on a subset of nodes. By contrast, in this paper, we study the problem of reconstructing a known graph signal using as input a graph signal that is non-zero only for a small subset of nodes (seeding nodes). The sparse signal is then percolated (interpolated) across the graph using a graph filter. Graph filters are a generalization of classical time-invariant systems and represent linear transformations that can be implemented distributedly across the nodes of the graph. Three setups are investigated. In the first one, a single simultaneous injection takes place on several nodes in the graph. In the second one, successive value injections take place on a single node. The third one is a generalization where multiple nodes inject multiple signal values. For noiseless settings, conditions under which perfect reconstruction is feasible are given, and the corresponding schemes to recover the desired signal are specified. Scenarios leading to imperfect reconstruction, either due to insufficient or noisy signal value injections, are also analyzed. Moreover, connections with classical interpolation in the time domain are discussed. The last part of the paper presents numerical experiments that illustrate the results developed through synthetic graph signals and two real-world signal reconstruction problems: influencing opinions in a social network and inducing a desired brain state in humans.
cs.SI
cs
Reconstruction of Graph Signals through Percolation from Seeding Nodes Santiago Segarra, Antonio G. Marques, Geert Leus, and Alejandro Ribeiro 1 5 1 0 2 l u J 0 3 ] I S . s c [ 1 v 4 6 3 8 0 . 7 0 5 1 : v i X r a Abstract—New schemes to recover signals defined in the nodes of a graph are proposed. Our focus is on reconstructing bandlimited graph signals, which are signals that admit a sparse representation in a frequency domain related to the structure of the graph. Most existing formulations focus on estimating an unknown graph signal by observing its value on a subset of nodes. By contrast, in this paper, we study the problem of reconstructing a known graph signal using as input a graph signal that is non-zero only for a small subset of nodes (seeding nodes). The sparse signal is then percolated (interpolated) across the graph using a graph filter. Graph filters are a general- ization of classical time-invariant systems and represent linear transformations that can be implemented distributedly across the nodes of the graph. Three setups are investigated. In the first one, a single simultaneous injection takes place on several nodes in the graph. In the second one, successive value injections take place on a single node. The third one is a generalization where multiple nodes inject multiple signal values. For noise- less settings, conditions under which perfect reconstruction is feasible are given, and the corresponding schemes to recover the desired signal are specified. Scenarios leading to imperfect reconstruction, either due to insufficient or noisy signal value injections, are also analyzed. Moreover, connections with classical interpolation in the time domain are discussed. The last part of the paper presents numerical experiments that illustrate the results developed through synthetic graph signals and two real- world signal reconstruction problems: influencing opinions in a social network and inducing a desired brain state in humans. Index Terms—Graph signal processing, Signal reconstruction, Interpolation, Percolation, Graph-shift operator, Bandlimited graph signals I. INTRODUCTION Sampling and reconstruction of bandlimited signals are cornerstone problems in classical signal processing. The emer- gence of new fields of knowledge such as network science and big data is generating a pressing need to extend the results existing for classical time-varying signals to signals defined on graphs [3]–[5]. This not only entails modifying the existing algorithms, but also gaining intuition on the concepts that are preserved and lost when a signal is defined not in the time grid, but in a more general graph domain. In the context of reconstruction of graph signals, two different approaches have been developed. A first approach is related to the interpolation of bandlimited signals, which consists in inferring unobserved values by leveraging the fact that the signal lives in a low-dimensional space [6]–[8]. Although is Work in this paper supported by Spanish MINECO grant No TEC2013-41604-R and USA NSF CCF-1217963. S. Segarra and A. Ribeiro are with the Dept. of Electrical and Systems Eng., Univ. of Pennsylvania. A. G. Marques is with the Dept. of Signal Theory and Comms., King Juan Carlos Univ. G. Leus is with the Dept. of Elec- trical Eng., Mathematics and Computer Science, Delft Univ. of Tech- nology. Emails: [email protected], [email protected], [email protected], and [email protected]. Parts of this paper will be presented at EUSIPCO 2015 [1] and GLOBALSIP 2015 [2]. interpolation approaches are centralized, iterative [9] most and distributed [10], [11] interpolation schemes have also been developed. A different approach towards graph signal reconstruction is graph regularization [12], [13] where a notion of smoothness is assumed on the signal and the unobserved values are estimated based on this notion. Both approaches co- incide in that they estimate a graph signal from the observation of a subset of the signal values. By contrast, the approach in this paper is to preserve the two-step methodology used when recovering bandlimited time-varying signals, which consists in the generation of a sparse signal followed by the application of a low-pass filter to reconstruct the missing entries, and extend it to the more general graph domain. To be more specific, we study the reconstruction of ban- dlimited graph signals through the application of low-pass graph filters to sparse seeding signals. Graph filters are the generalization of classical time-invariant systems when the signals are defined on a general graph as opposed to the classical time domain [4]. Seeding signals are graph signals attaining nonzero values on a subset of the nodes in the graph, called seeding nodes. To describe our approach more precisely, let y stand for the target graph signal we want to recover. Our goal is to design a graph filter H and a sparse signal x such that y can be obtained upon applying H to x. The design is accomplished in two steps. In the first step, we design the filter H leveraging the bandlimitedness of y, to eliminate the frequencies not present in y. Then, we use the H designed in the first step and the specific value of y to design the signal x. The challenge is that x cannot be chosen freely but is rather the output of a seeding phase where only a few seeding nodes inject values. The seeding phase requires more elaboration than its counterpart for time-varying signals, not only because graph signals are less regular, but also because it will be shown that in general the seeding values cannot coincide with those of the signal to recover. For a rigorous problem definition see Section II-B and Figure 1 in Section III. Since graph filters act on graph signals through the successive application of local operators, the output of a graph filter can be viewed as the outcome of a diffusion or percolation process. Applications include the generation of an opinion profile in a social network [14] by influencing a few agents (Section VII-B) and the synthesis of brain signals [15] by exciting a few neural regions (Section VII-C). Other potential applications for signal reconstruction via local interactions include molecular communications in nanonetworks [16], [17] and wireless sensor networks [18]. investigates The paper three different reconstruction schemes, each of them associated with a different seeding phase. In Section III, the seeding phase consists of a unique seeding signal with several nonzero values, which coincides with the intermediate signal x. By contrast, in Section IV the 2 seeding phase consists of several seeding signals injected by a single seeding node. At each instant, the signal is perco- lated (diffused) within one-hop neighborhoods. The support of x depends on the duration of the seeding phase and the connectivity of the seeding node. Finally, in Section V we consider a more general scheme which merges the two earlier approaches. In this scheme, the seeding phase consists of several time instants and, in each of them, multiple nodes are allowed to inject a signal. The schemes will be referred to as multiple node-single time (MN-ST), single node-multiple time (SN-MT) and multiple node-multiple time (MN-MT) seeding, respectively. For the three of them, we state conditions on the underlying graph and the seeding nodes to guarantee perfect reconstruction of any bandlimited signal. We also show that, in general, if the interpolator takes the form of a graph filter, the seeding values cannot coincide with those of the signal to interpolate. Furthermore, we discuss how additional seeding values can be used to reduce the complexity of the graph filter needed for perfect recovery and draw connections with classical interpolation of time-varying signals. In Section VI we study the reconstruction performance in imperfect settings, either because the seeding values are insufficient in number or corrupted by noise. In Section VII we run numerical experiments to illustrate signal reconstruction in noiseless and noisy scenarios using both synthetic and real-world graphs.1 II. BANDLIMITED GRAPH SIGNALS AND GRAPH FILTERS Let G denote a directed graph with a set of N nodes or vertices N and a set of links E, such that if node i is connected to j, then (i, j) ∈ E. The (incoming) neighborhood of i is defined as the set of nodes Ni = {j (j, i) ∈ E} connected to i. For any given graph we define the adjacency matrix A as a sparse N × N matrix with nonzero elements Aji if and only if (i, j) ∈ E. The value of Aji captures the strength of the connection from i to j. The focus of this paper is not on analyzing G, but a graph signal defined on the set of nodes N . Formally, such a signal can be represented as a vector x = [x1, ..., xN ]T ∈ RN where the i-th component represents the value of the signal at node i or, alternatively, as a function f : N → R, defined on the vertices of the graph. The graph G is endowed with a graph-shift operator S [4], [19]. The shift S is a N × N matrix whose entry Sji can be nonzero only if i = j or if (i, j) ∈ E. The sparsity pattern of the matrix S captures the local structure of G, but we make no specific assumptions on the values of the nonzero entries of S. Choices for S are the adjacency matrix of the graph [4], [19], its Laplacian [3], and their respective generalizations [20]. The intuition behind S is to represent a linear transformation that can be computed locally at the nodes of the graph. More rigorously, if y is defined as y = Sx, then node i can compute yi provided that it has access to the value of xj at j ∈ Ni. We assume henceforth that S is diagonalizable, so that there exists a N × N matrix V and a N × N diagonal matrix Λ that can be used to decompose S as S = VΛV−1. In particular, S is diagonalizable when it is normal, i.e., it satisfies SSH = SH S 1Notation: ei is the ith N × 1 canonical basis vector (all entries of ei are zero except the ith one, which is one); EK := [e1, ..., eK ] is a tall matrix collecting the K first canonical basis vectors while ¯EK := [eK+1, ..., eN ] collects the last N − K canonical basis vectors; 0 and 1 are, respectively, the all-zero and all-one matrices (when not clear from the context, a subscript indicating the dimensions will be used). where SH denotes the conjugate transpose of S. In that case, we have that V is unitary, which implies V−1 = VH, and leads to the decomposition S = VΛVH. We are interested in cases where the graph-shift operator S plays a role in explaining the graph signal x. More specifically, cases where x can be expressed as a linear combination of a subset of the columns of V = [v1, ..., vN ], or, equivalently, where the vector (cid:98)x = V−1x is sparse [21]. In this context, vectors vi are interpreted as the graph frequency basis, (cid:98)xi as the corresponding signal frequency coefficients, and x as a bandlimited graph signal. We assume that the set of active frequencies are known and, without loss of generality, that those are the first K ones associated with the eigenvalues of largest magnitude [21], [22]. Under this assumption, if we denote by(cid:98)xK := [(cid:98)x1, . . . ,(cid:98)xK]T a K × 1 vector collecting the coefficients corresponding to those frequencies, it holds that x is a K-bandlimited signal if (cid:98)x = [(cid:98)xT K, 0, . . . , 0]T , x = V(cid:98)x := VK(cid:98)xK, (1) where we have defined the tall matrix VK := [v1, ..., vK] containing the first K eigenvectors of the shift operator S. A. Graph filters operators of the form H :=(cid:80)L−1 Graph filters H : RN → RN are linear graph-signal l=0 hlSl; i.e., polynomials (of degree L−1) of the graph-shift operator [4]. A particularity of graph filters is that they can be implemented locally, e.g., with L− 1 exchanges of information among neighbors. This is true because the application of S on a signal x can be computed through local interactions. l=0 hlΛl(cid:1)V−1. The diagonal matrix (cid:98)H :=(cid:80)L−1 V(cid:0)(cid:80)L−1 can be alternatively written as (cid:98)H = diag((cid:98)h), where vector (cid:98)h The graph filter H can also be written as H = l=0 hlΛl can then be viewed as the frequency response of H and it is a vector that contains the frequency response of the filter. Let λi denote the i-th eigenvalue of S and define the N × L Vandermonde matrix  1 λ1 ... . . . λL−1 ... ... 1 λN . . . λL−1 1 N  . Ψ := (2) (3) therefore Upon defining the vector containing the coefficients of the This implies that if y is defined as y = Hx, its frequency l=0 hlSl = Vdiag(cid:0)Ψh(cid:1)V−1 = Vdiag((cid:98)h)V−1. filter as h := [h0, . . . , hL−1]T , it holds that (cid:98)h = Ψh and H =(cid:80)L−1 representation (cid:98)y satisfies(cid:98)y = diag(cid:0)Ψh(cid:1)(cid:98)x. one where the frequency response (cid:98)h := Ψh is given by where (cid:98)hK contains the frequency response for the first K Within this context, a low-pass graph filter of bandwidth K is (cid:98)h = [(cid:98)hT K, 0, . . . , 0]T , frequencies. Notice that when the low-pass filter in (5) is (4) (5) L−1(cid:89) applied to an arbitrary signal x, is K- bandlimited as described in (1). An alternative expression to define a graph filter is [23] the output signal H = a0 (S − alI), (6) l=1 which also gives rise to a polynomial on S of degree L− 1. A specific advantage of the representation in (6) is that it provides a straightforward way to design low-pass filters via successive annihilation of graph frequencies. In particular, if we fix al = λk for some eigenvalue λk of S then the filter H will eliminate the frequency basis vk, i.e., the eigenvector associated with λk. For future reference, we denote by D the number of distinct eigenvalues in {λk}N k=K+1. Remark 1 (Discrete-time signals) To establish connections with classical time-varying signals, we define the directed cycle graph Gdc, with node set N = {1, 2, . . . , N} and edge set Edc = {(i, modN (i) + 1)}N i=1, where modN (i) denotes the remainder obtained after dividing i by N. Its adjacency and Laplacian matrices are denoted, respectively, as Adc and Ldc := I−Adc. Discrete-time periodic signals can be thought as graph signals on the directed cycle Gdc. Setting the shift operator either to S = Adc or S = Ldc gives rise to the √ Fourier basis F. More formally, the right eigenvectors of S satisfy V = F, with Fij := exp(+j2π(i − 1)(j − 1)/N )/ √−1. Selecting S = Adc has the additional N where j advantage of satisfying Λii = exp(−j2π(i − 1)/N ), i.e., the eigenvalues of the shift operator correspond to the classical also exist [3]. The frequency representation(cid:98)x of a graph signal discrete frequencies. Interpretations for the eigenvalues of Ldc x is given by (cid:98)x = V−1x whereas the frequency response of a filter with coefficients h is given by (cid:98)h = Ψh. For general graphs, matrices V−1 and Ψ need not be related. However, for the case of Gdc, if Sdc = Adc, then Ψ = N FH and V−1 = FH. Thus, the Fourier transforms for signals and filter coefficients are equivalent up to a constant for time-varying signals but this is not true for general graph signals. √ := B. Signal reconstruction using graph filters Our objective is to reconstruct a specific K-bandlimited signal y by applying a graph filter H to a signal x, where x is the result of a seeding procedure. More specifically, the reconstruction scheme proceeds in two phases: • Seeding phase. The input to this phase is a set of τ graph signals {s(t)}τ−1 t=0 , denominated seeding signals. These signals percolate through the graph following the dynamics x(t) = Sx(t−1) + s(t), x(−1) = 0. The output of this phase is set as x := x(τ−1). (7) • Filtering phase. The graph signal x is used as input to a low-pass graph filter H, generating the output z := Hx. The purpose of the seeding phase, which has duration τ, is to inject into the graph the information needed to interpolate the signal y. The filtering phase further propagates the informa- tion available from the seeding phase while annihilating the frequencies with indices k > K that are present in x but not 3 in y. This phase has duration L− 1, which is the order of the filter H. The goal of this paper is to design {s(t)}τ−1 t=0 and H such that z = y. In Sections III, IV, and V we present this design for three different seeding schemes, where we impose additional restrictions on the structure and the number of seeding signals. Remark 2 In classical discrete-time signal processing, recov- ery of bandlimited signals is a two-step process. Firstly, a sparse regular signal whose non-zero values coincide with those of the signal to recover is generated. Secondly, the (zero) values not specified in the sparse signal are extrapolated from the non-zero ones using a low-pass filter. Our approach in this paper is to preserve this two-step methodology and use it to recover bandlimited graph signals. This provides a way to regenerate a desired signal in a graph – either estimated from samples or otherwise – by acting on a subset of (seeding) nodes. As it will be shown in the ensuing sections, for signals defined on a general graph, the non-zero values of the sparse signal in the first step will not coincide with those of the signal to recover. This deviates from the classical concept of interpolation, which assumes that the non-zero values are the same than those of the signal to reconstruct. The practical advantage of studying recovery schemes that use graph filters is twofold. First, they can be implemented distributedly, using only local exchanges among neighbors. Second, since graph filters can be used to model diffusion processes (e.g. the spread of an opinion in a social network), our results can be used to reconstruct signals in network applications that implement linear diffusion dynamics. III. MULTIPLE NODE - SINGLE TIME SEEDING In multiple node - single time (MN-ST) seeding we consider the particular case where there is only τ = 1 seeding signal s so that x = s [cf. (7)]. Denoting by P the amount of nonzero values in s, we interpret MN-ST seeding as having P seeding nodes that inject a single value, while the remaining N − P nodes keep silent; see left and center panels in Figure 1. Define the signal injected by node i as si and assume, without loss of generality, that the seeding nodes are the P first ones. We therefore define the P × 1 and N × 1 seeding vectors as sP = [s1, . . . , sP ]T , (8) (9) Then, given a bandlimited signal y = VK(cid:98)yK [cf. (1)], our s = [s1, . . . , sP , 0, . . . , 0]T . goal is to design H and s such that y = Hs, (10) where H has the particular structure of a graph filter (cf. Sec- tion II-A). Exploiting the fact that y is bandlimited, it is reasonable to write (10) in the frequency domain. To do this, both sides of (10) are left multiplied by V−1, which yields (11) (cid:98)y = V−1Hs = V−1Vdiag(Ψh)V−1s = diag(Ψh)(cid:98)s, where we used (3) for the second equality. Utilizing the fact that the seeding signal s is sparse [cf. (9)] we may write its frequency representation as (cid:98)s = V−1s = V−1EP sP , (12) 4 (cid:98)yK = ET where, we recall, EP := [e1, ..., eP ] is a tall matrix collecting the P first canonical basis vectors of size N × 1. By substi- tuting (12) into (11), our goal of designing H and s such that y = Hs can be reformulated as designing h and sP such that (cid:98)y = diag(cid:0)Ψh(cid:1)V−1EP sP , Leveraging the sparsity of (cid:98)y [cf. (1)], equations in (13) can be split into two which is a bilinear system of N equations and L+P variables. the system of N (13) K diag(Ψh) V−1EP sP , K diag(Ψh) V−1EP sP , (14) 0N−K = ¯ET (15) where, we recall, ¯EK := [eK+1, ..., eN ] collects the last N − K canonical basis vectors and 0N−K denotes the (N − K) × 1 vector of all zeros. Note that the conditions in (15) are the same for any K-bandlimited signal. On the other hand, the conditions in (14) depend on the specific signal to be interpolated. A natural approach is to use the filter coefficients h – which are related to the global behavior of the graph – to guarantee that (15) holds, while using the seeding signal sP to satisfy (14) and, hence, to guarantee that the output of the interpolation is y. In this way, the filter coefficients h to be designed do not depend on the particular signal to reconstruct. The conditions under which the mentioned approach is guaranteed to find a feasible solution are given in the form of two propositions. Ensuing discussions describe the actual procedure to interpolate the signal. Proposition 1 If L > D (cf. Section II-A), there exist infinitely many nonzero L×1 vectors h∗ such that, after setting h = h∗, (15) is satisfied for any V−1 and sP . Proof: Since (15) has to hold for any seeding signal sP , we need ¯ET KΨh = 0. This requires h to belong to the kernel of the (N −K)×L matrix ¯ET KΨ. Since ¯ET KΨ is a Vandermonde matrix, its number of linearly independent rows is equal to the number of distinct eigenvalues in {λk}N k=K+1, which is D. Thus, the existence of a solution h∗ (cid:54)= 0 requires L > D. For L > D, ¯ET KΨ is rank deficient and the dimension of its kernel space is L − D. Hence, setting h to any nonzero element of the kernel space will satisfy (15). In what follows, we will assume that L = D + 1 and set the coefficients h∗ that solve (15) as the unit vector spanning the unidimensional kernel space of ¯ET KΨ. For the case where all the eigenvalues k=K+1 are distinct, this implies that L = N − K + 1. {λk}N Once the coefficients of the filter are designed, the next step K Ψh∗ K := ET denoting the frequency response of the low-pass filter in the active frequencies, substituting h = h∗ into (14) yields is to find the optimum seeding signal. With (cid:98)h∗ (cid:98)yK = diag((cid:98)h∗ K) ET KV−1EP sP . (16) For which the following result holds. Proposition 2 The system of K equations in (16) is guaran- teed to have a solution with respect to sP if the following two conditions hold: i) λk1 (cid:54)= λk2 for all (λk1, λk2) such that k1 ≤ K and k2 > K, ii) rank(ET KV−1EP ) ≥ K. Proof : Condition i) is required to guarantee that all KΨh∗ = 0N−K; b) h∗ (cid:54)= 0L and c) rank of ¯ET elements of (cid:98)h∗ (cid:98)h∗ elements of (cid:98)h∗ the K are nonzero. We prove this by contradiction. Recall that the following facts holds true (cf. Proposition 1): a) ¯ET KΨ is L− 1. Assume, without loss of generality, that the element of K that is zero is the K-th one. Then, we can use a) to write K−1Ψh∗ = 0N−K+1. Condition i) and fact c) guarantee that ¯ET K−1Ψh∗ = 0N−K+1 ¯ET K−1Ψ has rank L; then, satisfying ¯ET requires h∗ = 0L, which contradicts b). Hence, all the K) K are nonzero. This guarantees that diag((cid:98)h∗ diag((cid:98)h∗ (17) KV−1EP is a K×P submatrix of V−1. To guarantee where ET that the system of equations in (17) has at least one solution, we need condition ii) to hold. K)−1(cid:98)yK = (ET is invertible, so that (16) can be written as KV−1EP )sP , Different from the time domain, where all the eigenvalues of S (frequencies) are distinct, in the more general graph domain there can be graph topologies that give rise to S with repeated eigenvalues. Condition i) is required because a graph filter H always produces the same frequency response if the corresponding eigenvalues are the same. Therefore, it is not possible for H to eliminate one of the frequencies without eliminating the other. An alternative to bypass this problem is discussed in Section III-A. Condition ii) requires the rank of the K × P matrix ET KV−1EP being at least K. At the very least, this requires P , the number of seeding nodes, to be equal to K, the number of frequencies present in y. For the particular case of P = K, if the conditions in the proposition are satisfied, the sP that recovers y is KV−1EP )−1diag((cid:98)h∗ K)−1(cid:98)yK. sP = (ET (18) However, if condition ii) is not satisfied, there may be cases where setting P = K fails. To see why this is true, notice that [V−1]k,p can be viewed as how strongly node p expresses frequency k. Suppose for example that there exists a k such that [V−1]k,p = 0 for all nodes p = 1, . . . , P , then it is not possible to reconstruct a signal y with (cid:98)yk (cid:54)= 0 using that set of nodes. This problem is also present when sampling graph signals by observing the value of the signal in a subset of nodes [7]. Proposition 2 states conditions for perfect reconstruction in a noiseless setting. In noisy scenarios, the specific set of nodes selected to inject the seeding signal has an impact on the reconstruction error. This is analyzed in Section VI. A. Filter degree reduction in MN-ST seeding The MN-ST reconstruction scheme requires a low-pass filter H of degree D, which grows with the size of the graph. Since the degree of H corresponds to the number of local interactions needed to implement the filter, the communication overhead can be a problem for large graphs. In this context, we look for solutions that reduce the degree of H by increasing the number of seeding nodes P . This can be done by splitting the system of equations in (13) as [cf. (14)-(15)] K, 0T P−K]T = ET P diag(Ψh) V−1EP sP , 0N−P = ¯ET P diag(Ψh) V−1EP sP. (19) (20) [(cid:98)yT MN - ST x y SN - MT x H H S 5 Fig. 1: Two different schemes to reconstruct signal y. On the left, MN-ST seeding injects P = 2 values simultaneously (blue arrows), after which the low-pass filter H is applied. On the right, SN-MT seeding first injects a single value that percolates to the two neighboring nodes. After a second value injection at the same node, filter H completes the reconstruction. The filter coefficients must be obtained now to annihilate the N − P frequencies in (20) and the P seeding nodes must inject a signal whose spectrum, after being filtered by H, matches that of the desired signal (19). Notice that (19)-(20) can also be used when (14)-(15) fail due to a violation of condition i) in Proposition 2. More specifically, for every frequency index k2 > K with the same eigenvalue as a frequency index k1 ≤ K we can induce a zero frequency coefficient in the reconstructed signal via the seeding values [cf. (19)] instead of through the low-pass filter [cf. (20)] and, hence, drop condition i) as a requirement for recovery. Further notice that for (20) to hold for any sP , the degree of the filter needs to be at least equal to the number of distinct eigenvalues in {λk}N k=P +1 (cf. Proposition 1). In the extreme case of P = N, the trivial solution h = [1, 0, . . . , 0]T (0-order filter) and sP = y satisfies (19)-(20). B. Relation to classical interpolation In the classical time domain, sinc (low-pass) interpolation of a bandlimited signal leads to perfect reconstruction. If the sampling is performed at the minimum possible rate, the bandwidth of the low-pass filter has to be exactly the same than that of y. By contrast, if the signal is oversampled, the bandwidth can be larger. Equivalently, if more samples than the minimum required number are available, then the low-pass filter does not have to cancel all the frequencies not present in y. The analysis in Section III-A reveals that this is also the case when signals are defined in more general graph domains. The main differences between the MN-ST reconstruction scheme and classical time interpolation come from the fact that the basis V of a general graph shift S is not as structured as the Fourier basis F. A difference of particular relevance is that, for general graphs, the seeding values sP do not coincide with the values of the desired signal y. This contrasts with the classical interpolation of uniformly sampled time-varying signals, where sP is a subset of the signal y. In fact, it can be rigorously shown that requiring such a condition for general graphs would lead to an infeasible interpolation. To be concrete, suppose that P = K, so that s = [sT K, 0T ]T [cf. (9)], and that sK is equal to the first entries of y. We can then (21) Secondly, we write the goal of y = Hs into the frequency leverage the fact that s and (cid:98)y are sparse to write KVEK(cid:98)yK. domain as (cid:98)y = diag((cid:98)h)V−1s and use again the sparsity of s and (cid:98)y to write Kdiag((cid:98)h)EKET Kdiag((cid:98)h)V−1EKsK = ET (cid:98)yK = ET = diag((cid:98)hK)ET KV−1EKsK (22) KV(cid:98)y = ET KV−1EKsK, Ky = ET sK = ET (23) KV−1EKET Substituting (21) into (22) yields KVEK(cid:98)yK. (cid:98)yK = diag((cid:98)hK)ET K(cid:98)h contains the first K components of (cid:98)h. where (cid:98)hK := ET Since (23) must hold for all (cid:98)yK, it can only be satisfied if diag((cid:98)hK)ET KV−1EKET KVEK = I. This requires matrix KVEK) to be diagonal. While this is true when (ET K = N, it is not true for a general K. However, in the time domain where V = F (see Remark 1), for some cases the multiplication of submatrices of F is guaranteed to be diagonal. For example, if the K seeding nodes are chosen uniformly (equally) spaced, then (ET KVEK) = K/N I. This implies not only that (23) is satisfied, but also that all the entries in(cid:98)hK must be set to N/K. In other words, KV−1EKET KV−1EKET the optimal low-pass interpolator after uniform sampling in the time domain has the same response for all the active frequencies, as known from classical signal processing. IV. SINGLE NODE - MULTIPLE TIME SEEDING In single node - multiple time (SN-MT) seeding, we con- sider the particular case where all the τ = P seeding values are injected at a single node; see right and center panels in Figure 1. To be more specific, assume without loss of gener- ality that the first node is the one injecting the seeding values, so that the seeding signal s(t) at time t is of the form s(t) = [s(t), 0, . . . , 0]T . Then, define sP := [s(P−1), . . . , s(0)]T to be a P × 1 vector grouping the seeding values. We present the relation between the seeding values sP and the output of the seeding phase x in the following lemma. Lemma 1 The frequency representation of the intermediate signal x in SN-MT seeding is given by where(cid:98)e1 := V−1e1 is the frequency representation of the first (24) canonical basis vector. (cid:98)x = diag((cid:98)e1)ΨsP , Proof: Since x is obtained after P injections of seeding values following the dynamics in (7), it holds that x = x(P−1) =(cid:80)P−1 l=0 Sls(P−1−l) =(cid:80)P−1 l=0 Sls(P−1−l)e1. (25) Equation (25) relates the signal x to the successive inputs s(·) of the seeding node and can be interpreted as the application of the graph filter ¯H :=(cid:80)P−1 l=0 s(P−1−l)Sl (26) 6 (cid:98)x = diag(ΨsP )(cid:98)e1, of degree P − 1 to the canonical basis vector e1. Building on this interpretation, we may use (4) to write (28) K)ET K := ET (28), we obtain [cf. (16)] (cid:98)zK = ET The next step is to analyze the output of the filtering structure of the graph Ψ and the seeding values sP , as well as (27) and, by exploiting the fact that for generic vectors a and b it holds that diag(a)b = diag(b)a, the lemma follows. The proof of Lemma 1 exploits the reinterpretation of the seeding phase as the application of a graph filter ¯H, whose coefficients are given by the seeding values, to the canonical elements represent how strongly the node expresses each of the graph frequencies. basis vector e1. Equation (24) reveals how (cid:98)x depends on the on the particular node chosen to inject the values via(cid:98)e1, whose phase in the frequency domain (cid:98)z. To do this, recall that h∗ (cid:98)h∗ := Ψh∗, we may analyze the application of the low-pass Kdiag((cid:98)h∗)(cid:98)x = ET Kdiag((cid:98)h∗)EKET K(cid:98)x. Further recalling that(cid:98)h∗ K(cid:98)h∗ and substituting (24) into (cid:98)yK = diag((cid:98)h∗ Kdiag((cid:98)e1)ΨsP . denotes the coefficients of a low-pass filter (cf. Section II-A) that eliminates all frequencies with indices k > K. Defining (29) Expression (29) relates the frequencies present in y to the seeding values sP . Provided that K ≤ P , the following proposition states the conditions under which (29) can be solved with respect to sP . Proposition 3 Let U1 be the number of values in {[(cid:98)e1]k}K filter in the frequency domain as diag((cid:98)h∗ (cid:17)(cid:0)ET Kdiag((cid:98)e1)EK k=1 that are zero and let D1 be the number of repeated values in {λk}K the system of K equations in (29) is guaranteed to have a solution with respect the following two conditions hold: i) λk1 (cid:54)= λk2 for all (λk1 , λk2 ) such that k1 ≤ K and k2 > K, ii) U1 = 0 and D1 = 0. (cid:98)yK = Proof: If we rewrite (29) as is required to guarantee that all the entries of vector (cid:98)h∗ are nonzero and, hence, matrix diag((cid:98)h∗ K) is invertible (cf. Kdiag((cid:98)e1)EK is invertible since it is a diagonal matrix with proof of Proposition 2). Condition U1 = 0 in ii) ensures that ET no zero elements in its diagonal. Finally, D1 = 0 guarantees KΨ has rank K whenever K ≤ P since it is a row-wise that ET Vandermonde matrix with no repeated rows. then it becomes clear that conditions i) and ii) ensure in- vertibility of the two square matrices, and full row rank of KΨ. To be specific, condition i) the rectangular matrix ET KΨ(cid:1) sP , (cid:1)(cid:0)ET k=1. Then, to sP if (cid:16) (30) K) K Condition i), which is equivalent to that in Proposition 2, guarantees that the low-pass filter with coefficients h∗ does not eliminate any of the frequencies present in y. Condition ii) states requirements for recovery on both the seeding node and the global structure of the graph. The seeding node is required to be able to act on every active frequency (U1 = 0), while the graph is required to have every active frequency distinguishable from each other (D1 = 0). Condition ii) ensures that the rank of matrix ET K when P ≥ K, guaranteeing that (29) can be solved with respect to sP . For the particular case of P = K the seeding values can be found as Kdiag((cid:98)e1)Ψ is equal to sP =(cid:0)ET Kdiag((cid:98)e1)Ψ(cid:1)−1 diag((cid:98)h∗ K)−1(cid:98)yK. (31) When comparing the conditions ii) in Propositions 2 and 3, we observe that for MN-ST seeding we should require a rank condition on a submatrix of V−1. By contrast, for SN-MT seeding, the Vandermonde structure of Ψ allows reformulating the rank condition in terms of the graph related quantities U1 and D1, providing further insight on specifying the situations when recovery is possible. This dual behavior is also present when sampling graph signals. When following “selection sampling” [7], which is the counterpart of MN-ST interpo- lation, perfect reconstruction depends on the invertibility of a submatrix of V, whereas when following an “aggregation sampling” scheme [8], which is the counterpart of SN-MT interpolation, the conditions for perfect reconstruction can be written in terms of specific graph related quantities. Even though Proposition 3 guarantees perfect recovery under SN-MT seeding in a noiseless case, in noisy scenarios the selection of the seeding node is essential to reduce the reconstruction error. This is analyzed in Section VI under a more general seeding scheme. A. Filter degree reduction in SN-MT seeding Mimicking the filter degree reduction technique presented in Section III-A, SN-MT seeding can also implement a lower- degree filter if a higher number of seeding values is injected. To achieve this, we need the additional seeding values to generate a signal whose spectrum is zero for the inactive fre- quencies that are not eliminated by the filter. More specifically, the seeding values sP and the filter coefficients h have to satisfy [cf. (19)-(20)] P diag((cid:98)e1)ΨsP , P diag((cid:98)e1)ΨsP , (32) K, 0T P−K]T = diag(ET 0N−P = diag( ¯ET P Ψh)ET P Ψh) ¯ET (33) where N − P is the number of frequency coefficients elim- inated by the low-pass filter h. As done in Section III-A, h will be designed to solve (33) for any choice of sP , while sP will be chosen to solve the P equations in (32). A sufficient degree for h is presented next. {[(cid:98)e1]k}N be k=K+1 repeated the zero in be are values Proposition 4 Let U2 number of values and D2 the in that K < k ≤ N and [(cid:98)e1]k (cid:54)= 0}. Then, (33) {λk}k∈KU , where number of KU := {k can be solved with respect to h for any choice of sP provided that L−1 ≥ max(0, N−P −U2−D2). Proof: Notice that in (33) the filter eliminates the last N − P frequencies, however, since the ordering is arbitrary, any subset of N − P frequencies (not containing the K first ones) can be chosen to be annihilated by h. Thus, our objective it to show that the proposed degree is enough to nullify a particular choice of N − P frequency coefficients. Define as R the set of indices corresponding to zero elements in(cid:98)e1 or [(cid:98)yT repeated rows in Ψ. Since condition ii) in Proposition 3 must be satisfied – otherwise, perfect recovery would be infeasible –, the cardinality of R is U2 + D2 and every index in R must be greater than K. First assume that U2 + D2 < N − P and pick the N − P frequencies to be eliminated to include the ones in R. This is equivalent to picking a frequency ordering such that every index in R is greater than P . Based on R, define the selection matrices ER := [ek1 , ek2 , . . . , ekU2+D2 ] for all ki ∈ R and ¯ER := [ek1, ek2 , . . . , ekN−P −U2−D2 ] for all ki ∈ {P + 1, . . . , N}\R where \ represents the set difference operator. Hence, the system of equations in (33) can be split 0N−P−U2−D2 = diag( ¯ETRΨh) ¯ETRdiag((cid:98)e1)ΨsP , into two 0U2+D2 = diag(ETRΨh)ETRdiag((cid:98)e1)ΨsP . (34) (35) Condition (34) can be guaranteed for any sP if h = h∗, where h∗ are the coefficients of a low-pass filter of degree L−1 = N − P − U2− D2, as stated by the proposition. To complete the proof, we need to show that h = h∗ also guarantees that (35) holds. To see why this is the case, notice that U2 rows of ETRdiag((cid:98)e1)Ψ are exactly zero, trivially satisfying (35) for any sP . Also, each of the remaining D2 equations in (35) corresponds to a repeated eigenvalue and, thus, can be obtained by multiplying one of the N − K − U2 − D2 homogenous equations in (34) and (32) by a scalar, guaranteeing that h∗ also solves these D2 equations. For the case where U2 + D2 ≥ N − P , we pick a frequency ordering such that every index greater than P is contained in R. Thus, (33) is implied by the homogenous equations in (32), and no filter (degree 0) is needed. Proposition 4 explicitly states that every additional seeding value decreases the required filter degree. However, in contrast to the situation for MN-ST, this reduction of the filter degree does not entail a reduction in the number of applications of the graph-shift operator, because it requires the length of the seeding phase to be extended. More interestingly, the additional seeding values can be used as a mean to guarantee perfect reconstruction when condition i) in Proposition 3 is not satisfied, as explained in Section III-A for MN-ST seeding. When P ≥ N−U2−D2 the seeding phase suffices to recover the signal. This can be of interest in scenarios where the graph- shift operator S describes an intrinsic graph diffusion dynamic and the design of the filter coefficients is not feasible. It is also of interest if y is not bandlimited. See Section VII for further discussions. B. Relation to classical interpolation When S = Adc, applying the lth power of S to a signal amounts to shifting the signal l time instants. Consequently, the intermediate signal x obtained after the seeding phase in SN-MT reconstruction coincides with the seeding signal s in MN-ST reconstruction, provided that the seeding nodes are chosen adjacent to each other. Moreover, for the extreme case of the number of seeding values P being enough to eliminate the filtering phase, which entails L − 1 = 0, Proposition 4 requires setting P = N, because both U2 and D2 are zero if S = Adc. The design of the P = N seeding values sP that guarantee that x = y can be carried out trivially by setting sP = [x1, . . . , xN ] = y. V. MULTIPLE NODE - MULTIPLE TIME SEEDING 7 In the more general multiple node - multiple time (MN-MT) seeding scheme, we can have several seeding signals (τ > 1) and we do not assume any structure on s(t), so that any node may inject a seeding value at any given time. We concatenate the τ seeding signals into the N τ × 1 vector s defined as s := vec([s(τ−1), s(τ−2), . . . , s(0)]T ). Defining the N×N 2 matrix Θ := [diag((cid:98)e1), . . . , diag((cid:98)eN )], we may relate x to s as stated in the following lemma. Lemma 2 The frequency representation of the intermediate signal x in MN-MT seeding is given by (cid:98)x = Θ(I ⊗ Ψ)s, where ⊗ represents the Kronecker product. Proof: If we denote by x := x(τ−1) the signal obtained after the seeding phase, it holds that [cf. (7)] τ−1(cid:88) (cid:32) N(cid:88) (cid:33) N(cid:88) s(τ−1−l) i ei = l=0 l=0 i=1 i=1 τ−1(cid:88) x = Sls(τ−1−l) = where the filter Hi is given by (36) Hiei, (37) (38) Sl τ−1(cid:88) l=0 Hi = s(τ−1−l) i Sl. Writing the input-output relationship of those filters in the frequency domain, we have that [cf. (4)] N(cid:88) (cid:98)x = diag(Ψsi)(cid:98)ei = N(cid:88) diag((cid:98)ei)Ψsi. (39) i=1 i=1 Recalling the definitions of Θ and s, the sum in (39) can be written in matrix form, giving rise to (36). As was the case for Lemma 1 in SN-MT seeding, Lemma 2 leverages the reinterpretation of the seeding phase as the application of a filter – in this case, N different filters, one per node – to the canonical basis vectors [cf. (37)]. The coefficients of the filter associated with the i-th node are given by the values injected by that i-th node [cf. (38)]. Notice that, as expected, (36) reduces to (24) whenever the seeding values are forced to be zero for every seeding node except for the first one. To analyze the output of the filtering phase z, recall that KΨh∗ denotes the response of a low-pass filter in the K = ET active frequencies. Mimicking the procedure in Section IV, we find that the active frequency coefficients in y can be written in terms of the seeding values s as (cid:98)h∗ K)ET KΘ(I ⊗ Ψ)s. (40) K values in(cid:98)yK can be reconstructed using the N τ values in The system of equations in (40) is underdetermined, since the s. However, our focus is on the case where only P (cid:28) N τ elements are binary Cij ∈ {0, 1} and satisfy(cid:80) seeding values are injected during the seeding phase. To this (cid:80) extent, we introduce the P × N τ selection matrix C whose j Cij = 1 and i Cij ≤ 1 for all i and j, respectively. Since the matrix has exactly one 1 in every row, C selects P seeding values among the N τ node-time pairs. If we denote by sP := Cs the vector (cid:98)yK =(cid:98)zK = diag((cid:98)h∗ 8 containing these P seeding values, (40) can be rewritten as [cf. (16) and (29)] A. Insufficient seeding values (cid:98)yK = diag((cid:98)h∗ K)ET KΘ(I ⊗ Ψ)CT sP . (41) To resemble the structure of previous sections, the conditions under which (41) can be solved with respect to sP are given in the form of a proposition. Proposition 5 The system of K equations in (41) is guaran- teed to have a solution with respect to sP if the following two conditions hold: i) λk1 (cid:54)= λk2 for all (λk1, λk2) such that k1 ≤ K and k2 > K, ii) rank(ET Proof: Condition i) is required to guarantee that diag((cid:98)h∗ K) is invertible (cf. proof of Proposition 2). This allows us to rewrite (41) as KΘ(I ⊗ Ψ)CT ) ≥ K. diag((cid:98)h∗ K)−1(cid:98)yK = ET KΘ(I ⊗ Ψ)CT sP . (42) To guarantee that the system of equations in (42) has at least one solution, we need condition ii) to hold. Condition i), also present in Propositions 2 and 3, guarantees that the filtering phase does not annihilate any of the frequen- cies present in y. Condition ii) requires, at the very least, P ≥ K. However, there may be cases where setting P = K can fail as stated in the discussion ensuing Proposition 2. Mimicking the developments in Sections III-A and IV-A, for the general case of MN-MT seeding, additional seeding values can be used to reduce the degree of the low-pass filter. Indeed, for every extra seeding value the degree of the filter needed decreases by one, reducing the communication cost of the reconstruction scheme. Moreover, these extra seeding values can be used to obtain perfect reconstruction even when condition i) in Proposition 5 is violated, as explained in Section III-A. The selection matrix C can be designed so that condition ii) in Proposition 5 is satisfied, guaranteeing perfect recovery. Furthermore, for the cases in which perfect reconstruction is infeasible due to, e.g., the presence of noise, the choice of C can be optimized to achieve robust recovery, as analyzed in the following section. Remark 3 When C in (41) selects the first P elements of s, (41) reduces to (29) and SN-MT reconstruction is recov- ered. Similarly, if C selects the elements of s in positions 1, τ + 1, . . . , P τ + 1, then (41) reduces to (16) as in MN-ST reconstruction. VI. IMPERFECT RECONSTRUCTION We study two settings where perfect reconstruction is infea- sible: insufficient number of seeding values (Section VI-A) and additive noise in the injections (Section VI-B). The analysis is focused on the MN-MT seeding scheme, since the results for MN-ST and SN-MT can be obtained by particularizing the value of the selection matrix C (cf. Remark 3). When the number of seeding values P is not enough to achieve perfect reconstruction, the goal is to minimize a pre- specified error metric between the reconstructed signal z and the original K-bandlimited graph signal y. Three different design scenarios are considered. In the first one, the seeding values sP are designed assuming that both h and C are fixed. The second scenario addresses the joint design of sP and h. In the last one, the joint design of sP and C is performed. 1) Designing the seeding values sP : Assume that condi- tion i) in Proposition 5 holds and recall that h∗ stands for the coefficients of a low-pass filter that eliminates all the frequencies k > K. Then, the first K frequency coefficients (cid:98)zK of the reconstructed signal z are obtained as [cf. (41)] obtaining (cid:98)yK = (cid:98)zK is in general infeasible. A reasonable (43) Since we assume insufficient seeding values, i.e., P < K, (cid:98)zK = diag((cid:98)h∗ KΘ(I ⊗ Ψ)CT sP . approach is to design sP to minimize the energy of the reconstruction error. Defining the matrix K)ET ΦK := diag((cid:98)h∗ the optimal seeding values s∗ s∗ P := arg min sP KΘ(I ⊗ Ψ), K)ET P can be obtained as (cid:107)y − VKΦKCT sP(cid:107)2 2, (44) (45) where, we recall, VK := VEK. The minimization problem in (45) has the well-known closed-form solution [24] s∗ P = (CΦH K ΦKCT )−1CΦH K VH (46) where we assume that the fixed seeding locations C lead to a matrix ΦKCT that has full column rank. With  := y−z denoting the reconstruction error, its energy can be written as (cid:107)(cid:107)2 (cid:17) K ΦKCT )−1CΦH I − ΦKCT (CΦH 2 = yH VK (cid:16) K y, K y. VH K (47) Notice that, since h∗ is given, the reconstruction error is zero for the frequency components k > K. 2) Designing the seeding values sP and the filter coeffi- cients h: When perfect reconstruction is infeasible, carrying out a separate optimization of h and sP , where h is designed to filter the frequencies not present in y and sP is designed to match the spectrum of y in the active frequencies, is not jointly optimal. Minimization of the reconstruction error by jointly designing sP and h is briefly discussed next. Notice that the N frequency coefficients – as opposed to just the first K coefficients – of the reconstructed signal(cid:98)z are [cf. (41)] (cid:98)z = diag(Ψh)ET (cid:107)y − V(cid:98)z(cid:107)2 Hence, if the objective is to minimize (cid:107)(cid:107)2 {s∗ P , h∗} := argmin {sP ,h} 2 KΘ(I ⊗ Ψ)CT sP . 2, we have that (48) (49) (cid:107)y − Vdiag(Ψh)ET KΘ(I ⊗ Ψ)CT sP(cid:107)2 2, = argmin {sP ,h} which is a bilinear optimization. Bilinear problems are non- convex, but there is a large amount of works dealing with their analysis and efficient solution [25]–[27]. The formulation in (49) considers that h∗ can be chosen as a function of the signal to reconstruct y. In applications where P (h, y))(cid:107)2 this is not feasible, formulating the optimal design requires additional assumptions on y. If the distribution of y is known, a two-stage stochastic programming approach can be pursued [28]. In the second stage, h in (49) is considered given and P is obtained as the minimizer of (cid:107)(h, y, sP )(cid:107)2 the optimal s∗ 2, which is a function of h and y [cf. (46)]. In the first stage, the solution of the second stage s∗ P (h, y) and the distribution of y are leveraged to write the expectation of the reconstruction error in (49) as ¯(h) := Ey[(cid:107)(h, y, s∗ 2], which only depends on h. The optimum h∗ is then the minimizer of the expected error ¯(h). Notice that this two-stage approach is used in Sections III, IV, and V to find conditions for perfect recovery, where bandlimitedness is the prior knowledge of y. 3) Designing the seeding values sP and the seeding loca- tions C: Suppose now that one can select the specific nodes and time instants where the injections take place. This amounts to choosing the P entries of C that are non-zero, which is a combinatorial problem. Although for small networks one could try all possible choices of C and select the one leading to the smallest reconstruction error, for general networks a more scalable approach is required. To formulate the corresponding optimization problem sP = C s is substituted into (45). After that, the product CT C is rewritten as diag(c) where c is a binary selection vector of dimension N τ ×1. Note that having ci = 1 indicates that at time t = modτ (N τ − i) the node (i + t)/τ injects a seeding value. With this notation, the joint design of sP and c amounts to solving {s∗, c∗} := argmin {s,c} (cid:107)y − VKΦKdiag(c) s(cid:107)2 2 + γ(cid:107)c(cid:107)0 s.t. c ∈ {0, 1}N τ , (50) where ΦK is defined in (44). In (50) each seeding location used is penalized with a constant cost γ. By tuning γ, the desired level of sparsity of c can be achieved. Problem (50) can be further simplified by setting d := diag(c) s and requiring sparsity on d d∗ := argmin d (cid:107)y − VKΦKd(cid:107)2 2 + γ(cid:107)d(cid:107)0. (51) Among other advantages, the formulation in (51) is amenable to relaxations that reduce the computational complexity re- quired to find a solution. A straightforward approach is to relax the problem by replacing the 0-norm with the 1-norm to obtain a convex formulation. As in problem (49), the design in (50) and its subsequent simplification in (51) assume that the seeding nodes can be chosen as a function of y. For applications where this is not convenient, a two-stage stochastic programming approach similar to the one described for (49) can also be used in solving (50). Last but not least, although computationally challenging, a joint optimization of sP , h and C can be pursued by combining the approaches in Sections VI-A2 and VI-A3. B. Noise when injecting the seeding values The conditions for perfect reconstruction stated in Propo- sitions 2, 3 and 5 require the seeding values to be the exact solution of (16), (29), and (41), respectively. However, in real applications, the injected values can be corrupted with additive noise. This noise can be either attenuated or amplified when the signal percolates through the graph via the successive 9 applications of S. The goal of this section is to quantify the reconstruction error and to discuss seeding selection schemes tailored to these operating conditions. Their performance will be illustrated via numerical simulations in Section VII. Let us assume that the injected signal is sP +wP , where wP is a P × 1 noise vector with zero mean and covariance Rw. The active frequencies of the reconstructed signal can then be written as(cid:98)zK = ΦKCT (sP + wP ) [cf. (41) and (44)]. From this, we may obtain the reconstruction error as  = VK((cid:98)zK −(cid:98)yK) = VKΦKCT wP , (52) with covariance matrix R = E(H ) = VKΦKCT RwCΦH KVH K . (53) Ideally, C should be designed to select the seeding nodes and time instants that minimize the reconstruction error, which can be quantified as a function of R. In what follows, we will focus on minimizing the mean squared error (MSE), which is achieved by minimizing trace(R). However, similar approaches can be followed to minimize other commonly used error metrics such as λmax(R) and log(det(R)) [29]. To illustrate the design of C, two particular scenarios are considered. In the first one, we assume i) that the frequency coefficients (cid:98)yK are zero mean with covariance R(cid:98)y = I and ii) that the noise wP is zero mean with covariance Rw = σ2 E((cid:107)sP(cid:107)2 2)I. Note that assumption ii) is meaningful if the system operates under a constant signal-to-noise ratio (SNR) regime. In the second scenario, we assume the noise is also uncorrelated but its power is independent of that of the seeding signal, so that Rw = σ2I. For convenience, the optimal seeding strategy for the first scenario is presented in the form of a lemma. Lemma 3 Suppose that (cid:98)yK and wP are drawn from zero- mean distributions with covariances R(cid:98)y = I and Rw = σ2 E((cid:107)sP(cid:107)2 2)I, respectively. Then, the selection c∗ that mini- (cid:17) mizes the MSE of the reconstruction is given by c∗:= argmin (cid:16)(cid:0)ΦKdiag(c)ΦH (cid:1)−1(cid:17) ΦKdiag(c)ΦH K (cid:16) trace K c s.t. c ∈ {0, 1}N τ , trace (cid:107)c(cid:107)0 = P. (54) KVH K ). 2)trace(VKΦKdiag(c)ΦH (55) to cyclic permutations and Proof : To prove the lemma, we need to show that the minimization of the objective in (54) is equivalent to the min- imization of trace(R). By substituting Rw = σ2 E((cid:107)sP(cid:107)2 2)I and diag(c) := CT C into (53), it follows that trace(R) = σ2 E((cid:107)sP(cid:107)2 Since the trace is invariant VH K VK = I, we have that trace(R) = σ2 E((cid:107)sP(cid:107)2 that (cid:98)yK = ΦKCT sP [cf. (41) and (44)] to write sP = To find an expression for E((cid:107)sP(cid:107)2 K)−1(cid:98)yK and, consequently, to write (cid:107)sP(cid:107)2 CΦH P sP =(cid:98)yH as K)−1(cid:98)yK. 2), we leverage the fact 2)trace(ΦKdiag(c)ΦH K (ΦKdiag(c)ΦH K(ΦKCT CΦH (cid:107)sP(cid:107)2 2 = sH (57) 2 K). (56) 10 (cid:98)y y Fig. 2: Perfect recovery of a bandlimited graph signal. (a) The graph G, the target signal to recover y and its frequency representation (cid:98)y. (b) Evolution of the reconstructed signal. The seeding and filtering phases are separated by a dotted line and the recovered signal is framed in red. (c) Evolution of the frequency components of the reconstructed signal. Successive annihilation during the filtering phase is observed. (b) (a) (c) Using the expression for the expected value of a quadratic form, it follows that E((cid:107)sP(cid:107)2 (cid:16)(cid:0)ΦKdiag(c)ΦH (cid:1)−1(cid:17) 2) = trace (58) K . Upon replacing (58) into (56) and recalling that σ2 does not depend on c, the expression in (54) follows. The statistical assumption on(cid:98)yK allows us to design c∗ such that the expected performance of the reconstruction scheme is optimized. In this way, the choice of the seeding nodes and instants is independent of the particular signal being reconstructed. Even though obtaining general relaxations to efficiently approximate the non-convex problem in (54) is out of the scope of the paper, we can gain intuition by specializing (54) for time-varying signals, i.e., by setting S = Adc. For SN- MT seeding, where designing c boils down to selecting the seeding node, it can be shown that the objective in (54) does not depend on the particular node chosen. This is as it should be, since in the directed cycle every node is topologically indistinguishable from the others. For MN-ST seeding, the best strategy is to uniformly distribute the seeding nodes, as we formally state next. Proposition 6 Suppose that the problem in (54) is particu- larized for the case of MN-ST seeding of time-varying signals using an ideal low-pass filter. Then, if K = P = N/θ, it holds that the optimal seeding strategy selects the nodes in positions 1, 1 + θ, . . . , 1 + (K − 1)θ. Proof: When S = Adc we have that: a) V = F; b)(cid:98)h∗ trace(cid:0)M−1(cid:1) trace (M) K = α1K for some constant α where 1K is the K × 1 vector of all ones – since we are considering an ideal low-pass filter –; and c) c only can take nonzero values in positions i = 1, 1 + τ, . . . , 1+(N−1)τ (since we are considering MN-ST seeding). Leveraging a), b) and c), problem (54) can be reformulated as c∗ := argmin (59) KFHdiag(c)FEK, c ∈ {0, 1}N , (cid:107)c(cid:107)0 = K, where c selects K seeding nodes out of the N possible ones. First, notice that trace(M) does not depend on the particular choice of c. To see why this is true, we denote by I(c) the set containing the indices of the K seeding nodes selected by c. Then, we can exploit the structure in F to write s.t. M = ET c (cid:88) K−1(cid:88) i∈I(c) j=0 (cid:12)(cid:12)(cid:12)(cid:12) 1√ N trace(M) = % of recovery Min error Median error MN-ST 91.8 .001 .048 SN-MT MN-MT 96.4 .032 .349 94.4 .003 .066 (cid:114) K N If we denote by {γi}K TABLE I: Recovery performance for the three seeding schemes. We restrict MN-MT to consist of two seeding nodes injecting two values. which does not depend on c. Hence, the optimal c∗ in (59) can be found as the one minimizing trace(cid:0)M−1(cid:1). is then to find the c∗ that minimizes(cid:80) that(cid:80) i=1 the K eigenvalues of M, our goal i 1/γi. Given that all γi are nonnegative (M is positive semi-definite) and (60) implies i γi = K 2/N, the minimization is achieved by setting γ1 = γ2 = . . . = γK = K/N. Hence, if we show that uniform seeding leads to γi = K/N for all i, the proof concludes. To show this, notice that under uniform sampling diag(c)FEK = (61) where F(K) is the Fourier basis of size K × K. Hence, M = K/N I [cf. (59)] and every eigenvalue of M equals K/N. F(K), In words, even though for the noiseless case any seeding selection strategy satisfying the conditions in Proposition 2 is equally optimal, uniform seeding in directed cycles is the best MN-ST scheme when noise is present in sP . A second scenario of interest are setups where the additive noise at different value injections is uncorrelated and of fixed power, i.e., Rw = σ2I. In this case, (53) can be rewritten as (62) The design of c that minimizes the MSE of the reconstruction is the solution of the following linear integer program c∗ := argmin R = σ2VKΦKdiag(c)ΦH trace(ΦKdiag(c)ΦH K) KVH K . c trace(R) = argmin (cid:107)c(cid:107)0 = P c ∈ {0, 1}N τ , c s.t. (63) which can be approximated by relaxing the binary and 0-norm constraints. It turns out that the solution of (63) promotes the injection of seeding values at nodes that weakly express the active frequencies, i.e., nodes j such that the values [(cid:98)ej]k for k ≤ K are small. This occurs because the noise power is fixed and those nodes require the injection of seeding signals with high power, leading to a high SNR. VII. NUMERICAL EXPERIMENTS (cid:12)(cid:12)(cid:12)(cid:12)2 N (i−1)(j−1) e+j 2π = K 2 N , (60) We illustrate the reconstruction schemes in noiseless and noisy scenarios using synthetic (Section VII-A) and real-world graphs (Sections VII-B and VII-C). 12345678910-0.8-0.6-0.4-0.200.20.40.60.811.2-0.27-0.49-0.380.39-0.820.370.760.31-0.770.22 Node12345678910Node Index-0.180.311.241.030.000.000.000.000.000.00 Frequency Index123456789100000000.31-0.420.000.000.000.000.000.000.000.00-0.440.860.000.31-0.420.00-0.110.310.00-0.11-0.150.44-0.43-0.010.070.080.14-0.10-0.09-0.11-0.220.52-0.53-0.070.170.090.42-0.04-0.46-0.24-0.040.49-0.65-0.140.270.040.590.22-0.75-0.530.120.22-0.750.02-0.070.160.750.47-0.85-0.490.540.02-0.730.21-0.050.160.300.57-0.40-0.81-0.27-0.49-0.380.39-0.820.370.760.31-0.770.22Time01234567Node1234567891000000000000Node Index-0.03-0.02-0.030.160.29-0.070.250.18-0.210.11-0.000.010.070.05-0.940.19-0.22-0.110.53-0.20-0.00-0.01-0.060.150.000.02-0.45-0.180.37-0.24-0.000.010.060.400.000.00-0.85-0.290.22-0.26-0.01-0.02-0.090.820.000.00-1.11-0.29-0.00-0.13-0.030.040.181.270.00-0.00-0.87-0.13-0.000.00-0.08-0.10-0.441.360.000.00-0.280.00-0.000.00-0.180.311.241.03-0.00-0.00-0.000.000.000.00Time01234567Frequency Index1234567891000000000000000000000000 11 Fig. 3: Reconstruction errors when recovering a signal in a social network with insufficient seeding values. Fig. 4: Heat map of the adjacency matrix A of brain graph G. A. Synthetic graph signals Figure 2a represents a graph G with N = 10 nodes and adjacency matrix A generated using an Erdos-R´enyi (ER) model with edge probability 0.3 [30]. Define the graph-shift operator S = A and let y be a signal to be recovered. Though seemingly random in the node domain, the structure of y is highly determined by G. Indeed, y has bandwidth K = 4, as can be observed from its frequency representation (cid:98)y in Figure 2a. The first set of experiments illustrates the perfect recovery of y when P = 4 seeding values are injected into G followed by a low-pass filter of degree N−P = 6. The reconstruction is carried out using MN-MT seeding (Section V) where nodes 1 and 2 act as seeding nodes and each of them injects a seeding value for time instants t ∈ {0, 1}. After the seeding phase, a filter that successively annihilates the N − K = 6 frequencies not active in y is implemented [cf. (6)]. The evolutions of the reconstructed signal and its frequency representation are depicted in Figures 2b and 2c, respectively. Notice that perfect reconstruction is achieved since the last column in both figures coincide with y and (cid:98)y. Figure 2b illustrates that the reconstructed signal is sparse during the seeding phase, consisting of the first two time instants. More specifically, for t = 0 the signal attains nonzero values only for the seeding nodes [cf. (7)] and for t = 1 the signal remains zero for every node outside of the one-hop neighborhood of the seeding nodes. During the filtering phase – times t = 2 to t = 7 – signal values are successively exchanged between neighboring nodes in order to finally recover y at time t = 7. Figure 2c helps to understand the operation of the filtering phase. The signal x obtained after the seeding phase (t = 1) contains every frequency not active in the desired signal y. Thus, in every successive time instant, one of these frequencies is annihilated. E.g., at time t = 2 the frequency with index i = 5 is eliminated and at t = 3 the frequency i = 6 is eliminated. In this way, at time t = 7 every frequency not active in y has been annihilated and perfect recovery is achieved. To compare the reconstruction performance of MN-ST, SN- MT, and MN-MT seeding, we generate 1000 Erdos-R´enyi graphs with 10 nodes and edge probabilities between 0.2 and 0.4. On each graph we define a 4-bandlimited signal and try to recover it through the three seeding schemes presented; see Table I. We restrict the MN-MT schemes to those consisting of two seeding nodes injecting two values each. We first compute the recovery percentage of the three schemes in noiseless scenarios. More specifically, for a given graph and signal to recover, we test for perfect recovery for every possible combination of seeding nodes. For example, there are 210 ways (10 choose 4) of selecting the seeding nodes in MN-ST while there are only 10 ways of selecting the single seeding node in SN-MT. If, e.g., 9 out of these 10 ways lead to perfect recovery, then the recovery percentage for SN-MT on that particular graph is 90%. The values in Table I correspond to the averages of these percentages across the 1000 graphs generated. Notice that the highest recovery percentage of SN-MT suggests that condition ii) in Proposi- tion 3 is more commonly satisfied in random ER graphs than the respective conditions in Propositions 2 and 5. We then introduce noise in the injections following the constant SNR model in Section VI-B for σ = 10−3. Denoting by z the signal obtained from the reconstruction and by y the desired signal, we define the reconstruction error as  = (cid:107)z− y(cid:107)2/(cid:107)y(cid:107)2. For every given graph and signal y, we record the minimum and median  for every possible choice of seeding nodes within each reconstruction scheme. In Table I we report the median of these values across the 1000 graphs generated. As it turns out, MN-ST is an order of magnitude more robust than SN-MT both in terms of minimum and median error. Finally, observe that MN-MT seeding presents an intermediate behavior both in terms of recovery percentage and reconstruction error. B. Influencing opinions in social networks Consider the well-known social network of Zachary’s karate club [31] represented by a graph G consisting of 34 nodes or members of the club and 78 undirected edges symbolizing friendships among members. Denoting by L the Laplacian of G, define the graph shift operator S = I − αL with α = 1/λmax(L). A signal y on G can be interpreted as a unidimensional opinion of each club member regarding a specific topic, and each successive application of S can be seen as an opinion update influenced by neighboring individuals. Bandlimitedness of y implies that the opinion discrepancies between neighbors are small. In this context, signal reconstruction can be interpreted as the problem of inducing a desired global opinion profile by influencing the opinion of a subset of members. We analyze the recovery performance when the number of seeding values is insufficient (Section VI-A). For this, we generate a signal y of bandwidth K = 5 and try to reconstruct it using P seeding values for P = 1, . . . , 5; see Figure 3. For every P , we find the combination of seeding values and locations that minimizes the reconstruction error within each seeding scheme (cf. Section VI-A3). E.g., if P = 2 and we Seeding Values11.522.533.544.55Reconstruction Error00.10.20.30.40.50.60.70.80.9MNSTSNMTMNMTBrain Regions102030405060Brain Regions10203040506000.20.40.60.811.2 12 Left Hemisphere Right Hemisphere (a) (b) (c) Fig. 6: Inducing a brain state in the presence of noise. (a) Histogram of the reconstruction error for different choices of the six seeding nodes. (b) Frequency of appearance of each brain region among the configurations achieving the lowest reconstruction errors. (c) Anatomical location of the six regions most used in robust seeding configurations. PORB: Pars orbitalis RMF: Rostral middle frontal CM: Caudal middle frontal IP: Inferior Parietal SM: Supra marginal C. Inducing a brain state Upon dividing the human brain into the 66 regions of interest (ROIs) defined in [32], we build a weighted undirected graph G whose nodes are the ROIs and whose edge weights are given by the density of anatomical connections between regions; see Figure 4. The first 33 ROIs are located on the right hemisphere of the brain while regions 34 to 66 correspond to their left counterparts. From Figure 4 we see that most connections occur within the same cortical hemisphere with few inter hemispheric connections. We define the graph-shift operator S = A where A is the adjacency matrix of G. The level of activity of each ROI can be represented by a graph signal y where larger values represent higher levels of activity. Successive applications of S on y model a linear evolution of the brain activity pattern [33]. As a method to inject seeding values to G, we consider transcranial magnetic stimulation (TMS) [15], a noninvasive method to stimulate ROIs. In this context, reconstructing a brain signal amounts to inducing a specific brain state via TMS. In particular, we consider the problem of driving the brain from a resting state to one associated with high-level cognitive operations. Brain resting states are associated with high activity in the posterior cingulate (PC) and inferior parietal (IP) cortices whereas active states are associated with high activity in the rostral middle frontal (RMF) and superior parietal (SP) cortices [34], [35]. In Figure 5 we present the initial yi and target yt signals, where the activity corresponding to the eight regions mentioned – left and right versions of each cortex – is highlighted with larger markers. In order to drive the brain from yi to yt we consider a MN-MT seeding scheme with six seeding nodes. Since it is unclear how to implement a low- pass filter in a human brain, we consider that each seeding node injects eleven values, totalizing P = 66 seeding values permitting the recovery of the target signal after the seeding phase without the need of a posterior filtering phase. Notice that throughout the paper we assumed the initial signal yi to be zero, meaning that there is no signal present on the graph before the reconstruction process. However, our model can accommodate for yi different from zero. To see this, if the seeding phase lasts τ instants, then we can design our seeding values to recover the signal yr = yt − Sτ−1yi in the original formulation so that the negative term cancels the effect of the seeding phase on yi and the target signal yt is recovered. We consider noisy injections following the constant SNR model in Section VI-B for σ = 10−3. Denoting by z the re- constructed signal, define the reconstruction error as  = (cid:107)z− Fig. 5: Initial yi (red) and target yt (blue) brain states. High activity is represented by positive activity levels while negative values represent low levels of activity. are analyzing SN-MT seeding, we consider every individual as possible seeding node and then choose the one achieving the minimum error. In Figure 3 we report the average of these minimum errors across 100 bandlimited signals. As expected, for P = 1 the three schemes coincide and for P = 5 perfect recovery is achieved for all of them. However, for intermediate values of P , MN-ST presents a considerably lower error than SN-MT. For P = 3 this implies that, when trying to induce a global opinion profile, it is more effective to influence the opinion of three individuals once than to influence the opinion of the same individual three times. The fact that MN-MT seeding presents the lowest reconstruction errors is expected since this scheme includes the other two as particular cases. Notice that in this case, as opposed to Table I, we do not restrict MN-MT to the cases where multiple seeding nodes and multiple seeding values in each node are used. For the above analysis to hold true, we must be able to apply a low-pass filter on the social network as required by the filtering phases of MN-ST, SN-MT, and MN-MT. This can be achieved by assuming that we can modify the rate of exchange of opinions in the network represented by α. Indeed, consider that after the seeding phase, the signal still percolates over the graph – people still communicate their opinions to neighbors – but we can modify the diffusion rate αl at each discrete time instant. Thus, after L − 1 interactions we obtain that (64) z =(cid:81)L−1 l=1 (I − αlL)x, which is equivalent to applying an annihilating filter [cf. (6)] to x. Notice that the filter in (64) is a polynomial on L rather than S. However, the frequency annihilation procedure is still valid since the eigenvectors – frequency basis – of L and S are equal. Reconstruction Error00.020.040.060.080.1Frequency05k10k15k20k25kBrain Regions05101520253035404550556065Frequency0100200300400500600PORB%IP%CM%PORB%SM%Brain Regions0102030405060Activity Level-10-8-6-4-20246810 yt(cid:107)2/(cid:107)yr(cid:107)2. We compute  for every possible combination of seeding nodes. Given that the seeding values are induced by TMS, we discard as possible seeding nodes the regions inaccessible by TMS like the ones located in the medial cortex and subcortical structures. After discarding inaccessible ROIs, the six seeding nodes can be chosen out of 38 possible ROIs, amounting to 2,760,681 possible configurations. In Figure 6a we present a histogram of the reconstruction error for different seeding configurations where we only show those attaining errors below 0.1. The red bar in this histogram corresponds to the 1,611 configurations that achieve the lowest reconstruction errors. In Figure 6b we present the frequency of appearance of each ROI in these 1,611 robust seeding configurations. The regions with zero appearances correspond to the ROIs inaccessible to TMS, however, among the accessible regions the frequency of appearance is not uniform. For example, the left inferior parietal cortex in position 41 appears 583 times whereas the right bank of the frontal pole in position 1 is only used 50 times. In Figure 6c we depict the 6 regions more commonly used in robust seeding configurations. Notice that both the left and right versions of the Pars Orbitalis are commonly used as seeding nodes, suggesting the importance of this region for robust brain state induction. VIII. CONCLUSIONS A novel approach for the recovery of bandlimited graph signals – that admit a sparse representation in the frequency domain – was proposed. The focus was not on estimating an unknown graph signal but rather on inducing a known bandlimited signal through minimal actions on the graph. These actions referred to signal injections at different seeding nodes, which then percolate through the graph via local interactions described by a graph filter. Restrictions on the number of seeding nodes and the amount of injections at each node gave rise to three different reconstruction schemes and their performance in noiseless and noisy settings was analyzed. For the noiseless case, we showed that a K-bandlimited signal can be recovered using K injections followed by a low- pass filter in the (graph) frequency domain. In contrast to classical time-varying signals, it was also shown that if the seeding nodes inject the values of the original signal in those nodes, perfect recovery is not feasible. For scenarios leading to imperfect reconstruction, we analyzed robust seeding strategies to minimize distortion. Finally, the different reconstruction schemes were illustrated through numerical experiments in both synthetic and real-world graph signals. REFERENCES [1] S. Segarra, A. G. Marques, G. Leus, and A. Ribeiro, “Interpolation of graph signals using shift-invariant graph filters,” in European Signal Process. Conf. (EUSIPCO), Nice, France, Aug. 31 - Sept. 4 2015. [2] ——, “Reconstruction of graph signals: percolation from a single seeding node,” in Global Conf. on Signal and Info. Process. (GlobalSIP), Orlando, FL, December 2015 (submitted). [3] D. Shuman, S. Narang, P. Frossard, A. Ortega, and P. Vandergheynst, “The emerging field of signal processing on graphs: Extending high- dimensional data analysis to networks and other irregular domains,” IEEE Signal Process. Mag., vol. 30, no. 3, pp. 83–98, Mar. 2013. [4] A. Sandryhaila and J. Moura, “Discrete signal processing on graphs,” IEEE Trans. Signal Process., vol. 61, no. 7, pp. 1644–1656, Apr. 2013. [5] X. Zhu and M. Rabbat, “Approximating signals supported on graphs,” in IEEE Intl. Conf. Acoust., Speech and Signal Process. (ICASSP), March 2012, pp. 3921–3924. 13 [6] S. Narang, A. Gadde, and A. Ortega, “Signal processing techniques for interpolation in graph structured data,” in IEEE Intl. Conf. Acoust., Speech and Signal Process. (ICASSP), May 2013, pp. 5445–5449. [7] S. Chen, R. Varma, A. Sandryhaila, and J. Kovacevi´c, “Dis- crete signal processing on graphs: Sampling theory,” arXiv preprint arXiv:1503.05432, 2015. [8] A. G. Marques, S. Segarra, G. Leus, and A. Ribeiro, “Sampling of graph signals with successive local aggregations,” arXiv preprint arXiv:1504.04687, 2015. [9] S. Narang, A. Gadde, E. Sanou, and A. Ortega, “Localized iterative methods for interpolation in graph structured data,” in Global Conf. on Signal and Info. Process. (GlobalSIP), Dec. 2013, pp. 491–494. [10] X. Wang, P. Liu, and Y. Gu, “Local-set-based graph signal reconstruc- tion,” IEEE Trans. Signal Process., vol. 63, no. 9, pp. 2432–2444, Sept. 2015. [11] X. Wang, M. Wang, and Y. Gu, “A distributed tracking algorithm for reconstruction of graph signals,” IEEE J. Sel. Topics Signal Process., vol. 9, no. 4, pp. 728–740, June 2015. [12] S. Chen, A. Sandryhaila, J. Moura, and J. Kovacevi´c, “Signal recovery on graphs,” arXiv preprint arXiv:1411.7414, 2014. [13] D. Zhou and B. Scholkopf, “A regularization framework for learning from graph data,” in ICML Work. Stat. Relational Learning and its Connections to other Fields, vol. 15, 2004, pp. 67–68. [14] D. J. Watts and P. S. Dodds, “Influentials, networks, and public opinion formation,” J. Consumer Research, vol. 34, no. 4, pp. 441–458, 2007. [15] M. Hallett, “Transcranial magnetic stimulation and the human brain,” Nature, vol. 406, no. 6792, pp. 147–150, 2000. [16] T. Nakano, M. Moore, F. Wei, A. Vasilakos, and J. Shuai, “Molecular communication and networking: Opportunities and challenges,” IEEE Trans. Nanobiosci., vol. 11, no. 2, pp. 135–148, June 2012. [17] M. S. Kuran, H. B. Yilmaz, T. Tugcu, and B. Ozerman, “Energy model for communication via diffusion in nanonetworks,” Nano Commun. Netw., vol. 1, no. 2, pp. 86 – 95, 2010. [18] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: A scalable and robust communication paradigm for sensor networks,” in Intl. Conf. Mobile Comput. and Netw. New York, NY, USA: ACM, 2000, pp. 56–67. [19] A. Sandryhaila and J. Moura, “Discrete signal processing on graphs: Frequency analysis,” IEEE Trans. Signal Process., vol. 62, no. 12, pp. 3042–3054, June 2014. [21] A. Anis, A. Gadde, and A. Ortega, “Towards a sampling theorem for signals on arbitrary graphs,” in IEEE Intl. Conf. Acoust., Speech and Signal Process. (ICASSP), May 2014, pp. 3864–3868. [22] M. Rabbat and V. Gripon, “Towards a spectral characterization of signals supported on small-world networks,” in IEEE Intl. Conf. Acoust., Speech and Signal Process. (ICASSP), May 2014, pp. 4793–4797. [23] S. Safavi and U. Khan, “Revisiting finite-time distributed algorithms via successive nulling of eigenvalues,” IEEE Signal Process. Lett., vol. 22, no. 1, pp. 54–57, Jan. 2015. [24] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1993. [25] G. McCormick, “Computability of global solutions to factorable non- convex programs: Part I convex underestimating problems,” Math. Program., vol. 10, no. 1, pp. 147–175, 1976. [26] H. Konno, “A cutting plane algorithm for solving bilinear programs,” Math.l Program., vol. 11, no. 1, pp. 14–27, 1976. [27] S. Choudhary and U. Mitra, “Identifiability scaling laws in bilinear inverse problems,” arXiv preprint arXiv:1402.2637, 2014. [28] A. Shapiro, D. Dentcheva, and A. Ruszczynski, Lectures on Stochastic Programming: Modeling and Theory. SIAM, 2014, vol. 16. [29] F. Pukelsheim, Optimal Design of Experiments. SIAM, 1993, vol. 50. [30] B. Bollob´as, Random Graphs. Springer, 1998. [31] W. W. Zachary, “An information flow model for conflict and fission in small groups,” J. Anthropological Research, vol. 33, no. 4, pp. pp. 452–473, 1977. [32] P. Hagmann, L. Cammoun, X. Gigandet, R. Meuli, C. J. Honey, V. J. Wedeen, and O. Sporns, “Mapping the structural core of human cerebral cortex,” PLoS Biol, vol. 6, no. 7, p. e159, 2008. [33] S. Gu, F. Pasqualetti, M. Cieslak, S. T. Grafton, and D. S. Bassett, “Controllability of brain networks,” arXiv preprint arXiv:1406.5197, 2014. [34] M. D. Greicius, B. Krasnow, A. L. Reiss, and V. Menon, “Functional connectivity in the resting brain: A network analysis of the default mode hypothesis,” Proc. Nat. Academy Sci., vol. 100, no. 1, pp. 253–258, 2003. [35] J. D. Medaglia, M.-E. Lynall, and D. S. Bassett, “Cognitive network neuroscience,” J. Cogn. Neurosci., vol. 27, no. 8, pp. 1471–1491, July 2015. [20] C. Godsil and G. Royle, Algebraic graph theory. Graduate Texts in Mathematics, 2001, vol. 207. Springer-Verlag,
1611.09030
4
1611
2019-08-26T17:48:48
A modelling and computational study of the frustration index in signed networks
[ "cs.SI", "math.OC" ]
Computing the frustration index of a signed graph is a key step toward solving problems in many fields including social networks, political science, physics, chemistry, and biology. The frustration index determines the distance of a network from a state of total structural balance. Although the definition of the frustration index goes back to the 1950's, its exact algorithmic computation, which is closely related to classic NP-hard graph problems, has only become a focus in recent years. We develop three new binary linear programming models to compute the frustration index exactly and efficiently as the solution to a global optimisation problem. Solving the models with prioritised branching and valid inequalities in Gurobi, we can compute the frustration index of real signed networks with over 15000 edges in less than a minute on inexpensive hardware. We provide extensive performance analysis for both random and real signed networks and show that our models outperform all existing approaches by large factors. Based on solve time, algorithm output, and effective branching factor we highlight the superiority of our models to both exact and heuristic methods in the literature.
cs.SI
cs
A modelling and computational study of the frustration index in signed networks Samin Aref1 2 Andrew J. Mason3 Mark C. Wilson2 1Max Planck Institute for Demographic Research Konrad-Zuse-Str. 1, Rostock, 18057, Germany 2School of Computer Science, University of Auckland Auckland, Private Bag 92019, New Zealand 3Department of Engineering Science, University of Auckland Auckland, Private Bag 92019, New Zealand [email protected] August 27, 2019 Abstract Computing the frustration index of a signed graph is a key step toward solving problems in many fields including social networks, political science, physics, chemistry, and biology. The frustration index determines the distance of a network from a state of total structural balance. Although the definition of the frustration index goes back to the 1950's, its exact algorithmic computation, which is closely related to classic NP-hard graph problems, has only become a focus in recent years. We develop three new binary linear programming models to compute the frustration index exactly and efficiently as the solution to a global optimisation problem. Solving the models with prioritised branching and valid inequalities in Gurobi, we can compute the frustration index of real signed networks with over 15000 edges in less than a minute on inexpensive hardware. We provide extensive performance analysis for both random and real signed networks and show that our models outperform all existing approaches by large factors. Based on solve time, algorithm output, and effective branching factor we highlight the superi- ority of our models to both exact and heuristic methods in the literature. Keywords: 0-1 integer linear programming, Graph optimisation, Frustration index, Branch and bound, Signed networks, Balance theory The reference to this article should be made as follows: Aref, S., Mason, M. J., Wil- son, M. C. A modelling and computational study of the frustration index in signed networks. Networks, (Forthcoming), doi: 10.1002/net.XXXXX. Old title: An exact method for computing the frustration index in signed networks using binary programming 1 1 Introduction Local ties between entities lead to global structures in networks. Ties can be formed as a result of interactions and individual preferences of the entities in the network. The dual nature of interactions in various contexts means that the ties may form in two opposite types, namely positive ties and negative ties. In a social context, this is interpreted as friendship versus enmity or trust versus distrust between people. The term signed network embodies a multitude of concepts involving relationships characterisable by ties with plus and minus signs. Signed graphs are used to model such networks where edges have positive and negative signs. Structural balance in signed graphs is a macro-scale structural property that has become a focus in network science. Balance theory was the first attempt to understand the sources of tensions and conflicts in groups of people with signed ties [37]. According to balance theory, some structural configurations of people with signed ties lead to social tension and therefore are not balanced. In network context, if the vertex set of a signed network can be partitioned into k ≤ 2 subsets such that each negative edge joins vertices belonging to different subsets, it is called a balanced network [13]. Using graph-theoretic concepts, Cartwright and Harary identified cycles of the graph as the origins of tension, in particular cycles containing an odd number of negative edges [13]. By definition, signed graphs in which no such cycles are present satisfy the property of structural balance. For graphs that are not totally balanced, a distance from total balance (a measure of partial balance [7]) can be computed. Among various measures is the frustration index that indicates the minimum number of edges whose removal (or equivalently, negation) results in balance [1, 35, 64]. In what follows, we discuss previous works related to the frustration index (also called the line index of balance [35]). We use both names, line index of balance and frustration index, interchangeably in this paper. 1.1 Motivation In the past few decades, different measures of balance [13, 55, 61, 44, 25] have been suggested and deployed to analyse balance in real-world signed networks resulting in conflicting observations [46, 26, 25]. Measures based on cycles [13, 55], triangles [61, 44], and closed-walks [25] are not generally consistent and do not satisfy key axiomatic properties [7]. Among all the measures, a normalised version of the frustration index is shown to satisfy many basic axioms [7]. This measure provides a clear understanding of the transition to balance in terms of the number of edges to be modified to reduce the tension, as opposed to graph cycles that were first suggested as origins of tension in unbalanced networks [13]. The frustration index is a key to frequently stated problems in many different fields of research In biological networks, optimal decomposition of a network into monotone [39, 36, 40, 20, 21]. subsystems is made possible by computing the frustration index [39]. In finance, performance of a portfolio can be linked to the balance of its underlying signed graph [36]. In physics, the frustration index provides the minimum energy state in models of atomic magnets known as Ising models [40]. In political science [6] and international relations [20], networks can be partitioned into cohesive clusters using the line index of balance. In chemistry, bipartite edge frustration has applications to the stability of fullerene, a carbon allotrope [21]. For discussions on applications of the frustration index, one may refer to [8]. 2 1.2 Complexity Computing the frustration index is related to the well-known unsigned graph optimisation prob- lem EDGE-BIPARTIZATION, which requires minimisation of the number of edges whose dele- tion makes the graph bipartite. Given an instance of the latter problem, by declaring each edge to be negative we convert it to the problem of computing the frustration index. Since EDGE- BIPARTIZATION is known to be NP-hard [63], so is computing the frustration index. In the con- verse direction there is a reduction of the frustration index problem to EDGE-BIPARTIZATION which increases the number of edges by a factor of at most 2 [38]. If the reduction preserves pla- narity, the frustration index can be computed in polynomial time for such planar graphs [33], which is equivalent to the ground state calculation of a two-dimensional spin glass model with no periodic boundary conditions and no magnetic field [18, 30]. The classic graph optimisation problem MAXCUT is also a special case of the frustration index problem, as can be seen by assigning all edges to be negative (an edge is frustrated if and only if it does not cross the cut). 1.3 Approximation In general graphs, the frustration index is even NP-hard to approximate within any constant factor (assuming Khot's Unique Games Conjecture [41]) [38]. That is, for each C > 0, the problem of finding an approximation to the frustration index that is guaranteed to be within a factor of C is believed to be NP-hard. log n) [2] or O(k log k) [9] where n is the number of vertices and k is the frustration index. Coleman et al. provide a review on the performance of several approximation algorithms of the frustration index [14]. √ The frustration index can be approximated to a factor of O( 1.4 Heuristics and local optimisation Doreian and Mrvar have reported numerical values as the line index and suggest that determining this index is in general a polynomial-time hard problem [20]. However, their algorithm does not provide optimal solutions and the results are not equal to the line index of balance [5]. Data- reduction schemes [38] and ground state search heuristics [39] are used to obtain estimates for the frustration index. Facchetti, Iacono, and Altafini suggested a non-linear energy function minimisa- tion model for finding the frustration index [26]. Their model was solved using various techniques [39, 23, 49, 50]. Using the ground state search heuristic algorithms [39], the frustration index is estimated in biological networks with n ≈ 1.5 × 103 [39] and social networks with n ≈ 105 [26, 27]. 1.5 Exact computation Using a parametrised algorithmics approach, Huffner, Betzler, and Niedermeier show that the frus- tration index (under a different name) is fixed parameter tractable and can be computed in O(2km2) [38], where m is the number of edges and k is the fixed parameter (the frustration index). Binary (quadratic and linear) programming models were recently suggested as methods for computing the exact value of the frustration index [5] capable of processing graphs with m ≈ 103 edges. 3 1.6 Related works on a similar problem Despite the lack of exact computational methods for the frustration index, a closely related and more general problem in signed networks has been investigated comprehensively. According to Davis's definition of generalised balance, a signed network is weakly balanced (k-balanced) if and only if its vertex set can be partitioned into k subsets such that each negative edge joins vertices belonging to different subsets [17]. The problem of finding the minimum number of frustrated edges for general k (an arbitrary number of subsets) is referred to as the Correlation Clustering problem [10]. For every fixed k, there is a polynomial-time approximation scheme for the correlation clustering problem [32]. For arbitrary k, exact [12, 29] and heuristic methods [22, 47, 48] are developed based on a mixed integer programming model [19]. Denoting the order of a graph by n, exact algorithms fail for n > 21 [12] and n > 40 [29], while greedy algorithms [22] and local search heuristics [47] are used for larger instances with n ≈ 103 and n ≈ 104 respectively. After extending the non-linear energy minimisation model suggested by Facchetti et al. [26] to generalised balance, Ma et al. has experimented on the correlation clustering problem in networks with n ≈ 105 using various heuristics [49, 50]. Esmailian et al. have also extended the work of Facchetti et al. [26] focusing on the role of negative ties in signed graph clustering [23, 24]. Our contribution The principal focus of this research study is to provide further insight into computing the frustration index by developing efficient computational methods outperforming previous methods by large factors. We systematically investigate several formulations for exact computation of the frustration index and compare them based on solve time as well as other performance measures. The advantage of formulating the problem as an optimisation model is not only exploring the details involved in a fundamental NP-hard problem, but also making use of powerful mathematical programming solvers like Gurobi [34] to solve the NP-hard problem exactly and efficiently. We provide numerical results on a variety of undirected signed networks, both randomly generated and inferred from well-known data sets (including real signed networks with over 15000 edges). A recent study by the current authors has investigated computing the frustration index in smaller scales using quadratic and linear optimisation models [5]. The linear model is used for computing the frustration index in several small random and real networks with up to 3200 edges. We improve the contributions of [5] by providing three new binary linear formulations which not only outperform the models in [5] by large factors, but also facilitate a more direct and intuitive interpretation. We discuss more efficient speed-up techniques that require substantially fewer ad- ditional constraints compared to [5]. This allows Gurobi's branch and bound algorithm to start with a better root node solution and explore considerably (several orders of magnitude) fewer nodes leading to a substantially shorter solve time. Moreover, our new models handle order-of-magnitude larger instances that are not solvable by the models in [5]. We provide in-depth performance anal- ysis using extensive numerical results showing the solve times of our worst-performing model to be 2 − 9 times faster than the best-performing model in [5]. This paper begins by laying out the theoretical dimensions of the research in Section 2. Linear programming models are formulated in Section 3. Section 4 provides different techniques to improve the formulations and reduce solve time. The numerical results on the models' performance are presented in Section 5. Section 6 provides comparison against the literature using both random 4 and real networks. Other formulations and extensions to the models are provided in Section 7 followed by Section 8 which sums up the research highlights. 2 Preliminaries We recall some standard definitions. 2.1 Basic notation We consider undirected signed networks G = (V, E, σ). The ordered set of nodes is denoted by V = {1, 2, . . . , n}, with V = n. The set E of edges is partitioned into the set of positive edges E+ and the set of negative edges E− with E− = m−, E+ = m+, and E = m = m− + m+. The sign function is denoted by σ : E → {−1, +1}. We represent the m undirected edges in G as ordered pairs of vertices E = {e1, e2, ..., em} ⊆ {(i, j) i, j ∈ V, i < j}, where a single edge ek between nodes i and j, i < j, is denoted by ek = (i, j), i < j. We denote the graph density by ρ = 2m/(n(n − 1)). The entries, aij, of the signed adjacency matrix, A, are defined in (1).  σ(i,j) σ(j,i) 0 aij = if (i, j) ∈ E if (j, i) ∈ E otherwise (1) The number of edges incident to the node i ∈ V represents the degree of node i and is de- noted by d(i). A directed cycle (for simplicity cycle) of length k in G is a sequence of nodes v0, v1, ..., vk−1, vk = v0 such that for each i = 1, 2, ..., k there is an edge from vi−1 to vi. The sign of a cycle is the product of the signs of its edges. A cycle with negative sign is unbalanced. A balanced cycle is one with positive sign. A balanced graph is one with no negative cycles. 2.2 Node colouring and frustration count Satisfied and frustrated edges are defined based on colourings of the nodes. Colouring each node with black or white, a frustrated (satisfied) edge (i, j) is either a positive (negative) edge with different colours on the endpoints i, j or a negative (positive) edge with the same colours on the endpoints i, j. Subfigure 1a illustrates an example signed graph in which positive and negative edges are represented by solid lines and dotted lines respectively. Subfigures 1b and 1c illustrate node colourings and their impacts on the frustrated edges that are represented by thick lines. Let X ⊆ V be a subset of vertices. This defines a partition (X, V \ X) of V . We call X a colouring set. Let binary variable xi denote the colour of node i ∈ V under colouring set X. We consider xi = 1 if i ∈ X (black node) and xi = 0 if i ∈ V \ X (white node). Definition. We define the frustration count of signed graph G under colouring X as fG(X) := (i,j)∈E fij(X) where fij(X) is the frustration state of edge (i, j), given by (cid:80)  fij(X) = if xi = xj and (i, j) ∈ E+ if xi = xj and (i, j) ∈ E− if xi (cid:54)= xj and (i, j) ∈ E− if xi (cid:54)= xj and (i, j) ∈ E+. 0, 1, 0, 1, 5 (2) (a) An example graph with four nodes, two positive edges, and three negative edges (b) An arbitrary node colouring resulting in two edges (0,2), (2,3) frustrated (c) Another node colouring resulting in one frustrated edge (1,2) Figure 1: Node colourings and the respective frustrated edges for an example signed graph The optimisation problem consists in finding a subset X∗ ⊆ V of G that minimises the frus- tration count fG(X), i.e., solving Eq. (3). The globally optimal solution to this problem gives the frustration index L(G) of signed graph G. It follows that fG(X) gives an upper bound on L(G) for any X ⊆ V . Note that the colouring in Subfigure 1b does not minimise fG(X), while in Subfigure 1c fG(X) is minimum. L(G) = min X⊆V fG(X) (3) 3 Binary linear programming formulations In this section, we introduce three binary linear models in (4) -- (6) to minimise the frustration count as the objective function. There are various ways to form the frustration count using variables defined over graph nodes and edges which lead to various mathematical programming models that we discuss in this section. 3.1 The AND model We start with an objective function to minimise the frustration count. Note that the frustration state of a positive edge (i, j) can be represented by fij = xi + xj − 2xixj ∀(i, j) ∈ E+ using the two binary variables xi, xj ∈ {0, 1} for the endpoint colours. For a negative edge, we have fij = 1 − (xi + xj − 2xixj) ∀(i, j) ∈ E−. The term xixj can be replaced by binary variable xij = xixj for each edge (i, j) that take value 1 whenever AND(xi,xj ) = 1 (both endpoints are coloured black) and 0 otherwise. This gives our first binary linear model in (4) that calculates the frustration index in the minimisation objective function. The optimal solution represents a subset X∗ ⊆ V of G that minimises the frustration count. The optimal value of the objective function in Eq. (4) is denoted by Z∗ which represents the frustration index. The dependencies between the xij and xi, xj values are taken into account using standard AND constraints. The AND model has n + m variables and 2m+ + m− constraints. Note that 6 120312031203Negative frustrated edgePositive frustrated edgeNegative edgePositive edge xij variables are dependent variables because of the constraints and the minimisation objective function. Therefore, we may drop the integrality constraint of the xij variables and consider them as continuous variables in the unit interval, xij ∈ [0, 1]. The next subsection discusses an alternative binary linear model for computing the frustration index. (cid:88) min xi:i∈V,xij :(i,j)∈E Z = (i,j)∈E+ xi + xj − 2xij + s.t. xij ≤ xi ∀(i, j) ∈ E+ xij ≤ xj ∀(i, j) ∈ E+ xij ≥ xi + xj − 1 ∀(i, j) ∈ E− xi ∈ {0, 1} ∀i ∈ V xij ∈ {0, 1} ∀(i, j) ∈ E (cid:88) (i,j)∈E− 1 − (xi + xj − 2xij) (4) 3.2 The XOR model The XOR model is designed to directly count the frustrated edges using binary variables fij ∈ {0, 1},∀(i, j) ∈ E. As before, we use xi ∈ {0, 1},∀i ∈ V to denote the colour of node i. This model is formulated by observing that the frustration state of a positive edge (i, j) ∈ E+ is given by fij = XOR(xi,xj ). Similarly for (i, j) ∈ E−, we have fij = 1− XOR(xi,xj ). Therefore, the minimum frustration count under all node colourings is obtained by solving (5). (cid:88) min xi:i∈V,fij :(i,j)∈E Z = fij (i,j)∈E s.t. fij ≥ xi − xj ∀(i, j) ∈ E+ fij ≥ xj − xi ∀(i, j) ∈ E+ fij ≥ xi + xj − 1 ∀(i, j) ∈ E− fij ≥ 1 − xi − xj ∀(i, j) ∈ E− xi ∈ {0, 1} ∀i ∈ V fij ∈ {0, 1} ∀(i, j) ∈ E (5) The dependencies between the fij and xi, xj values are taken into account using two standard XOR constraints per edge. Therefore, the XOR model has n + m variables and 2m constraints. Note that fij variables are dependent variables because of the constraints and the minimisation objective function. Therefore, we may specify fij variables as continuous variables in the unit interval, fij ∈ [0, 1]. A third linear formulation of the problem is provided in the next subsection. 3.3 The ABS model In this subsection, we propose the ABS model, a binary linear model in which we use two edge variables to represent the frustration state of an edge. We start by observing that for a given node colouring, xi − xj = 1 for a positive frustrated edge and xi − xj = 0 for a positive satisfied edge (i, j) ∈ E+. Similarly, 1 − xi − xj = xi + xj − 1 gives the frustration state of a negative edge (i, j) ∈ E−. 7 To linearise the absolute value terms, we introduce additional binary variables eij, hij ∈ {0, 1}, ∀(i, j) ∈ E. We replace xi − xj with eij + hij to represent the frustration state of a positive edge (i, j) ∈ E+. This requires adding the constraint xi − xj = eij − hij ∀(i, j) ∈ E+. Similarly, we replace xi + xj − 1 with eij + hij to represent the frustration state of a negative edge (i, j) ∈ E−. Accordingly, we add the constraint xi + xj − 1 = eij − hij ∀(i, j) ∈ E−. These two replacements allow us to linearise the two absolute value terms and formulate the ABS model in (6) which has n + 2m variables and m constraints. Note that in an optimal solution, variables eij and hij both take the value 0 for a satisfied edge (i, j) ∈ E, whereas for a frustrated edge (i, j) ∈ E exactly one of the two variables eij and hij takes the value 1. The objective function in (6) sums the frustration states of all edges and its optimal value equals the frustration index. min xi:i∈V,eij ,hij :(i,j)∈E Z = eij + hij (cid:88) (i,j)∈E s.t. xi − xj = eij − hij ∀(i, j) ∈ E+ xi + xj − 1 = eij − hij ∀(i, j) ∈ E− xi ∈ {0, 1} ∀i ∈ V eij ∈ {0, 1} ∀(i, j) ∈ E hij ∈ {0, 1} ∀(i, j) ∈ E (6) 3.4 Comparison of the models In this subsection we compare the three models introduced above and two of the models suggested in [5], based on the number and type of constraints. Table 1 summarises the comparison. Table 1: Comparison of optimisation models developed for computing the frustration index Variables Constraints Constraint type Objective et al. Aref UBQP [5] n 0 - quadratic et Aref al. binary linear [5] n + m m+ + m− linear linear AND (4) XOR (5) ABS (6) n + m n + 2m n + m 2m+ + m− 2m+ + 2m− m+ + m− linear linear linear linear linear linear In optimal solutions of our three suggested models, the frustration state of edge (i, j) is repre- sented by the corresponding term for edge (i, j) in the objective function. This leads to Eq. (7) which makes a connection between the optimal values of the decision variables in the three models. fij = eij + hij = (1 − aij)/2 + aij(xi + xj − 2xij) (7) Note that not only does the number of constraints scale linearly with graph size, each constraint involves at most 4 variables. Thus the worst-case space usage for solving these models is O(n2). The three linear models perform differently in terms of solve time and the number of branch and bound (B&B) nodes required to solve a given instance. Solving large-scale binary programming models is not easy in general [11] and therefore there is a limit to the size of the largest graph whose frustration index can be computed in a given time. In the next section, we discuss some techniques for improving the performance of Gurobi in solving our suggested binary linear models. 8 4 Speed-up techniques In this section we discuss techniques to speed up the branch and bound algorithm for solving the binary linear models described in the previous section. The branch and bound algorithm can be provided with a list of prioritised variables for branching which may speed up the solver if branching on these variables leads more quickly to integer solutions. Another technique often deployed in solving Integer Programming (IP) models is using valid inequalities which we discuss briefly. Two key features of valid inequalities is that they are satisfied by the optimal integer solutions (validity), but are violated by undesired feasible solutions (useful- ness). We implement some valid inequalities as lazy constraints which are given to the solver, but only added to the model if they are violated by a solution [42, 34]. Implementing valid inequalities as lazy constraints restricts the model by removing the undesired solutions that violate them. Such valid and useful restrictions reduce solve time [42]. 4.1 Pre-processing data reduction Standard graph pre-processing can be used to reduce graph size and order without changing the frustration index. This may reduce solve time in graphs containing nodes of degree 0 and 1 (also called isolated and pendant vertices respectively) and nodes whose removal increases the number of connected components (also called articulation points) [38]. We have tested iterative reduction of isolated and pendant vertices as well as decomposing graphs by cutting them into smaller sub- graphs using articulation points. Our experiments show that reducing isolated and pendant vertices does not considerably affect the solve time. Moreover, the scarcity of articulation points in many graphs in which isolated and pendant vertices have been removed, makes decomposition based on articulation points not particularly useful. 4.2 Branching priority and fixing a colour We relax the integrality constraints and observe in the Linear Programming relaxation (LP relax- ation) of all three models that there always exists a fractional solution of xi = 0.5,∀i ∈ V which gives an optimal objective function value of 0. We can increase the root node objective by fixing one node variable to value 1. Fixing a node variable also breaks the symmetry that exists and allows changing all node colours to give an equivalent solution. This is similar to fixing the ghost spin in the ground state calculation of a spin glass model [18] and is also used in [5]. When the colour of node k is fixed by imposing xk = 1, the variables associated with edges incident to node k take value 0.5 (in the ABS model one of the two variables eij and hij take value 0.5). In all three models, this changes the fractional solution of the LP relaxation from 0 to d(k)/2 because all edges incident to node k contribute 0.5 to the objective function. This observation shows that the best node variable to be fixed is the one associated with the highest degree which allows for an increase of maxi∈V d(i)/2 in the LP relaxation optimal objective function value. We formulate this as a constraint in (8). xk = 1 k = arg max i∈V d(i) (8) In our experiments, we always observed an improvement in the root node objective value when Eq. (8) was added, which shows it is useful. We provide more detailed results on the root node objective values for several instances in Section 6. 9 Based on the same idea, we may modify the branch and bound algorithm so that it branches first on the node with the highest degree. This modification is implemented by specifying a branching priority for the node variables in which variable xi has a priority given by its degree d(i). 4.3 Unbalanced triangle constraints We consider one valid inequality for each negative cycle of length 3 (unbalanced triangle) in the graph. Under arbitrary colouring X, every negative cycle of the graph contains an odd number of frustrated edges. This means that any colouring of the nodes in an unbalanced triangle must produce at least one frustrated edge. Recalling that under colouring X, the variable fij is 1 if edge (i, j) is frustrated (and 0 otherwise), then for any node triple (i, j, k) defining an unbalanced triangle in G, inequality (9) is valid. fij + fik + fjk ≥ 1 ∀(i, j, k) ∈ T − (9) In (9), T − = {(i, j, k) ∈ V 3 aijaikaj k = −1} denotes the set of node triples that define an unbalanced triangle. The expression in inequality (9) denotes the sum of frustration states for the three edges (i, j), (i, k), (j, k) making an unbalanced triangle. Note that in order to implement the unbalanced triangle constraints (9), fij must be represented using the decision variables in the particular model. Eq. (7) shows how fij can be defined in the AND and ABS models. We implement the valid inequality in (9) using Gurobi's feature for adding lazy constraints and ensure that lazy constraints that cut off the relaxation solution at the root node are also pulled into the model (see lazy as a tunable parameter in linear constraint attributes in [34]). 4.4 Overall improvement made by the speed-up techniques In this subsection, we report the solve time improvement obtained by implementing the speed-up techniques. The evaluation is based on 100 Erdos-R´enyi graphs with uniformly random parameters from the ranges 40 ≤ n ≤ 50, 0 ≤ ρ ≤ 1, and 0 ≤ m−/m ≤ 1. The total solve time reduction observed when both speed-up techniques (4.2 -- 4.3) are implemented is 67% for the AND model, 90% for the XOR model, and 78% for the ABS model. Table 2 shows the solve time improvements made by implementing the speed-up techniques individually and collectively. Table 2: Usefulness of the speed-up techniques based on 100 Erdos-R´enyi graphs Without speed-up With branching priority With triangle inequalities With both speed-up techniques Average solve time (s) AND XOR ABS 14.80 19.71 5.50 5.90 17.26 9.21 4.93 4.42 41.60 4.91 31.72 4.08 - Time improvement (%) AND XOR ABS - 60% 88% 72% 38% 24% 12% 67% 90% 78% - 5 Computational performance In this section, our optimisation models are tested on various random instances using 64-bit Gurobi version 7.5.2 on a desktop computer with an Intel Core i5 7600 @ 3.50 GHz (released in 2017) and 10 8.00 GB of RAM running 64-bit Microsoft Windows 10. We use NetworkX package in Python for generating random graphs. The models were created using Gurobi's Python environment in 64-bit Anaconda3 5.0.1 Jupyter. 5.1 Comparison of the models' performance In this subsection, we discuss the time performance of Gurobi for solving the extended binary linear models which include both speed-up techniques (4.2 -- 4.3). In order to compare the performance of the three linear models, we consider 12 test cases each containing 10 Barab´asi-Albert random graphs with various combinations of density and propor- tion of negative edges. The results in Table 3 show that the three models have relatively similar performance in terms of solve time. Table 3: Solve time comparison of the three models based on test cases of 10 Barab´asi-Albert graphs m− m Average Z∗ n m ρ 60 539 0.3 884 0.5 70 741 0.3 1209 0.5 0.3 0.5 0.7 1 0.3 0.5 0.7 1 0.3 0.5 0.7 1 0.3 0.5 0.7 1 157.4 185.0 172.9 55.0 262.4 325.8 329.4 272.4 217.0 260.6 248.0 78.0 361.7 460.4 457.7 382.2 Solve time (s) mean ± SD AND (4) 1.13 ± 0.48 1.48 ± 0.56 1.07 ± 0.41 0.04 ± 0.01 1.4 ± 0.16 37.41 ± 11.53 36.73 ± 8.28 1 ± 0.17 4.07 ± 1.67 4.56 ± 0.89 2.94 ± 0.37 0.07 ± 0 3.27 ± 0.34 471.18 ± 77.27 308.05 ± 130.31 4.07 ± 1.08 XOR (5) 1.59 ± 0.3 2.95 ± 0.28 2.55 ± 0.8 0.04 ± 0.01 0.45 ± 0.08 27.09 ± 27.09 39.8 ± 7.82 0.77 ± 0.26 4.55 ± 0.77 12.28 ± 1.72 9.72 ± 2.32 0.05 ± 0.01 0.76 ± 0.09 322.99 ± 112.29 369.14 ± 208.88 2.93 ± 1.31 ABS (6) 0.84 ± 0.1 1.1 ± 0.19 0.84 ± 0.16 0.06 ± 0.02 0.41 ± 0.04 25.15 ± 8.46 30.44 ± 5.73 6.12 ± 4.61 1.52 ± 0.34 2.84 ± 0.46 1.87 ± 0.26 0.1 ± 0.03 0.96 ± 0.1 324.72 ± 131.86 251.21 ± 96.75 20.67 ± 14.28 Comparing values of the same column, it can be seen that graphs with a higher density (more edge variables) have a longer solve time. For graphs of a given order and density, we observe the shortest solve times for m−/m ∈ {0.3, 1} in most cases which are also associated with the two smallest averages of values of Z∗. 5.2 Convergence of the models with and without the speed-ups We investigate the algorithm convergence by running the three models with and without the speed- up techniques for one Erdos-R´enyi (ER) random graph and one Barab´asi-Albert (BA) random graph with n = 100, m = 900, m− = 600 and plotting the upper and lower bounds over time. Figure 2 shows normalised bounds over time on a log scale where the vertical axes represent upper and lower bounds normalised by dividing by the optimal objective function value. 11 (a) The AND model, ER graph (b) The XOR model, ER graph (c) The ABS model, ER graph (d) The AND model, BA graph (e) The XOR model, BA graph (f) The ABS model, BA graph Figure 2: Normalised upper and lower bounds over time with and without the speed-up techniques for one ER graph and one BA graph with n = 100, m = 900, m− = 600 on a log scale. Vertical axes show normalised upper and lower bounds. (colour version online) For the randomly generated Erdos-R´enyi graph in Subfigures 2a, 2b, and 2c, the solve times of all three models without the speed-up techniques are over 12000 seconds (and in one case 33000 seconds). These solve times are reduced to less than 2800 seconds (and in one case 1400 seconds) when the speed-up techniques are implemented. Subfigures 2d, 2e, and 2f show a considerable solve time improvement for the randomly generated Barab´asi-Albert graph. It takes 420 seconds (80 seconds) for the AND model and the ABS model to find an optimal solution without (with) the speed-up techniques. The XOR model without (with) the speed-up techniques reaches optimality in 655 seconds (40 seconds). 5.3 Largest instances solvable in 10 hours Our experiments allow us to discuss the size of the largest graph whose frustration index can be computed in a reasonable time using an extended binary linear model. Two important factors must be taken into consideration in this regard: network properties and processing capacities. As it is expected from our degree-based prioritised branching in 4.2, network properties such as degree heterogeneity could have an impact on the solve time. Moreover, the numerical results in [5] 12 0.00.20.40.60.81.01.201101001,00010,000100,000Time (seconds)0.00.20.40.60.81.01.201101001,00010,000100,000Time (seconds)0.00.20.40.60.81.01.201101001,00010,000100,000Time (seconds)0.00.20.40.60.81.01.201101001,000Time (seconds)Upper bound (with speed-up)Lower bound (with speed-up)Upper bound (without speed-up)Lower bound (without speed-up)0.00.20.40.60.81.01.201101001,000Time (seconds)0.00.20.40.60.81.01.201101001,000Time (seconds) suggest that reaching optimality in real signed networks takes a considerably shorter time compared to randomly generated signed networks of comparable size and order, confirming the observations of [16, 38]. Processing capacities of the computer that runs the optimisation models are also relevant to the size of the largest solvable instance because Gurobi allows using multiple processing cores for exploring the feasible space in parallel [34]. Besides, exploring a large binary tree may require a considerable amount of memory which might be a determining factor in solve time of some instances due to memory limits. Given a maximum solve time of 10 hours on the current hardware configuration (Intel Core i5 7600 @ 3.50 GHz and 8.00 GB of RAM), random instances with up to 2000 edges were observed to be solvable to global optimality. Regarding real signed graphs which have regularities favouring Gurobi's solver performance, graphs with up to 30000 edges are solvable (to global optimality) within 10 hours. If we use more advanced processing capacities (32 Intel Xeon CPU E5-2698 v3 @ 2.30 GHz processors and 32 GB of RAM), real signed graphs with up to 100000 edges are solvable (to global optimality) within 10 hours [8]. We have observed in most of our numerical experiments that the branch and bound algorithm finds the globally optimal solution in a fraction of the total solve time, but it takes more time and computations to guarantee the optimality. To give an example, Subfigures 2a, 2b, and 2c show that a considerable proportion of the solve time, ranging in 30% -- 90%, is used for guaranteeing optimality after finding the globally optimal solution. One may consider using a non-zero mixed integer programming gap to find solutions within a guaranteed proximity of an optimal solution even if the instance has more than 100000 edges. 6 Evaluating performance against the literature In this section, we use both random and real networks to evaluate not only the solve time, but also the output of our models against other methods in the literature. 6.1 Solve time in random graphs In this subsection, we compare the solve time of our algorithm against other algorithms suggested for computing the frustration index. Besides [5], our review of the literature finds only two methods claiming exact computation of the frustration index [12, 38]. Brusco and Steinley suggested a branch and bound algorithm for minimising the overall frustration (under a different name) for a predefined number of colours [12]. Huffner, Betzler, and Niedermeier have suggested a data-reduction schemes and an iterative compression algorithm for computing the frustration index [38]. Brusco and Steinley have reported running times for very small graphs with only up to n = 21 vertices. While, their exact algorithm fails to solve graphs as large as n = 30 in a reasonable time [12], our binary linear models solve such instances in split seconds. Huffner, Betzler, and Niedermeier have generated random graphs of order n with low densities (ρ ≤ 0.04) to test their algorithm [38]. The largest of such random graphs solvable by their algorithm in 20 hours has 500 nodes. They also reported that only 3 out of 5 random graphs with n ∈ {100, 200, 300, 400, 500} can be solved by their method in 20 hours. Our three binary linear models solve all such instances in less than 100 seconds. 13 6.2 Solve time and algorithm output in real networks In this section we use signed network data sets from biology and international relations. The frustration index of biological networks has been a subject of interest to measure the distance to monotonicity [16, 39]. In international relations, the frustration index is used to measure distance to balance for a network of countries [20]. In this section, the frustration index is computed in real biological and international relations networks by solving the three binary linear models coupled with the two speed-up techniques 4.2 -- 4.3. We use effective branching factor as a performance measure. If the solver explores b branch and √ bound nodes to find an optimal solution of a model with v variables, the effective branching factor is v b. The most effective branching is obtained when the solver only explores 1 branch and bound node to reach optimality. The effective branching factor for such a case would take value 1 which represents the strength of the mathematical formulation. 6.2.1 Biological data sets We use the four signed biological networks that were previously analysed by [16] and [39]. The epidermal growth factor receptor (EGFR) pathway [57] is a signed network with 779 edges. The molecular interaction map of a macrophage (macro.) [56] is another well studied signed network containing 1425 edges. We also investigate two gene regulatory networks, related to two organisms: a eukaryote, the yeast Saccharomyces cerevisiae (yeast), [15] and a bacterium, Escherichia coli (E.coli) [59]. The yeast and E.coli networks have 1080 and 3215 edges respectively. The data sets for real networks used in this study are publicly available in a Figshare research data repository [4]. For more details on the four biological data sets, one may refer to [39]. We use root node objective, Number of B&B nodes, effective branching factor, and solve time as performance measures. The performance of three binary linear models can be compared based on these measures in Table 4 in which values in brackets show the corresponding measure for the case in which speed-up techniques were not used. DasGupta et al. have suggested approximation algorithms [16] that are later tested on the four biological networks in [38]. Their approximation method provides 196 ≤ L(G)EGFR ≤ 219 which our exact model proves to be incorrect. The bounds obtained by implementing their approximation are not incorrect for the other three networks, but they have very large gaps between lower and upper bounds. Huffner, Betzler, and Niedermeier have previously investigated frustration in the four biological networks suggesting a data-reduction schemes and (an attempt at) an exact algorithm [38]. Their suggested data-reduction schemes can take more than 5 hours for yeast, more than 15 hours for EGFR, and more than 1 day for macrophage if the parameters are not perfectly tuned. Besides the solve time issue, their algorithm provides L(G)EGFR = 210, L(G)macrophage = 374, both of which are proven to be incorrect by our results. They report that their algorithm fails to terminate for E.coli [38]. Iacono et al. have also investigated frustration in the four networks [39]. Their heuristic algo- rithm provides upper and lower bounds for EGFR, macrophage, yeast, and E.coli with 96.37%, 90.96%, 100%, and 98.38% ratio of lower to upper bound respectively. The comparison of our outputs against those reported in the literature is provided in Table 5. Iacono et al. also suggest an upper bound for the frustration index [39, page 227]. However, some values of the frustration index in complete graphs with all negative edges show that their suggested upper bound is incorrect (take a complete graph with 9 nodes and 36 negative edges 14 Table 4: Performance measures for the three binary linear models with (and without) the speed-ups Root node objective EGFR 329, 779 Graph n, m AND 28.5 (13) XOR 28.5 (13) 28.5 (13) ABS Number of B&B nodes AND 3 (91) XOR 1 ABS (25) 1 (47) Effective branching factor AND 1.0010 (1.0041) XOR 1 ABS (1.0029) 1 (1.0027) Macro. 678, 1425 67 (53) 67 (53) 67 (53) 1 (199) 1 (1) 1 (456) 1 (1.0025) 1 (1) 1 (1.0022) Yeast 690, 1080 11.5 (0) 11.5 (0) 11.5 (0) 1 (7) 1 (1) 3 (7) 1 (1.0011) 1 (1) 1.0004 (1.0008) E.coli 1461, 3215 130.5 (4) 130.5 (4) 130.5 (4) 31 (279) 3 (19) 36 (357) 1.0007 (1.0012) 1.0002 (1.0006) 1.0006 (1.0010) which has a frustration index of 16 while the bound suggested in [39] gives a value of 15). For a more detailed discussion on bounds for the frustration index, one may refer to [5, 53]. We also compare our solve times to the best results reported for heuristics and approximation algorithms in the literature. Huffner et al. have provided solve time results for their suggested algorithm [38] (if parameters are perfectly tuned for each instance) as well as the algorithm suggested by DasGupta et al. [16]. Iacono et al. have only mentioned that their heuristic requires a fairly limited amount of time (a few minutes on an ordinary PC [39]) that we conservatively interpret as 60 seconds. Table 6 sums up the solve time comparison of our suggested models against the literature in which the values for running our models without the speed-up techniques are provided inside brackets. As the hardware configuration is not reported in [16, 39], we conservatively evaluate the order-of-magnitude improvements in solve time with respect to the differences in computing power in different years. According to Moore's law [54], the exponential increase in transistor density on integrated circuits leads to computer power doubling almost every two years. Moore's prediction has been remarkably accurate from 1965 to 2013, while the actual rate of increase in computer power has slowed down since 2013 [51]. Moore's law ballpark figures allow us to compare computations executed on different hardware in different years. We conservatively estimate a factor of 16 times for the improvements in computer power between 2010 and 2018 to be attributable to hardware improvements. The solve times of the slowest (fastest) model among AND, XOR, and, ABS in Table 6 shows a factor of improvement ranging between 30 − 333 (81 − 545) compared to the fastest solve time in 2010 [16, 38, 39]. This 15 Table 5: Our algorithm output against the best results reported in the literature ABS (6) 193 332 41 371 DasGupta et al. [16] [196, 219]† [218,383] [0, 43] [0, 385] Iacono et al. [39] [186, 193] [302, 332] 41 [365, 371] Author Reference EGFR Macro. Yeast E.coli † Incorrect results ‡ The algorithm does not converge Huffner et al. [38] 210† 374† 41 ‡ Aref et al. [5] 193 332 41 371 AND (4) 193 332 41 371 XOR (5) 193 332 41 371 Table 6: Algorithm solve time in seconds with (and without) the speed-up techniques against the results reported in the literature Year 2010 2010 Reference [16] [39] EGFR 420 >60 Macro. 2640 >60 Yeast 4620 >60 † E.coli >60 † Not reported ‡ The algorithm does not converge 2010 [38] 6480 60 60 ‡ 2018 [5] 0.68 1.85 0.33 18.14 2018 AND (4) 0.27 (0.82) 0.34 (1.24) 0.18 (0.45) 0.99 (1.91) 2018 XOR (5) 0.21 (0.67) 0.26 (1.37) 0.11 (0.28) 1.97 (4.73) 2018 ABS (6) 0.23 (0.66) 0.49 (1.30) 0.15 (0.39) 0.74 (1.86) shows our solve time improvements are not merely resulted from hardware differences. While data-reduction schemes [38] can take up to 1 day for these data sets and heuristic algo- rithms [39] only provide bounds with up to 9% gap from optimality, our three binary linear models equipped with the speed-up techniques (4.2 -- 4.3) solve the four instances to optimality in a few seconds. 6.2.2 International relations data sets We also compute the frustration index for two data sets of international relations networks. In international relation networks, countries and their relations are represented by nodes and edges of signed graphs. We use the Correlates of War (CoW) [58] data set which has 51 instances of networks with up to 1247 edges [20] and the United Nations General Assembly (UNGA) [52] data set which has 62 instances with up to 15531 edges when converted into signed networks by [28]. Figueiredo and Frota provide detailed explanation on the process of creating signed networks from the UNGA data [28]. The CoW signed network data set is constructed by Doreian and Mrvar [20] based on signed international relations between countries in 1946-1999. In their analysis, some numerical results provided on the CoW data set are referred to as line index [20]. However, the values of L(G) we have obtained using our optimisation models prove that values reported in [20] for the 51 time frames of the network are never the smallest number of edges whose removal results in balance. Doreian and Mrvar have not reported any solve time, but have suggested that determining their line index is in general a polynomial-time hard problem [20]. The solve times of our models for each instance of the CoW data set is ≤ 0.1 seconds. We also tested our three models on the UNGA instances. The UNGA data set is based on 16 voting on the UN resolutions. In this data set, instances refer to annual UNGA sessions between 1946 and 2008. Figure 3 shows the solve times of our models for instances of this data set. Figure 3: Solve times of AND, XOR, and ABS models tested on the UNGA instances (colour version online) As it can be seen in Figure 3, most UNGA instances can be solved in less that 5 seconds using any of the three models. The XOR and the ABS models solve all UNGA instances in less than a minute, while solving the AND model for instance 21 and instance 25 takes about 75 and 118 seconds respectively. These two harder instances have the highest values of the frustration index (L(G) = 616 and L(G) = 611 respectively) in the UNGA data set. 7 Other formulations and extensions In this section we provide an alternative formulation and two extensions to the 2-colour minimum frustration count optimisation problem. 7.1 Max (2,2)-CSP formulation and theoretical results In this subsection, we formulate the problem of computing the frustration index as a constraint satisfaction problem in (10) and provide theoretical results on the fastest known algorithms. Compu- tation of the frustration index can be formulated as a Maximum 2-Constraint Satisfaction Problem with 2 states per variable (Max (2,2)-CSP) with n variables and m constraints. The signed graph, G(V, E, σ), is the input constraint graph. We consider a score for each edge (i, j) depending on its sign σij and the assignment of binary values to its endpoints. In the formulation provided in (10), the dyadic score function S(i,j) : {0, 1}2 → {0, 1} determines the satisfaction of edge (i, j) accordingly (score 1 for satisfied and score 0 for frustrated). The output of solving this problem is the colouring function φ : V → {0, 1} which maximises the total number of satisfied edges as score function S(φ). Denoting the maximum score function value by S∗(φ), the frustration index can be calculated as the number of edges that are not satisfied m − S∗(φ). 17 75.76118.4552.0157.2936.3051015202530123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263Solve time (s)United Nations General Assembly session numberANDXORABS (cid:88) φ max S(φ) = (i,j)∈E S(φ(i),φ(j)) S(i,j) = {((0, 0), (1 + σij)/2), ((0, 1), (1 − σij)/2), ((1, 0), (1 − σij)/2), ((1, 1), (1 + σij)/2)} (10) According to worst-case analyses, the fastest known algorithm [43] with respect to n solves Max (2,2)-CSP in O(nm2nω/3), where ω is the matrix multiplication exponent. Since ω < 2.373 [45], the running time of the algorithm from [43] is O(1.7303n). It improves on the previous fastest algorithm [62] only in the polynomial factor of the running time. With respect to n, the algorithm in [43] is the fastest known algorithm for MAXCUT, and therefore for computing the frustration index as well. Both algorithms [43, 62] use exponential space and it is open whether MAXCUT can be solved in O(cn) for some c < 2 when only polynomial space is allowed. With respect to the number m of edges, the Max (2,2)-CSP formulation in (10) enables the use of algorithms from [31] and [60]. The first algorithm uses 2(9m/50+O(m)) time and polynomial space [31], while the second algorithm uses 2(13m/75+O(m)) time and exponential space. With respect to the number of edges, these two algorithms [31, 60] are also the fastest algorithms known for MAXCUT, and therefore for computing the frustration index. 7.2 Weighted minimum frustration count optimisation problem We extend the 2-colour minimum frustration count optimisation problem for a graph with weights wij ∈ [−1, 1] instead of the signs aij ∈ {−1, 1} on the edges. We call such a graph a weighted signed graph. Taking insights from (7), the frustration of edge (i, j) ∈ E with weight wij can be represented by fij = (1 − wij)/2 + wij(xi + xj − 2xij) using the binary variables xi, xj, xij of the AND model (4). Note that, the frustration of an edge in a weighted signed graph is a continuous variable in the unit interval fij ∈ [0, 1]. Note that, aijxij ≤ (3aij − 1)(xi + xj)/4 + (1 − aij)/2 embodies all constraints for edge (i, j) in the AND model regardless of the edge sign. Accordingly, the constraints of the AND model can be modified to incorporate weights wij. The weighted minimum frustration count optimisation problem can be formulated as a binary linear programming model in (11). (1 − wij)/2 + wij(xi + xj − 2xij) (cid:88) Z = min xi:i∈V,xij :(i,j)∈E (i,j)∈E s.t. wijxij ≤ (3wij − 1)(xi + xj)/4 + (1 − wij)/2 ∀(i, j) ∈ E (11) xi ∈ {0, 1} ∀i ∈ V xij ∈ {0, 1} ∀(i, j) ∈ E We have generated random weighted signed graphs to test the model in (11). Our preliminary results show that the weighted version of the problem (11) is solved faster than the original models for signed graphs. 18 7.3 Multi-colour minimum frustration count optimisation problem We formulate another extension to the 2-colour minimum frustration count optimisation problem by allowing more than 2 colours to be used. As previously mentioned in Subsection 1.6, a signed network is k-balanced if and only if its vertex set can be partitioned into k subsets (for some fixed k ≥ 1) such that each negative edge joins vertices belonging to different subsets [17]. Figure 4 demonstrates an example graph and the frustrated edges for various numbers of colours. Subfig- ure 4d shows that the graph is weakly balanced. (a) An example graph with n = 4, m− = 4, m+ = 1 (b) One colour re- sulting in four frus- trated edges (c) Two colours re- sulting in one frus- trated edge (d) Three colours resulting in no frus- trated edge Figure 4: The frustrated edges represented by dashed lines for the multi-colour minimum frustration count optimisation problem. The harder problem of finding the minimum number of frustrated edges where k is not specified in advance (an arbitrary number of node colours) is referred to as the Correlation Clustering problem. As mentioned in Subsection 1.6, another integer linear programming formulation for the correlation clustering problem is suggested by [19] which is widely used in the literature [29, 22, 47]. In the multi-colour minimum frustration count optimisation problem, each node may be given one of a set of colours C = {1, 2, 3, ..., k := C}. Assume ci ∈ C is the colour of node i. We consider that a positive edge (i, j) ∈ E+ is frustrated (indicated by fij = 1) if its endpoints i and j are coloured differently, i.e., ci (cid:54)= cj; otherwise it is not frustrated (indicated by fij = 0). A negative edge (i, j) ∈ E− is frustrated (indicated by fij = 1) if ci = cj; otherwise it is not frustrated (indicated by fij = 0). Using binary variables xic = 1 if node i ∈ V has colour c ∈ C (and xic = 0 otherwise), we formulate this as the following binary linear model in Eq. (12). (cid:88) (cid:88) (i,j)∈E min s.t. c∈C fij xic = 1 ∀i ∈ V fij ≥ xic − xjc ∀(i, j) ∈ E+, ∀c ∈ C fij ≥ xic + xjc − 1 ∀(i, j) ∈ E−, ∀c ∈ C xic ∈ {0, 1} ∀i ∈ V, ∀c ∈ C fij ∈ {0, 1} ∀(i, j) ∈ E (12) If we have just two colours, then we use xi ∈ {0, 1} to denote the colour of node i. This gives the XOR model expressed in Eq. (5). 19 1203120312031203Negative frustrated edgePositive frustrated edgeNegative edgePositive edge Solving the problem in (12) provides us with the minimum number of frustrated edges in the k-colour setting. This number determines how many edges should be removed to make the network k-balanced. For a more general formulation of partitioning graph vertices into k sets, one may refer to [3] where numerical results for graphs with up to 20 nodes are provided. 8 Conclusion In this study, we provided an efficient method for computing a standard measure in signed graphs which has many applications in different disciplines. The present study suggested efficient mathe- matical programming models and speed-up techniques for computing the frustration index in graphs with up to 15000 edges on inexpensive hardware. We developed three new binary optimisation models which outperform previous methods by large factors. We also suggested prioritised branching and valid inequalities which make the binary linear optimisation models several times (see Table 6) faster than recently developed models [5] and capable of processing relatively large instances. Extensive numerical results on random and real networks were provided to evaluate computa- tional performance and underline the superiority of our models to other methods in the literature in both solve time and algorithm output. We also formulated the problem as a constraint satis- faction model and provided theoretical results on the fastest known algorithms for computing the frustration index with respect to the number of nodes and the number of edges. We also provided two extensions to the model for future investigation. Acknowledgements The authors thank the anonymous referees, Serge Gaspers, Gregory Gutin, and Jeffrey Linderoth for valuable comments, Yuri Frota for providing data on United Nations General Assembly instances, and Serge Gaspers for his contribution to Subsection 7.1. ORCID Samin Aref Andrew J. Mason Mark C. Wilson http://orcid.org/0000-0002-5870-9253 http://orcid.org/0000-0001-9848-6595 http://orcid.org/0000-0002-3343-7458 References [1] Abelson, R. P., and Rosenberg, M. J. Symbolic psycho-logic: A model of attitudinal cognition. Behavioral Science 3, 1 (1958), 1 -- 13. √ [2] Agarwal, A., Charikar, M., Makarychev, K., and Makarychev, Y. O( log n) ap- proximation algorithms for min UnCut, min 2CNF deletion, and directed cut problems. In Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing (New York, NY, USA, 2005), R. Fagin, Ed., STOC '05, ACM, pp. 573 -- 581. 20 [3] Ales, Z., Knippel, A., and Pauchet, A. Polyhedral combinatorics of the k-partitioning problem with representative variables. Discrete Applied Mathematics 211 (2016), 1 -- 14. [4] Aref, S. Signed networks from sociology and political science, systems biology, international relations, finance, and computational chemistry. Figshare research data repository (2017). doi: 10.6084/m9.figshare.5700832.v2. [5] Aref, S., Mason, A. J., and Wilson, M. C. Computing the line index of balance using in- teger programming optimisation. In Optimization Problems in Graph Theory, B. Goldengorin, Ed. Springer, 2018, pp. 65 -- 84. [6] Aref, S., and Neal, Z. Legislative effectiveness hangs in the balance: Studying balance and polarization through partitioning signed networks. arXiv preprint arXiv:1906.01696 (2019). [7] Aref, S., and Wilson, M. C. Measuring partial balance in signed networks. Journal of Complex Networks 6, 4 (2018), 566 -- 595. [8] Aref, S., and Wilson, M. C. Balance and frustration in signed networks. Journal of Complex Networks 7, 2 (2019), 163 -- 189. [9] Avidor, A., and Langberg, M. The multi-multiway cut problem. Theoretical Computer Science 377, 1 (2007), 35 -- 42. [10] Bansal, N., Blum, A., and Chawla, S. Correlation clustering. Machine learning 56, 1-3 (2004), 89 -- 113. [11] Bilitzky, A., and Sadeh, A. Efficient solutions for special zero-one programming problems. Journal of Combinatorial Optimization 10, 3 (2005), 227 -- 238. [12] Brusco, M., and Steinley, D. K-balance partitioning: An exact method with applications to generalized structural balance and other psychological contexts. Psychological Methods 15, 2 (2010), 145 -- 157. [13] Cartwright, D., and Harary, F. Structural balance: a generalization of Heider's theory. Psychological Review 63, 5 (1956), 277 -- 293. [14] Coleman, T., Saunderson, J., and Wirth, A. A local-search 2-approximation for In European Symposium on Algorithms (Berlin, Germany, 2008), 2-correlation-clustering. D. Halperin and K. Mehlhorn, Eds., Springer, pp. 308 -- 319. [15] Costanzo, M. C., Crawford, M. E., Hirschman, J. E., Kranz, J. E., Olsen, P., Robertson, L. S., Skrzypek, M. S., Braun, B. R., Hopkins, K. L., Kondu, P., Lengieza, C., Lew-Smith, J. E., Tillberg, M., and Garrels, J. I. YPDTM, PombePDTM and WormPDTM: model organism volumes of the BioKnowledgeTM Library, an integrated resource for protein information. Nucleic Acids Research 29, 1 (2001), 75 -- 79. [16] DasGupta, B., Enciso, G. A., Sontag, E., and Zhang, Y. Algorithmic and complexity results for decompositions of biological networks into monotone subsystems. Biosystems 90, 1 (2007), 161 -- 178. [17] Davis, J. A. Clustering and structural balance in graphs. Human Relations 20, 2 (1967), 181 -- 187. 21 [18] De Simone, C., Diehl, M., Junger, M., Mutzel, P., Reinelt, G., and Rinaldi, G. Exact ground states of Ising spin glasses: New experimental results with a branch-and-cut algorithm. Journal of Statistical Physics 80, 1 (1995), 487 -- 496. [19] Demaine, E. D., Emanuel, D., Fiat, A., and Immorlica, N. Correlation clustering in general weighted graphs. Theoretical Computer Science 361, 2 (2006), 172 -- 187. [20] Doreian, P., and Mrvar, A. Structural Balance and Signed International Relations. Journal of Social Structure 16 (2015), 1 -- 49. [21] Dosli´c, T., and Vukicevic, D. Computing the bipartite edge frustration of fullerene graphs. Discrete Applied Mathematics 155, 10 (2007), 1294 -- 1301. [22] Drummond, L., Figueiredo, R., Frota, Y., and Levorato, M. Efficient solution of the correlation clustering problem: An application to structural balance. In On the Move to Meaningful Internet Systems: OTM 2013 Workshops (Berlin, Heidelberg, 2013), Y. T. Demey and H. Panetto, Eds., Springer Berlin Heidelberg, pp. 674 -- 683. [23] Esmailian, P., Abtahi, S. E., and Jalili, M. Mesoscopic analysis of online social networks: The role of negative ties. Physical Review E 90, 4 (2014), 042817. [24] Esmailian, P., and Jalili, M. Community detection in signed networks: The role of negative ties in different scales. Scientific reports 5 (2015), 14339. [25] Estrada, E., and Benzi, M. Walk-based measure of balance in signed networks: Detecting lack of balance in social networks. Physical Review E 90, 4 (2014), 1 -- 10. [26] Facchetti, G., Iacono, G., and Altafini, C. Computing global structural balance in large-scale signed social networks. Proceedings of the National Academy of Sciences 108, 52 (2011), 20953 -- 20958. [27] Facchetti, G., Iacono, G., and Altafini, C. Exploring the low-energy landscape of large-scale signed social networks. Physical Review E 86, 3 (2012), 036116. [28] Figueiredo, R., and Frota, Y. The maximum balanced subgraph of a signed graph: Applications and solution approaches. European Journal of Operational Research 236, 2 (2014), 473 -- 487. [29] Figueiredo, R., and Moura, G. Mixed integer programming formulations for clustering problems related to structural balance. Social Networks 35, 4 (2013), 639 -- 651. [30] Fytas, N. G., Theodorakis, P. E., and Hartmann, A. K. Revisiting the scaling of the specific heat of the three-dimensional random-field Ising model. The European Physical Journal B 89, 9 (2016), 200. [31] Gaspers, S., and Sorkin, G. B. Separate, measure and conquer: Faster polynomial- space algorithms for max 2-csp and counting dominating sets. In Automata, Languages, and Programming (Berlin, Heidelberg, 2015), M. M. Halld´orsson, K. Iwama, N. Kobayashi, and B. Speckmann, Eds., Springer Berlin Heidelberg, pp. 567 -- 579. 22 [32] Giotis, I., and Guruswami, V. Correlation clustering with a fixed number of clusters. In Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithm (Philadelphia, PA, USA, 2006), C. Stein, Ed., SODA '06, Society for Industrial and Applied Mathematics, pp. 1167 -- 1176. [33] Grotschel, M., and Pulleyblank, W. R. Weakly bipartite graphs and the MAX-CUT problem. Operations Research Letters 1, 1 (1981), 23 -- 27. [34] Gurobi Optimization Inc. Gurobi optimizer reference manual, 2017. url: http://www. gurobi.com/documentation/7.5/refman/index.html date accessed 2017-05-01. [35] Harary, F. On the measurement of structural balance. Behavioral Science 4, 4 (1959), 316 -- 323. [36] Harary, F., Lim, M.-H., and Wunsch, D. C. Signed graphs for portfolio analysis in risk management. IMA Journal of Management Mathematics 13, 3 (2002), 201 -- 210. [37] Heider, F. Social perception and phenomenal causality. Psychological Review 51, 6 (1944), 358 -- 378. [38] Huffner, F., Betzler, N., and Niedermeier, R. Separator-based data reduction for signed graph balancing. Journal of Combinatorial Optimization 20, 4 (2010), 335 -- 360. [39] Iacono, G., Ramezani, F., Soranzo, N., and Altafini, C. Determining the distance to monotonicity of a biological network: a graph-theoretical approach. IET Systems Biology 4, 3 (2010), 223 -- 235. [40] Kasteleyn, P. W. Dimer Statistics and Phase Transitions. Journal of Mathematical Physics 4, 2 (1963), 287 -- 293. [41] Khot, S. On the power of unique 2-prover 1-round games. In Proceedings of the thirty-fourth annual ACM symposium on Theory of computing (Montreal, Quebec, Canada, 2002), STOC '02, ACM, pp. 767 -- 775. [42] Klotz, E., and Newman, A. M. Practical guidelines for solving difficult mixed integer linear programs. Surveys in Operations Research and Management Science 18, 1-2 (2013), 18 -- 32. [43] Koivisto, M. Optimal 2-constraint satisfaction via sum-product algorithms. Information processing letters 98, 1 (2006), 24 -- 28. [44] Kunegis, J. Applications of Structural Balance in Signed Social Networks. arXiv:1402.6865 [physics] (2014). arXiv: 1402.6865. [45] Le Gall, F. Powers of tensors and fast matrix multiplication. In Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation (New York, NY, USA, 2014), ISSAC '14, ACM, pp. 296 -- 303. [46] Leskovec, J., Huttenlocher, D., and Kleinberg, J. Signed networks in social media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (New York, NY, USA, 2010), E. D. Mynatt, D. Schoner, G. Fitzpatrick, S. E. Hudson, W. K. Edwards, and T. Rodden, Eds., CHI '10, ACM, pp. 1361 -- 1370. 23 [47] Levorato, M., Drummond, L., Frota, Y., and Figueiredo, R. An ILS algorithm to evaluate structural balance in signed social networks. In Proceedings of the 30th Annual ACM Symposium on Applied Computing (New York, NY, USA, 2015), A. Bechini and J. Hing, Eds., SAC '15, ACM, pp. 1117 -- 1122. [48] Levorato, M., Figueiredo, R., Frota, Y., and Drummond, L. Evaluating balancing on social networks through the efficient solution of correlation clustering problems. EURO Journal on Computational Optimization 5, 4 (2017), 467 -- 498. [49] Ma, L., Gong, M., Du, H., Shen, B., and Jiao, L. A memetic algorithm for computing and transforming structural balance in signed networks. Knowledge-Based Systems 85 (2015), 196 -- 209. [50] Ma, L., Gong, M., Yan, J., Yuan, F., and Du, H. A decomposition-based multi-objective optimization for simultaneous balance computation and transformation in signed networks. Information Sciences 378 (2017), 144 -- 160. [51] Mack, C. The multiple lives of Moore's law. IEEE Spectrum 52, 4 (2015), 31 -- 37. [52] Macon, K. T., Mucha, P. J., and Porter, M. A. Community structure in the United Nations general assembly. Physica A: Statistical Mechanics and its Applications 391, 1-2 (2012), 343 -- 361. [53] Martin, F. Frustration and isoperimetric inequalities for signed graphs. Discrete Applied Mathematics 217 (2017), 276 -- 285. [54] Moore, G. E. Cramming more components onto integrated circuits. Electronics 38, 8 (1965), 114 -- 117. [55] Norman, R. Z., and Roberts, F. S. A derivation of a measure of relative balance for social structures and a characterization of extensive ratio systems. Journal of Mathematical Psychology 9, 1 (1972), 66 -- 91. [56] Oda, K., Kimura, T., Matsuoka, Y., Funahashi, A., Muramatsu, M., and Kitano, H. Molecular interaction map of a macrophage. AfCS Research Reports 2, 14 (2004), 1 -- 12. [57] Oda, K., Matsuoka, Y., Funahashi, A., and Kitano, H. A comprehensive pathway map of epidermal growth factor receptor signaling. Molecular Systems Biology 1, 1 (2005). [58] Pevehouse, J., Nordstrom, T., and Warnke, K. The Correlates of War 2 international governmental organizations data version 2.0. Conflict Management and Peace Science 21, 2 (2004), 101 -- 119. [59] Salgado, H., Gama-Castro, S., Peralta-Gil, M., D´ıaz-Peredo, E., S´anchez- Solano, F., Santos-Zavaleta, A., Martinez-Flores, I., Jim´enez-Jacinto, V., Bonavides-Mart´ınez, C., Segura-Salazar, J., Martnez-Antonio, A., and Collado- Vides, J. Regulondb (version 5.0): Escherichia coli k-12 transcriptional regulatory network, operon organization, and growth conditions. Nucleic Acids Research 34, suppl 1 (2006), D394 -- D397. 24 [60] Scott, A. D., and Sorkin, G. B. Linear-programming design and analysis of fast algorithms for max 2-csp. Discrete Optimization 4, 3 (2007), 260 -- 287. [61] Terzi, E., and Winkler, M. A spectral algorithm for computing social balance. In Pro- ceedings of International Workshop on Algorithms and Models for the Web-Graph (Atlanta, Georgia, USA, 2011), A. Frieze, P. Horn, and P. Pra(cid:32)lat, Eds., WAW 2011, Springer, Berlin Heidelberg, pp. 1 -- 13. [62] Williams, R. A new algorithm for optimal 2-constraint satisfaction and its implications. Theoretical Computer Science 348, 2 (2005), 357 -- 365. [63] Yannakakis, M. Edge-deletion problems. SIAM Journal on Computing 10, 2 (1981), 297 -- 309. [64] Zaslavsky, T. Balanced decompositions of a signed graph. Journal of Combinatorial Theory, Series B 43, 1 (1987), 1 -- 13. 25
1404.7048
2
1404
2015-02-06T00:15:42
Multiscale Event Detection in Social Media
[ "cs.SI", "cs.LG", "physics.soc-ph", "stat.ML" ]
Event detection has been one of the most important research topics in social media analysis. Most of the traditional approaches detect events based on fixed temporal and spatial resolutions, while in reality events of different scales usually occur simultaneously, namely, they span different intervals in time and space. In this paper, we propose a novel approach towards multiscale event detection using social media data, which takes into account different temporal and spatial scales of events in the data. Specifically, we explore the properties of the wavelet transform, which is a well-developed multiscale transform in signal processing, to enable automatic handling of the interaction between temporal and spatial scales. We then propose a novel algorithm to compute a data similarity graph at appropriate scales and detect events of different scales simultaneously by a single graph-based clustering process. Furthermore, we present spatiotemporal statistical analysis of the noisy information present in the data stream, which allows us to define a novel term-filtering procedure for the proposed event detection algorithm and helps us study its behavior using simulated noisy data. Experimental results on both synthetically generated data and real world data collected from Twitter demonstrate the meaningfulness and effectiveness of the proposed approach. Our framework further extends to numerous application domains that involve multiscale and multiresolution data analysis.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) Multiscale Event Detection in Social Media Xiaowen Dong · Dimitrios Mavroeidis · Francesco Calabrese · Pascal Frossard 5 1 0 2 b e F 6 ] I S . s c [ 2 v 8 4 0 7 . 4 0 4 1 : v i X r a Received: date / Accepted: date Abstract Event detection has been one of the most important research top- ics in social media analysis. Most of the traditional approaches detect events based on fixed temporal and spatial resolutions, while in reality events of dif- ferent scales usually occur simultaneously, namely, they span different intervals in time and space. In this paper, we propose a novel approach towards multi- scale event detection using social media data, which takes into account differ- ent temporal and spatial scales of events in the data. Specifically, we explore the properties of the wavelet transform, which is a well-developed multiscale transform in signal processing, to enable automatic handling of the interac- tion between temporal and spatial scales. We then propose a novel algorithm to compute a data similarity graph at appropriate scales and detect events of different scales simultaneously by a single graph-based clustering process. Fur- thermore, we present spatiotemporal statistical analysis of the noisy informa- tion present in the data stream, which allows us to define a novel term-filtering procedure for the proposed event detection algorithm and helps us study its behavior using simulated noisy data. Experimental results on both syntheti- cally generated data and real world data collected from Twitter demonstrate the meaningfulness and effectiveness of the proposed approach. Our framework X. Dong MIT Media Lab, Cambridge, MA, United States E-mail: [email protected] D. Mavroeidis Philips Research, Eindhoven, Netherlands E-mail: [email protected] F. Calabrese IBM Research, Dublin, Ireland E-mail: [email protected] P. Frossard ´Ecole Polytechnique F´ed´erale de Lausanne (EPFL), Lausanne, Switzerland E-mail: [email protected] 2 Xiaowen Dong et al. further extends to numerous application domains that involve multiscale and multiresolution data analysis. Keywords Multiscale event detection · Spatiotemporal analysis · Wavelet decomposition · Modularity-based clustering 1 Introduction The last decade has seen rapid development of online social networks and social media platforms, which leads to an explosion of user-generated data posted on the Internet. The huge amount of such data enables the study of many research problems, and event detection is certainly one of the most pop- ular and important topics in this novel research area. Social media platforms present several advantages for event detection. First, due to the real-time na- ture of online social services, the public awareness of real world happenings could be raised in a much quicker fashion than with the traditional media. Second, due to the large amount of users posting content online, more com- plete pictures of the real world events with descriptions from different angles are offered with fast and large-scale coverage. These advantages have attracted a significant amount of interest from the data mining communities in event detection problems. For instance, the MediaEval Workshop has open research task dedicated to event detection (Reuter et al, 2013), and numerous event detection approaches have been proposed recently in the literature (Sayyadi et al, 2009; Becker et al, 2009; Aggarwal and Subbian, 2012). Events in social media platforms can be loosely defined as real world hap- penings that occur within similar time periods and geographical locations, and that have been mentioned by the online users in the forms of images, videos or texts. Different types of events are usually of different temporal and spa- tial scales or resolutions 1, meaning that they span different intervals in time and space. For example, discussions about the London 2012 Summer Olympic Games would span a temporal period of nearly one month and a spatial area of all over the world, while those regarding the 2012 concert of The Stone Roses in the Phoenix Park in Dublin may concentrate only on the date and at the location of the concert. Similarly, Fig. 1 illustrates discussions on Twit- ter about two events of different spatiotemporal scales in New York City. In the designs of event detection algorithms, it is thus important to take into account the different temporal and spatial scales of various kinds of events. This is challenging in the sense that: (i) Event detection approaches usually rely on classification or clustering algorithms with fixed temporal and spatial resolutions; This results in the detected events being of similar scales; (ii) It is not yet clear how multiple resolutions in time and in space interact with each other so that they can be analyzed simultaneously, even if it is relatively easier to take into account multiple resolutions in only one of these two di- mensions; (iii) Data streams from social media platforms usually contain much 1 Throughout the paper, we use “scales” and “resolutions” interchangeably. Multiscale Event Detection in Social Media 3 (a) (b) Fig. 1 Two events in New York City that has been discussed on Twitter: (a) Occupy Wall Street protests. (b) Katy Perry’s concert at the Madison Square Garden. Each dot on the map represents a tweet. While discussions about the first event span the middle and lower Manhattan area for more than three hours, the discussions about the second are concentrated near the concert venue for less than an hour. noisy information irrelevant to the events of interest. It is thus important to understand how to attenuate the influence of the noise on detecting events of different scales. Efficient and robust multiscale event detection for solving the above challenges is exactly the objective of the present paper. In this paper, we first introduce a baseline approach that detects events that are of similar scales and localized in both time and space, which serves as a first step towards the understanding of multiscale event detection. We then propose a novel approach towards the detection of events that are of different scales and localized either in time or in space but not necessarily in both simultaneously. To this end, we study the relationship between scales in the two dimensions and explore the properties of the wavelet transform to automatically and explicitly handle the interaction between different scales in time and space simultaneously. We propose an algorithm to compute a data similarity graph at appropriate scales, based on which we perform a graph- based clustering process to detect events of different spatiotemporal scales. Furthermore, we present spatiotemporal analysis of the distribution of noisy information in data streams, especially using notions from spatial statistics, which allows us to define a novel term-filtering procedure for the proposed multiscale event detection algorithm, and helps us study the behavior of the two approaches in this paper using simulated noisy data. We compare the proposed multiscale event detection approach with the baseline approach on both synthetically generated data and real world data collected from Twitter. We show experimentally that the proposed approach can effectively detect events of different temporal and spatial scales. On the one hand, we believe that the modeling of the relationship and interaction between temporal and spatial scales and the detection of multiscale events provide new insights into the task of event detection with social media data. On the other hand, the proposed framework can be further generalized to other application domains that involve multiscale or multiresolution data analysis. 4 Xiaowen Dong et al. 2 Spatiotemporal detection of events In this paper, we define an “event” in social media as follows. Definition. Events in social media are real world happenings that are reflected by data that are concentrated either in both time and space, or in at least one of the two dimensions. Events defined as above are usually of different temporal and spatial scales, namely, they span different intervals in time and space. In addition, there exist data that do not contain any information about ongoing events. In the case of Twitter, such examples can be tweets that are like: “At work”, or “It feels great to be home...”. When non-informative tweets constitute a large part of the input data, the event-relevant tweets could however be buried in noise. It becomes very difficult in this case to identify the information of interest. In this paper, we focus on the Twitter data streams and consider the following objective. Objective. Consider a Twitter data stream that contains temporal, spatial and text information. Our goal is to design event detection approaches that (i) are able to identify events that appear at multiple spatiotemporal scales, namely, events that affect or take place in different temporal and spatial inter- vals, and (ii) are robust against the ambiguous and noisy information present in the data. In this paper, we cast event detection as a graph-based clustering prob- lem, where the vertices of the graph represent the tweets, and the edges reflect their similarities. The goal is to group similar tweets into the same cluster such that they correspond to a real world event. The clustering algorithm utilizes a similarity measure between tweets that takes into account the temporal, spa- tial, and textual features of a tweet. Intuitively, two tweets that are generated by users that are participating in the same event should share a number of common terms and be closely located in time and/or space. In this paper, we compare two different ways of measuring similarity between tweets, the first a baseline approach based on spatiotemporal constraints and the second a novel wavelet-based scheme. Then, in order to effectively handle the noisy infor- mation, we study the spatiotemporal distribution of the noise in the Twitter data, especially using a homogeneous Poisson process as a statistical model in our analysis. This is helpful to analyze the behavior of the baseline and the proposed event detection algorithms. 3 Local event detection via spatiotemporal constraints Events defined as in the previous section can have different localization be- havior in time and space. When the events are localized in both dimensions, event detection can be effectively implemented by imposing spatiotemporal constraints on the data. In this section, we first describe a baseline approach Multiscale Event Detection in Social Media 5 for detecting events that are localized both in time and space, which serves as a first step towards the understanding of multiscale event detection presented later. We formulate a clustering problem, where we wish to group together the tweets that correspond to the same real world event. The similarity measure between different tweets is thus important. In our baseline event detection approach, we measure the similarity between every pair of tweets ti and tj as: (cid:26) stf-idf(ti, tj) S1(ti, tj) = 0 t(ti, tj) ≤ Tt and d(ti, tj) ≤ Td, if otherwise. (1) where t(ti, tj) and d(ti, tj) are the temporal difference in minutes and the spatial distance in meters, respectively, between ti and tj. The thresholds Tt and Td enforce the locality of the events and impose strict spatiotemporal constraints. Under such constraints, two tweets ti and tj that have a reason- ably high text similarity tend to refer to the same event in real world. The function stf-idf(ti, tj) represents the text similarity of ti and tj in terms of the cosine angle between the vector representations of the two tweets using the term frequency-inverse document frequency (tf-idf ) weighting scheme (Man- ning et al, 2008). Given S1(ti, tj) as the pairwise similarity between tweets, we can create an undirected and weighted graph with adjacency matrix W1: (cid:26) S1(ti, tj) W1(i, j) = 0 i (cid:54)= j, i = j, if if (2) where the vertices represent tweets and the edges (along with the associated weights) are defined by S1(ti, tj). By partitioning the vertices of the graph into disjoint clusters, each cluster is then expected to contain tweets that are likely to correspond to the same event. Furthermore, due to the constraints introduced in Eq. (1), these events are localized in both time and space. In this paper, we perform graph-based clustering using the Louvain method (Blon- del et al, 2008). This is a greedy optimization method that first find small communities in a local way by maximizing the modularity function (Newman, 2006), before repeating the same procedure by considering the communities found in the previous step as vertices in a new graph, until a maximum of modularity is attained2. The Louvain method is suitable for our purpose of event detection because of the following advantages: (i) Unlike most of the clustering methods, it does not require prior knowledge about the number of clusters; This is important because we usually do not know the number of events a priori. (ii) Unlike the popular approach based on normalized graph cut (such as spectral clustering (von Luxburg, 2007)), it does not necessarily favor a balanced clustering; This enables the detection of small-scale clusters together with some relatively larger ones. (iii) It is also computationally very efficient when applied to large scale networks. Specifically, the complexity of 2 Since we are interested in local clusters, we apply the non-recursive version of the Lou- vain method which stops after the first iteration. 6 Xiaowen Dong et al. (a) (b) Fig. 2 (a) Events of similar scales and are localized in both time and space. (b) Events of different scales and are not necessarily localized in both time and space. the greedy implementation in Blondel et al (2008) is empirically observed to be close to O(n log n) where n is the number of the vertices in the graph. The graph-based clustering approach described above outputs a set of clus- ters that correspond to events localized in both time and space. This can be illustrated by Fig. 2(a), where each cluster corresponds to a particular time- space “cube”. After clustering, we apply simple post-processing steps to iden- tify those clusters that are likely to correspond to meaningful events in real world. For example, we consider that a meaningful event should be observed by a sufficient number of users with sufficient information reflected on Twitter. Therefore, we consider a cluster as a local event if and only if the number of tweets and distinct Twitter users within the cluster are above certain thresh- olds (see Sect. 7 for the implementation details of these post-processing steps). The algorithm for local event detection is summarized in Algorithm 1. Obviously, the choices for the values of thresholds Tt and Td in Eq. (1) are critical in LED. Without prior information we may choose them such that they correspond to the expected temporal and spatial spans of events to be discovered. By setting Tt and Td appropriately, the algorithm would then be efficient at detecting events that are of similar scales and that are sufficiently concentrated in both time and space. For events of different scales, however, setting the thresholds too low might break down some event clusters while setting them too high would generally lead to a higher amount of noisy information in other clusters3 (as we will see in the experimental sections). In this case, one needs to implement more complex detection schemes to identify events that appear at multiple spatiotemporal scales. Hence, we introduce in the next section our novel wavelet-based method for multiscale event detection. 3 One may think of applying LED with small values for Tt and Td before grouping similar clusters together using a second clustering step. In fact, the second and further iterations of the Louvain method already offers such a grouping. Alternatively, a hierarchical clustering algorithm can be applied to the clusters obtained by LED. However, such further grouping process does not usually lead to a clear interpretation in terms of the spatiotemporal scales of the resulting event clusters, and it is often difficult to decide when to stop the recursive process and output the eventual clusters. Multiscale Event Detection in Social Media 7 Algorithm 1 Local Event Detection via Locality Constraints (LED) 1: Input: T : a set of tweets with temporal, spatial, and text information Tt: temporal threshold Td: spatial threshold 2: Compute the pairwise similarities S1(ti, tj ) between tweets in T using Eq. (1), and the 3: Apply the non-recursive Louvain method to W1, and retain the meaningful clusters adjacency matrix W1 using Eq. (2). {ci}m {ci}m i=1 after post-processing steps. 4: Output: i=1: clusters that correspond to events that are localized in both time and space. 4 Multiscale event detection using wavelets In this section, we propose a novel algorithm for multiscale event detection. Specifically, we first introduce a new model of the relationship and interaction between the temporal and spatial scales. We then propose a wavelet-based scheme for computing the pairwise multiscale similarities between tweets. 4.1 Relationship model between temporal and spatial scales The fundamental question in designing approaches towards multiscale event detection resides in properly handling events that are of different scales and do not have simultaneous temporal and spatial localization. An illustration is shown in Fig. 2(b), where three events are represented by rectangular cuboids that span different time and space intervals. Two of them are only concentrated in one dimension but spread in the other one. In such cases, we need to compute a similarity score S2(ti, tj) between pairs of tweets ti and tj that carefully considers the temporal and spatial scales of different events. We shall relax the strict constraints in both temporal and spatial dimensions as defined in Eq. (1), so that S2(ti, tj) is computed at appropriate scales that actually correspond to the span of the underlying events. To this end, we propose in this paper to model the relationship and interaction between the temporal and spatial scales as follows. Scale relationship model. When two tweets ti and tj share common terms and are close in space, we could tolerate a coarser temporal resolution in com- puting S2(ti, tj). Vice versa, when they are close in time, we could tolerate a coarser spatial resolution. Our scale relationship model essentially says that, for two tweets ti and tj to be considered similar, they should be similar at a fine resolution in at least one of the temporal or spatial dimensions, but not necessarily in both simutaneousy. It thus represents a tradeoff between time and space in the detection of events of different spatiotemporal scales. This matches the observation that real world events often happen within a small geographical area but could span longer time intervals (such as a protest at a certain location in a city), or they take 8 Xiaowen Dong et al. Fig. 3 Two time series of the number of occurrences of a certain term (computed using the temporal resolution ∆t) within two different geographical cells. These geographical cells are defined by discretizing the geographical area using the spatial resolution ∆d. place only within short time intervals but could spread a larger geographical area (such as a brief power outage across different areas of a city). Therefore, based on the proposed model, we can relax the strict constraints defined in Eq. (1) in event detection. In order to do so, however, we do not compare two tweets ti and tj with large temporal or spatial distances by simply choosing higher thresholds Tt and Td, since this would suffer from text ambiguity generally present in the Twitter data stream (the same word having different meanings depending on context). We do not either incorporate directly the exact temporal and spatial distances between them into the computation of the similarity metric S2(ti, tj), since this might lead to domination of one scale to the other. These limitations motivate us to propose a more detailed analysis model, that is, instead of considering the temporal and spatial information of each tweet as a whole, we now analyze spatiotemporal patterns of the terms (or keywords) contained in each tweet. More specifically, to compare two tweets ti and tj, we propose to look at the similarity between the time series of the number of occurrences of the common terms shared by them (the occurrence is evaluated in terms of in how many tweets these terms appear). On the one hand, this enables us to study the interaction between the temporal and spatial scales when computing the similarity between keyword time series. On the other hand, this does not affect the clustering-based event detection framework, as similarities between tweets would eventually be computed based on similarities between time series of the common terms shared by them. We build the time series of keywords as follows. We start with initial tem- poral resolution ∆t and spatial resolution ∆d. Next, for each term shared by ti and tj, we compute using the temporal resolution ∆t two time series of its number of occurrences, that are based on data corresponding to the two geographical cells to which ti and tj belong. These geographical cells are de- fined by discretizing the geographical area using the spatial resolution ∆d. The keyword time series are illustrated in Fig. 3. Multiscale Event Detection in Social Media 9 4.2 Wavelet-based similarity computation We now propose to use a wavelet-based method to measure similarities between time series of keywords. Similarity between time series are often measured by the correlation of their coefficients under the wavelet transform (Daubechies, 1992), which is a well-developed tool in signal processing that leads to a mul- tiresolution representation of the signals. In this paper, we consider the discrete wavelet transform (DWT) using the Haar wavelet, since it provides a natural way to handle different temporal scales as required in our approach. Specifi- cally, due to the properties of the Haar wavelet, the approximation coefficients of DWT at different levels naturally correspond to aggregating the time se- ries from fine scales (starting with the initial temporal resolution) into coarse scales, each time by a factor of two. Therefore, to evaluate the similarity of the time series at a certain temporal scale, we only need to measure the correlation between a specific set of the DWT coefficients at the corresponding level (see Fig. 4 for an illustration). Our key idea is then to evaluate the similarity between the two time se- ries shown in Fig. 3 at a properly chosen temporal scale, which is in turn determined by the spatial distance between the two geographical cells. More specifically, we introduce a number of predefined spatial scales for the spa- tial distance. Then, if the spatial scale is coarse, which means that ti and tj are distant, then we require the time series to be compared at a finer tem- poral scale (the finest temporal scale being the initial temporal resolution); Alternatively, if the spatial scale is fine, which means that ti and tj are close, then the time series could be compared at a coarser temporal scale. Given the number of spatial scales specified by the parameter nscale, we define nscale distance ranges using logarithmical equispacing between the minimum and maximum distances between two distinct geographical cells (measured based on the center of the cells), which correspond to these spatial scales4. According to the scale relationship model, the temporal scale St is then selected inversely according to the spatial scale: St = nscale + 1 − Ss. (3) For instance, if we choose to have nscale = 4 spatial scales Ss ∈ {1, 2, 3, 4}, 1 being the coarsest and 4 the finest, then we would have St = 4, 3, 2, 1, respectively, that represent from the finest to the coarsest temporal scale. This in turn means that we compute the DWT at levels from 1 to 4, respectively. This procedure is illustrated in Fig. 4. We can now define a new similarity metric between two tweets ti and tj as follows: S2(ti, tj) = stf-idf(ti, tj) × sst(ti, tj), (4) 4 When two tweets come from the same geographical cell, they would share the same time series for any common term. In this case, the correlation of DWT coefficients would always be 1 regardless of the level at which we compute the transform (or the temporal scale). This special case can be interpreted as only keeping the spatial constraint in LED but relaxing the temporal constraint. 10 Xiaowen Dong et al. Fig. 4 An illustration of wavelet-based similarity computation for time series of length 16 (zero padding can be applied when needed if the length of time series is not a power of 2). The dots indicate the DWT coefficients at the corresponding level that are used for computing correlation, while the dots highlighted by the rounded rectangle correspond to approximation coefficients at each level. The approximation coefficients at DWT level k correspond to a time series generated by aggregating every 2k entries in the original time series (up to a constant). where stf-idf(ti, tj) is the text similarity of ti and tj defined as in Eq. (1). For each term shared by ti and tj, we can compute a similarity of the corresponding time series; sst(ti, tj) is then defined as the maximum such similarity among all the terms shared by ti and tj. The reasons why we choose the maximum similarity are as follows. First, social media platforms that are ideal for event detection usually contain short textual data where two pieces of text, if corre- sponding to the same event, would share only a few but informative common terms, such as hashtags in Twitter or tags in Youtube or Flickr. Second, in Twitter specifically, although many tweets may share the same popular term, it is less often that there would be a high similarity between the two keyword time series in terms of their spatiotemporal patterns, especially at fine tempo- ral scales, after a term-filtering procedure which we propose in the next section that removes the “noisy” terms that generally spread in time and space. We thus consider high similarity between time series as a strong indicator that ti and tj may be related to the same event. Taking the maximum instead of the average similarity helps us preserve such information and promote a higher recall metric (retrieval of positive links between tweets) that we favor. In Eq. (4), we consider the overall similarity between two tweets as a prod- uct of their text similarity (stf-idf(ti, tj)) and the similarity of spatiotemporal patterns of the terms shared by them (sst(ti, tj)). This leads to an interesting comparison between LED and MED: Both approaches only consider the text similarity stf-idf(ti, tj) that is meaningful in event detection; However, while the former relies on fixed temporal and spatial constraints on ti and tj, the latter looks at similar spatiotemporal patterns of the common terms, thus of- fers more flexibility for events of different scales. Finally, we can use our new similarity metric to construct an undirected and weighted graph W2: (cid:26) S2(ti, tj) i (cid:54)= j, i = j, if if (5) W2(i, j) = 0 Multiscale Event Detection in Social Media 11 Based on this similarity graph, we can again apply the Louvain method to detect event clusters. The complete algorithm for the proposed multiscale event detection approach is summarized in Algorithm 2. Algorithm 2 Multiscale Event Detection using Wavelets (MED) 1: Input: T : a set of tweets with temporal, spatial, and text information ∆t: initial temporal resolution ∆d: initial spatial resolution nscale: number of spatial scales 2: For every pair of tweets ti and tj in T , extract the common terms {wi}k 3: For each wi, compute using ∆t the time series of its number of occurrences, that are based on data corresponding to the two geographical cells (defined using ∆d) to which ti and tj belong. 4: Determine using Eq. (3) the temporal scale St using the spatial scale Ss to which the i=1. distance between the two geographical cells corresponds. 5: Apply DWT to the two time series, and compute the similarity between them as the correlation between a specific set of DWT coefficients at the level corresponding to Ss. 6: Compute sst(ti, tj ) as the maximum time series similarity among {wi}k i=1. Compute 7: Apply the non-recursive Louvain method to W2, and retain the meaningful clusters S2(ti, tj ) using Eq. (4), and the adjacency matrix W2 using Eq. (5). {ci}m {ci}m i=1 after post-processing steps. i=1: clusters that correspond to events of different temporal and spatial scales. 8: Output: There are a number of parameters in our multiscale event detection ap- proach. First, the initial resolution parameters ∆t and ∆d are used for con- structing keyword time series; Compared to Tt and Td in LED, they do not have to adapt to the “true” scales of various events, thanks to the scale rela- tionship model and the scale adjustment afterwards using the wavelet-based scheme. In practice, we can simply choose them to be relatively small, for example, as the expected minimum temporal and spatial intervals a desired event may span (specific example choices are presented in Sect. 7). Second, the number of spatial scales nscale can be considered as a choice in the design of the algorithm. Intuitively, an nscale too small would not take full advantage of the spatiotemporal scale relationship model, while nscale being too large might lead to unnecessary increase in computational cost. The choice of this parameter is also influenced by the resolution parameters ∆t and ∆d. One the one hand, ∆d determines the number of geographical cells ld along one dimension hence the spatial variability in the data. This implicitly controls the maximum nscale such that the resulting distance scales are meaningful. On the other hand, given a certain time span of data, the temporal resolution ∆t would determine the length of keyword time series lt, which in turn de- termines the maximum (meaningful) level of DWT computation using a Haar wavelet and hence the maximum temporal scale. Because of the relationship in Eq. (3), the maximum spatial scale is thus determined accordingly. Based on these two observations, we therefore suggest considering (cid:100)min(log2ld, log2lt)(cid:101) as an upper bound for nscale, where (cid:100)·(cid:101) denotes the ceiling of a number. In our 12 Xiaowen Dong et al. experiments, we choose nscale = 4 to ensure a certain level of spatial variability while respecting this upper bound. 5 Spatiotemporal analysis of noise in Twitter One challenge in designing event detection algorithms for Twitter data is that we often need to deal with a large amount of “noise” tweets that do not pro- vide any information regarding real world events. Examples can be tweets such as “Could really use a drink” or “Nachos for lunch”, or discussions between Twitter users about personal matters. We consider these tweets as noise and event detection algorithms should be able to discard them and not allow them to influence the event detection result. In the literature, several works (such as Sakaki et al (2010)) have employed keyword filtering techniques in order to tackle this problem and derived a working set of tweets that contain informa- tion relevant to the types of events they wish to detect. Since we do not focus in this paper on specific event types, but rather on events that take place in specific locations and time intervals, we analyze in this section the spatiotem- poral structure of the noise, namely, the event-irrelevant tweets in the data. This analysis will allow us to define a novel term-filtering procedure, and to evaluate empirically the performance of the event detection algorithms in this paper using simulated noisy data under different space-time parameters. 5.1 Spatial distribution of noise in Twitter data In order to get an intuition about the relevant spatial statistics models that can be useful for analyzing the spatial distribution of the noise, we focus on a set of geo-located tweets collected from a specific day (22-01-2012) in New York City. In this dataset, four of the top-ten frequent terms are: nyc contained in 335 tweets (183 of which are located in middle and lower Manhattan), love contained in 674 tweets (145 of which are located in middle and lower Man- hattan), lol contained in 1080 tweets (110 of which are located in middle and lower Manhattan), and night contained in 355 tweets (97 of which are located in middle and lower Manhattan). These terms, albeit being among the most frequent ones in the daily collection of tweets, do not appear to be relevant to a specific event of interest. In Fig. 5 we illustrate the locations of the tweets (in middle and lower Manhattan) that contain these frequent terms. One can observe that the tweets have a slight, but not strong spatial concentration and appear to be almost randomly distributed within the Manhattan area. Based on these spatial plots we seek the appropriate spatial statistics tools to model these distributions. In the spatial statistics literature (Cressie and Wikle, 2011), the lack of spatial structure is commonly assessed using the concept of Complete Spa- tial Randomness (CSR). CSR considers that the points on a map (locations Multiscale Event Detection in Social Media 13 (a) “nyc” (b) “love” (c) “lol” (d) “night” Fig. 5 Locations of tweets that contain four specific frequent terms. of tweets in our context) follow a homogeneous Poisson point process. This implies that the numbers of tweets in non-overlapping areas in the map are in- dependent and follow a Poisson distribution with some intensity parameter λ. More precisely, if we denote the number of tweets within an area A as N (A), CSR asserts that N (A) follows a Poisson distribution with mean λ · V (A), where V (A) denotes the size of the area A. Intuitively, the CSR property as- serts that points are “randomly” scattered in an area and are not concentrated in specific locations. We consider the task of assessing the levels of noise in Twitter data (with respect to the target event detection task) by testing the CSR property for tweets that contain common terms5. In particular, we initially select a term (say the most frequent term in a collection of tweets) and then we test whether the locations of the tweets that contain this term have the CSR property. In case a term has the CSR property (i.e., the locations of the tweets that contain this term follow a Poisson point process distribution), the edges in the twitter similarity graph that are based on these terms can be considered as noise and may result in the identification of clusters that are not related to events of interest. 5 The direct usage of the CSR tests for the whole input tweet stream would not be particularly informative since both of our algorithms construct a similarity graph between tweets where the edge weights (i.e., the similarities between tweets) are based on the terms that two tweets have in common. In this case, noise or event-irrelevant tweets would affect the construction of the graph only when two “noise” tweets have a term in common (i.e., resulting in the formation of an edge that connects event-irrelevant tweets in the tweet similarity graph). 14 Xiaowen Dong et al. In order to evaluate the CSR property we have employed Ripley’s K- function (Cressie and Wikle, 2011), which is a commonly used measure for assessing the proximity of a spatial distribution to a homogeneous Poisson point process. The sample-based estimate of Ripley’s K-function is defined as N (dij < s)/n2 for a given distance value s, where dij de- (cid:98)K(s) = V (A)(cid:80) i(cid:54)=j notes the Euclidean distance between two sample points i and j (two tweets in our context) in the space, N (dij < s) counts the number of sample pairs that has a distance smaller than s, n is the total number of points, and V (A) is the size of the area A. It is known that, when a spatial Poisson process is homogeneous, the values of the K-function are approximately equal to πs2. Thus, the proximity of (cid:98)K(s) to πs2 can be employed for evaluating how similar use the standardized K-function: (cid:98)L(s) = π − s, and the proximity to a (cid:98)L(s) to 0. homogeneous Poisson process is measured by the proximity of the values of our data distribution is to a homogeneous Poisson process. In this paper, we (cid:113) (cid:98)K(s) We now assess the spatial distribution of the sets of tweets shown in Fig. 5 (tweets containing the terms “nyc”, “love”, “lol” and “night”). Specifically, we illustrate in Fig. 6 the values of their standardized K-function for different values of s (distances) up to 4km, depicted in the black lines. Moreover, we simulate (2000 times) a homogeneous Poisson process and compute the maxi- mum and minimum values for (cid:98)L(s), depicted in the blue and red dashed lines, respectively. We can observe that, the values of (cid:98)L(s) obtained using the loca- values of (cid:98)L(s) obtained from the simulated homogeneous Poisson processes. tions of these tweets are close to, and in several cases within the ranges of, the This indicates that these tweets are slightly more concentrated in space than what a homogeneous Poisson process would produce (possibly due to the dif- ferences in the concentration of twitter users in different areas in middle and lower Manhattan), but their spatial distribution is still close to a homogeneous Poisson process. To further explain what we mean by “still close to a homogeneous Poisson process”, let us consider what appears to be one of the most extreme differences between the spatial distribution of tweets and a homogeneous Poisson process in Fig. 6, which is the value (cid:98)L(s) = 0.19 that is achieved for a distance value s = 1km for the term “nyc”. Based on the number of tweets that contain the term “nyc” on 22-01-2012 (in middle and lower Manhattan), a homogeneous Poisson process would require an intensity parameter λ = 7.93 per square kilometer to generate the same number of tweets. This would mean that on average, the number of tweets per square kilometer that contain the term “nyc” should be 7.93. In our case, the value of (cid:98)L(s) = 0.19 for s = 1km means that, for small distances, the actual concentration of tweets is slightly higher, with an intensity parameter λ = 11.21 per square kilometer. This shows that, even in this worst case, the spatial distribution of tweets is still not far from a homogeneous Poisson process. Multiscale Event Detection in Social Media 15 (a) “nyc” (b) “love” (c) “lol” (d) “night” Fig. 6 Comparison between the sample-based estimates of the standardized K-function for tweets containing the four specific terms, and the max-min values of this function for simulated homogeneous Poisson processes. In order to evaluate whether our observation for the four specific terms holds for a larger tweet collection, we analyze all the geo-located tweets from the New York area for the duration between 01-11-2011 and 01-04-2013. Specif- ically, for each day, we have retrieved the top-ten frequent terms, and for each frequent term we have computed the sample-based estimates of(cid:98)L(s) for s from ues of (cid:98)L(s) only when the number of tweets in middle and lower Manhattan illustrates the mean, the variance and the range of the values of (cid:98)L(s) (around 0.1km to 1.2km, again focusing on the middle and lower Manhattan area. To avoid cases where the number of samples is low, we have computed the val- is larger than 100. The results are presented in the boxplot of Fig. 7, which 5000 values in total, ten for each of the 500 days), for different values of s. As we can see, the boxplot in Fig. 7 illustrates that the most frequent terms in our Twitter data do not have a strong spatial pattern and follow a distribution 16 Xiaowen Dong et al. Fig. 7 Boxplot of the values of the standardized K-function for the most frequent terms. that is close to a homogeneous Poisson process, only exhibiting slightly higher tweet concentrations for small distances. 5.2 Temporal distribution of noise in Twitter data In order to analyze the temporal pattern of the noise in Twitter data, we have assessed whether the distribution of the timestamps of event-irrelevant tweets is close to a uniform distribution. A uniform distribution of the timestamps can serve as a strong indication that these tweets are not relevant to an event that takes place in a confined time interval. In order to test this hypothesis, we have collected the timestamps of the top-ten frequent terms of each day between 01-11-2011 and 01-04-2013. We focus our analysis on a 6-hour interval between 11am and 5pm. For this time interval we tested whether the timestamps of tweets that contain a specific frequent term follow a uniform distribution, using the Chi-squared goodness of fit test. Interestingly, we could reject the null hypothesis that the timestamps are uniformly distributed at a 5% confidence level only in 27% of the cases. This result suggests that a large number of frequent terms in our data does not have a strong temporal pattern. In summary, the spatiotemporal analysis of the distribution of the noise in Twitter data presented in this section allows us to (i) conduct synthetic experiments with simulated noisy data that help us understand the behavior of the event detection algorithms under different space-time parameters, and (ii) consider a term-filtering mechanism that removes tweets that contain the terms with low values for (cid:98)L(s). We will describe both aspects in more details in the next section. Multiscale Event Detection in Social Media 17 6 Synthetic experiments In order to better understand the behavior of the event detection algorithms LED and MED, and the potential influence of the noise in the data, we present in this section experimental results based on synthetic data. Specifi- cally, we generate artificial documents that are considered as “tweets” posted at different time instants and diverse spatial locations. By creating some arti- ficial “events” in this setting, we are able to evaluate quantitatively the per- formances of the proposed methods under different choices for the parameter values. In what follows, we first explain the experimental setup, and then present the event detection results. 6.1 Experimental setup We work with a spatial area of 10 by 10, which are defined by bottom left and top right coordinates (0, 0) and (10, 10) respectively in a 2-D Euclidean space, and a temporal interval of (0, 32) on the real line. We then define events that span different spatial areas and temporal intervals in diverse experimental settings. First, for each event, we choose a number between 3 and 10 uniformly at random as the number of tweets related to that event. These event-relevant tweets are uniformly distributed in the spatial area and temporal interval spanned by that event. We also generate, based on the spatiotemporal analysis presented in Sect. 5, event-irrelevant tweets, namely, noise, which follows a 2-D Poisson point process in the whole spatial area and are distributed uniformly in the whole temporal interval. Next, the content of each tweet is generated as follows. We take geo-located tweets from New York collected on a random day (in this case 21-01-2012) as a reference, and choose 59 terms as event-relevant terms (referred to as signal terms) and consider all the other terms that appear in the tweets on that day as noise (referred to as noise terms). We select the number of terms in each event-relevant tweet uniformly at random between 5 and 10. In particular, in each event-relevant tweet, one term is selected uniformly at random from the 59 signal terms, and the rest are randomly chosen from the noise terms with probabilities that depend on their numbers of occurrences in the actual daily tweets. We also create event-irrelevant tweets, and the number of terms in each event-irrelevant tweet is selected uniformly at random between 3 and 10. The terms in each event-irrelevant tweet are only chosen from the noise terms. We present event detection results in the following scenarios. 6.2 Event detection results in synthetic data 6.2.1 Events concentrated in both time and space without noise In a first scenario, we consider 20 events, each of which is concentrated in a 2 by 2 spatial area and a temporal interval of 2. The spatial and temporal loca- 18 Xiaowen Dong et al. tions are chosen uniformly at random in the whole spatial area and temporal interval. We only consider event-relevant tweets, where the goal is to detect the 20 clusters that correspond to the events by clustering the tweets into dif- ferent subsets. For MED, we focus on terms that appear in at least 3 tweets. We choose nscale = 4 unless its upper bound (cid:100)min(log2ld, log2lt)(cid:101) goes below 4 due to the increase of resolution parameters. In our experiments, we take the same value for the four parameters in the two methods, namely Tt and Td in LED and ∆t and ∆d in MED, and evaluate the clustering performance in terms of Normalized Mutual Information (NMI) and F-measure (Manning et al, 2008). The F-measure is computed using a choice of β = 2 meaning that it is slightly in favor of recall6, as we consider that it is more important to ensure that tweets related to the same event are grouped into one cluster. The results obtained by averaging 10 test runs are shown in Fig. 8. As we can see, in terms of both evaluation criteria, the performance of LED with small values of the thresholds Tt and Td is not satisfactory as it is not able to capture the links between all the tweets within the same event. However, the performance increases noticeably as the temporal and spatial thresholds are chosen to be close to or larger than the “true” scales of the events (2 in this case for both time and space). When the thresholds get too large, the performance drops slightly, as the chance of grouping two different events together in one cluster increases. Compared to LED, MED achieves much better performance even when the resolution parameters ∆t and ∆d are small. The reason is that, even at very fine initial resolutions, the wavelet-based representation in MED is able to aggregate the time series appropriately such that the similarity of the time series is actually computed at a coarser scale. This suggests that MED is better at capturing the links between tweets corresponding to the same event, even with suboptimal choices for the value of the parameters. Therefore, the performance of MED is much less sensitive to parameter selection than that of LED. 6.2.2 Events concentrated in only one dimension without noise We now consider events that are not necessarily concentrated in both time and space but only in one of the two dimensions. Specifically, we consider 20 events, where 10 of them are concentrated in a temporal interval of length between 1 to 2 but spread in a spatial area with a size from 8 by 8 to 16 by 16. The other 10 events are concentrated in a spatial area with a size from 1 by 1 to 2 by 2 but spread in a temporal interval of length between 8 to 16. We still consider a noise-free scenario as in the previous experiment. The clustering results are shown in Fig. 9. We see that, while MED can handle the scale changes in this scenario with a performance that remains comparable to that in the previous experiment, the performance of LED drops significantly. Specifically, due to the lack of a single temporal and spatial scale for all the events, LED only performs reasonably well when the threshold values for Tt 6 F-measure is computed as (1 + β2) · Precision·Recall (β2·Precision)+Recall . Multiscale Event Detection in Social Media 19 (a) (b) Fig. 8 Clustering performance in terms of (a) NMI and (b) F-measure, on events concen- trated in both time and space without noise. (a) (b) Fig. 9 Clustering performance in terms of (a) NMI and (b) F-measure, on events concen- trated in only one dimension without noise. and Td are large enough to cover the scales of all the events. This experiment highlights the advantage of MED in handling events of different scales and in the absence of simultaneous temporal and spatial localization. 6.2.3 Events concentrated in both time and space with noise We now move to noisy scenarios where we also consider event-irrelevant tweets in addition to event-relevant tweets. Specifically, we generate event-irrelevant tweets that follow a 2-D Poisson point process with an intensity parameter λ = 10 within the whole spatial area of 10 by 10. This generates around 1000 noise tweets in addition to the tweets that correspond to 20 events generated as in Sect. 6.2.1. The goal is to detect the events by applying clustering to all the tweets in the dataset. To measure the clustering quality, we define the groundtruth to be a combination of 20 event clusters and noise clusters where each noise tweet is considered as a single cluster. The reason for this setting is that we wish to group tweets that correspond to the same event, and at the same time we want to ensure that the noise tweets remain as separated as possible. Based on the analysis in Sect. 5, for MED, we propose to evaluate 20 Xiaowen Dong et al. the values of the standardized K-function (cid:98)L(s) for all the terms that appear that have an average(cid:98)L(s) value no smaller than 1 as valid terms for generating in at least 3 tweets for s chosen to be 0.5, 1, 1.5 and 2, and only consider terms keyword time series. The clustering results are shown in Fig. 10. In the noisy scenario, we see that the NMI and F-measure curves show different trends. Specifically, with small values for the threshold or resolution parameters, the number of links between tweets created by both methods is small, and most of the noise clusters remain well-separated. When the parameter values increase, noise tweets starting forming more links to event-relevant tweets as well as to themselves, which penalizes the clustering. Therefore, we see that the NMI curves show an almost monotonically decreasing trend as the parameter val- ues increase. In contrast, the F-measure is a weighted combination of precision and recall, which penalizes both false positives and false negatives. Therefore, for both methods, we see that the F-measure curves initially increase as the parameter values increase (where the number of false negatives generally de- creases), and decrease as these parameters become large (where the number of false positives increases). We now compare the performance of LED and MED in the same experi- ment. For NMI, we see that the performance of LED drops significantly when the thresholds exceed the “true” scales of the events, as large thresholds in LED tend to increase the number of event-relevant and noise tweets that are linked to each others. In comparison, the performance of MED is relatively more stable, which is partly due to the term-filtering procedure employed. Similarly, we see that MED outperforms LED for a large range of parameter values in terms of the F-measure. In addition, the performance of MED is again more stable in the sense that it peaks at a wider range of parameter values, while LED only performs well when the threshold values are chosen at the “true” event scales. 6.2.4 Events concentrated in only one dimension with noise Finally, we show in Fig. 11 the experimental results in a noisy scenario where the events are concentrated either in time or space as defined in Sect. 6.2.2. While the NMI curves are similar to those in Fig. 10, the F-measure curves show that the performance of both methods drops significantly in this challeng- ing scenario. Still, MED outperforms LED in terms of both peak performance and stability. 6.2.5 Influence of parameter settings We now take a closer look at the parameter settings for the synthetic experi- ments. Especially, we investigate how the length of the temporal interval, the size of the spatial area, and the number of signal terms in each event-relevant tweet, influence the performance of both algorithms in terms of the F-measure in the scenario of Sect. 6.2.4, that is, the performance curve in Fig. 11(b)). Multiscale Event Detection in Social Media 21 (a) (b) Fig. 10 Clustering performance in terms of (a) NMI and (b) F-measure, on events concen- trated in both time and space with noise. (a) (b) Fig. 11 Clustering performance in terms of (a) NMI and (b) F-measure, on events concen- trated in only one dimension with noise. First, given a fixed parameter for the Poisson point process and fixed spatial area of 10 by 10, the total number of noise tweets remains the same. In this case, we observe that the performance of both algorithms has improved when the temporal interval increases from 32 to 128 (Fig. 12(a)), due to decreased noise density in the temporal dimension hence a higher signal-to-noise-ratio. Such a gain is more dramatic for LED especially at large parameter values, in which case the performance of this approach is more sensitive to the density of the noisy information. Second, given a fixed temporal interval of 32, as the spatial area increases from 10 by 10 to 16 by 16, the total number of noise tweets increases quadrat- ically. In this case, we see from Fig. 12(b) that the performance of both algo- rithms decreases mainly because of that, as the total number of noise tweets increases, generally more links are formed between noise tweets. Finally, we have investigated the influence of the number of signal terms in each event-relevant tweet on the performance of the algorithms. Specifically, we increase the number of signal terms from 1 to 3 in each event-relevant tweet and repeat the same experiments. We have observed performance gain 22 Xiaowen Dong et al. (a) (b) (c) Fig. 12 Clustering performance in terms of F-measure on events concentrated in only one dimension with noise. (a) The same setting as Sect. 6.2.4. but with a temporal interval of 128. (b) The same setting as Sect. 6.2.4. but with a spatial area of 16 by 16. (c) The same setting as Sect. 6.2.4. but with 3 signal terms in each event-relevant tweet. in Fig. 12(c) for both algorithms which matches the intuition that a higher signal-to-noise-ratio generally leads to better performance. In summary, the synthetic experiments suggest that LED is efficient at detecting events that are concentrated in both time and space, provided that these events are of similar scales and that the correct temporal and spatial thresholds are chosen in the algorithm. In comparison, although we employed a term-filtering procedure in MED in the noisy scenarios, the results on syn- thetic data generally suggest that MED is better than LED at detecting events of different scales and in the absence of simultaneous temporal and spatial localization. MED is also less sensitive to parameter selection and leads to more robust and stable event detection performance. 7 Real world experiments We now test the performance of LED and MED in real world event detection tasks. We focus in this section on the comparison between these two event detection methods, since (i) such a comparison would highlight the difference between LED and MED in detecting real world events of various temporal and spatial scales, and (ii) to the best of our knowledge, there is no other multiscale method in the literature that is dedicated to event detection. We first describe the data and some implementation details, and then present the event detection results. Finally, we discuss about the scalability of the proposed algorithm. 7.1 Data description We have collected geotagged public tweets in the New York area, which cor- responds to a geographical bounding box with bottom left GPS coordinates pair (40.4957, -74.2557) and top right coordinates pair (40.9176, -73.6895), from November 2011 to March 2013. The streams of public tweets are re- trieved using Twitter’s official Streaming API with the “locations” request Multiscale Event Detection in Social Media 23 parameter7. After the initial retrieval, we filter out those tweets that have no geotags or have geotags outside the predefined bounding box. This results in 16449769 geotagged tweets in total. As a pre-processing step, we remove those tweets that contain a clear location indicator, such as the ones corresponding to Foursquare check-ins, which we do not consider as events of interest. 7.2 Implementation details We implement both event detection algorithms LED and MED on a daily basis, that is, we aim at detecting events from each day. The tf-idf weight- ing scheme in the vector space model is implemented using the Text to Ma- trix Generator (TMG) MATLAB toolbox (Zeimpekis and Gallopoulos, 2006), where we also remove a list of stop words provided by the toolbox (with an additional one “http”), and set the minimum and maximum length of a valid term to be 3 and 30. For LED, we use a temporal threshold of Tt = 30 minutes and spatial threshold of Td ≈ 100 meters (difference of 0.001 in latitude or 0.0015 in longitude) in Eq. (1) for the detection of local event clusters. For MED, we focus on terms that appear in at least 5 tweets. We evaluate the values of the standardized K-function (cid:98)L(s) for all these terms with s chosen to be 0.2, 0.4, 0.6, 0.8 and 1, and only consider those that have an average (cid:98)L(s) value no smaller than 0.5 as valid terms for generating keyword time series. The initial temporal and spatial resolutions in MED are set to ∆t = 30 minutes and ∆d = 100 meters, and the number of spatial scales is set to nscales = 4. Once the clusters are obtained by both methods, we perform simple post-processing steps that (i) remove clusters that contain less than 3 tweets or less than 3 distinct users, so that each event would contain sufficient information from sufficient number of observes, and (ii) remove clusters in which more than 50% of the tweets comes from a single user, so that the information source is sufficiently diverse, and finally (iii) remove clusters that correspond to job advertisements and traffic alerts posted by bots. While there is no general rule for such post-processing, we found these steps practical to remove clusters that are not meaningful and correspond to noisy information. 7.3 Event detection results We now analyze the clustering results for both LED and MED algorithms. First of all, the clusters detected by LED do correspond to meaningful real world events of interest. For example, Table 1 shows some example local clus- ters obtained that correspond to several protests during the Occupy Wall Street (OWS) movement8 in New York City. To understand better the be- havior of LED, we take 2011-11-17 as an example date, when many OWS 7 https://dev.twitter.com/streaming/overview/request-parameters#locations 8 http://en.wikipedia.org/wiki/Occupy_Wall_Street 24 Xiaowen Dong et al. Table 1 Example local clusters detected by LED that correspond to protests in the OWS movement. protests took place. We first show in Fig. 13 all the 41 local event clusters detected on this date in middle and lower Manhattan, where different clusters are shown in different colors. Detailed information about the top 20 clusters are further shown in Table 2, where the six columns correspond to cluster id, median timestamp (GMT+0) of all the tweets in the cluster, minimal time interval (in seconds) that covers 80% of the tweets, mean latitude and lon- gitude of the tweets, and (up to 10) top terms contained in the cluster. As we can see in Fig. 13 and in the third column of Table 2, all the clusters are highly localized in both time and space. In addition, due to the strict temporal and spatial constraints used by LED (see Eq. (1)), for the same event we get separate clusters, which correspond to different timestamps (such as clusters 2 and 5 that talk about protests at Zuccotti Park) or different locations (such as clusters 3 and 13 that talk about protests at Union Square). Ideally, we would like some of these separated clusters to be grouped together if they are related to the same real world event. We now present the event detection results on data from the same date using MED. Table 3 summarizes the top 10 clusters detected by MED, four of which are visualized on the map in Fig. 14. From Fig. 14 and the third column of Table 3, we see that MED is able to detect events that spread in much larger spatial areas or longer time intervals than LED. Specifically, we see in Fig. 14(a) and Fig. 14(b) two clusters related to OWS protests at Zuccotti Park (cluster 1), and Union Square and Foley Square (cluster 2), respectively, both of which span rather long time intervals. Moreover, although most of the tweets in the two clusters are mainly posted from locations where the protests took place, there also exist tweets in the clusters that mention Multiscale Event Detection in Social Media 25 Fig. 13 Local event clusters detected by LED on 2011-11-17. The colors represent cluster ids. the same events but have been posted at quite distant locations. In Fig. 14(c) and Fig. 14(d), we see two clusters corresponding to the Raise Cache tech event (cluster 5) and the Mastercard free lunch promotion event (cluster 9), respectively, both of which are more concentrated in time but spread in space (with a few outliers in the latter case). Although there exists certain amount of noise tweets in the detected clusters, these examples demonstrate that MED is able to detect events that concentrate only in time or space, many of which are of different scales. In comparison, LED is not able to detect such event clusters. Specifically, LED produced many separated clusters for OWS protests, two separated clusters with some missing tweets for the Raise Cache tech event, and missed completely the Mastercard promotion event due to the lack of a group of tweets that are concentrated in both time and space. Finally, we notice that even in the results obtained by MED there some- times exists more than one cluster about the same event, for example, in Ta- ble 3 there are two clusters detected for both the OWS protests (clusters 1 and 2) and the Katy Perry concert (clusters 3 and 4). First, the protests at Zuccotti 26 Xiaowen Dong et al. Table 2 Detailed information about the top 20 local event clusters detected by LED on 2011-11-17. The six columns from the left to the right correspond to cluster id, median timestamp (GMT+0) of all the tweets in the cluster, minimal time interval (in seconds) that covers 80% of the tweets, mean latitude and longitude of the tweets, and (up to 10) top terms contained in the cluster. Table 3 Detailed information about the top 10 event clusters detected by MED on 2011- 11-17. The six columns from the left to the right correspond to cluster id, median timestamp (GMT+0) of all the tweets in the cluster, minimal time interval (in seconds) that covers 80% of the tweets, mean latitude and longitude of the tweets, and (up to 10) top terms contained in the cluster. Park took place from the morning to noon, while the protests at Union Square and Foley Square happened in the afternoon after 3pm. Although there indeed exist semantic links between tweets that correspond to these two events, the rather different locations and timestamps lead to separate clusters. Second, for the Katy Perry concert, the two clusters highly overlap in both time and space, and the tweets in one cluster have quite strong links to those in the other one. In this case, clusters have been separated mainly because of the strong pat- terns present in the texts: While in cluster 3 the concert is described mostly using a single term “katyperry”, in cluster 4 we see two separate terms “katy” and “perry”. Multiscale Event Detection in Social Media 27 (a) (b) (c) (d) Fig. 14 Example event clusters detected by MED on 2011-11-17: (a) OWS protests at Zuccotti Park (cluster 1). (b) OWS protests at Union Square and Foley Square (cluster 2). (c) Raise Cache (cluster 5). (d) Mastercard free lunch promotion (cluster 9). 7.4 Scalability The computational complexity of both LED and MED mainly depend on (i) the construction of a similarity graph, and (ii) the graph-based clustering process. As we mentioned before, the Louvain method used in the cluster- ing process is empirically observed to be able to scale to large scale graphs. Therefore, we mainly discuss the computational cost of constructing similarity graphs in the two algorithms. For both LED and MED, the construction of a similarity graph can be performed efficiently because the similarities need to be computed only for pairs of tweets that have common terms. Thus, the computational complexity of the similarity graph construction, using an appropriate index structure (such as an inverted index), can be O(n × avg connectivity), where n is the total number of tweets and avg connectivity denotes, given a tweet t, the average number of tweets in the dataset with non-zero similarity with t. In our real world experiment, avg connectivity corresponds to only 2% of the total number of tweets. In addition, avg connectivity can be further reduced by the term-filtering procedure that is employed in MED for noise-filtering. Since term-filtering is applied to the most popular (frequent) terms, this can substantially affect 28 Xiaowen Dong et al. avg connectivity. In our experiment, for example, after the filtering procedure avg connectivity is further reduced by more than 40% compared to LED. Moreover, the filtering procedure potentially represents a tradeoff between the performance of the algorithm and its computational complexity. A more aggressive filtering can largely attenuate the influence of noisy information and at the same time reduce the computational cost. However, it might also filter out terms that are related to some relatively small-scaled events. For MED, we need to compute the spatiotemporal similarity of time series for the valid terms (after term-filtering) shared by every pair of tweets. How- ever, since the spatiotemporal similarity is defined between time series that come from different geographical cells, we only need to evaluate, for each valid term, the pairwise similarity between time series from different cells, instead of comparing every pair of different tweets containing that term. This keeps the number of DWT computations needed relatively low due to the small number of geographical cells. Practically, for the daily Twitter stream with geotag in the middle and lower Manhattan area of New York City that we have considered in the ex- periment (∼8000 geotagged tweets with 36000 terms in total), it takes only a few seconds to finish the construction of the similarity graph in LED. For the implementation of MED, it takes roughly 5 minutes for our MATLAB code to create the similarity graph on a lab server with average computing power or 8 minutes on a mid-2009 MacBook Pro (both single core process), where the main computational cost is due to the DWT computations. While we consider this computation time reasonable given the benefits of the algo- rithm, we certainly hope to further improve the scalability of our algorithm in future work. 8 Related work Social media data have become pervasive due to the fast development of online social networks since the last decade. This has given rise to a series of interest- ing research problems such as event detection based on user-generated content (Sayyadi et al, 2009; Becker et al, 2009; Aggarwal and Subbian, 2012). As an example, Chen and Roy (2009) and Papadopoulos et al (2011) have proposed to detect social events using tagged photos in Flickr. A more popular platform is Twitter, which has attracted a significant amount of interest due to the rich user-generated text data that can be used for event detection (Atefeh and Khreich, 2013). Early works in the field have focused on more specific types of events, such as news (Sankaranarayanan et al, 2009) and earthquakes (Sakaki et al, 2010), while recent approaches detect various types of events (Petrovic et al, 2010; Marcus et al, 2011; Becker et al, 2011; Ozdikis et al, 2012; Li et al, 2012a; Parikh and Karlapalem, 2013; Berlingerio et al, 2013). Although the specific techniques presented in the state-of-the-art event detection approaches may vary from a technical point of view, many of them rely on the detection of certain behaviors in the Twitter stream such as the burstiness of certain Multiscale Event Detection in Social Media 29 keywords, which indicates the emergence of particular events. In particular, several works use wavelets, which is a well-developed tool in signal process- ing, for event detection based on keyword burstiness patterns (Weng and Lee, 2011; Cordeiro, 2012). Recently, there has been an increasing amount of interest in exploring both the temporal and spatial dimensions to better capture the meaningful informa- tion and reduce noise in the data from social media platforms. In Rattenbury et al (2007), the authors have proposed to analyze for event extraction the semantics of tags associated with the Flickr photos, by taking into account multiple temporal and spatial resolutions. In Chen and Roy (2009), the au- thors have proposed to cluster Flickr photos based on both the temporal and the spatial distributions of the photo tags using wavelets. In Becker et al (2010), the authors have considered combining text, temporal and spatial fea- tures in order to build an appropriate tweet similarity measure. In Lappas et al (2012), the authors have proposed two approaches to detect burstiness of keywords in both temporal and spatial dimensions simultaneously. In Sugitani et al (2013), the authors have proposed a hierarchical clustering procedure for event detection in Twitter, where both temporal and spatial constraints have been imposed to measure the similarities of tweets. They have also proposed to examine co-occurrences of keywords that present specific spatiotemporal pat- terns. Other examples include Lee et al (2011); Li et al (2012b); Thom et al (2012); Walther and Kaisser (2013) and Zaharieva et al (2013), where the au- thors have proposed spatiotemporal clustering methods for anomaly and event detection in Twitter and Flickr, respectively. These approaches are certainly inspirational to the idea proposed in the present paper; However, most of them do not explicitly handle multiple spatiotemporal scales in event detection. Finally, there are a few approaches in the literature that have studied the influence of different resolutions for temporal and spatial analysis in event de- tection. For example, in Cooper et al (2005) and Rattenbury et al (2007), the authors have proposed to use a scale-space analysis of the data (Witkin, 1983). The common objective in these approaches is to select the most appropriate scale for event extraction and detection. More generally, multiscale or mul- tiresolution clustering algorithms has been of interest in the machine learning, pattern recognition, and physics (Ronhovde et al, 2011, 2012) communities since the last decade. The approaches that take advantage of the properties of the wavelet transform to enable a multiresolution interpretation in the cluster- ing process, such as the works in Sheikholeslami et al (2000) and Tremblay and Borgnat (2012), are of particular interest. Although these approaches are not originally proposed for event detection in social media platforms, they have inspired us to consider wavelets in our framework. While they output multi- ple sets of clustering solutions at different resolutions, our approach however uses wavelets to choose the appropriate temporal and spatial resolutions for constructing a single data similarity graph. In summary, although there exist many approaches that take into account the temporal and spatial dimensions of the social media data for event detec- tion, they generally do not explicitly handle different scales in data analysis. 30 Xiaowen Dong et al. In contrast, our framework explicitly handles multiple spatiotemporal scales, which we believe is essential for building an efficient and generic event detec- tion approach. Different scales in the temporal and spatial dimensions have been treated separately in most of the state-of-the-art analyses, but the rela- tionship and interaction between these scales have been largely overlooked in the literature. To the best of our knowledge, our approach is the first attempt that is based on an explicit modeling of the relationship between different tem- poral and spatial resolutions. Finally, we present a statistical analysis of the temporal and spatial distributions of noisy information in the Twitter data, which we believe is the first of its kind. We believe our perspective contributes to the research in the field of social media analytics and provides new insights into the design of novel clustering and event detection algorithms. 9 Conclusion In this paper, we have proposed a novel approach towards multiscale event de- tection in social media. Especially, we have shown that it is important to under- stand and model the relationship between the temporal and spatial scales, so that events of different scales can be separated simultaneously and in a mean- ingful way. Furthermore, we have presented statistical modeling and analysis about the spatiotemporal distributions of noisy information in the Twitter stream, which not only helps us define a novel term-filtering procedure for the proposed approach, but also provides new insights into the understanding of the influence of noise in the design of event detection algorithms. Future directions include (i) further investigation of the possibility of extending and generalizing the proposed scale relationship model to handle temporal and spatial scales simutaneously for multiscale event detection, (ii) more appro- priate and accurate statistical models for analyzing noisy information present in social media data, and (iii) improvement on the scalability of the proposed algorithms. References Aggarwal CC, Subbian K (2012) Event Detection in Social Streams. In: SIAM International Conference on Data Mining (SDM), Anaheim, CA Atefeh F, Khreich W (2013) A Survey of Techniques for Event Detection in Twitter. Computational Intelligence Becker H, Naaman M, Gravano L (2009) Event Identification in Social Me- dia. In: ACM SIGMOD Workshop on the Web and Databases (WebDB), Providence, RI Becker H, Naaman M, Gravano L (2010) Learning Similarity Metrics for Event Identification in Social Media. In: The Third ACM International Conference on Web Search and Data Mining (WSDM), New York City, NY Multiscale Event Detection in Social Media 31 Becker H, Naaman M, Gravano L (2011) Beyond Trending Topics: Real-World Event Identification on Twitter. In: The Fifth International AAAI Confer- ence on Weblogs and Social Media (ICWSM), Barcelona Berlingerio M, Calabrese F, Lorenzo GD, Dong X, Gkoufas Y, Mavroeidis D (2013) SaferCity: a System for Detecting and Analyzing Incidents from Social Media. In: IEEE International Conference on Data Mining (ICDM), Dallas, TX Blondel VD, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment (10):P10,008 (12pp) Chen L, Roy A (2009) Event Detection from Flickr Data through Wavelet- Based Spatial Analysis. In: The 18th ACM Conference on Information and Knowledge Management (CIKM), Hong Kong Cooper M, Foote J, Girgensohn A, Wilcox L (2005) Temporal Event Clustering for Digital Photo Collections. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) 1(3):269–288 Cordeiro M (2012) Twitter Event Detection: Combining Wavelet Analysis and Topic Inference Summarization. In: Doctoral Symposium on Informatics Engineering, Porto Cressie N, Wikle CK (2011) Statistics for Spatio-Temporal Data (Wiley Series in Probability and Statistics). Wiley Daubechies I (1992) Ten Lectures on Wavelets. SIAM Lappas T, Vieira MR, Gunopulos D, Tsotras VJ (2012) On the Spatiotemporal Burstiness of Terms. In: The 38th International Conference on Very Large Databases, Istanbul Lee CH, Yang HC, Chien TF, Wen WS (2011) A Novel Approach for Event Detection by Mining Spatio-temporal Information on Microblogs. In: Inter- national Conference on Advances in Social Networks Analysis and Mining (ASONAM), Kaohsiung Li C, Sun A, Datta A (2012a) Twevent: Segment-based Event Detection from Tweets. In: The 21st ACM International Conference on Information and Knowledge Management (CIKM), Maui, HI Li R, Lei KH, Khadiwala R, Chang KCC (2012b) TEDAS: A Twitter-based Event Detection and Analysis System. In: The 28th IEEE International Conference on Data Engineering (ICDE), Washington, DC von Luxburg U (2007) A Tutorial on Spectral Clustering. Statistics and Com- puting 17(4):395–416 Manning CD, Raghavan P, Schutze H (2008) Introduction to Information Re- trieval. Cambridge University Press Marcus A, Bernstein MS, Badar O, Karger DR, Madden S, Miller RC (2011) Twitinfo: Aggregating and Visualizing Microblogs for Event Exploration. In: ACM CHI Conference on Human Factors in Computing Systems, Vancouver Newman MEJ (2006) Modularity and community structure in networks. Pro- ceedings of the National Academy of Sciences of the USA 103(23):8577–8582 Ozdikis O, Senkul P, Oguztuzun H (2012) Semantic Expansion of Hashtags for Enhanced Event Detection in Twitter. In: The First International Workshop 32 Xiaowen Dong et al. on Online Social Systems (WOSS), Istanbul Papadopoulos S, Zigkolis C, Kompatsiaris Y, Vakali A (2011) Cluster-Based Landmark and Event Detection for Tagged Photo Collections. IEEE Multi- Media 18(1):52–63 Parikh R, Karlapalem K (2013) ET: Events from Tweets. In: The 22nd Inter- national Conference on World Wide Web (WWW), Rio de Janeiro Petrovic S, Osborne M, Lavrenko V (2010) Streaming First Story Detection with application to Twitter. In: The 11th Annual Conference of the North American Chapter of the Association for Computational Linguistics, Los Angeles, CA Rattenbury T, Good N, Naaman M (2007) Towards Automatic Extraction of Event and Place Semantics from Flickr Tags. In: ACM SIGIR Conference on Research and Development on Information Retrieval, Amsterdam Reuter T, Papadopoulos S, Petkos G, Mezaris V, Kompatsiaris Y, Cimiano P, de Vries C, Geva S (2013) Social Event Detection at MediaEval 2013: Chal- lenges, Datasets, and Evaluation. In: MediaEval Benchmarking Initiative for Multimedia Evaluation (MediaEval) 2013 Workshop, Barcelona Ronhovde P, Chakrabarty S, Hu D, Sahu M, Sahu KK, Kelton KF, Mauro NA, Nussinov Z (2011) Detecting hidden spatial and spatio-temporal struc- tures in glasses and complex physical systems by multiresolution network clustering. The European Physical Journal E 34:105 Ronhovde P, Chakrabarty S, Hu D, Sahu M, Sahu KK, Kelton KF, Mauro NA, Nussinov Z (2012) Detection of hidden structures for arbitrary scales in complex physical systems. Scientific Reports 2:329 Sakaki T, Okazaki M, Matsuo Y (2010) Earthquake Shakes Twitter Users: Real-time Event Detection by Social Sensors. In: The 19th International Conference on World Wide Web (WWW), Raleigh, NC Sankaranarayanan J, Samet H, Teitler BE, Lieberman MD, Sperling J (2009) TwitterStand: News in Tweets. In: The 17th ACM SIGSPATIAL Interna- tional Conference on Advances in Geographic Information Systems, Seattle, WA Sayyadi H, Hurst M, Maykov A (2009) Event Detection and Tracking in Social Streams. In: The Third International AAAI Conference on Weblogs and Social Media (ICWSM), San Jose, CA Sheikholeslami G, Chatterjee S, Zhang A (2000) WaveCluster: A Multi- Resolution Clustering Approach for Very Large Spatial Databases. The In- ternational Journal on Very Large Data Bases 8(3-4):289–304 Sugitani T, Shirakawa M, Hara T, Nishio S (2013) Detecting Local Events by Analyzing Spatiotemporal Locality of Tweets. In: The 27th International Conference on Advanced Information Networking and Applications Work- shops (WAINA), Barcelona Thom D, Bosch H, Koch S, Woerner M, Ertl T (2012) Spatiotemporal Anomaly Detection through Visual Analysis of Geolocated Twitter Mes- sages. In: 2012 IEEE Pacific Visualization Symposium (PacificVis), Songdo Tremblay N, Borgnat P (2012) Multiscale Community Mining in Networks Using Spectral Graph Wavelets. arXiv:12120689 Multiscale Event Detection in Social Media 33 Walther M, Kaisser M (2013) Geo-spatial Event Detection in the Twit- ter Stream. In: The 35th European Conference on Information Retrieval (ECIR), Moscow Weng J, Lee BS (2011) Event Detection in Twitter. In: The Fifth International AAAI Conference on Weblogs and Social Media (ICWSM), Barcelona Witkin A (1983) Scale Space Filtering. In: International Joint Conference on Artificial Intelligence (IJCAI), Karlsruhe Zaharieva M, Zeppelzauer M, Breiteneder C (2013) Automated Social Event Detection in Large Photo Collections. In: ACM International Conference on Multimedia Retrieval, Dallas, TX Zeimpekis D, Gallopoulos E (2006) TMG: A MATLAB Toolbox for Generating Term-Document Matrices from Text Collections. In “Grouping Multidimen- sional Data: Recent Advances in Clustering”, J Kogan, C Nicholas and M Teboulle, eds pp 187–210
1605.04374
1
1605
2016-05-14T04:01:49
Online learning for Social Spammer Detection on Twitter
[ "cs.SI" ]
Social networking services like Twitter have been playing an import role in people's daily life since it supports new ways of communicating effectively and sharing information. The advantages of these social network services enable them rapidly growing. However, the rise of social network services is leading to the increase of unwanted, disruptive information from spammers, malware discriminators, and other content polluters. Negative effects of social spammers do not only annoy users, but also lead to financial loss and privacy issues. There are two main challenges of spammer detection on Twitter. Firstly, the data of social network scale with a huge volume of streaming social data. Secondly, spammers continually change their spamming strategy such as changing content patterns or trying to gain social influence, disguise themselves as far as possible. With those challenges, it is hard to directly apply traditional batch learning methods to quickly adapt newly spamming pattern in the high-volume and real-time social media data. We need an anti-spammer system to be able to adjust the learning model when getting a label feedback. Moreover, the data on social media may be unbounded. Then, the system must allow update efficiency model in both computation and memory requirements. Online learning is an ideal solution for this problem. These methods incrementally adapt the learning model with every single feedback and adjust to the changing patterns of spammers overtime. Our experiments demonstrate that an anti-spam system based on online learning approach is efficient in fast changing of spammers comparing with batch learning methods. We also attempt to find the optimal online learning method and study the effectiveness of various feature sets on these online learning methods.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) Online Learning for Social Spammer Detection on Twitter Phuc Tri Nguyen · Hideaki Takeda 6 1 0 2 y a M 4 1 ] I S . s c [ 1 v 4 7 3 4 0 . 5 0 6 1 : v i X r a Received: date / Accepted: date Abstract Social networking services like Twitter have been playing an import role in people's daily life since it supports new ways of communicating effectively and sharing information. The advantages of these social net- work services enable them rapidly growing. However, the rise of social network services is leading to the in- crease of unwanted, disruptive information from spam- mers, malware discriminators, and other content pol- luters. Negative effects of social spammers do not only annoy users, but also lead to financial loss and privacy issues. There are two main challenges of spammer detec- tion on Twitter. Firstly, the data of social network scale with a huge volume of streaming social data. Secondly, spammers continually change their spamming strategy such as changing content patterns or trying to gain so- cial influence, disguise themselves as far as possible. With those challenges, it is hard to directly apply tra- ditional batch learning methods to quickly adapt newly spamming pattern in the high-volume and real-time so- cial media data. We need an anti-spammer system to be able to adjust the learning model when getting a la- bel feedback. Moreover, the data on social media may be unbounded. Then, the system must allow update efficiency model in both computation and memory re- quirements. Online learning is an ideal solution for this problem. These methods incrementally adapt the learn- ing model with every single feedback and adjust to the changing patterns of spammers overtime. Our experi- Phuc Tri Nguyen University of Information Technology, Ho Chi Minh, Vietnam E-mail: [email protected] Hideaki Takeda National Institute of Informatics Tokyo, Japan E-mail: [email protected] ments demonstrate that an anti-spam system based on online learning approach is efficient in fast changing of spammers comparing with batch learning methods. We also attempt to find the optimal online learning method and study the effectiveness of various feature sets on these online learning methods. Keywords Social spammer detection · Online learning · Twitter 1 Introduction Social network services like Twitter have been played a major role in people's daily life. It offers a convenient and efficient way to communicate and disseminate in- formation. Individuals use Twitter to tweet anything about their concern such as news, jokes, or even their feeling. Companies and organizations use Twitter as an effective channel to connect with their customers, promote or sell their products. With these advantages, Twitter has been increasingly used for large-scale in- formation dissemination in various fields of human life such as marketing, journalism or public relations. Nevertheless, the popularity of Twitter has led to the rise of unwanted, disruptive information from social spammers. Twitter spammers (Wikipedia, 2016) are de- fined as malicious users who try to gain social influence and generate spamming contents which negatively im- pact on legitimate users. Spammers are motivated to launch various of attacks such as stealing personal in- formation of users (Bilge et al, 2009), spreading viruses, malware (Grier et al, 2010), phishing attacks, or com- promise suspicious fake followers. Social spammers do not only annoy users, but also lead to financial loss and 2 Phuc Tri Nguyen, Hideaki Takeda privacy issues of users. Therefore, the problem of so- cial spamming is a serious issue prevalent on Twitter. Characterizing and detecting social spammers can keep Twitter as a spam-free environment and improve the quality of user experiences. There are two main challenges of spammer detection on Twitter. 1. The first challenge is how to process an enormous amount of Twitter data. Today, Twitter services handle more than 2.8 billion requests and store 4.5 petabytes of time series data every minutes (Twit- ter, 2016). We need an approach that can be able to scale up to handle a huge volume of data with limited computation capacity. 2. Fast change of spamming patterns is the second challenge. The social spammer detection usually seems like a endless game between spammers and anti- spam systems. Spammers continually change their spamming strategy to fool the anti-spam systems. An approach that can be able to adapt to the com- plex, and fast changing of data is needed. There were some previous studies on the Twitter spam- mer detection for years. Their approaches address this problem as the task of classifying a Twitter user into a spammer or a legitimate user. By analytic the spam- mers behaviors, they proposed effective features which related to content-based and network-based of users and then built a traditional batch learning model to detect spammers for future data. However, such batch learning models are less efficient due to rapid changing and quick evolution of spammers. Moreover, because of limited resources, it is very expensive if we gather all spamming patterns from batches to train the learning model. One efficient approach for the fast evolve and large- scale of social spammer detection on Twitter is online learning. The online learning method continually up- dates the existing model while data arrives, as opposed to batch learning techniques which learn from the en- tire data. In this paper, we study how to apply online learning on the social spammer detection on Twitter. Our experiment on Honey Pot dataset (Lee et al, 2011) and 1KS-10KN (Yang et al, 2012) dataset indicate the effectiveness of the online learning approach for this problem. The main contributions of our work are outlined as fol- lows: 1. Successfully apply online learning for the problem of social spammer detection on Twitter. Our ex- periments show that online learning approaches ef- ficiently reflect with the fast changing of data. 2. Find an optimal online learning method for social spammer detection on Twitter. We evaluated 16 on- line learning algorithms and find the Soft Confident- Weight algorithm achieves the best performance. 3. Evaluate the effectiveness of four different feature sets when applying online learning on this problem. The best result was observed by the combination of 2 sets of user network features and user activities features. This results indicated that user profile fea- tures and user content features are less robust than user network features and user activities features. The remaining of this report is organized as follows. In the next section, we will present a brief overview of related works on spammer detection. A description of the methodology applied will be described in Section 3. Then an experimental study showing the effectiveness of online learning is presented in Section 4. Finally, we conclude and discuss future work in Section 5. 2 Related Works 2.1 Spammer detection in other platforms Spammers have been around us since the beginning of the electronic communication and adapted through the development of technology. Spam detection problem is a serious issue, and it has been studied for years on various platforms such as SMS (G´omez Hidalgo et al, 2006), email (Blanzieri and Bryl, 2008), and the Web (Webb, 2006). A popular and well-developed approach for spam detection is based on machine learning tech- niques. They extracted effective features from historical data and built a supervised learning model. This model will be used to classify new data as either spam or le- gitimate user/message. 2.2 Spammer detection on Twitter As a result of the popularity of social media like Twit- ter, spammers are turning into the fast growing in this platform. There were some previous studies to tackle this problem. Some studies focus on analyzing the spammer charac- teristics on Twitter. (Yardi et al, 2009) explored the be- havior of spammers from the entire life cycle of #robot- pickupline hashtag. According to their observations, spam- mers tend to send more messages and network interac- tion with others. Thus, the higher ratio of followers to followings of a user have, the higher probability that Online Learning for Social Spammer Detection on Twitter 3 the user is a spammer. (Grier et al, 2010) studied per- spective of spammers and click-through behaviors. Ad- dition, they had already evaluated the effectiveness of backlists to prevent spamming. (Thomas et al, 2011b) collected the suspended accounts in 7 months from Au- gust 2010 to March 2011 and then they studied the characteristic of spammer account, tweet behavior, and spam campaign. (Ghosh et al, 2012) focused on the link farm on Twitter by analyzing the suspended accounts. They observed that most of the link farms came from new users. They also proposed Collusion Rank to de- mote the ranking of link farms on Twitter. (Benevenuto et al, 2010) addressed the study of spam- mer detection on Twitter trending topics. They used an SVM classifier to distinguish between spammers and le- gitimate users based on the basic of tweet contents and user profile information. Using the social honeypot to collected spammers is an interested work studied by (Lee et al, 2010, 2011). After analysis spammer behav- ior, they extracted user profile features and user net- work features and built a supervised learning classifier to identify spammers. However, the approach requires a lot of time for observation spamming evidence. Addi- tion, the collected data is often biased because it was only received content polluted from active spammers who was following the honeypot accounts. (Yang et al, 2011) observed that the proposed features from previous works were less effective with the evolv- ing of spammers. They utilized ten new features for spammer detection on Twitter and evaluated these fea- tures with the existing ones. Their experiments indi- cated that using their new features give a better result for spammer detection problem. (Ferrara et al, 2014) used the information related to tweet content, user net- work, sentiment, and temporal patterns of activity for detecting Twitter bots. Some approaches have assessed the safety or suspiciousness of URLs in tweets as a mean to identify spam tweets (Thomas et al, 2011a; Cao and Caverlee, 2015; Wang et al, 2013; Lee and Kim, 2012). More recent work has investigated the relationship be- tween automation and spamming. In the study of (Am- leshwaram et al, 2013), a system for automated spam- mers detection is described. Features related to automa- tion have been exploited to adapt to the changing struc- ture of Twitters spammers population. An analysis of automated activity on Twitter was presented on (Chu et al, 2010), and a system that detects the automation of an account is described in (Chu et al, 2012). Previous works on spam detection on Twitter can be summarized as follows: collecting and analyzing spam- mer behaviors, define and extracting effective features, using supervised learning algorithms to build the sta- tistical classifier to detect spammers. However, the be- havior of spammers changes too fast in social media. It is hard for the batch-learning system to adapt to the evolving of spammers. 3 Online Learning for Social Spam Detection To detect spammer on Twitter, we propose a framework based on online supervised classification method. The classify model will be incrementally updated real-time. The overall framework is presented in the Fig 1. In the training step, given m users with their identity label, the system will extract the features vector of each user. The detail of the extracted features will be talking in the feature represent spammers or legitimate users. Fea- ture vectors and identity labels will be used to built the classifier model Hm. Given one more user, the feature extraction module will be used to extract the features of the user and update classifier model Hm to Hm+1. 3.1 Features represent spammers or legitimate users A spammer and a legitimate user have motivation dif- ferently in posting tweets or doing social activities. We can assume that the characteristics of spammers are quite different to legitimate users. The features to present a user include profile, social networks, activities and content of posted tweets. 3.1.1 User profile features The profile features are extracted from a user's Twitter profile and consist of: – the length of screen name – whether the user profile has a description, the length of description – whether the user profile has a URL – the longevity (age) of an account (hours, days, weeks) 3.1.2 User networks features The following features are used to characterize a user's social networks which mainly extracted from friendship information. – number of users following (friends) – number of followers – the ratio of number of following to number of fol- lowers 4 Phuc Tri Nguyen, Hideaki Takeda Fig. 1: The online learning framework for spammer detection on Twitter – the reputation of a user which is calculated by the ratio between the number of followers and the total number of followers and following. User's reputation = f ollowers f ollowing+f ollowers – the following rate which is calculated the ratio be- tween number of following and the longevity of ac- count (hours, days, weeks) – the followers rate which is calculated the ratio be- tween number of followers and the longevity of ac- count (hours, days, weeks) – number of bidirectional friend f ollowing∩ f ollowes – the percentage of bidirectional friends with follow- ing f ollowing∩f ollowes f ollowing f ollowing∩f ollowes – the percentage of bidirectional friends with followers f ollowes – the standard deviation of followings – the standard deviation of followers 3.1.3 User activity features These features category capture user's social activities such as posted tweets or retweets. – number of posted tweets – number of posted tweets per hours, days, weeks – number of content similarity of posted tweets by a user. – number of direct mentions (e.g., @username) per posted tweet – number of direct mentions (e.g., @username) per hours, days, weeks – number of URLs per tweet – number of URLs per hours, days, weeks – number of hashtags per tweet – number of hashtags per hours, days, weeks – number of retweets per tweet – number of retweets per hours, days, weeks 3.1.4 User content features Capture the linguistic properties of the text of each tweet such as part-of-speech tagging, the number of spam words from spamming words dictionary 1, Lin- guistic Inquiry and Word Count (LIWC) and sentiment features. – Part-of-speech tagging provides the syntactic infor- mation of a sentence and has been used in the nat- ural language processing for measuring text infor- mativeness. In detail implementation, we use the Twitter-specific tagger (Gimpel et al, 2011). – Number of spam words is generated by matching a famous list of spam words. This list contains over 21,000 phrases, patterns, and keywords commonly used by spammers and comment bots in usernames, email addresses, link text. Since the masking be- havior can dramatically decrease the proportion of spam tweets in a spamming account, applying this feature on an account content may not be helpful in detecting complex spamming accounts. – LIWC dictionary is used to analyze text statisti- cally and find psychologically-meaningful categories (Pennebaker et al, 2001). There are 68 defined cate- gories in LIWC dictionary. We use LIWC dictionary to compute 68 user's personality features. These features may help to determine the personality of spammers or legitimate users. – In psychological, the micro expressions (Matsumoto and Hwang, 2011) play a distinct role in detecting deception. Inspired by this work, I explore the senti- ment information could help capture deceptions of spammers. In this work, I use the list of lexicons from (Dodds et al, 2011) for generating the senti- ment features. 1 https://github.com/splorp/wordpress-comment-blacklist Classifier HmUsersLabelsvectorsUserLabelvectormm+1Classifier Hm+1UservectorPredicted LabelInputFeature extractionInputFeature extractionTrainUpdateTraining stepPredicting stepOutput Online Learning for Social Spammer Detection on Twitter 5 3.2 Online learning algorithms Table 1: Statistics of 2 two datasets: Honey Pot (Lee et al, 2011) and 1KS-10KN (Yang et al, 2012) This section briefly presents the online learning algo- rithms which we use for our evaluation. Informal, the online learning algorithms are trying to solve an online classification problem over a sequence of pairs {(x1, y1), (x2, y2), ..., (xm, ym)}, where each xm is an example's feature vector and ym ∈ {0, 1} is its label. At each step m during training, the algorithm makes a label pre- diction hm(xm), which for linear classifier is hm(x) = sign(wmx). After making a prediction, the algorithm receives the actual label ym. Then the algorithms compute the loss l(ym, ym) based on some criterion to measure the differ- ence between the prediction and the revealed true label ym. The learner finally decides when and how to update the classification model at the end of each learning step bases on the result of the loss function. In this paper, we have no vested interest in any par- ticular strategy for online learning. We simply focus on the application of online learning on the problem social spammer detection on Twitter. In our experiment, we use the LIBOL an online learn- ing tool which was developed by (Hoi et al, 2014). This tool consists of existing state-of-the-art online learning algorithms for large-scale online classification tasks. In details, these online learning algorithms can be grouped into two following categories: first-order online learning algorithms and second-order online learning algorithms. First-order online learning algorithms include the algo- rithms that only keep updating one classification func- tion. The examples algorithms in this categories are fol- lowing: – Perceptron: the classical online learning algorithm (Rosenblatt, 1958) Spammers Legitimate Users # Users # Tweets # Users # Tweets Honey Pot 22,223 2,353,473 19,276 3,259,693 1KS-10KN 1,000 145,095 10,000 1,209,521 space d. The examples algorithms in this categories are following: – SOP: the Second Order Perceptron algorithm (Cesa- Bianchi et al, 2005) – CW: the Confidence-Weight learning algorithm (Cram- mer et al, 2009a) – IELLIP: the online learning algorithms by improved ellipsoid method (Yang et al, 2009) – ARROW: the Adaptive Regularization of Weight Vectors algorithm (Crammer et al, 2009b) – NARROW: the New variant of Adaptive Regular- ization (Orabona and Crammer, 2010) – NHERD: the Normal Herding method via Gaussian Herding (Crammer and Lee, 2010) – SCW: the Soft Confidence Weight algorithms (Wang et al, 2012) 4 Experiments In this section, we conduct the experiments to evalu- ate the effectiveness of online learning over the social spammer detection on Twitter. To demonstrate the ef- fectiveness of online learning, we address the following questions: 1. What is the accuracy of online learning methods compare with the batch learning methods on the single dataset? – ALMA: the Approximate Maximal Margin algorithm 2. Do online learning algorithms provide a better adap- (Gentile, 2002) tation on the data distribution changing? – ROMMA: the Relaxed Online Maximum Margin al- 3. Which online algorithms are most appropriate for gorithm (Li and Long, 2002) our application? – OGD: the Online Gradient Descent algorithm (Zinke- vich, 2003) – PA: the Passive Aggressive algorithm (Crammer et al, 4. How about the effectiveness of four different fea- ture sets when applying online learning on the social spammer detection on Twitter? 2006) Second-order online learning algorithms have been ex- plored in recent years. The major family of this cat- egories assume the weight vector follows a Gaussian distribution w ∼ N (µ, Σ) with mean vector µ ∈ Rd, covariance matrix Σ ∈ Rd×d and dimensional vector 4.1 Datasets In our experiments, we use two Twitter datasets. The statistics of two datasets are presented in Table 1. 6 Phuc Tri Nguyen, Hideaki Takeda 4.1.1 Social Honeypot Dataset: Table 2: Effectiveness of online learning on single dataset (Lee et al, 2011) created 60 Tweeter accounts to attract spammers. After seven months, from December 2009 to August 2010, his team collected the information of 41,499 users and 5,613,166 their tweets. 22,223 users were labeled as spammers and 19,276 legitimate users. The ratio of spammers to legitimate users is around 1:1. 4.1.2 1KS-10KN Dataset: This dataset was collected by (Yang et al, 2012) from April 2010 to July 2010. This dataset contains the in- formation of 11,000 users and 1,354,616 their tweets. They labeled 1,000 users as spammers and 10,000 legit- imate users. The ratio of spammers to legitimate in the 1KS-10KN data is 1:10. In two dataset, we don't have the information about the changing of network information of users through a specific time interval. We only have a snapshot of net- work information at the ending of collected data. For our work, we adapted the datasets with our purpose by randomly splitting each dataset to 20 parts and consid- ering each part as a time interval. 4.2 Effectiveness of Online learning on single dataset In this section, we start by evaluating the effectiveness of online learning over the batch learning method re- garding classification cumulative error rate on Honey Pot dataset and 1KS-10KN dataset. A lower the cu- mulative error rate means the better performance. In details, we compare two online learning algorithms - SCW (Wang et al, 2012) and ALMA (Gentile, 2002) against two different training set configurations of the batch learning - Random Forest algorithms. We choose the batch learning - Random Forest algorithm because it was produced the highest performance on previous researches: (Lee et al, 2011; Yang et al, 2011). 2 on- line learning algorithms: SCW (Wang et al, 2012) and ALMA (Gentile, 2002) were chosen because they gave the lowest and second-lowest cumulative error rate in our experiments which will be presented in Table 4. As- suming that our system can only process one part of the dataset, we conduct experiments to every single part of data. Figure 2 and Table 2 shows the classification cumu- lative error rates for online learning method and batch learning method on Honey Pot dataset and 1KS-10KN dataset. The x-axis shows the percentage of the dataset % 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 HoneyPot 1KS-10KN RF1 0.101 0.102 0.101 0.099 0.099 0.099 0.098 0.098 0.097 0.097 0.096 0.097 0.096 0.095 0.095 0.096 0.096 0.096 0.096 RF-2 0.098 0.095 0.091 0.090 0.091 0.090 0.089 0.090 0.089 0.089 0.089 0.090 0.089 0.089 0.090 0.090 0.090 0.090 0.091 SCW ALMA RF-1 RF-2 0.020 0.104 0.018 0.099 0.015 0.094 0.014 0.092 0.015 0.089 0.015 0.090 0.088 0.016 0.015 0.088 0.015 0.087 0.014 0.087 0.014 0.087 0.014 0.087 0.086 0.014 0.015 0.086 0.015 0.086 0.015 0.086 0.015 0.086 0.015 0.086 0.086 0.015 0.112 0.108 0.105 0.102 0.099 0.099 0.098 0.099 0.098 0.099 0.099 0.099 0.099 0.099 0.099 0.099 0.099 0.099 0.100 0.018 0.014 0.013 0.012 0.013 0.014 0.014 0.013 0.013 0.012 0.012 0.012 0.012 0.012 0.012 0.013 0.013 0.013 0.013 SCW ALMA 0.055 0.038 0.053 0.030 0.048 0.025 0.044 0.021 0.044 0.019 0.044 0.019 0.018 0.044 0.042 0.017 0.040 0.016 0.039 0.016 0.037 0.015 0.035 0.014 0.014 0.033 0.032 0.014 0.032 0.014 0.031 0.014 0.030 0.014 0.029 0.014 0.014 0.029 and the y-axis shows the cumulative error rate: per- centage of miss-classified examples for all user up to this part. The RF-1 represent using the batch learning - Random Forest to train once on the first part of 20 splitting data. Then the model will be used to test on all the remaining parts. The RF-2 uses the same setting with RF-1 but retrain the model for every interval. For example, RF-2 train on part 2 of dataset and test on part 3. SCW and ALMA are 2 online learning used to make a single update over a cumulative training data. In our experiment on single dataset, the distribution of data does not change much since we do not have the real streaming data on social spammer detection. We try to adapt the data Honey Pot and 1KS-10KN with our purpose. At the beginning part of data, the cumula- tive error rate of two online learning algorithms: SCW and ALMA are lower than batch learning: RF-1 and RF-2. However, the next results on the remaining parts show that SCW and ALMA faster reduce the cumula- tive error rate than batch learning. It means that online learning gives a more rapid adaptability when testing with other parts of data. These results tested on single dataset indicate that on- line learning can give a comparable result with batch- learning when the distribution of data does not change much. Although online learning does not achieve the better result compare with batch learning techniques, it allows faster adapt to new data. Online Learning for Social Spammer Detection on Twitter 7 (a) Honey Pot dataset (b) 1KS-10KN dataset Fig. 3: Effectiveness of Online learning on combine dataset new data from the 1KS-10KN dataset. In RF-2, the classifier will be re-trained from the prior interval, gave the better performance than RF-1. It means that the new data eventually can help to reduce the cumulative error rate. However, online learning algorithms - SCW and ALMA gave the better adaptability with the chang- ing of data distribution since it gave the lowest cumula- tive error rate compare with the batch-learning method. The experiment results show that online learning very appropriate with the fast changing of spammers. Fig. 2: Effectiveness of online learning on single dataset 4.4 Which online algorithms are most appropriate for social spammer detection 4.3 Effectiveness of Online learning on combine dataset In the real world problem, social spammers always change their spamming strategy; it makes rapid changing in the distribution of data. It explained why we study the ability to adapt to the changing distribution when to combine two datasets. We use the same online learn- ing algorithms and two setting of batch learning in the previous section and evaluate on the combined dataset. In particular, this dataset contains 20 first parts from Honey Pot dataset and 20 next parts from 1KS-10KN dataset. Figure 3 show the result of social spammer detection on the combine of Honey Pot and 1KS-10KN dataset. In the RF-1, the cumulative error rate becomes signifi- cant increase when testing on data from 1KS-10KN. It is indicated the classifier model fail to detect spammers when data distribution changes. If we want to achieve better accuracy, we need to retrain the model with the In this section, we evaluate which of the online learning algorithms are the best suited to the social spammer detection. We tested 16 online learning algorithms im- plemented using the LIBOL tool. All of the experiments run on the combined dataset discussed in the previous section. Table 4 shown the comparison of the performance of online learning algorithms. We find that the cumula- tive error rate ranged from 0.265 to 0.071. The Soft Confidence-Weight showed the best performance com- pare with the other online learning algorithms. 4.5 Effectiveness of various feature set combinations In this section, we trained 2 online learning (SCW- the highest performance and ALMA-the second-highest performance) with different feature sets (e.g. UP: User Profile features, UN: User Network features, UA: User Activities features, UC: User Content features) and var- ious combination of the feature sets on the mixture of Cumulative error rate (%)8%9%10%10%11%12%Percentage of Dataset
10%20%30%40%50%60%70%80%90%100%RF-1RF-2SCWALMACumulative error rate (%)1%2%3%4%5%6%Percentage of Dataset
10%20%30%40%50%60%70%80%90%100%RF-1RF-2SCWALMACumulative error rate (%)7%14%21%28%35%42%HoneyPot Dataset 1KS-10KN Dataset
Percentage of Dataset
20%40%60%80%100%20%40%60%80%100%RF-1RF-2SCWALMA 8 Phuc Tri Nguyen, Hideaki Takeda Table 4: Performance comparison of online learning algorithms n o r t p e c r e P % 10% 0.137 15% 0.129 20% 0.125 25% 0.126 30% 0.123 35% 0.124 40% 0.122 45% 0.122 50% 0.120 55% 0.121 60% 0.121 65% 0.121 70% 0.121 75% 0.122 80% 0.122 85% 0.122 90% 0.123 95% 0.123 100% 0.123 5% 0.129 10% 0.134 15% 0.135 20% 0.134 25% 0.134 30% 0.135 35% 0.132 40% 0.130 45% 0.129 50% 0.128 55% 0.129 60% 0.126 65% 0.124 70% 0.122 75% 0.121 80% 0.119 85% 0.119 90% 0.119 95% 0.117 100% 0.115 A M M O R 0.164 0.150 0.148 0.150 0.151 0.152 0.150 0.151 0.150 0.152 0.153 0.154 0.155 0.155 0.157 0.157 0.158 0.158 0.159 0.162 0.164 0.165 0.166 0.166 0.166 0.170 0.170 0.171 0.171 0.174 0.172 0.172 0.173 0.174 0.176 0.178 0.177 0.178 0.180 A M M O R a 0.168 0.155 0.154 0.155 0.156 0.158 0.158 0.159 0.158 0.159 0.160 0.162 0.163 0.162 0.162 0.163 0.164 0.164 0.165 0.166 0.168 0.169 0.170 0.168 0.167 0.170 0.169 0.169 0.169 0.171 0.169 0.168 0.169 0.169 0.170 0.173 0.174 0.175 0.176 A M L A 0.107 0.102 0.099 0.098 0.096 0.097 0.096 0.096 0.096 0.096 0.096 0.097 0.097 0.097 0.097 0.097 0.098 0.098 0.098 0.109 0.108 0.108 0.105 0.103 0.100 0.098 0.096 0.093 0.091 0.089 0.086 0.084 0.082 0.080 0.079 0.077 0.075 0.074 0.072 D G O 0.095 0.096 0.092 0.090 0.088 0.089 0.087 0.087 0.086 0.085 0.086 0.086 0.085 0.085 0.086 0.086 0.086 0.085 0.086 0.102 0.116 0.128 0.135 0.141 0.147 0.152 0.156 0.158 0.162 0.165 0.166 0.167 0.167 0.168 0.168 0.168 0.168 0.167 0.166 t o P y e n o H N K 0 1 - S K 1 A P 0.145 0.143 0.140 0.137 0.137 0.138 0.135 0.136 0.136 0.136 0.135 0.136 0.136 0.135 0.135 0.135 0.136 0.136 0.136 0.135 0.133 0.130 0.128 0.124 0.122 0.120 0.118 0.116 0.114 0.114 0.112 0.110 0.110 0.109 0.108 0.108 0.107 0.106 0.107 1 A P 2 A P 0.126 0.128 0.127 0.126 0.125 0.126 0.123 0.124 0.123 0.124 0.123 0.123 0.123 0.123 0.122 0.123 0.123 0.123 0.123 0.123 0.120 0.117 0.113 0.110 0.107 0.104 0.101 0.099 0.096 0.095 0.092 0.090 0.088 0.086 0.085 0.084 0.083 0.081 0.080 0.131 0.132 0.130 0.128 0.126 0.129 0.125 0.126 0.125 0.125 0.125 0.125 0.125 0.125 0.125 0.125 0.125 0.125 0.126 0.125 0.123 0.120 0.118 0.115 0.112 0.110 0.109 0.107 0.105 0.105 0.103 0.100 0.100 0.099 0.098 0.098 0.097 0.096 0.097 P O S 0.137 0.131 0.127 0.123 0.120 0.121 0.118 0.118 0.118 0.118 0.117 0.118 0.118 0.119 0.120 0.120 0.121 0.121 0.121 0.124 0.129 0.130 0.132 0.131 0.130 0.131 0.130 0.128 0.129 0.128 0.126 0.124 0.123 0.123 0.122 0.122 0.121 0.119 0.118 P I L L E I 0.165 0.159 0.156 0.154 0.154 0.155 0.152 0.153 0.152 0.153 0.153 0.154 0.154 0.154 0.153 0.154 0.155 0.155 0.155 0.155 0.153 0.151 0.148 0.144 0.142 0.141 0.139 0.138 0.135 0.136 0.134 0.131 0.132 0.131 0.130 0.130 0.129 0.129 0.129 W C 0.148 0.146 0.147 0.146 0.145 0.150 0.149 0.151 0.152 0.154 0.154 0.155 0.156 0.156 0.157 0.158 0.159 0.159 0.161 0.155 0.151 0.147 0.144 0.140 0.137 0.135 0.132 0.131 0.129 0.128 0.127 0.124 0.124 0.123 0.121 0.121 0.120 0.118 0.118 D R E H N 0.097 0.097 0.093 0.090 0.087 0.088 0.087 0.087 0.086 0.086 0.086 0.086 0.086 0.085 0.086 0.086 0.086 0.086 0.086 0.100 0.110 0.122 0.130 0.138 0.146 0.153 0.158 0.163 0.170 0.175 0.179 0.182 0.185 0.189 0.192 0.196 0.200 0.202 0.204 W O R A 0.093 0.092 0.089 0.088 0.085 0.086 0.085 0.085 0.084 0.084 0.084 0.084 0.083 0.083 0.084 0.084 0.084 0.084 0.085 0.096 0.104 0.116 0.124 0.130 0.136 0.142 0.147 0.150 0.156 0.160 0.163 0.165 0.166 0.169 0.171 0.173 0.175 0.176 0.176 W O R A N 0.103 0.104 0.102 0.102 0.098 0.098 0.097 0.097 0.096 0.096 0.096 0.096 0.095 0.095 0.095 0.095 0.095 0.095 0.095 0.111 0.125 0.138 0.148 0.158 0.168 0.177 0.185 0.193 0.202 0.209 0.216 0.221 0.227 0.233 0.240 0.245 0.251 0.256 0.262 W C S 0.105 0.098 0.094 0.093 0.091 0.091 0.089 0.089 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.096 0.098 0.098 0.098 0.097 0.095 0.094 0.092 0.089 0.088 0.086 0.084 0.082 0.080 0.079 0.077 0.076 0.074 0.073 0.071 2 W C S 0.104 0.101 0.098 0.099 0.097 0.097 0.095 0.095 0.094 0.094 0.093 0.093 0.093 0.093 0.094 0.094 0.094 0.093 0.094 0.110 0.125 0.140 0.151 0.163 0.175 0.184 0.193 0.200 0.209 0.217 0.224 0.229 0.235 0.241 0.246 0.251 0.257 0.261 0.265 Honey Pot dataset and 1KS-10KN dataset. The experi- ment results are reported in Figure 4, Table 5 and Table 6. The result of social spammer detection by using SCW algorithm and ALMA algorithm are quite similar. The result of user profile features and user content features lower than user network features and user activity fea- tures when using a single feature set. It is consistent because social spammers are easy to fake their profile as a normal user on Twitter. Moreover, spammers quickly change their content information. It makes the user con- tent features become noisy and less efficient. In all of the experiments, the result of the combination of user network features and user activity features gives the best result in term of cumulative error rate 0.068 by using SCW algorithm and 0.056 by using ALMA. These results indicate that this two kind of features set are robustness with the changing spamming patterns and stable across the choice of online learning algorithms. 5 Conclusion and Future Work The social spammer detection on Twitter is sophisti- cated and adaptable to game the system by contin- ually change their content and network patterns. To handle fast evolving social spammers, we suggest us- ing the online learning incrementally update classifier model when the newly spamming pattern occurred. Our experiment results show that the approach is effective in dynamically changing spamming strategies of spam- mers comparing with other batch learning method. Ad- ditionally, we address that the online learning - Soft Confident-Weight achieve the best result compare with other online algorithms. We also studied the effective- ness of four feature sets on two online learning algo- rithms - SCW and ALMA. The experiments show that user network features and user activities features are more robustness than user profile features and user con- tent features and stable across online learning algo- rithms. In near future, the amount of available data has risen Online Learning for Social Spammer Detection on Twitter 9 Table 5: Evaluation of various feature set combinations on the SCW algorithm % P U N U A U C U 10% 0.354 15% 0.365 20% 0.360 25% 0.362 30% 0.359 35% 0.360 40% 0.358 45% 0.359 50% 0.357 55% 0.358 60% 0.358 65% 0.359 70% 0.359 75% 0.360 80% 0.361 85% 0.359 90% 0.359 95% 0.360 100% 0.360 5% 0.369 10% 0.376 15% 0.381 20% 0.387 25% 0.391 30% 0.396 35% 0.400 40% 0.405 45% 0.410 50% 0.411 55% 0.414 60% 0.417 65% 0.421 70% 0.424 75% 0.426 80% 0.428 85% 0.430 90% 0.432 95% 0.434 100% 0.435 0.152 0.150 0.147 0.146 0.145 0.146 0.146 0.145 0.143 0.143 0.143 0.143 0.143 0.142 0.142 0.142 0.142 0.143 0.143 0.138 0.133 0.128 0.123 0.119 0.114 0.111 0.107 0.104 0.101 0.098 0.095 0.092 0.090 0.088 0.086 0.084 0.082 0.080 0.079 0.214 0.204 0.203 0.204 0.202 0.201 0.199 0.201 0.200 0.199 0.199 0.199 0.198 0.199 0.199 0.198 0.198 0.197 0.198 0.206 0.202 0.197 0.192 0.186 0.181 0.176 0.170 0.165 0.160 0.155 0.151 0.147 0.143 0.139 0.136 0.132 0.129 0.126 0.123 0.188 0.184 0.183 0.184 0.182 0.182 0.179 0.179 0.178 0.177 0.176 0.176 0.176 0.177 0.177 0.176 0.176 0.176 0.175 0.196 0.211 0.223 0.234 0.243 0.249 0.254 0.260 0.266 0.270 0.274 0.277 0.279 0.281 0.284 0.286 0.288 0.289 0.290 0.290 t o P y e n o H N K 0 1 - S K 1 N U + P U 0.133 0.137 0.133 0.132 0.130 0.131 0.130 0.130 0.128 0.128 0.127 0.128 0.127 0.127 0.127 0.127 0.127 0.128 0.128 0.132 0.127 0.122 0.118 0.113 0.109 0.106 0.102 0.099 0.096 0.094 0.091 0.089 0.087 0.085 0.082 0.081 0.079 0.078 0.076 A U + P U 0.204 0.195 0.193 0.193 0.191 0.192 0.191 0.192 0.191 0.191 0.190 0.190 0.190 0.190 0.191 0.189 0.189 0.189 0.189 0.202 0.208 0.212 0.212 0.207 0.202 0.196 0.190 0.184 0.178 0.173 0.168 0.163 0.159 0.155 0.151 0.147 0.143 0.140 0.137 C U + P U 0.189 0.182 0.179 0.177 0.175 0.174 0.172 0.172 0.171 0.170 0.168 0.168 0.168 0.169 0.169 0.168 0.167 0.167 0.168 0.186 0.204 0.219 0.235 0.249 0.260 0.271 0.281 0.290 0.299 0.306 0.313 0.321 0.329 0.335 0.340 0.345 0.349 0.355 0.361 A U + N U 0.103 0.100 0.097 0.096 0.093 0.094 0.093 0.093 0.092 0.092 0.091 0.091 0.091 0.091 0.091 0.091 0.091 0.091 0.091 0.098 0.097 0.096 0.096 0.094 0.093 0.092 0.090 0.087 0.085 0.083 0.081 0.079 0.078 0.076 0.074 0.072 0.071 0.069 0.068 C U + N U 0.110 0.109 0.105 0.102 0.101 0.101 0.098 0.098 0.097 0.096 0.096 0.096 0.096 0.096 0.096 0.096 0.096 0.096 0.096 0.101 0.100 0.097 0.095 0.093 0.090 0.089 0.087 0.085 0.084 0.082 0.081 0.079 0.078 0.077 0.076 0.075 0.073 0.072 0.071 C U + A U 0.188 0.184 0.182 0.182 0.181 0.180 0.177 0.178 0.176 0.176 0.175 0.175 0.175 0.176 0.176 0.175 0.175 0.175 0.175 0.191 0.203 0.212 0.218 0.223 0.226 0.229 0.231 0.232 0.233 0.234 0.234 0.233 0.232 0.231 0.231 0.230 0.229 0.228 0.227 A U + N U + P U 0.096 0.094 0.091 0.091 0.089 0.090 0.090 0.090 0.089 0.088 0.088 0.089 0.088 0.088 0.088 0.089 0.089 0.088 0.089 0.097 0.105 0.112 0.117 0.122 0.126 0.130 0.133 0.136 0.139 0.142 0.145 0.147 0.150 0.152 0.154 0.157 0.159 0.161 0.162 C U + N U + P U 0.109 0.110 0.104 0.102 0.100 0.099 0.097 0.097 0.096 0.095 0.095 0.095 0.094 0.094 0.094 0.095 0.095 0.095 0.095 0.101 0.099 0.097 0.095 0.093 0.091 0.089 0.087 0.086 0.084 0.083 0.081 0.080 0.079 0.077 0.076 0.075 0.074 0.073 0.072 C U + A U + N U 0.103 0.099 0.094 0.093 0.090 0.091 0.089 0.088 0.087 0.087 0.087 0.087 0.086 0.086 0.087 0.086 0.086 0.086 0.086 0.098 0.106 0.111 0.114 0.115 0.115 0.116 0.116 0.115 0.115 0.115 0.114 0.113 0.112 0.112 0.111 0.111 0.111 0.110 0.109 A U + C U + N U + P U 0.104 0.100 0.095 0.093 0.091 0.090 0.088 0.088 0.087 0.087 0.087 0.087 0.086 0.086 0.087 0.086 0.087 0.086 0.086 0.099 0.107 0.113 0.116 0.117 0.118 0.119 0.119 0.118 0.119 0.118 0.117 0.116 0.115 0.114 0.114 0.113 0.113 0.112 0.111 steadily. It imposes a computational burden on the sin- gle system. In consequences, we need an approach can be able to perform in a distributed fashion. With this motivation, the future works will be focused on how to build the scalable distributed spammer detection sys- tem. References Amleshwaram AA, Reddy N, Yadav S, Gu G, Yang C (2013) Cats: Characterizing automation of twit- ter spammers. In: Communication Systems and Net- works (COMSNETS), 2013 Fifth International Con- ference on, IEEE, pp 1–10 Benevenuto F, Magno G, Rodrigues T, Almeida V (2010) Detecting spammers on twitter. In: In Collab- oration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: Automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference on World Wide Web, ACM, New York, NY, USA, WWW '09, pp 551–560, DOI 10.1145/1526709.1526784, URL http: //doi.acm.org/10.1145/1526709.1526784 Blanzieri E, Bryl A (2008) A survey of learning-based techniques of email spam filtering. Artif Intell Rev 29(1):63–92, DOI 10.1007/s10462-009-9109-6, URL http://dx.doi.org/10.1007/s10462-009-9109-6 Cao C, Caverlee J (2015) Detecting spam urls in so- cial media via behavioral analysis. In: Advances in Information Retrieval, Springer, pp 703–714 Cesa-Bianchi N, Conconi A, Gentile C (2005) A second- order perceptron algorithm. SIAM Journal on Com- puting 34(3):640–668 Chu Z, Gianvecchio S, Wang H, Jajodia S (2010) Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of the 26th annual computer security ap- plications conference, ACM, pp 21–30 10 Phuc Tri Nguyen, Hideaki Takeda Table 6: Evaluation of various feature set combinations on the ALMA algorithm % 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 P U N U A U C U 0.359 0.362 0.360 0.360 0.359 0.360 0.359 0.360 0.357 0.359 0.359 0.360 0.360 0.359 0.359 0.357 0.356 0.357 0.357 0.364 0.370 0.375 0.379 0.381 0.383 0.385 0.385 0.387 0.389 0.391 0.391 0.391 0.390 0.390 0.390 0.390 0.389 0.389 0.386 0.137 0.140 0.135 0.134 0.131 0.132 0.132 0.132 0.130 0.131 0.130 0.130 0.130 0.129 0.130 0.130 0.130 0.130 0.131 0.144 0.152 0.158 0.160 0.161 0.159 0.157 0.153 0.148 0.143 0.139 0.135 0.132 0.129 0.126 0.123 0.120 0.118 0.115 0.113 0.227 0.216 0.213 0.213 0.213 0.212 0.210 0.211 0.211 0.211 0.210 0.211 0.210 0.211 0.212 0.211 0.210 0.210 0.210 0.203 0.194 0.185 0.178 0.171 0.164 0.158 0.153 0.148 0.143 0.138 0.134 0.130 0.127 0.123 0.120 0.117 0.114 0.112 0.109 0.205 0.203 0.202 0.200 0.198 0.197 0.193 0.196 0.194 0.194 0.193 0.193 0.193 0.193 0.193 0.192 0.192 0.193 0.193 0.198 0.198 0.197 0.196 0.194 0.191 0.189 0.186 0.184 0.182 0.181 0.178 0.176 0.174 0.172 0.170 0.169 0.168 0.166 0.165 t o P y e n o H N K 0 1 - S K 1 N U + P U 0.132 0.135 0.131 0.131 0.128 0.129 0.127 0.127 0.126 0.126 0.126 0.126 0.125 0.125 0.125 0.125 0.125 0.125 0.125 0.139 0.149 0.156 0.160 0.162 0.161 0.160 0.157 0.152 0.148 0.144 0.140 0.137 0.134 0.131 0.128 0.125 0.123 0.120 0.117 A U + P U 0.207 0.196 0.196 0.196 0.194 0.196 0.194 0.197 0.196 0.197 0.196 0.196 0.196 0.196 0.196 0.195 0.195 0.195 0.195 0.198 0.191 0.183 0.175 0.168 0.162 0.157 0.151 0.146 0.141 0.137 0.133 0.129 0.125 0.122 0.119 0.116 0.113 0.110 0.108 C U + P U 0.201 0.194 0.192 0.190 0.186 0.185 0.180 0.183 0.182 0.183 0.181 0.182 0.182 0.182 0.182 0.180 0.180 0.180 0.181 0.191 0.193 0.193 0.192 0.190 0.188 0.186 0.184 0.182 0.180 0.179 0.177 0.175 0.173 0.171 0.169 0.168 0.166 0.165 0.163 A U + N U 0.101 0.103 0.100 0.100 0.097 0.099 0.098 0.098 0.097 0.097 0.096 0.096 0.096 0.096 0.097 0.097 0.097 0.098 0.098 0.100 0.096 0.092 0.088 0.085 0.082 0.079 0.077 0.074 0.072 0.070 0.068 0.066 0.064 0.063 0.061 0.060 0.059 0.058 0.056 C U + N U 0.126 0.123 0.120 0.118 0.115 0.113 0.111 0.111 0.110 0.109 0.109 0.109 0.108 0.109 0.109 0.108 0.109 0.109 0.110 0.120 0.122 0.122 0.122 0.121 0.120 0.120 0.118 0.117 0.116 0.115 0.113 0.113 0.112 0.111 0.110 0.110 0.109 0.108 0.107 C U + A U 0.197 0.193 0.194 0.193 0.192 0.191 0.188 0.189 0.188 0.188 0.187 0.187 0.187 0.188 0.187 0.187 0.187 0.187 0.187 0.189 0.186 0.181 0.176 0.171 0.166 0.161 0.156 0.152 0.147 0.143 0.139 0.135 0.132 0.129 0.126 0.123 0.120 0.117 0.114 A U + N U + P U 0.096 0.096 0.095 0.095 0.091 0.093 0.091 0.093 0.092 0.091 0.092 0.092 0.092 0.092 0.092 0.093 0.092 0.093 0.093 0.102 0.100 0.097 0.095 0.093 0.091 0.086 0.083 0.080 0.079 0.077 0.075 0.073 0.071 0.067 0.065 0.063 0.062 0.060 0.059 C U + N U + P U 0.122 0.121 0.117 0.114 0.111 0.111 0.108 0.108 0.107 0.107 0.107 0.108 0.108 0.108 0.108 0.108 0.109 0.109 0.109 0.120 0.124 0.125 0.126 0.125 0.125 0.124 0.123 0.122 0.121 0.120 0.119 0.118 0.117 0.116 0.115 0.114 0.113 0.112 0.111 C U + A U + N U 0.103 0.101 0.098 0.097 0.094 0.095 0.093 0.094 0.094 0.094 0.094 0.094 0.094 0.094 0.095 0.095 0.095 0.095 0.095 0.106 0.107 0.106 0.104 0.102 0.099 0.097 0.095 0.092 0.090 0.088 0.085 0.083 0.081 0.079 0.077 0.076 0.074 0.073 0.071 A U + C U + N U + P U 0.107 0.105 0.102 0.100 0.096 0.096 0.095 0.095 0.095 0.095 0.095 0.095 0.094 0.095 0.095 0.095 0.095 0.096 0.096 0.105 0.105 0.103 0.101 0.099 0.097 0.094 0.092 0.090 0.088 0.085 0.083 0.081 0.079 0.077 0.076 0.074 0.073 0.071 0.070 Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) De- tecting automation of twitter accounts: Are you a hu- man, bot, or cyborg? Dependable and Secure Com- puting, IEEE Transactions on 9(6):811–824 Crammer K, Lee DD (2010) Learning via gaussian herd- ing. In: Advances in neural information processing systems, pp 451–459 Crammer K, Dekel O, Keshet J, Shalev-Shwartz S, Singer Y (2006) Online passive-aggressive algo- rithms. The Journal of Machine Learning Research 7:551–585 Crammer K, Dredze M, Pereira F (2009a) Exact convex confidence-weighted learning. In: Advances in Neural Information Processing Systems, pp 345–352 Crammer K, Kulesza A, Dredze M (2009b) Adaptive regularization of weight vectors. In: Advances in neu- ral information processing systems, pp 414–422 Dodds PS, Harris KD, Kloumann IM, Bliss CA, Dan- forth CM (2011) Temporal patterns of happiness and information in a global social network: Hedonomet- rics and twitter. PloS one 6(12):e26,752 Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2014) The rise of social bots. arXiv preprint arXiv:14075225 Gentile C (2002) A new approximate maximal mar- gin classification algorithm. The Journal of Machine Learning Research 2:213–242 Ghosh S, Viswanath B, Kooti F, Sharma NK, Kor- lam G, Benevenuto F, Ganguly N, Gummadi KP (2012) Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference on World Wide Web, ACM, New York, NY, USA, WWW '12, pp 61–70, DOI 10.1145/2187836.2187846, URL http: //doi.acm.org/10.1145/2187836.2187846 Gimpel K, Schneider N, O'Connor B, Das D, Mills D, Eisenstein J, Heilman M, Yogatama D, Flanigan J, Smith NA (2011) Part-of-speech tagging for twit- ter: Annotation, features, and experiments. In: Pro- ceedings of the 49th Annual Meeting of the Asso- Online Learning for Social Spammer Detection on Twitter 11 Table 3: Effectiveness of Online learning on combine dataset % RF-1 RF-2 SCW ALMA t o P y e n o H N K 0 1 - S K 1 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 0.102 0.103 0.102 0.102 0.100 0.101 0.099 0.101 0.102 0.102 0.102 0.102 0.102 0.102 0.101 0.101 0.101 0.101 0.102 0.130 0.157 0.182 0.206 0.227 0.246 0.263 0.279 0.294 0.308 0.321 0.333 0.344 0.355 0.365 0.375 0.384 0.393 0.402 0.410 0.101 0.102 0.100 0.096 0.096 0.097 0.095 0.097 0.096 0.095 0.095 0.095 0.094 0.094 0.094 0.095 0.095 0.095 0.095 0.131 0.126 0.120 0.116 0.112 0.108 0.105 0.102 0.099 0.096 0.093 0.090 0.088 0.086 0.084 0.082 0.080 0.078 0.077 0.075 0.105 0.098 0.094 0.093 0.091 0.091 0.089 0.089 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.087 0.096 0.098 0.098 0.098 0.097 0.095 0.094 0.092 0.089 0.088 0.086 0.084 0.082 0.080 0.079 0.077 0.076 0.074 0.073 0.071 0.107 0.102 0.099 0.098 0.096 0.097 0.096 0.096 0.096 0.096 0.096 0.097 0.097 0.097 0.097 0.097 0.098 0.098 0.098 0.109 0.108 0.108 0.105 0.103 0.100 0.098 0.096 0.093 0.091 0.089 0.086 0.084 0.082 0.080 0.079 0.077 0.075 0.074 0.072 Fig. 4: Evaluation of various feature set combination on SCW algorithm and ALMA algorithm ciation for Computational Linguistics: Human Lan- guage Technologies: Short Papers - Volume 2, Asso- ciation for Computational Linguistics, Stroudsburg, PA, USA, HLT '11, pp 42–47, URL http://dl.acm. org/citation.cfm?id=2002736.2002747 G´omez Hidalgo JM, Bringas GC, S´anz EP, Garc´ıa FC (2006) Content based sms spam filtering. In: Proceed- ings of the 2006 ACM Symposium on Document En- gineering, ACM, New York, NY, USA, DocEng '06, pp 107–114, DOI 10.1145/1166160.1166191, URL http://doi.acm.org/10.1145/1166160.1166191 Grier C, Thomas K, Paxson V, Zhang M (2010) @ spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM conference on Com- puter and communications security, ACM, pp 27–37 Hoi SC, Wang J, Zhao P (2014) Libol: A library for online learning algorithms. The Journal of Machine Learning Research 15:495–499, URL http://LIBOL. stevenhoi.org Lee K, Caverlee J, Webb S (2010) Uncovering so- cial spammers: Social honeypots + machine learn- ing. the 33rd International ACM SIGIR Conference on Research and De- velopment in Information Retrieval, ACM, New In: Proceedings of York, NY, USA, SIGIR '10, pp 435–442, DOI 10. 1145/1835449.1835522, URL http://doi.acm.org/ 10.1145/1835449.1835522 Lee K, Eoff BD, Caverlee J (2011) Seven months with the devils: A long-term study of content polluters on twitter. In: ICWSM, Citeseer Lee S, Kim J (2012) Warningbird: Detecting suspicious urls in twitter stream. In: NDSS Li Y, Long PM (2002) The relaxed online maximum margin algorithm. Machine Learning 46(1-3):361–387 Matsumoto D, Hwang HS (2011) Evidence for train- ing the ability to read microexpressions of emotion. Motivation and Emotion 35(2):181–191 Orabona F, Crammer K (2010) New adaptive algo- rithms for online classification. In: Advances in neural information processing systems, pp 1840–1848 Pennebaker JW, Francis ME, Booth RJ (2001) Lin- guistic inquiry and word count: Liwc 2001. Mahway: Lawrence Erlbaum Associates 71:2001 Rosenblatt F (1958) The perceptron: a probabilistic model for information storage and organization in the brain. Psychological review 65(6):386 Thomas K, Grier C, Ma J, Paxson V, Song D (2011a) Design and evaluation of a real-time url spam filtering SCWUPUNUAUCUP+UNUP+UAUP+UCUN+UAUN+UCUA+UCUP+UN+UAUP+UN+UCUN+UA+UCUP+UN+UC+UACumulative Error Rate0.0000.1250.2500.3750.5000.1110.1090.0720.1620.2270.0710.0680.3610.1370.0760.2900.1230.0790.435ALMAUPUNUAUCUP+UNUP+UAUP+UCUN+UAUN+UCUA+UCUP+UN+UAUP+UN+UCUN+UA+UCUP+UN+UC+UACumulative Error Rate0.0000.1250.2500.3750.5000.0700.0710.1110.0590.1140.1070.0560.1630.1080.1170.1650.1090.1130.386 12 Phuc Tri Nguyen, Hideaki Takeda service. In: Security and Privacy (SP), 2011 IEEE Symposium on, IEEE, pp 447–462 Thomas K, Grier C, Song D, Paxson V (2011b) Sus- pended accounts in retrospect: an analysis of twit- ter spam. In: Proceedings of the 2011 ACM SIG- COMM conference on Internet measurement confer- ence, ACM, pp 243–258 Twitter (2016) Observability at twitter: technical overview, part i Wang D, Navathe SB, Liu L, Irani D, Tamersoy A, Pu C (2013) Click traffic analysis of short url spam on twit- ter. In: Collaborative Computing: Networking, Ap- plications and Worksharing (Collaboratecom), 2013 9th International Conference Conference on, IEEE, pp 250–259 Wang J, Zhao P, Hoi SC (2012) Exact soft confidence- weighted learning. arXiv preprint arXiv:12064612 Webb S (2006) Introducing the webb spam corpus: Us- ing email spam to identify web spam automatically. In: In Proceedings of the 3rd Conference on Email and AntiSpam (CEAS) (Mountain View Wikipedia (2016) Spamming - wikipedia, the free encyclopedia. URL https://en.wikipedia.org/ w/index.php?title=Spamming&oldid=710141595, [Online; accessed 25-March-2016] Yang C, Harkreader RC, Gu G (2011) Die free or live hard? empirical evaluation and new design for fight- ing evolving twitter spammers. In: Recent Advances in Intrusion Detection, Springer, pp 318–337 Yang C, Harkreader R, Zhang J, Shin S, Gu G (2012) Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international con- ference on World Wide Web, ACM, pp 71–80 Yang L, Jin R, Ye J (2009) Online learning by ellipsoid method. In: Proceedings of the 26th Annual Inter- national Conference on Machine Learning, ACM, pp 1153–1160 Yardi S, Romero D, Schoenebeck G, et al (2009) Detect- ing spam in a twitter network. First Monday 15(1) Zinkevich M (2003) Online convex programming and generalized infinitesimal gradient ascent
1312.0938
1
1312
2013-12-03T04:01:51
Epidemic Thresholds with External Agents
[ "cs.SI", "physics.soc-ph" ]
We study the effect of external infection sources on phase transitions in epidemic processes. In particular, we consider an epidemic spreading on a network via the SIS/SIR dynamics, which in addition is aided by external agents - sources unconstrained by the graph, but possessing a limited infection rate or virulence. Such a model captures many existing models of externally aided epidemics, and finds use in many settings - epidemiology, marketing and advertising, network robustness, etc. We provide a detailed characterization of the impact of external agents on epidemic thresholds. In particular, for the SIS model, we show that any external infection strategy with constant virulence either fails to significantly affect the lifetime of an epidemic, or at best, sustains the epidemic for a lifetime which is polynomial in the number of nodes. On the other hand, a random external-infection strategy, with rate increasing linearly in the number of infected nodes, succeeds under some conditions to sustain an exponential epidemic lifetime. We obtain similar sharp thresholds for the SIR model, and discuss the relevance of our results in a variety of settings.
cs.SI
cs
Epidemic Thresholds with External Agents Siddhartha Banerjee, Avhishek Chatterjee, Sanjay Shakkottai Department of Electrical and Computer Engineering The University of Texas at Austin, USA Email: {siddhartha, avhishek}@utexas.edu,[email protected] 3 1 0 2 c e D 3 ] I S . s c [ 1 v 8 3 9 0 . 2 1 3 1 : v i X r a Abstract—We study the effect of external infection sources on phase transitions in epidemic processes. In particular, we consider an epidemic spreading on a network via the SIS/SIR dynamics, which in addition is aided by external agents - sources unconstrained by the graph, but possessing a limited infection rate or virulence. Such a model captures many existing models of externally aided epidemics, and finds use in many settings - epidemiology, marketing and advertising, network robustness, etc. We provide a detailed characterization of the impact of external agents on epidemic thresholds. In particular, for the SIS model, we show that any external infection strategy with constant virulence either fails to significantly affect the lifetime of an epidemic, or at best, sustains the epidemic for a lifetime which is polynomial in the number of nodes. On the other hand, a random external-infection strategy, with rate increasing linearly in the number of infected nodes, succeeds under some conditions to sustain an exponential epidemic lifetime. We obtain similar sharp thresholds for the SIR model, and discuss the relevance of our results in a variety of settings. I . IN TRODUC T ION We study epidemic processes on large graphs in the presence of external agents - i.e., settings in which information/infection spreads in a network via an intrinsic infection process (i.e., along the edges of the graph), but in addition, is aided in its spread by external sources unconstrained by the graph topology. More specifically, we focus on characterizing phase transition behaviour in SIS/SIR epidemic processes in the presence external infection sources of bounded virulence, but whose position is unconstrained by the graph. Epidemic processes are widely used as an abstraction for various real-world phenomena – human infections, computer viruses, rumors, information broadcast, product advertising, etc. Though there are many models for such epidemic pro- cesses, at a high level they can be divided in two groups – those in which nodes once infected remain forever in such a state, and those in which nodes can recover from the infection. Henceforth, to distinguish between the two, we refer to the former as spreading processes, reserving the term epidemic process for the latter. Spreading processes help understand the dynamics of one-way dissemination of some object in a network – for example: a rumor, a software update, a fitter genetic mutation, etc. On the other hand, epidemic processes are used to study transient infection processes, i.e., those which spread for a while but eventually die out in finite networks. for a spreading process is the SI A standard model (Susceptible-Infected) dynamics, wherein a ‘susceptible’ node (S) transitions to being ‘infected’ (I) at a rate proportional to the number of infected neighboring nodes. An important metric here is the spreading time, i.e., the time taken for all nodes to get infected. In our earlier work [1], it was shown that external agents can dramatically shorten the spreading time of the SI process in some graphs - further this remains true even if the agents infect in a random manner. in epidemic On the other hand, the metric of interest processes is usually the extinction time – the time when the infection dies out in the system. A non-trivial aspect of epidemic processes is that they exhibit phase transition phenomena - when the infection rate exceeds a threshold, then the infection abruptly switches from being short-lived to being persistent (i.e., with a very large extinction time; in case of infinite graphs, they never die out). This aspect makes them interesting from a mathematical perspective, and also is important for understanding real-life settings, wherein such threshold phenomena have been observed empirically. The two most widely-used models for epidemic processes are the Susceptible-Infected-Susceptible (SIS) [2], and the Susceptible-Infected-Resistant (SIR) dynamics [3]. In both models, as in the SI model, a node in the susceptible state (S) transitions to the infected state (I) at a rate equal to an infection rate times the number of infected neighbors – however nodes do not remain infected forever. In the SIS model, an infected node transitions back to the susceptible state (S) according to a cure rate – the critical parameter herein is the ratio of the infection to cure rate, denoted as β 1 . In the SIR dynamics, a node in state (I) upon being cured enters a resistant state (R), whereupon it is removed from the system. Note that the absorbing states of the SIS/SIR models correspond to the epidemic becoming extinct – for the SIS process, this is when all nodes are in state (S ), while for the SIR process it is when all nodes are either in state (S) or (R)2 . In this work, we characterize the impact of external sources on phase transition phenomena in SIS/SIR epidemics.. In addition to technical contributions to the understanding of epidemic processes (in terms of new techniques and intuition for threshold phenomena), our results are significant in terms of their interpretation for certain real-world settings. Our analysis captures both the worst-case perspective (by how much can the extinction time of a ‘harmful’ epidemic be extended via an adversarial external agent?) and the design perspective (how can we design the external policy to prolong 1 It turns out that without loss of generality, we can normalize the cure rate to 1 – the ratio of the two is sufficient to characterize the system. 2 Specifically, an absorbing state of the SIR model consists of any connected component of nodes in state (R), and the rest in state (S) the lifetime of ‘useful’ epidemic). In particular, it is instructive to keep in mind two particular examples: • Epidemiology - Characterizing the spread of a human disease/computer worm in a network, aided by external agents. Here the aim is to understand the worst case scenario that could be induced by external agents un- constrained by locality/geography. In human diseases, the external agents correspond to long-distance travellers; for the propagation of computer viruses spreading on a local network, long-range jumps are via the Internet, or sometimes, through portable disks. • Product advertising - Enhancing brand recall amongst consumers via viral means (word-of mouth, viral ads on online social networks, etc.) coupled with long-range ‘broadcast’ advertising (TV advertising, targeting cus- tomers for special offers, etc.). The aim here is the exact opposite of the previous case – how can product aware- ness be sustained for a longer time via well-designed advertising strategies. A. Our Contributions We consider graphs Gn = (V , E ), parametrized by the number of nodes V = n, in which an epidemic commences spreading through two interacting processes: an intrinsic spread, and an additional external infection. The intrinsic spread follows either the SIS or SIR dynamics (refer Section I for an informal description, and Section II for details). For the external infection process, similar to the model in [1], each node becomes infected (if susceptible) at a different (zero or non-zero) exponential rate at each instant in addition to the intrinsic process; thus at time t, the external infection can be represented as a V -dimensional vector ¯L(t) of external infection-rates for each node. We allow the external rates to be chosen as a function of the network state and history (omniscience) and further, potentially designed to maximize the extinction time (adversarial) – the only constraint on the external process is that it has bounded virulence, i.e., the total external rate at any instant is less than some parameter µ (which can be a function of n). Further, we assume that the external source exists if and only if there is at least one infected node in the network, ensuring that our process has the same absorbing states as the original epidemics. We focus on characterizing the expected time to extinction E[TS I S ] (and in case of the SIR model, the number of eventual infected nodes) as a function of four factors: (i) the intrinsic infection rate β (with intrinsic cure rate normalized to 1), (ii) the external virulence µ, (iii) the graph topology, and iv . the external infection policy. Our main results are as follows: 1) (Subcritical SIS epidemic): Under the SIS dynamics with µ = O(1) (constant external infection), for any graph G with maximum degree dmax , and any external infection policy, if β dmax < 1, then E[TS I S ] = O(1), i.e., the epidemic dies out in constant time. For comparison, the critical threshold for subcritical epidemics without external infection is βλ1 < 1 [2], 2 where λ1 is the leading eigenvalue of the graph adjacency matrix; note that davg ≤ λ1 ≤ dmax . 2) (Critical SIS epidemic): Under the SIS dynamics with (cid:28) β < 1 , i.e., order- µ = O(1), for any graph if 1 dmax λ1 wise greater than (dmax )−1 , but less than (λ1 )−1 , then there exists an external infection policy resulting in an extinction time which is at least polynomial in n. this is tight Furthermore, in that for any graph with sufficiently large maximum-degree, and any infection policy with the above choices of β and µ, the extinction time is also bounded by a polynomial in n. To the best of our knowledge, this is the first rigorous demonstration of such a polynomial-lifetime regime in SIS epidemics. 3) (Supercritical SIS epidemic): Next, we consider the problem of designing an external infection strategy so as to result in a supercritical epidemic, i.e., E[TS I S ] = enΩ(1) . Without external infection, the best-known suffi- cient condition for this is β η ≥ 1 [2], where η is the graph conductance3 . We show that if the external rate µ grows with the number of infected nodes I as γ I , for some constant γ > 0, and up to some I = nα , then even a random external infection strategy ensures exponential epidemic lifetime provided β η + γ ≥ 1. 4) (Subcritical SIR epidemic): Finally, we show that µ = Θ(1) is a tight threshold for subcritical epidemics – if β dmax < 1, then the number of infected nodes is sub-polynomial in n, whereas if β is orderwise greater, then it is possible to infect a polynomial number of nodes independent of where the infection starts spreading. A unique feature of our analysis is that unlike most existing work on the SIR epidemic which essentially reduce the problem to studying a static process, our model necessitates an understanding of the dynamics of the SIR model – we achieve this via a coupling between the SIS and SIR models. We formally state these results in Section III. In addition, in Section III-E, we highlight the importance of our results through detailed analyses of several important settings – we discuss both the import of our results in real-world examples, as well as apply them to characterize epidemic lifetimes in some important classes of networks. B. Related Work The spread of processes over graphs/networks has been studied in various contexts (e.g., epidemiology [4], [5], [6], sociology [7], [8], applied probability [9], [10], [11]). The SIS/SIR processes has been widely studied to char- acterize its phase transitions. The foundational work in the probability community focused on infinite regular graphs, in particular, grids and trees [10]. For finite graphs, phase transitions were first characterized via empirical [12], [13], and also approximate (mean-field) techniques [14], [15]. Other works have provided a more rigorous analysis of phase tran- sition – in particular, Ganesh et al. [2] for general graphs, 3More specifically, the local conductance, i.e., the isoperimetric number of all sets of size ≤ nα for some α > 0. and some specific families, and Berger et al. [16] for the preferential attachment graph. These papers provide conditions for subcritical and supercritical regimes under the SIS model. Draief et al. [3] undertake a similar program for the SIR model. Our work follows in the line of these results, providing a rigorous characterization for epidemics with external sources. The role of external sources in epidemic spread has been studied under different models. In the context of human disease spread, works include [17] (airline effects), [18] (geo- graphic effects) and [19] (multiscale effects). This is paralleled by studies of epidemics on computer/mobile phone networks [20], [21], [22]. Finally, in the context of social networks, Myers et al. [23] consider a model similar to our model of random external infection, and use Twitter data to estimate the extent of external influence. Several studies in literature consider network intervention to modify spread properties. The authors in [24] study enhancing epidemics via designing the seed set. In [14], the authors change the graph topology via additional edges; this in some sense is an optimization view of the famous ‘small-world’ graph constructions [25], [26]. Wagner and Anantharam [27] consider redistributing edge infection-rates in a line network so as to ensure long-lasting epidemics. A complementary setting to this is considered by Borgs et al. [28], wherein the cure-rate can be redistributed among nodes to minimize the infection spread. All of these works only consider static (or one-shot) policies – we instead allow our external agents to dynamically change their policies. Finally, our earlier work [1] considers the same model of external infection, but for spreading processes (in particular, the SI dynamics). However, unlike spreading processes, where external agents always speed up spreading, this work shows that the situation is much more subtle for epidemic processes. I I . MODE L Intrinsic infection: As mentioned before, we consider epi- demic processes on an underlying graph G(V , E ) (with V = n). The process evolves in continuous-time t following either the SIS or the SIR dynamics. In the SIS model, a node exists in one of the two states: susceptible (0) or infected (1). The state of the network at any time t is given by X(t) ∈ {0, 1}n (with Xi (t) the state of node i at time t). Infected nodes propagate the epidemic to neighboring susceptible nodes at rate β , and revert to being susceptible at a rate 1. Hence at a time t the transition for a node j in the network follows a Markov process with (cid:88) transitions: 0 → 1 : at rate β i:(i,j )∈E Xi (t), 1 → 0 : at rate 1. In the SIR model, a node can take 3 states: susceptible (0), infected (1) or resistant (e). Now an infected node, i.e., with state (1), upon recovering transitions to a resistant state (e) – subsequently it plays no further part in the dynamics. Thus 3 (cid:88) the transition for node j follows a Markov process: 0 → 1 : at rate β i:(i,j )∈E ,Xi (t)(cid:54)=e Xi (t), 1 → e : at rate 1. Note that state (e) is an absorbing state for a node. External infection: Our model for external infections is the same as in [1]. We formally model the external infection as a time-varying vector L(t) = {Li (t) : i ∈ V }, where Li (t) ≥ 0 is the extra rate (i.e., in addition to any intrinsic infection rate) at which the external source tries to infect node i at time t. We define the external virulence as L(t)1 ≤ µ – one way to visualize this is that the external source’s infection times follow a Poisson process with rate µ, and during each infection event (say at time t), the external source infects a single node j with probability Lj (t) µ . The external infection- rate vector L(t) (and the virulence µ) can vary with time t and can depend on the state of the network S (t). Our external infection model generalizes several models for long-range infection spreading, in particular: • µ = 0 reduces to the underlying SIS/SIR process. • Static long-range edges: µ is the number of additional edges added; Li (t) at time t is the number of long-range edges incident on node i that have an infected node at the other end. • Dynamic long-range edges: Same as above, but the set of additional edges can be changed over time. • Mobile agents: One/several mobile agents spread the infection (and which can move arbitrarily over the graph). This can also model targeted advertising, giving ‘special offers’ for individuals, etc. • Broadcasting with bandwidth constraints: An external source with bandwidth µ, which can be shared across any set of nodes. Such a model can be used for broadcast advertising (eg., TV/magazine ads), or dissemination of software updates from a central server, etc. Note that we do not claim our results are the tightest possible under all models of infection via external sources. Some of the above have been studied before, and it is sometimes non-trivial to analyze particular models of external infection, such as additional long-range links [14] or agents performing random walks on the graph [29]. However, our model and analysis does capture many of the salient features of these models, reproducing some existing results, and more importantly, help- ing characterize many new settings. At a higher level, our work suggests that such models for external infection exhibit a certain dichotomy – external infection sources either do not affect the phase transition points (if µ is insufficient), or if they do change the threshold (i.e., if µ is large enough), then they do so even if the strategy is random. Notation: We denote Z0 to be the collection of non-negative integers, and R0 to be the real numbers. Further, we use the Landau notation (O , Θ, Ω) to describe the growth rate of functions. We use {≥st , ≤st} to denote stochastic dominance relations between random variables; specifically Y ≥st X implies that P[Y > r] ≥ P[X > r] for all r. I I I . MA IN R E SU LT S AND D I SCU S S ION We now state our main results, and discuss their implica- tions for different graphs, and different external agent models. We present the results and discussions here, with brief proof outlines. In Section IV, we discuss in more detail some of the technical novelty of our analysis. The complete proofs are presented in the appendix. A. Subcritical SIS Epidemic For an SIS epidemic X(t) = {Xi (t) : i ∈ V }, the metric of interest is the extinction time, given by: TS I S = inf {t : X(t) = 0}. Note that this definition remains consistent under our model of external agents, as we define the external infection vector L(t) to be 0 when X(t) = 0. Note also that the distribution of TS I S depends on the initial condition X(0). Recall that the subcritical regime is one wherein the extinc- tion time of an epidemic is small (usually O(1) or O(log n)). Our main result for subcritical SIS epidemics in the presence of external infection agents is as follows: Theorem 1. Given an SIS epidemic with intrinsic infection rate β on a graph G with maximum degree dmax , if the initial number of infected nodes is O(1) (arbitrarily chosen) and β dmax < 1, then for any external infection strategy with rate µ = O(1), we have: E[TS I S ] = O(1). Prior work for the intrinsic SIS epidemic (i.e., without external agents) reveals that the subcritical threshold for β is , where λ1 is the largest eigenvalue (or spectral related to 1 λ1 radius) of the adjacency matrix. This fact, though earlier known empirically and via mean-field approximations, was formally established by Ganesh et al. [2], who showed that if βλ1 < 1, then E[TS I S ] = O(log n)4 . Note that for any graph, davg ≤ λ1 ≤ dmax (where davg is the average degree). Thus for d-regular graphs, the spectral radius is equal to the maximum degree; moreover, for any graph, β dmax < 1 is a sufficient condition for the sub-critical regime. What Theorem 1 shows is that under constant external infection (i.e., µ = O(1)), β dmax < 1 remains a sufficient condition for sub-critical epidemics – as long as the initial infected set is of size O(1), the epidemic has O(1) extinc- tion time, under an arbitrary choice of the initial infected nodes, and arbitrary external infection strategies (including omniscient and adversarial strategies). Proof outline: We first embed the multi-dimensional Markov chain in a suitable 1-dimensional Markov chain – we do this by considering the total number of infected nodes in the network and embedding it in a Markov chain via stochastic domination arguments. Similar techniques were used to show supercritical behavior in [2], [16] – however the resulting 4Note that this result does not make any restrictions on the size of the initial infected set. The log n factor is then inevitable – essentially, it is the expected time for n isolated infected nodes to recover. 4 Markov chains in those works have an absorbing state at 0 (i.e., if there are no infected nodes in the network). A critical contribution of our work is to show that it is possible to further embed the process in an ergodic Markov Chain, by adding some virtual transitions, while preserving the quantities of interest (in this case, the time to absorption). This technique allows us to easily compute closed-form bounds for the absorbing time,even under complex external-infection policies. The complete proof is given in Section A in the Appendix. Comparing with the bounds for the intrinsic infection raises the following natural question – what happens in settings max (cid:28) β < λ−1 where µ is still O(1), but d−1 (i.e., β is 1 orderwise greater than d−1 max , but below the subcriticalilty threshold). We focus on this in the next section where we show that such a setting does in fact make a difference – it leads to a regime where the resulting epidemic has a polynomial lifetime. B. Critical SIS Epidemic max (cid:28) β < λ−1 Suppose now µ is still O(1), but d−1 – in 1 other words, it is not large enough to escape the subcritical regime without external aid, but larger than the sufficient condition in Theorem 1 for O(1) extinction time with ex- ternal aid. The question now is whether this regime is also subcritical, or if there is a fundamental shift in the epidemic lifetime in this region brought about by the external agents. This is particularly important in settings where dmax and λ1 differ greatly – for example, graphs with a power law degree distribution. In this section we show that there is in fact a fundamental shift in this regime – for a large class of graphs, the presence of the external source causes an orderwise change in the epidemic lifetime, which we characterize in a tight manner. First, existing results for subcritical epidemics without external aid (in particular, Theorem 3.1 in [2]) can be bootstrapped to derive the following upper bound on the extinction time: Theorem 2. For an SIS epidemic with βλ1 < 1, originating from any set of initially infected nodes, and aided by any external infection strategy with µ = O(1), we have E[TS I S ] = nO(1) , i.e., the lifetime is at most polynomial in the number of nodes. Proof Outline: The main intuition behind this result is that within any time interval that is O(log n), the external infection has a n−λ (for some λ = Θ(1)) probability of failing to infect even a single node. Furthermore, existing results indicate that for any initial set of infected nodes, a subcritical epidemic has O(log n) expected extinction-time. Now we can combine these two facts to create a stochastically dominating process, wherein whenever the external agent successfully infects a node, we instead assume all the nodes in the system are infected – however by our previous observation, this can happen at most a polynomial number of times. The complete proof is given in Section B in the appendix. Thus we know that the epidemic can last for a time at most polynomial in n - however can this be achieved? The answer to this is provided in the following result: for some α > 0, suppose β = Ω (cid:0)n−α(1−) (cid:1) for some  > 0. Theorem 3. For SIS epidemics on graphs with dmax = Ω(nα ) Then, for any initial infected set, there exists external infection policies with µ = O(1) such that, for some λ = Θ(1): E[TS I S ] = Ω(n−λ ). The implication of this theorem is as follows: if we con- sider any graph with sufficiently large maximum degree (i.e., scaling polynomially with n), then an intrinsic infection rate of β >> d−1 max coupled with a constant external infection is sufficient to ensure that the epidemic lifetime is at least √ polynomial in n. Now the first eigenvalue of the adjacency dmax} ≤ λ1 ≤ dmax – thus it can matrix satisfies max{davg , √ be order-wise less than dmax . For example, for the star graph on n nodes, we have λ1 = n while dmax = n. The above theorem now implies that for such graphs, it is possible to max (cid:28) β < λ−1 choose an intrinsic infection rate such that d−1 1 , and then design an appropriate external infection strategy to ensure polynomial lifetime. Note that this is not unique to the star graph – for many graphs, like power-law and other heavy- tailed degree distributions, it is known that the maximum degree is polynomial in number of nodes, and further, there is an order-wise difference between λ1 and dmax (see also [2]). The above theorem implies that constant external-infection can cause a polynomial-lifetime critical regime in such networks. Proof outline: The proof proceeds in three steps. First, given any initial infected set, the external source can infect the node with degree dmax with at least constant probability (by focusing its entire virulence at that node). Next, by coupling arguments, the process subsequently can be stochastically dominated by considering an SIS process on a single star of degree dmax . The main technical ingredient is showing that the SIS infection on a star on dmax = nα nodes lasts for a time that is at least polynomial in n if aided by an external source of at least constant virulence; note that this is not true if the external source is absent (from existing results in [2], [16]). The complete proof is given in Section B in the appendix. C. Supercritical SIS Epidemic The results in the previous two sections indicates that O(1) external infection is insufficient to push an epidemic from the subcritical to the supercritical regime - it can at most increase the lifetime to a polynomial function of n, but not to an exponential. The question we address now is what conditions on µ are sufficient to ensure exponential epidemic lifetimes – i.e. E[TS I S ] = enΩ(1) . More specifically, we want to design an external-infection scheme that guarantees that epidemic is in the supercritical regime; ideally, this policy should work for any graph/initial infected set/intrinsic infection rate β . The results from the previous section show that we need µ to grow with n to have any chance of reaching the supercritical regime. In fact, it 5 turns out that just scaling with n is not sufficient, as we prove the following refinement of Theorem 1, that demonstrates that even if µ grows slowly with n, it can not escape sub- exponential extinction times: (cid:17)5 results in sub-polynomial lifetime, i.e., (cid:16) log n Theorem 4. For the SIS epidemic on graph G, if β dmax < 1 and the initial infected set is O(1), then: 1) µ = o log log n E[TS I S ] = no(1) . 2) µ = O (polylog(n)) results in sub-exponential lifetime, specifically E[TS I S ] = O(epolylog(n) ). Thus, in order to achieve exponential epidemic lifetimes, it would appear that we need µ to be at least polynomial in n. However this is impractical for real-world settings – for example, it implies having a very high advertising budget, or a large number of infected long-distance travelers. Further, such an assumption is somewhat trivial from a mathematical point of view, as essentially the external infection dominates any effects of the intrinsic infection. However, it turns out we can circumvent this problem in the following way: instead of considering a fixed, large µ, we allow µ to scale with the size of the infected population (upto some maximum size). Note that from the previous theorem, it is clear that we need the maximum size to be polynomial in n, however the required external rate over time may be much smaller. This is the situation we consider next; in Section III-E, we discuss the relevance of this assumption in various settings. To state our results, we first need to recap the best known conditions for the supercritical regime for the SIS epidemic without external infection. For this, we need to introduce the generalized isoperimetric constant η(m) of a graph G [2], defined as follows: E (S, S c ) S , η(m) = min S⊆V :S ≤m where S is any subset of nodes (of size ≤ m, with its complement S c = V \ S ), and E (S, S c ) is the set of edges with one endpoint in S and one in the complement. The isoperimetric constant captures the notion of a bottleneck set: one which has the smallest number of edges exiting it, normalized by the number of nodes in the set. It is related to the notion of expansion on graphs – in particular, the above definition is equivalent to a ( m n , η(m))-expander [16]. Further, via Cheeger’s inequality, it is also related to the second largest eigenvalue λ2 of the adjacency matrix. Finally, it is known [2] that if β η(nα ) > 1, then for any initial set of infected nodes, we have E[TS I S ] = Ω(enα ). We now show how this can be improved with external sources. Suppose we define the set of infected nodes at time t as I (t) ⊆ V . Now we have the following sufficient condition for the epidemic to enter the supercritical regime: Theorem 5. Consider the SIS epidemic on graph G: given any α > 0, suppose the external infection rate µ scales linearly 5Recall f (n) = o(g(n)) means that limn→∞ f (n) g(n) = 0. . with the number of infected nodes I as µ = γ I for I < nα . Now if the intrinsic infection rate satisfies β η(I ) + γ > 1, then under an external infection strategy which infects nodes uniformly at random, we have E[TS I S ] ≥ enα We can unravel this result as follows – to achieve supercrit- icality, we require: • The external infection-rate scale linearly with the number of infected nodes I upto a maximum limit which is at least polynomial in n (though it can be of as small an order as we desire). • The slope of the line γ must obey γ > 1 − β η(nα ): essentially, it must compensate for the gap between the intrinsic rate and the critical threshold. • The external infection need not be specifically designed – in fact, it can be random. More specifically, it is sufficient to try to infect each node at a rate µ n , irrespective of whether it is already infected or not. We give an outline of the proof in Section IV-A; the complete proof is provided in Section C of the appendix. Combining all the previous theorems, we get the following summary for the SIS epidemic with external agents: suppose we have an intrinsic infection with rate β which is below the critical threshold, then adding a constant amount of additional external infection will either leave the extinction time unaf- fected (in a scaling sense, if β dmax < 1), or at best, if designed carefully, improve it to a polynomial in n (if β dmax >> 1). If however, we want to push the epidemic into the supercritical regime, we can do so by making the external rate grow linearly with the number of infected nodes, at a rate equal to how much β is below the threshold. The three regimes are summarized in Figure 1. We interpret these results in more detail via several examples in Section III-E. Illustration of the 3 regimes in SIS epidemics with external infection Fig. 1. sources: For µ = O(polylog(n)), we get subcritical and critical regimes, depending on β ; µ scaling linearly with I results in a supercritical epidemic. D. Subcritical SIR Epidemic Next we turn to the case of the SIR epidemic (see Section II for definitions). Recall that in this model, an absorbing state consists of a connected set of nodes in state (e), and the rest in state (0). We define the time to extinction TS IR of the epidemic as before. However a more important object of study here is the number of nodes eventually infected by the epidemic – we denote this as NS IR = I (TS IR ). 6 We assume throughout that the initial number of infected nodes is O(1), and they are chosen arbitrarily – this can be generalized, but since we are interested in the number eventually infected, this assumption is appropriate. We also note that there are two models which are referred to as the SIR model in literature – the one we define in Section II, wherein the nodes transition from state (1) to (e) according to an E xponential(1) clock, and an alternate model wherein the nodes transition from (1) to (e) after a deterministic time (usually 1 unit). We consider only the former model in this work; the results can be generalized to the latter in a straightforward way. Sufficient conditions for subcritical SIR epidemics, i.e., with small E[NS IR ], have been (rigorously) established – in particular, Driaef et al. [3] show that β dmax < 1, then E[NS IR ] = O(1)6 . Our main result in this section is a generalization of this result for the setting with external agents: Theorem 6. For the SIR epidemic on graph G with external infection-rate µ = O(1), if β (dmax − 1) < 1, then for any external infection policy, we have: (cid:17) (cid:16) log n E[NS IR ] = O(1). then the number of nodes Further, if µ = o log log n eventually infected is sub-polynomial – i.e., E[NS IR ] = no(1) . This means that any infection with intrinsic rate less than d−1 max can infect only a vanishing fraction of the nodes if the log n external infection strength is less than log log n . Proof Outline: As existing bounds on the SIR epidemic are obtained by observing the structure of the infection as t → ∞[3], it is difficult to take the same approach to incorporate external infection. We instead build on our results for the SIS epidemic spread via a coupling argument. The main observation is that for SIS and SIR epidemics on the same graph, with identical intrinsic rate β , as well as external rate µ (and identical external infection strategies), the extinction time for the SIS infection stochastically dominates that of the SIR infection. Using this, we can use various coupling arguments to get the result. The complete proof is given in Section D of the appendix. These conditions, in particular, for ensuring sub-polynomial number of infected nodes, are again tight in case of graphs with sufficiently large (polynomial) maximum degree. In par- ticular we have the following result: Lemma 7. Consider a graph G with maximum degree dmax = Ω(nα ) for some α > 0. For an SIR epidemic with β = Ω (n−α ) for 0 <  < α, aided by external infection-rate µ = Ω(1), then there exists an external infection policy such that E[NS IR ] = Ω(nk ) for some k > 0. Thus constant external infection does not significantly change the number of infected nodes when the underlying 6One can also get results for the case when βλ1 < 1, but the bounds are in terms of the eigenvectors of the adjacency matrix, making them harder to interpret in general. epidemic is subcritical. E. Discussion and Examples We conclude the presentation of our results by showing how they can be applied to various settings. Epidemiology: Both the SIS and SIR models are widely used to model human epidemics [13], and also computer viruses/worms [12]. SIR dynamics is used in cases where re- covery from an infection prevents re-infection (e.g., resistance in humans, patches for computer viruses); the SIS dynamics more closely models cases where an infection may return via mutations in the parasite (in fact this is true even for computer worms, which have been known to circumvent patches by exploiting multiple vulnerabilities). Finally, external sources have long been known to promote the spread of such epi- demics, be it via long-distance air travel/shipping propagating human diseases, or worms spreading via the Internet. What do our results imply for such settings? On the positive side, Theorems 1 and 2 show that an external source of constant virulence can not cause an infection to become supercritical – further, Theorem 3 reaffirms the intuition that the critical nodes that need to be defended against the infection are the ones which have high-degree. This is in a sense complementary to the results of Borgs et al. [28], who show that an effective strategy for distributing antidotes (i.e., augmenting recovery rates) is to provide it to nodes proportional to their degree. Our result can be viewed in terms of designing preventive measures – to control epidemic spread, one should vaccinate/quarantine nodes with a high degree. However, it can be argued that in many cases, the number of external agents actually does scale as γ I - for example in case of long-distance travel, if we assume that the people traveling are randomly chosen (irrespective of whether infected or not), then the number of infected people traveling does scale linearly as the number of infected people. In such a regime, the import of Theorem 5 is more grim – it suggests that an infection can become supercritical if such travel is not curbed before a certain point, and further this is not affected if the travel is random. This matches the empirical observation that epidemics which have a long incubation period (i.e., do not show symptoms in carriers till long after infection) often tend to become more widespread. Advertising: It is widely accepted that the recall of a product in the minds of consumers is jointly affected by its prevalence in social circles (e.g., if many your friends use a certain product, then you would tend to use it as well) and the use of advertising. Moreover, advertising can be both via broadcast media (e.g., TV/magazine ads, billboards) and also, increasingly, viral media (e.g., word of mouth, videos on Youtube, etc.). This scenario is very well modeled by the SIS/SIR epidemic – the epidemic represents the recall of a brand, which is strengthened by local interactions, and also by broadcast advertising; further, the rate of TV/magazine ads are subject to advertising budgets. In this domain, our results make very clear recommenda- tions – for any brand, a constant advertising budget is not 7 sufficient to ensure long-lasting recall. However, increasing the advertising budget proportional to the number of customers (which is viable since the revenues also increase) can achieve supercritical behavior. In terms of advertising strategy, our results suggest that if the budget is small, then targeted advertising, biased towards highly-networked consumers, is more beneficial - however, if the budget is large enough (and scaling linearly with the number of customers), then broadcast advertising (which can be thought of as a random infection strategy) is sufficient. Popular Models for Network Formation: Our results can be applied to specific graph families to obtain thresholds for the different regimes – however, they may not be the tightest in all graph families. Such a program is carried out in [2], who characterize λ1 and η(m) for several families of graphs, including random graph families such as the G(n, p) and certain families of power-law graphs – since our thresholds are also in terms of the same quantities, these results carry over to our setting, and in addition we get additional results for the case of external infection; for example, for graphs with sufficiently high maximum degree, we show that O(1) external infection rate is sufficient to push the lifetime to poly(n). However, our results allow for analysis of more sophisti- cated models of external infection. To illustrate this, consider the example of Kleinberg’s small-world network construction [25] – this consists of a 2-dimensional grid, where each node has an additional long range link, the other end of which is selected according to some given distribution. Viewing these long-range links as external-infection sources, we see µ = β (cid:0)I − n−1+α (cid:1) as long as I ≤ nα ). Now, using that the external infection rate increases roughly as β I (in particular, if the long-range link is chosen uniformly, then Theorem 5, we have that if β > 1, then the epidemic is supercritical. IV. PROO F S O F S E LECT ED R E SU LT S Due to lack of space, we defer complete proofs to the ap- pendix. Instead, we outline some of the main technical novelty behind our results; these ideas may be of independent interest for tackling other questions regarding epidemic processes. A. Embedding in a Dominating Ergodic Markov Chain The main idea for the results in the subcritical and super- critical regimes is to study the dynamics of the total number of infected nodes in the network at time t. This depends on the exact network topology; however it is possible to stochastically dominate it via appropriate 1−dimensional Markov Chains. Similar techniques have been used before [2], [16]; however in all prior work, state 0 is an absorbing state, and the absorption time is estimated via Martingale techniques. A technical novelty in our proof is that we embed the chain in an ergodic Markov chain, in a way that preserves the absorption time. This allows us to obtain closed-form expressions for the absorption time, and also consider more complex external infection strategies. We now outline this technique. 8 E[TL,0 ] = using detailed balance equations – this gives us the closed- form expression for E[T1,0 ]. The above lemma can be extended to a setting where the initial number of infected nodes is some L > 0. As before, k that has the same transition we construct a Markov chain U L probabilities as Uk , but now with an additional transition p0,k = 1 – again we have U L k is irreducible, finite state, and hence ergodic. Let πL denote the stationary distribution for k . We have the following lemma: U L L(cid:88) k(cid:89) n(cid:88) Lemma 9. i=L+1 k=L+1 k=1 where fk s are quantities that depend only on the transition probabilities for states in {0, 1, · · · , L}. Proof: The proof is identical to that of Lemma 8 – the only difference is that the chain is a birth-death chain for states ≥ L. Thus the expression for the stationary probability of state 0 has additional terms which depend on transition-rates of states between 1 and L; in our applications, the terms fk , fL are all O(1), and do not affect the scaling. The above lemmas allow us to get detailed characterizations for the subcritical and supercritical regimes. For complete proofs of Theorems 1, 4 and 5, refer Section C in the Appendix. pi−1,i pi,i−1 fk + fL B. Dynamic Analysis of the SIR Epidemic Studying thresholds for the SIR model with external in- fection requires understanding the transient behavior of the process. To this end, we develop the following coupling argument relating the dynamics of the SIR to the SIS model: Lemma 10. Consider an SIR epidemic on graph G with intrinsic infection-rate β and a given external infection policy with infection-rate µ. For an SIS epidemic on the same graph with identical external infection policy (i.e., same L(t) ∀ t), we have: TS I S ≥st TS IR . Proof: The result follows from a simple coupling argu- ment, wherein when a node gets recovered in the SIR model, it becomes susceptible in the SIS model. Now, given that the external infection policies are identical, the SIS epidemic dominates the SIR epidemic with respect to extinction time. R E F ER ENC E S [1] A. Gopalan, S. Banerjee, A. K. Das, and S. Shakkottai, “Random mobility and the spread of infection,” in IEEE INFOCOM, 2011, pp. 999–1007, see also longer version titled "Epidemic Spreading with External Agents" (available on arXiv.org). [2] A. J. Ganesh, L. Massoulié, and D. F. Towsley, “The effect of network topology on the spread of epidemics,” in IEEE INFOCOM, 2005, pp. 1455–1466. [3] M. Draief, A. Ganesh, and L. Massoulie, “Thresholds for virus spread on networks,” The Annals of Appl. Prob., vol. 18, pp. 359–378, 2008. [4] R. M. Anderson and R. M. May, Infectious Diseases of Humans Dynamics and Control. Oxford University Press, 1992. Fig. 2. Dominating chain for the total number of infected nodes. The transition rates {r(i)} are appropriately chosen to over/under dominate the underlying process. A ‘virtual’ 0 → 1 transition makes the chain ergodic. First, consider the continuous-time Markov chain for the aggregate infected nodes – note that transitions from any state (i.e., increase/decrease in the number of infected nodes) happen at a rate at least 1 and at most βn2 + n + µ ∼ poly(n). This allows us to consider a uniformized discrete-time Markov chain; from the previous observation, we see that the number of time-slots till absorption for the discrete chain is within a poly(n) factor of the time to absorption for the continuous chain. This is the reason this technique is most useful for the subcritical/supercritical regimes, but not fine-grained enough to capture the intermediate critical regime. Now consider a DTMC Uk , k ∈ Z0 on {0, 1, · · · , n} with state-transitions pi,i+1 , pi,i−1 > 0 for 1 ≤ i ≤ n− 1, pn,n−1 = 1, and remaining transitions having probability 0 – i.e., a birth- death chain, with absorbing state at 0 and reflection at n. Next, consider another DTMC, denoted Uk , on the same state space with the same transition matrix as Uk , but in addition, with p0,1 = 1 (i.e., a reflection at 0 instead of absorption). Note that Uk has an absorbing state and hence is not an ergodic DTMC; Uk , however, is an irreducible, aperiodic, finite state Markov chain, and hence ergodic [30]. The chain Uk is often referred to as the Ehrenfest Urn Process [30]; we denote π as the stationary distribution of Uk . Now let T1,0 be the time to hit 0 for the DTMC U starting from state 1 (i.e., the time to absorption with initial state 1). Then we have the following lemma: Lemma 8. E[T1,0 ] + 1 = 1 π(0) More specifically, in terms of the transition probabilities of n(cid:88) k(cid:89) Uk , with p0,1 defined to be 1, we have: i=1 k=1 Proof: First note that the distributions of T1,0 and T1,0 are same – this is because a sample path from state 1 to state 0 for Uk does not experience a 0 to 1 transition. Further, since the transition from 0 to 1 happens with probability 1, T0,0 = 1+ T1,0 a.s,. and as Uk is an ergodic Markov chain, the expectations for both the random variables exist, and also the expected return time for any state i is π(i)−1 . Putting these together we get the first claim. For the second, observe that for a birth-death DTMC with transition provabilities pi,i+1 and pi,i−1 , we can exactly evaluate the steady state distributions E[T1,0 ] = pi−1,i pi,i−1 [5] M. J. Keeling and K. T. Eames, “Networks and epidemic models,” Journal of the Royal Society Interface, vol. 2, no. 4, pp. 295–307, 2005. [6] D. J. Daley and J. Gani, Epidemic modelling: an introduction. Cam- bridge University Press, 2001, vol. 15. [7] E. M. Rogers, Diffusion of Innovations, 5th Edition. Free Press, August 2003. [8] A. Vespignani, “Modelling dynamical processes in complex socio- technical systems,” Nature Physics, vol. 8, pp. 32–39, 2012. [9] M. Draief and L. Massoulié, Epidemics and rumours in complex networks, volume 369 of London Mathematical Society Lecture Notes. Cambridge University Press, Cambridge, 2010. [10] T. M. Liggett, Stochastic interacting systems: contact, voter and exclu- sion processes. Springer, 1999, vol. 324. [11] R. Pastor-Satorras and A. Vespignani, Evolution and structure of the Internet: A statistical physics approach. Cambridge Univ. Press, 2007. [12] J. O. Kephart and S. R. White, “Directed-graph epidemiological models of computer viruses,” in IEEE Symposium on Security and Privacy, 1991, pp. 343–361. [13] R. Pastor-Satorras and A. Vespignani, “Epidemic Dynamics in Finite Size Scale-Free Networks,” Phys. Rev. E, vol. 65, no. 3, p. 035108, Mar 2002. [14] D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos, “Epi- demic thresholds in real networks,” ACM Transactions on Information and System Security (TISSEC), vol. 10, no. 4, p. 1, 2008. [15] P. Van Mieghem, J. Omic, and R. Kooij, “Virus spread in networks,” Networking, IEEE/ACM Transactions on, vol. 17, no. 1, pp. 1–14, 2009. [16] N. Berger, C. Borgs, J. T. Chayes, and A. Saberi, “On the spread of viruses on the internet,” in Proceedings of the sixteenth annual ACM- SIAM symposium on Discrete algorithms. Society for Industrial and Applied Mathematics, 2005, pp. 301–310. [17] V. Colizza, A. Barrat, M. Barthélemy, and A. Vespignani, “The role of the airline transportation network in the prediction and predictability of global epidemics,” Proceedings of the National Academy of Sciences, vol. 103, no. 7, pp. 2015–2020, 2006. [18] B. Wang, K. Aihara, and B. J. Kim, “Immunization of geographical networks,” in Complex (2), 2009, pp. 2388–2395. [19] D. Balcan, V. Colizza, B. Gonçalves, H. Hu, J. J. Ramasco, and A. Vespignani, “Multiscale mobility networks and the spatial spread- ing of infectious diseases,” Proceedings of the National Academy of Sciences, vol. 106, no. 51, pp. 21 484–21 489, 2009. [20] J. Kleinberg, “The Wireless Epidemic,” Nature, vol. 449, pp. 287–288, September 2007. [21] D. Moore, C. Shannon et al., “Code-red: a case study on the spread and victims of an internet worm,” in Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. ACM, 2002, pp. 273–284. [22] P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabasi, “Under- standing the spreading patterns of mobile phone viruses,” Science, vol. 324, no. 5930, pp. 1071–1076, May 2009. [23] S. A. Myers, C. Zhu, and J. Leskovec, “Information diffusion and influence in networks,” in Proceedings of the 18th ACM external SIGKDD international conference on Knowledge discovery and data mining. ACM, 2012, pp. 33–41. [24] D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of influence through a social network,” in KDD ’03: Proc. 9th ACM SIGKDD International Conference on Knowledge Discovery and Data mining. ACM, 2003, pp. 137–146. [25] J. Kleinberg, “Small-world phenomena and the dynamics of informa- tion,” Advances in neural information processing systems, vol. 1, pp. 431–438, 2002. [26] M. E. Newman and D. J. Watts, “Scaling and percolation in the small- world network model,” Physical Review E, vol. 60, no. 6, p. 7332, 1999. [27] A. B. Wagner and V. Anantharam, “Designing a contact process: the piecewise-homogeneous process on a finite set with applications,” Stoch. processes and their applications, vol. 115, no. 1, pp. 117–153, 2005. [28] C. Borgs, J. Chayes, A. Ganesh, and A. Saberi, “How to distribute an- tidote to control epidemics,” Random Structures & Algorithms, vol. 37, no. 2, pp. 204–222, 2010. [29] M. Draief and A. Ganesh, “A random walk model for infection on graphs: spread of epidemics & rumours with mobile agents,” Discrete Event Dynamic Systems, vol. 21, no. 1, pp. 41–61, 2011. [30] P. Bremaud, Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues, corrected ed. Springer-Verlag New York Inc., February 2001. 9 A P P END IX A. Subcritical SIS Epidemics with External Agents We now prove Theorems 1 and 4, using the techniques discussed in Section IV-A. Proof of Theorem 1: As transitions in X(t) are via exponential clocks, hence the system is a continuous time Markov chain – further TS I S , the time when X(t) hits 0, is a stopping time with respect to this Markov chain. Our aim is to upper-bound the time E[TS I S ]. To do so, we study the one-dimensional chain induced by the number of infected nodes in the network – more specifically, we stochastically dominate the total number of infected nodes as follows: Consider a Markov chain Z (t) ∈ {0, 1, 2, . . .} with Z (0) = X(0) and the state transition rates being the following: i → i + 1 at a rate β dmax i + µ for i > 0 i → i − 1 at a rate i for i > 0 We claim that Z stochastically dominates X(t), and con- sequently, the time to hit 0 for Z is a.s. larger than TS I S . This can be formally argued via a coupling argument, but essentially it arises from the fact that for any state X(t), the maximum rate at which the infection can grow (i.e at which X(t) can increase) is β X(t)dmax + µ – this is because a node can try to infect at most dmax nodes and the external infection can increase the number of infected nodes at a maximum rate of µ. Also note that for the original process X(t) is the rate at which infection decreases, since each node recovers at rate 1. Thus whenever Z (t) = X(t) = i, the rate of growth for Z is higher than that for X, while the rate of decrease are the same for both the processes. Hence, we can instead focus on finding an upper bound on time to hit zero for the process Z . Note that Z is a process on a finite state space [n] and is irreducible, with an absorbing state at 0 – hence the expected time to hit state 0 is finite. We next consider Z D , the embedded discrete-time chain (i.e., jump chain) of Z , whose transitions ( ∀ i > 0) are given by: pi,i+1 = β dmax i + µ (β dmax + 1)i + µ , pi,i−1 = i (β dmax + 1)i + µ Note that as the rate of jumps for any state i > 0 is lower bounded by 1 – hence the expected time spent in any state is O(1), and the time to absorption in the discrete time chain is orderwise equivalent to the absorption time in the original chain. Now we can use Lemma 9 to compute the expected hitting time to zero for Z D , given initial state is 1 (or some fixed K ). Note that for any fixed K > 0, the transition probabilities of Z D do not scale with n for states in [K ]; hence for the stated result, it is sufficient to show that the contribution due to the states i ∈ {K, K + 1, . . . , n} is O(1). pi,i+1 pi,i−1 (cid:33) µ iβ dmax βdmax ) . µ k(cid:89) i=1 n(cid:88) We have: k=K k(cid:89) i=1 β dmax i + µ (cid:32) k(cid:88) i i=1 ≤ n(cid:88) ≤ n(cid:88) k=1 (β dmax )k exp ∞(cid:88) k=1 ≤ (β dmax )k (k + 1)( k=1 Now note that for β dmax < 1 and µ = O(1), the RHS in the last expression can be upper bound by a constant order moment of a geometric random variable – hence it is O(1). This completes the proof. Thus we have that β dmax < 1 and µ = O(1) is a sufficient condition for subcritical epidemics. We can also now generalize the above argument to prove Theorem 4, wherein we bound the extinction time for µ scaling with n. Proof of Theorem 4: We define γ = > 1 – 1 βdmax further we can always assume γ = O(1), as otherwise, we can increase β , which can only increase the extinction time. Now following identical arguments as in those for Theorem E[TS I S ] ≤ n(cid:88) n(cid:88) 1, we get that (cid:90) ∞ (β dmax )k (k + 1)( k=1 k=2 ≤ γ γ−xxγµdx ≤ γΓ(γµ + 1) (log γ )γµ+1 , 1 where Γ(x + 1) = x!. Now using Stirling’s formula, and the (cid:17) (cid:16) log n fact that γ = Θ(1), we get that E[TS I S ] = O(µ2µ ). Now suppose µ = f (n) log n log log n , where f (n) is some function such that , and f (n) = o(1)) – limn→∞ f (n) = 0 (i.e., µ = o log log n substituting, we have E [TS I S ] = O(nf (n) ) = no(1) – similarly we can show that µ = polylog(n) is not sufficient for an exponential lifetime. βdmax ) ≤ γ µ γ−k kγµ B. Critical SIS Epidemics with External Agents Next we turn to Theorem 2, wherein we derive a polynomial upper bound for the extinction time in the case when βλ1 < 1: Proof of Theorem 2: From existing results (such as Theorem 3.1 of Ganesh et al. [2]), we have that in the absence S I S for the intrinsic of external agents, the time to extinction T i SIS process obeys E[T i S I S ] = O(log n) for any initial set of infected nodes, if βλ1 < 1. We now bootstrap this to obtain our result. Note that the external sources, under any strategy, can infect at most at a rate µ – thus to upper-bound E[TS I S ] (the extinction time with external sources), we can stochastically dominate it as follows: at time 0, assume all nodes are infected, and start an exponential clock with rate µ. Clearly the underly- ing SIS infection expires if all nodes recover before this clock expires; if however the clock stops before the SIS process dies, we restart the process with all nodes infected, and start another exponential clock with µ. By standard coupling arguments, the 10 time to extinction for this new process stochastically dominates TS I S for the original process. Given an SIS process starting with all nodes initially in- fected, the time to extinction without external sources is T i S I S ; further, let Zµ ∼ E xponential(µ). Then we have: S I S ] = E[exp(−µT i P[Zµ > T i S I S )] ≥ exp(−µE[TS I S ]) ≥ n−C , where C > 0 is some constant (independent of n); the second inequality above follows from Jensen’s inequality, and also we have used the fact that E[T i S I S ] = O(log n) and µ = O(1). Note that the above quantity lower-bounds the probability that, in the constructed process, the infection process ex- pires before the clock (corresponding to the external source) stops. Hence the expected number of regenerations that take place before the process expires is upper-bounded by O(nC ). the expected time between each regeneration is Further, E[min{T i S I S , Zµ }] – this is upper-bounded by E[Zµ ] = 1 µ = O(1). Thus E[TS I S ] = O(nO(1) ). To complete our analysis of the critical regime, we show that polynomial extinction-times are in fact achievable for any graphs with sufficiently large (i.e., polynomial) degree. We consider the following strategy: the external agent targets any susceptible node with degree Ω(nα−+δ ) (henceforth referred to as a high-degree node); else it infects a susceptible node chosen at random (in fact, for ease of exposition, we assume in the proof that the external node only infects the maximum- degree node; however it is easy to see that the above strategy is sufficient to show polynomial lifetime). A crucial result we use in our proof is as follows: note that as β scales as n−α , the expected number of infection attempts due to an infected high-degree node before it recovers is Ω(n ). Suppose now we have that a high-degree node is infected, but none of its neighbors is infected – we show that with high probability (i.e., at least 1 − ), the 1 poly(n) number of neighbors in infected state at the time the first node recovery occurs is poly(n). Subsequently, we show that given a poly(n) number of infected neighbors, a node gets infected with a probability at least 1 − n−Ω(1) in presence of O(1) external infection – note that this is not true in the absence of the external agents (when βλ1 < 1). Combining these observations, we show that the expected time to extinction of the epidemic is poly(n). Lemma 11. Given a star-graph on m nodes, and an SIS infection with β = Ω(m−1 ), for some constant  > 0. Suppose only the hub is infected at time t = 0 – then at (cid:1). least 1 − O (cid:0) 1 the time when the first node recovery occurs, the number of infected nodes in the system is Ω(m/3 ) with probability at m/3 Proof: First, note that decreasing the value of β can only make it less likely to have several infections before a recovery – hence we can assume that  < 1. Define k = m/3 . Now let Nt be the number of infected nodes at time t (thus N0 = 1), and T be the first time that some infected node recovers. For . = ≥ 1 + = 1 − some constants c1 , c2 > 0, we want to show that P[NT ≥ c1k ] with probability 1 − c2k−1 . For the system at a time t < T , suppose Nt = i – note that the hub is still infected, since no recoveries have occurred. Then there are 2 possible events – either Nt goes to state i + 1 at rate β (m − i + 1), or it stops (due to node recovery) at rate i. Now we have: (cid:19) (cid:18) β (m − i + 1) k(cid:89) P[NT ≥ k ] ≥ P[Nt reaches k before stopping] (cid:18) (cid:19)−k ≥ 1 − β (m − i + 1) + i i=1 k2 k β (m − k + 1) β (m − k + 1) ≥ 1 − m−/3 m2/3 1 − o(m) m − m5/3−1 + m−1 Choosing m sufficiently large, we get the result Proof of Theorem 3: We assume henceforth that the external agent only tries to infect the (unique) node with maximum degree – this is without loss of generality for the scaling results. First, note that irrespective of the initial state, the maximum-degree node gets infected with probability at least µ 1+µ = Ω(1) – thus the expected lifetime with any initial set of infected nodes is at least a constant fraction of the expected lifetime if the epidemic started at the maximum- degree node. Further, note that the lifetime of the epidemic on graph G if some edges are removed is stochastically dominated by the lifetime on G – this means that to complete the proof, it is sufficient to show that the SIS epidemic has a lifetime which is poly(n) if on a star graph with a hub and nα leaf-nodes, and an additional infection-source of rate µ = O(1) for the hub. We do this by analyzing cyclical epochs characterized by the reinfection/recovery of the hub – this is similar to techniques used in [2], [16], however the presence of external infection- sources changes the lifetime dramatically. We construct the following process which under-dominates the epidemic on the star: at time 0, we assume that only the hub is infected; subsequently, when either the hub or any of its neighboring leaf-nodes recovers for the first time, we instead make the hub recover – this clearly under-dominates the epidemic, as we have the same recovery rate, but a smaller infection rate in the system. We then show that with probability at least 1 − n−Ω(1) , the hub gets re-infected before all the infected leaf-nodes get recovered. If this happens, we can again restart the system with only the hub infected (and all leaf-nodes susceptible) – note that this implies the expected number of such regenerations is nΩ(1) , and the time spent in each epoch is at least Ω(1), which gives us the desired polynomial expected lifetime. First, suppose the hub is infected at some time t – then from Lemma 11, we have that when any infected node in probability at least 1 − Ω (cid:0)n−α/3 (cid:1). As we described above, the neighborhood recovers for the first time after t, then the number of infected nodes in the system is Ω(nα/3 ) with we now assume that the hub is the node which recovers first, 11 P[A n ] = and thus there are n = Ω(nα/3 ) infected neighbors. Next, given that there are n infected neighbors when the hub recovers – then the probability of the event A n that the hub is not re-infected before all the neighbors recover is given n−1(cid:89) by the following. n − i µ + (n − −i + 1)(1 + β ) i=0 To see this, note that if k neighbors are infected, then the probability that one of them recovers before the hub is re- infected is the same as that among three exponential random variables of rate µ, kβ and k , the one with rate k is minimum, µ+k(1+β ) ; subsequently, we can use the memoryless i.e., k property of the exponential distribution. We can now bound ≤ n(cid:89) n−1(cid:89) the above as follows: n − i 1 (cid:17)2(cid:33) (cid:32) µ + (n − −i + 1)(1 + β ) (cid:16) (cid:17) (cid:16) − n(cid:88) n(cid:88) 1 + β + µ i i=0 i=1 ≤ exp µ 1 µ β + i 2 i i=1 i=1 where we use that 1 + x ≥ ex− x2 2 . Now, using the fact that (cid:16) n−αµ/3(cid:17) log n + 1 ≤ Hn ≤ log(n + 1), we can simplify to get: P[A n ] ≤ C (n + 1)−µ(1−β ) = O , where we have used the fact that βλ1 ≤ 1 and hence is dies in the network is at least 1 − O (cid:0)n−αµ/3 (cid:1) = 1 − n−Ω(1) . β ≤ 1. Combining the two (via the union bound), we get the probability that the hub gets re-infected before the infection Thus, there are nΩ(1) such regenerations on average before the infection dies in the network. P[A n ] = β + + , C. Supercritical SIS Epidemics with External Agents We now give a sufficient condition for supercritical SIS epidemics in the presence of external sources. Proof of Theorem 5: To obtain a sufficient condition for supercritical behavior, we need to lower bound E[TS I S ] – for this, we stochastically under-dominate the process via the following (one-dimensional) Markov chain: let Y (t) be a con- tinuous time Markov chain on the state space {0, 1, · · · , m} with the following transition rates. i → i + 1 at rate β η(i)i + µ for i > 0, i → i − 1 at rate i for i > 0, and all other transitions having rate 0. Essentially, η(i) cap- tures the bottleneck cut for all sets of size ≤ i – standard coupling arguments show that this process is stochastically dominated by X[t]. To lower bound the time to absorption for this chain we use an approach similar to that in the proof of the theorem 1 – we construct an appropriate discrete-time ergodic Markov chain, so that we can use Lemma 8. Note that to find a lower-bound on the expected time to hit zero, it is sufficient to consider an initial state where only 1 node is infected. 12 E[N0 ] + E (cid:35) Li (t)dt (cid:82) TSIR Li (t)dt for each i. Adding up the inequalities for all (cid:19) (cid:18) n(cid:88) 0 the nodes, we get: ≤ 1 − β di P[Xi (∞) = e] (cid:34) n(cid:88) (cid:90) TSIR β + 1 i=1 where N0 = (cid:80) 0 i=1 1{Xi (0)=e} is the number of initially infected nodes. Reorganizing, and using di ≤ dmax and β (dmax − 1) < i 1, we get: E[NS IR ] ≤ E[N0 ] + µE[TS IR ] 1 − βdmax β+1 (cid:17) (cid:16) log n To conclude the proof, we need to bound E[TS IR ] – however from Lemma 10, we know it is sufficient to bound E[TS I S ]. , Further, from Theorem 4, we have that if µ = o log log n then TS I S = subpoly(n). This completes the proof. , The embedded chain Y D corresponding to Y has transition probabilities pi,i+1 = βη(i)i+µ βη(i)i+µ+i and pi,i−1 = i for all i > 0 (note we still assume i ≤ m), and all other βη(i)i+µ+i transition probabilities being 0. Defining T D 1,0 to be the time for the embedded chain to hit state 0 starting from 1, then (cid:19) (cid:18) k(cid:89) n(cid:88) from Lemma 8), we have: β η(i) + i=1 k=1 E[T D 1,0 ] = µ(i) i Next, we want to lower bound the time that the system (cid:16) enα (cid:17) spends in each state. Let M = βn2 + n+ µ – then the expected time spent at any state of the continuous time Markov chain M . Hence E[TS I S ] = Ω which Y is lower-bounded by 1 M (cid:16) enΩ(1) (cid:17) is enΩ(1) as long as M = O(poly(n)). Thus we have that a sufficient condition for supercritical . Now if ∀ i ∈ behavior is given by E[T D 1,0 ] = Ω Ω (cid:0)enα (cid:1), which is what we desire. {1, 2, . . . , nα } for some α > 0, we have β η(i) + µ(i) i ≥ 1 +  for some  > 0, then the LHS of the above equation is (cid:1), when I = i. Now suppose we have µ(i) = µ(i) (cid:0)1 − i To obtain the condition given in Theorem 5, note that random infection strategy is successful at a rate that equals β η(nα ) + γ ≥ 1 +  for some  > 0. Then we have: (cid:18) (cid:18) (cid:19)(cid:19) n k(cid:89) 1,0 ] ≥ nα(cid:88) 1 − i E[T D (cid:19) (cid:18) β η(nα ) + γ k(cid:89) ≥ nα(cid:88) n i=1 k=1 i=1 k=1 Now we can choose n large enough such that we have γnα−1 <  2 - this then ensures E[T D 1,0 ] = enΩ(1) . D. SIR Epidemics with External Agents Finally, we utilize Lemma 10 to get conditions for subcrit- ical SIR epidemics: Proof of Theorem 6: We first consider a standard technique for bounding the size of eventual infection without external agents (for example, in [3]).The main observation is that the probability of a node i to get infected eventually is dependent on its being infected initially and its neighbors N (i) = {j ∈ V (i, j ) ∈ E } being infected eventually. We (cid:88) have: P[Xi (∞) = e] ≤ P[Xi (0) = 1] + j∈N (i) P[Xj (∞) = e] 1 +  − γ i n β β + 1 . to account for the external sources, we can add Next, an additional term to the RHS to capture the probability that the node i is infected by external agent at some time. Recall that we defined L( t) to be an inhomogeneous Poisson given by 1 − exp((cid:82) TSIR process representing the external infection at node i – then the probability of i being infected via the external source is Li (t)dt), which is upper-bounded by 0
1710.06609
1
1710
2017-10-18T07:59:24
Supervised and Extended Restart in Random Walks for Ranking and Link Prediction in Networks
[ "cs.SI", "physics.soc-ph" ]
Given a real-world graph, how can we measure relevance scores for ranking and link prediction? Random walk with restart (RWR) provides an excellent measure for this and has been applied to various applications such as friend recommendation, community detection, anomaly detection, etc. However, RWR suffers from two problems: 1) using the same restart probability for all the nodes limits the expressiveness of random walk, and 2) the restart probability needs to be manually chosen for each application without theoretical justification. We have two main contributions in this paper. First, we propose Random Walk with Extended Restart (RWER), a random walk based measure which improves the expressiveness of random walks by using a distinct restart probability for each node. The improved expressiveness leads to superior accuracy for ranking and link prediction. Second, we propose SuRe (Supervised Restart for RWER), an algorithm for learning the restart probabilities of RWER from a given graph. SuRe eliminates the need to heuristically and manually select the restart parameter for RWER. Extensive experiments show that our proposed method provides the best performance for ranking and link prediction tasks, improving the MAP (Mean Average Precision) by up to 15.8% on the best competitor.
cs.SI
cs
Supervised and Extended Restart in Random Walks for Ranking and Link Prediction in Networks Woojeong Jin∗ Jinhong Jung∗ U Kang∗ 7 1 0 2 t c O 8 1 ] I S . s c [ 1 v 9 0 6 6 0 . 0 1 7 1 : v i X r a Abstract Given a real-world graph, how can we measure rel- evance scores for ranking and link prediction? Random walk with restart (RWR) provides an excellent measure for this and has been applied to various applications such as friend recommendation, community detection, anomaly detection, etc. However, RWR suffers from two problems: 1) using the same restart probability for all the nodes limits the expressiveness of random walk, and 2) the restart probability needs to be manually chosen for each application without theoretical justification. We have two main contributions in this paper. First, we propose Random Walk with Extended Restart (RWER), a random walk based measure which improves the expressiveness of random walks by using a distinct restart probability for each node. The improved expressiveness leads to superior accuracy for ranking and link prediction. Second, we propose SuRe (Supervised Restart for RWER), an algorithm for learning the restart probabilities of RWER from a given graph. SuRe eliminates the need to heuristically and manually select the restart parameter for RWER. Extensive experiments show that our proposed method provides the best performance for ranking and link prediction tasks, improving the MAP (Mean Average Precision) by up to 15.8% on the best competitor. 1 Introduction How can we measure effective node-to-node proxim- ities for graph mining applications such as ranking and link prediction? Measuring relevance (i.e., proximity or similarity) scores between nodes is a fundamental tool for many graph mining applications [1, 3, 2, 14, 5, 12]. Among various relevance measures, Random Walk with Restart (RWR) [6, 11, 10] provides useful node-to-node relevance scores by considering global network struc- ture [7] and intricate edge relationships [26]. RWR has been successfully exploited in a wide range of data mining applications such as ranking [28, 24, 11], link prediction [1, 3, 2, 15, 5], community detection [4, 30], anomaly detection [25], etc. ∗Seoul National University, Email: [email protected]; [email protected]; [email protected] However, RWR has two challenges for providing more effective relevance scores. First, RWR assumes a fixed restart probability on all nodes, i.e., a random surfer jumps back to the query node with the same prob- ability regardless of where the surfer is located. This as- sumption prevents the surfer from considering the query node's preferences for other nodes, thereby limiting the expressiveness of random walk for measuring good rel- evance scores. Second, RWR requires users to heuris- tically select the restart probability parameter without any theoretical guide or justification to choose it. In this paper, we propose a novel relevance measure Random Walk with Extended Restart (RWER), an extended version of RWR, which reflects a query node's preferences on relevance scores by allowing a dis- tinct restart probability for each node. We also pro- pose a supervised learning method SuRe (Supervised Restart for RWER) that automatically finds optimal restart probabilities in RWER from a given graph. Ex- tensive experiments show that our method provides the best the link prediction accuracy: e.g., SuRe boosts MAP (Mean Average Precision) by up to 15.8% on the best competitor as shown in Figure 1. Our main con- tributions are summarized as follows: • Model. We propose Random Walk with Ex- tended Restart (RWER), a new random walk model to improve the expressiveness of RWR. RWER allows each node to have a distinct restart probability so that the random surfer has a finer control on preferences for each node. • Learning. We propose SuRe, an algorithm for learning the restart probabilities in RWER from data. SuRe automatically determines the best restart probabilities. • Experiment. We empirically demonstrate that our proposed method improves accuracy in all dataset. Specifically, our proposed method im- proves MAP by up to 15.8% and Precision@20 by up to 10.1% on the best competitor. The code of our method and datasets used in this paper are available at http://datalab.snu.ac.kr/ sure. The rest of this paper is organized as follows. Section 2 presents a preliminary on RWR and defines Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited Figure 1: Link prediction performance on the HepTh dataset. SuRe shows the highest accuracies: 15.8% higher MAP, and 10.1% higher Precision@20 compared to the best existing method. the problem. Our proposed methods are described in Section 3. After presenting experimental results in Section 4, we provide a review on related works in Section 5. Lastly, we conclude in Section 6. 2 Preliminaries In this section, we describe the preliminaries on Random Walk with Restart. Then, we formally define the problem handled in this paper. We use Aij or A(i, j) to denote the entry at the intersection of the i-th row and j-th column of matrix A, A(i, :) to denote the i-th row of A, and A(:, j) to denote the j-th column of A. The i-th element of the vector x is denoted by xi. 2.1 Random Walk with Restart.Random walk with restart (also known as Personalized PageRank, PPR) [28] measures each node's proximity (relevance) w.r.t. a given query node s in a graph. RWR assumes a random surfer who starts at node s. The surfer moves to one of its neighboring nodes with probability 1− c or restarts at node s with probability c. When the surfer moves from u to one of its neighbors, each neighbor v is selected with a probability proportional to the weight in the edge (u, v). The relevance score between seed node s and node u is the stationary probability that the surfer is at node u. If the score is large, we consider that nodes s and u are highly related. Limitations. RWR cannot consider a query node's preferences for estimating relevance scores between the query node and other nodes. For example, suppose we compute relevance scores from the query node A to other nodes in a political blog network in Figure 2 where blue colored nodes are liberal blogs, red colored ones are conservative, black ones are not labeled, and an edge between nodes indicates a hyperlink between the corresponding blogs. Based on the topology of the graph, we consider that nodes E and F tend to be moderate, node D is likely to be liberal, and node I Figure 2: Example of RWR and our proposed ap- proaches RWER & SuRe on a political blog network. Blue colored nodes are liberal blogs, red colored are con- servative, and black colored ones are unlabeled blogs. RWR uses the fixed restart probability 0.1 or 0.5 while our proposed RWER uses distinct restart probabilities on nodes. Note that RWR shows different ranking re- sults depending on the restart probability. The ranking result of RWER is more desirable for the query node A (liberal) than those of RWR because many liberal blog nodes are ranked high in the ranking result. is likely to be conservative. Since the query node A is a liberal blog, node A will prefer other liberal nodes to conservative nodes. However, a conservative node G is ranked higher than nodes related to liberal blogs such as nodes C and D in the ranking result of RWR. The reason is that preferences are not considered in RWR, and the random surfer jumps back to the query node A with a fixed restart probability c wherever the surfer is. On the other hand, RWER reflects the query node's preferences on relevance scores by allowing a distinct restart probability for each node. Another practical problem is that it is non-trivial to set an appropriate value of the restart probability c for different applications since we need to manually choose c so that the restart probability provides opti- mal relevance scores for each application. RWR scores are highly affected by the restart probability; the rank- ing results of each restart probability (c = 0.1 and c = 0.5) are quite different as seen in Figure 2. In contrast, our learning method SuRe automatically de- termines the optimal restart probabilities for all nodes based on the query node's preferences as well as relation- ships between nodes. The detailed descriptions of our proposed approaches RWER and SuRe are presented in Section 3. 2.2 Problem Definition.We are given a graph G with n nodes and m edges, a query node s, and side information from the query node. The side information contains a set of positive nodes P = {x1, ..., xk} that s prefers, and a set of negative nodes N = {y1, ..., yl} Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.7MAPP@20𝑨𝑭𝑩𝑪𝑬𝑮𝑯𝑰RWRRankNode𝑐=0.1Node𝑐=0.51 𝐺 𝐴2 𝐻 𝐵3 𝐼 𝐹4 𝐴 𝐺5 𝐵 𝐶6 𝐶 𝐻7 𝐷 𝐷8 𝐸 𝐼9 𝐹 𝐸RWER & SuRe(proposed)RankNode𝑐1 𝐴0.122 𝐵0.063 𝐶0.094 𝐷0.195 𝐹0.486 𝐸0.217 𝐺0.948 𝐻0.839 𝐼0.85𝑫Liberal blog nodeConservative blog nodeQuerynodeUnlabeled blog nodeclose toliberalclose toconservativemoderate§𝑐is a restart probabilitymoderate that s dislikes. Our task is to learn restart probabilities for all nodes such that relevance scores of the positive nodes are greater than those of the negative ones. 3 Proposed Method In this section, we describe Random Walk with Extended Restart (RWER), our proposed model for extended restart probabilities. Also, we propose SuRe, an efficient algorithm for learning the restart probabilities. 3.1 Overview of Random Walk with Extended Restart. RWER is a novel relevance model reflecting a query node's preferences on relevance scores. The main idea of RWER is that we introduce a restart probability vector each of whose entry corresponds to a restart probability at a node, so that the restart probabilities are related to the preferences for the nodes. In RWER, a restart probability of each node is interpreted as the degree of boredom of a node w.r.t. the query node. That is, if the restart probability on a node is large, then the surfer runs away from the current node to the query node (i.e., the surfer becomes bored at the node). On the other hand, if the restart probability of the node is small, then surfer desires to move around the node's neighbors (i.e., the surfer has an interest in the node and its neighbors). As depicted in Figure 2, each node has its own restart probability in our model RWER. The restart probabilities are determined by our supervised learning method SuRe (Section 3.5) from the query (liberal) node A, the positive (liberal) nodes B and C, and the negative (conservative) nodes G and H. Note that a ranking list where many liberal nodes are ranked high is desirable for the query node A since A is liberal. As shown in Figure 2, using distinct restart probabilities for each node by RWER provides more satisfactory rankings for the query node than using a single restart probability for all nodes by RWR. The restart probabilities of liberal nodes are smaller than those of conservative nodes, which implies that the random surfer prefers searching around the liberal nodes such as B and C while the surfer is likely to run away from the conservative nodes such as G and H. One might think that it is enough to simply assign small restart probabilities to positive nodes and large restart probabilities to negative nodes for a desirable ranking. However, the restart probabilities should be determined also for unlabeled nodes, and the probabili- ties should reflect intricate relationships between nodes as well as the query node's preferences. For example, the restart probability of node F in Figure 2 is relatively moderate because node F is located between a liberal node A and a conservative node G. Also, the restart probability of node D is small since node D is close to Figure 3: Example of a network. Each node has its own restart probability. other liberal nodes B and C. Similarly, the restart prob- ability of node I is large since node I is closely related to other conservative nodes G and H. 3.2 Formulation of Random Walk with Ex- tended Restart.We formulate RWER in this sec- tion. We first explain the formulation using the example shown in Figure 3, and present general equations. In the example, the surfer goes to one of its neighbors or jumps back to the query node. To obtain the RWER proba- bility ru at time t + 1, we should take into account the scores of the three nodes which are i, j and k at time t. Suppose the surfer is at the node i at time t. The surfer can go to an out-neighbor through one of the two outgoing edges with probability 1 − ci. Note that every node has a distinct restart probability and node i has a restart probability ci in this case. Without the restart action, r(t+1) in Figure 3 is defined as follows: u u ← (1 − ci) r(t+1) r(t) i 2 + (1 − cj) r(t) j 3 + (1 − ck)r(t) k Also, the surfer on any node v jumps back to the query node with probability cv. The above equation is rewritten as follows considering the restart action of the random surfer: u ← (1 − ci) r(t+1) c1r(t) + (cid:16) r(t) i 2 + (1 − cj) r(t) j 3 + (1 − ck)r(t) k 1 + ··· + cvr(t) v + ··· + cnr(t) n 1(u = s) where 1(u = s) is 1 if u is the query node s; otherwise, it is 0. Note that the restart term is different from that of the traditional random walk with restart. Based on the aforementioned example, the recursive equation of our model is defined as follows: (3.1) (cid:17) (cid:33) ru = (1 − cv) rv OUTv cvrv 1(u = s) where INi OUTi is the set of out-neighbors of node i. is the set of in-neighbors of node i, and Equation (3.1) is expressed in the form of a matrix equation as follows: (cid:62) r = A (3.2) (I − diag(c))r + (cid:62) c r q (cid:16) (cid:17) where A is a row-normalized matrix of the adjacency matrix A, c is a restart vector whose i-th entry is ci, diag(c) is a matrix whose diag(c)ii = ci and other Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited  (cid:88) v∈INu  + (cid:32)(cid:88) v 𝑖𝑗𝑢𝑘 𝒄'𝒄(𝒄)𝒄* entries are 0, and q is a vector whose s-th element is 1 and all other elements are 0. Notice that if c is a vector all of whose elements are the same, then the RWER is equal to RWR (or PPR). The following lemma shows that equation (3.2) can be represented as a closed form equation. Lemma 3.1. The closed form w.r.t. r in equation (3.2) is represented as follows: r = (I − B) −1q (3.3) where B is A(cid:62)(I − diag(c)) + q(c − 1)(cid:62), A is a row- normalized matrix, and 1 is an all-ones vector. Proof. See Section 1.1 of [8]. (cid:4) Note that if c is given, the RWER vector r can be calculated using the closed form in Lemma 3.1. How- ever, the computation using the closed form requires O(n3) time and O(n2) memory space due to the matrix inversion where n is the number of nodes; thus, this ap- proach is impractical when we need to compute RWER scores in large-scale graphs. In order to avoid the heavy computational cost, we exploit an efficient iterative al- gorithm described in Section 3.3. 3.3 Algorithm for Random Walk with Ex- tended Restart.We present an iterative algorithm for computing RWER scores efficiently. Our algorithm is based on power iteration and comprises two phases: a normalization phase (Algorithm 1) and an iteration phase (Algorithm 2). Normalization phase (Algorithm 1). Our pro- posed algorithm first computes the out-degree diagonal matrix D of A (line 1). Then, the algorithm computes the row normalized matrix A using D (line 2). Iteration phase (Algorithm 2). Our algorithm computes the RWER score vector r for the seed node s in the iteration phase. As described in Section 3.2, the vector q denotes a length-n starting vector whose entry at the index of the seed node is 1 and otherwise 0 (line 1). Our algorithm iteratively computes equa- tion (3.2) (line 3). We then compute the error δ between r(cid:48), the result in the previous iteration, and r (line 4). Next, we update r(cid:48) into r for the next iteration (line 5). The iteration stops when the error δ is smaller than a threshold  (line 6). Theoretical analysis. We analyze the conver- gence of the iterative algorithm in Theorem 3.1 and the time complexity in Theorem 3.2. We assume that all the matrices considered are saved in a sparse format, such as the compressed column storage [20], which stores only non-zero entries, and that all the matrix operations ex- ploit such sparsity by only considering non-zero entries. Algorithm 1 Normalization phase of RWER Input: adjacency matrix A Output: row-normalized matrix A 1: compute a degree diagonal matrix D of A (i.e., Dii = (cid:80) j Aij) 2: compute a normalized matrix, A = D−1A. 3: return A Algorithm 2 Iteration phase of RWER Input: row-normalized matrix A, query node s, restart probability vector c, and error tolerance  compute error, δ = (cid:107)r(cid:48) − r(cid:107) update r ← r(cid:48) r(cid:48) ← A(cid:62) (I − diag(c)) r +(cid:0)c(cid:62)r(cid:1) q Output: RWER score vector r 1: set the starting vector q from the seed node s 2: repeat 3: 4: 5: 6: until δ <  7: return r Theorem 3.1. (Convergence) Suppose graph represented by A is irreducible and aperiodic. Then, the power iteration algorithm (Algorithm 2) for RWER converges. the Proof. See Section 1.2 of [8] Theorem 3.2. (Time Complexity) The time com- plexity of Algorithm 2 is O(T m) where T is the number of iterations, and m is the number of edges. Proof. See Section 1.3 of [8]. Theorem 3.2 indicates that our method in Algorithm 2 presents the linear scalability w.r.t the number of edges. 3.4 Cost Function. Although our relevance measure RWER improves the expressiveness of RWR by intro- ducing a distinct restart probability for each node, it is difficult to manually investigate the optimal restart probabilities for all nodes in large graphs. In this sec- tion, we define the cost function for finding the optimal restart probabilities. As mentioned in Section 2.2, our goal is to set the optimal restart probabilities so that the relevance scores of positive nodes outweigh those of negative nodes. We define the following cost function: F (c) = λ(cid:107)c − o(cid:107)2 + h(ry − rx) (cid:88) arg min (3.4) c x∈P,y∈N where λ is a regularization parameter that controls the importance of the regularization term, o is a given origin vector, h is a loss function, and rx and ry are RWER scores of nodes x and y, respectively. The cost function is obtained from the pairwise differences between the RWER scores of positive and negative nodes. Given an increasing loss function h, F (c) is minimized as the scores of positive nodes are maximized and those Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited of negative nodes are minimized. The origin vector o prevents the c vector becoming too small, and serves as a model regularizer which helps avoid overfitting and thus improves accuracy, as we will see in Section 4.4. We set o to a constant vector all of whose elements are set to a constant. We use the loss function h(x) = (1 + exp(−x/b))−1 since the loss function maximizes AUC [17, 5]. 3.5 SuRe - Optimizing the Cost Function. Our goal is to minimize equation (3.4) with respect to c. Note that the objective function F (c) is not convex. Thus, we exploit the gradient descent method to find the local minimum of function F (c). For the purpose, we first need to obtain the derivative of F (c) w.r.t. c: ∂F (c) ∂c = 2(c − o) + = 2(c − o) + (3.5) (cid:88) (cid:88) x∈P,y∈N x∈P,y∈N ∂h(ry − rx) ∂c ∂h(δyx) ∂δyx ( ∂ry ∂c − ∂rx ∂c ) where δyx is ry − rx. The derivative ∂h(δyx) function is 1 b h(δyx)(1 − h(δyx)). ∂δyx of the loss In order to obtain the derivative ∂rx ∂c , we have to calculate the derivative of the relevance score rx w.r.t. ci which is the i-th element of c. Let M be (I−B)−1; then, r = (I − B)−1q = Mq, M(:, s) = r, and M (x, s) = rx, from Theorem 3.1. Since M is the inverse of I − B, according to [19], becomes: ∂M ∂ci = −M ∂M ∂ci ∂(I − B) ∂ci M = M(− A (cid:62) Jii + Jsi)M where Jij is a single-entry matrix whose (i, j)th entry is 1 and all other elements are 0. Based on the above equation, ∂M (x,s) ∂M (x, s) is represented as follows: = M(x, :)(− A (cid:62) (:, i) + es)M (i, s) ∂ci ∂ci ∂c = ∂ci (cid:16) ∂rx ∂c ∂M (x, s) where es is a length n unit vector whose s-th entry is 1. is calculated for 1 ≤ i ≤ n; then, ∂rx Note that ∂M (x,s) is written in the following equation: (− A + 1e (cid:62) s )M(x, :) (3.6) where ◦ denotes Hadamard product, and 1 is an all- ones vector of length n. Similarly, ∂ry ∂c is calculated by switching x to y. ∂c − ( ∂ry Using the equation (3.6), (cid:80) (cid:62)(cid:17) ◦ M(:, s) ∂δyx ∂rx ∂c ) in equation (3.5) is represented as follows: x∈P,y∈N ∂h(δyx) ∂c = (cid:32) (3.7) (− A + 1e (cid:62) s ) (cid:88) ∂h(δyx) x∈P,y∈N ∂δyx (cid:33) (cid:17) ◦ r (M(y, :)−M(x, :)) (cid:62) ◦ M(:, s) (cid:16) (− A + 1e (cid:62) s )r = Algorithm 3 SuRe - Learning a restart vector c Input: adjacency matrix A, query node s, positive set P , negative set N , origin vector o, parameter b of loss function h, and the learning rate η Output: the learned restart vector c 1: initialize c ← o 2: while c does not converge do 3: compute r = M(:, s) based on equation (3.2) (Algo- rithm 2) compute r = (cid:80) (M(y, :) − M(x, :)) (cid:62) x∈P,y∈N ∂h(δyx) ∂δyx by a linear system solver (Lemma 3.2) compute ∂F (c) update c ← c − η ∂F (c) ∂c by equation (3.8) ∂c 6: 7: end while 8: return the learned restart vector c where r = M(:, s) is an RWER score vector, and r = in (cid:62) (M(y, :) − M(x, :)) (cid:80) . Then, ∂F (c) ∂c x∈P,y∈N ∂h(δyx) ∂δyx 4: 5: equation (3.5) is represented as follows: (− A + 1e (cid:62) s )r = 2(c − o) + ∂F (c) (3.8) ∂c (cid:16) (cid:17) ◦ r Notice that we do not obtain M explicitly to compute M(:, s) in equations (3.8) since M is the inverse of I − B and inverting a large matrix is infeasible as mentioned in Section 3.2. Instead, we use the iterative method described in Algorithm 2 to get r = M(:, s). However, the problem is that we also require rows of M (i.e., M(x, :) in r), and Algorithm 2 only computes a column of M for a given seed node. How can we calculate r without inverting M? r is computed iteratively by the following lemma: ∂δyx ∂h(δyx) x∈P,y∈N (cid:62) (M(y, :)− M(x, :)) Lemma 3.2. From the result of equation (3.7), r = which is repre- sented as r = M(cid:62) p ⇔ (I − B(cid:62))r = p where p = (ey − ex), ex is an n × 1 vector whose x-th element is 1 and the others are 0, and δyx = ry−rx. Then, r is the solution of the linear system (I− B(cid:62))r = p which is solved by an iterative method for linear sys- tems. x∈P,y∈N ∂h(δyx) ∂δyx Proof. See Section 1.4 of [8]. (cid:4) Note that M−(cid:62) = I − B(cid:62) is non-symmetric and invertible (Lemma 1.1. of [8]); thus, any iterative method for a non-symmetric matrix can be used to solve for r. We use GMRES [21], an iterative method for solving linear systems since it is the state-of-the-art method in terms of efficiency and accuracy. Optimization phase (Algorithm 3). SuRe al- gorithm for solving the optimization problem is sum- marized in Algorithm 3 and Figure 4. In the algorithm, we use a gradient-based method to update the restart probability c based on equation (3.8). Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited (cid:80) (cid:80) Table 1: Dataset statistics. The query nodes are used for the ranking and the link prediction tasks. Dataset #Nodes #Edges #Queries Wikipedia1 3,023,165 Epinions1 131,828 Slashdot1 79,120 HepPh1 34,546 HepTh1 27,770 Polblogs2 1,490 102,382,410 841,327 515,397 421,534 352,768 19,025 - 200 200 135 121 115 1 http://konect.uni-koblenz.de 2 http://www-personal.umich.edu/~mejn/netdata • Q2. Link prediction performance (Sec- tion 4.3). How effective is SuRe for link predic- tion tasks? • Q3. Parameter sensitivity (Section 4.4). How does the value of the origin vector used in SuRe affect the accuracy of link prediction? • Q4. Scalability (Section 4.5). How well does SuRe scale up with the number of edges? 4.1 Experimental Settings. Datasets. We experiment on various real-world network datasets. Datasets used in our experiments are summarized in Table 1. We use Polblogs and signed networks (Epinions and Slashdot) for the ranking task (Section 4.2), HepPh and HepTh for the link prediction task (Section 4.3), and Wikipedia for the scalability experiment (Section 4.5). Since only HepPh and HepTh have time information, we use them in the link prediction task. All experiments are performed on a Linux machine with Intel(R) Xeon E5-2630 v4 CPU @ 2.2GHz and 256GB memory. Methods. We compare our proposed method SuRe with Common Neighbor (CN) [16], Adamic- Adar (AA) [1], Jaccard's Coefficient (JC) [22], Random Walk with Restart (RWR) [6], MRWR [23], Supervised Random Walks (SRW) [5], and QUINT [15]. We set parameters in each method to the ones that give the best performance (see Section 2 of [8] for parameters). Evaluation Metrics. To compare the methods, we use Mean Average Precision (MAP), Area under the ROC curve (AUC), and Precision@20. MAP is the mean of average precisions for multiple queries. AUC is the expectation that a uniformly drawn random pos- itive is ranked higher than a uniformly drawn random negative. Precision@20 is the precision at the top-20 position in a ranking result. The higher the values of the metrics are, the better the performance is. 4.2 Ranking Performance.We evaluate the rank- ing performance of our method SuRe compared to that of other methods. Experimental setup. We perform this exper- iments on the Polblogs dataset and signed networks Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited Figure 4: Flowchart of RWER (Algorithms 1 and 2) and SuRe (Algorithm 3). SuRe learns restart probability vector c, and RWER computes our node relevance score vector r for given seed node s. tation of r = (cid:80) 3.6 Theoretical analysis.We analyze the time com- plexity of SuRe (Algorithm 3). Lemma 3.3. Let P and N denote the number of positive and negative nodes, respectively. The compu- (M(y, :) − M(x, :))(cid:62) takes O(T m + PN) time where T is the number of iter- ations until convergence, and m is the number of edges. (cid:4) Proof. See Section 1.5 of [8]. ∂h(δyx) x,y ∂δyx Based on Lemma 3.3, the time complexity of Algo- rithm 3 is presented in Theorem 3.3. Theorem 3.3. (Time complexity of Algorithm 3) For a given graph with m non-zero elements, the learn- ing algorithm SuRe takes O(T1(T2m + PN)) time where T1 is the number of times c is updated with the gradient, and T2 is the number of inner iterations for computing r and r. Proof. See Section 1.6 of [8]. (cid:4) Theorem 3.3 implies that our learning method SuRe in Algorithm 3 provides linear time and space scalability w.r.t. the number m of edges. Notice that P and N are constants much smaller than m. 4 Experiment We evaluate our proposed method SuRe with vari- ous baseline approaches. Since there is no ground-truth of node-to-node relevance scores in real-world graphs, we instead evaluate the performance of two represen- tative applications based on relevance scores: ranking and link prediction. Based on these settings, we aim to answer the following questions from the experiments: • Q1. Ranking performance (Section 4.2). Does our proposed method SuRe provide the best relevances scores for ranking compared to other methods? Compute𝐫 and𝐫#(Equations3.2)Initialize𝐜←𝐨𝐜𝐫,𝐫#,𝐜,𝐀)𝐀)Compute𝐫(Equation3.2)𝑃𝑁𝑠SuRe:optimize 𝐜𝐜not converged𝐜RWER:compute 𝐫Normalize𝐀𝐫converged𝐫Compute-.(𝐜)-𝐜(Equation3.8)𝐜←𝐜−𝜂𝜕𝐹(𝐜)𝜕𝐜𝑠𝐀),𝐪Initialize𝐪from𝑠 Table 2: Ranking results of our proposed method SuRe and other methods w.r.t. a query node obsidianwings, a liberal blog. Red colored nodes are conservative blogs, and the black colored ones are liberal blogs. Our ranking result from SuRe contains only liberal nodes, indicating the best result, while other ranking results wrongly contain conservative nodes. Rank SuRe RWR SRW QUINT 1 2 3 4 5 6 7 8 9 10 digbysb billmon gadflye reachm jameswo angrybe marksch tbogg wampum stevegi freerep michell prolife rightwi digbysb littleg billmon jameswo reachm politic digbysb tbogg liberal billmon xnerg corrent hughhew busybus pacific nielsen freerep michell prolife rightwi digbysb littleg billmon jameswo reachm hughhew (a) Epinions (b) Slashdot Figure 6: Ranking performance on the signed networks. Our method SuRe obtains up to 17.9% higher MAP and 25.6% higher Precision@20 (in Slashdot) compared to the best competitor. (a) MAP (b) Precision@20 Figure 5: Ranking performance on Polblogs. Our method SuRe provides the best ranking performance compared to other methods in terms of MAP and Precision@20. (Epinions and Slashdot). See Section 2.1 of [8] for de- tailed experimental setup. Case study. We analyze the ranking quality produced from each method in the Polblogs dataset. Table 2 shows the top-10 ranking list for a query node obsidianwings, a liberal blog. Red colored nodes are conservative, and the black colored ones are liberal. As shown in the table, our ranking result from SuRe is of a higher quality compared to those from RWR, SRW, and QUINT since top-10 ranking result from SuRe contains only liberal nodes while other ranking results have several conservative nodes, considering that the query node is liberal. Result. To evaluate ranking performances, we measure MAP, Precision@20, and AUC for the ranking results produced from our method SuRe including other random walk based methods. For brevity, we report MAP and Precision@20 in Polblogs, and MAP and AUC in Epinions and Slashdot. In Polblogs, if the query node is liberal (conserva- tive), then the positive class is liberal (conservative), Figure 7: Link prediction performance on the HepPh dataset. SuRe shows the highest accuracies: 12.5% higher MAP, and 6.8% higher Precision@20 compared to the best existing method. and the negative one is conservative (liberal). As shown in Figure 5, our method SuRe shows the best rank- ing performance compared to other methods in terms of MAP and Precision@20. In signed networks, we evaluate the perfor- mance of SuRe compared to other baselines includ- ing MRWR [23], an RWR-based method for signed net- works. As in Figure 6, our method SuRe shows the best performance: up to 17.9% higher MAP and 25.6% higher Precision@20 compared to the best competitor. 4.3 Link Prediction Performance.We examine the link prediction performance of our proposed method SuRe compared to other link prediction methods as well as RWR-based methods SRW and QUINT. Experimental Setup. We perform this experi- ments on the HepPh and HepTh datasets which are time-stamped networks. See Section 2.2 of [8] for de- tailed experimental setup. Result. Figures 1 and 7 show the link prediction performances in terms of MAP and Precision@20. As Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited 0.6 0.62 0.64 0.66 0.68 0.7 0.78 0.8 0.82 0.84 0.86 0.88 0.9 0.92 0.64 0.66 0.68 0.7 0.72MAPAUC 0.48 0.52 0.56 0.6 0.64 0.68 0.72MAPAUC 0.35 0.4 0.45 0.5 0.55 0.6 0.65MAPP@20 shown in the results, our method SuRe outperforms other competitors including SRW and QUINT which are the state-of-the-art methods for link prediction. In the HepTh dataset, compared to the best competitor SRW, SuRe achieves 15.8% improvement in terms of MAP, and 10.1% improvement in terms of Precision@20 (Figure 1). For the AUC results, see Section 2.3 of [8]. Note that SuRe provides the best prediction over all datasets. The results state that assigning a distinct restart probability to each node and learning the restart probabilities (RWER and SuRe) have a significant ef- fect on link prediction compared to using a fixed restart probability for all nodes (RWR). Furthermore, the re- sult indicates that learning restart probabilities (SuRe) provides better link prediction accuracy than existing supervised learning methods that focus on learning edge weights (SRW) or network topology (QUINT). Table 3: Number of parameters for each method. Dataset SRW SuRe QUINT #parameters O(#f eatures) O(n) O(n2) Discussion. We discuss the above experimental results in terms of the number of model parameters. As shown in Table 3, SRW has not enough parameters (i.e., #f eatures < n); thus, feature selection is important for the performance of applications in SRW. On the other hand, QUINT has too many parameters; thus, QUINT is prone to overfit. Also, it is infeasible to learn O(n2) parameters in large-scale graphs. Compared to these methods, SuRe has a moderate number of parameters, implying that 1) the expressiveness of SuRe is better than that of SRW, and 2) SuRe is not likely to overfit compared to QUINT. This point explains why SuRe provides better performance of the ranking and link prediction tasks than SRW and QUINT do as shown in Sections 4.2 and 4.3. 4.4 Parameter Sensitivity.We investigate the pa- rameter sensitivity of SuRe w.r.t. the value of the ori- gin vector o. The origin vector o serves as a model regularizer which helps avoid overfitting and improves accuracy, as described in Section 3.4. We evaluate MAP of ranking and link prediction tasks, and report the re- sults in Figure 8. Note that the performance of SuRe is improved by introducing the origin parameter o, com- pared to the case without o, which corresponds to the leftmost points in both plots of Figure 8. 4.5 Scalability.We examine the scalability of our proposed method SuRe compared to other baselines. We perform the optimization phase in Algorithm 3 with various sizes of the Wikipedia dataset to investigate the scalability of SuRe. Figure 9 shows that SuRe scales near-linearly with the number of edges. The slope of (a) MAP of ranking task in the (b) MAP of link prediction task Polblogs dataset in the HepTh dataset Figure 8: Parameter sensitivity of our method SuRe in Polblogs and HepTh datasets. We report the link prediction and ranking accuracy using MAP measure, changing the values of the elements in the origin vector o in SuRe, where all the elements of o is set to a same value. Note that the performance of SuRe is improved by introducing the origin parameter o. Figure 9: Scalability of SuRe with other baselines in the Wikipedia dataset. The figure shows that SuRe has near-linear scalability w.r.t. the number of edges. the fitted line for SuRe is 0.76, the smallest number: those for RWR, SRW, and QUINT are 0.83, 0.88, and 2.57, respectively. As shown in Figure 9, SuRe is not the fastest among the tested methods, but SuRe is the fastest among all learning based methods (SRW and QUINT). Note that the result for SuRe is consistent with Theorem 3.3 which states that SuRe scales near- linearly w.r.t. the number of edges. 5 Related Works The related works fall into two main categories: 1) relevance measures in graphs, and 2) ranking and link prediction based on relevance measures. Relevance measures in graphs. There are var- ious relevance measures in graphs based on link anal- ysis and random walk, e.g., PageRank [18], HITS [14], Random Walk Graph Kernel [13], and RWR (or Per- sonalized PageRank) [6]. Among these measures, RWR has received much attention from the data mining com- munity since it provides a personalized ranking w.r.t. a node, and it has been applied to many graph mining applications such as community detection [4], link pre- diction [5, 15], ranking [28], and graph matching [27]. Also, fast and scalable methods [24, 11, 28] for comput- Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited 0.64 0.65 0.66 0.67 0.68 0.69 0.7 0 0.2 0.4 0.6 0.8MAPValue of oSuRe 0.56 0.58 0.6 0.62 0.64 0.66 0 0.2 0.4 0.6 0.8MAPValue of oSuRe10-310-210-1100101102103104105106107108Running time (sec)Number of edgesSuReRWRSRWQUINT ing RWR in large graphs have been proposed to boost the performance of those applications in terms of time. Ranking and link prediction. Jung et al. [9] ex- tended the concept of RWR to design a personalized ranking model in signed networks. Wang et al. [29] proposed an image annotation technique that gener- ates candidate annotations and re-ranks them using RWR. Liben-Nowell et al. [16] extensively studied the link prediction problem in social networks based on rele- vance measures such as PageRank, RWR, and Adamic- Adar [1]. Many researchers have proposed supervised learning methods for link prediction. Backstrom et al. [5] proposed Supervised Random Walk (SRW), a supervised learning method for link prediction based on RWR. SRW learns parameters for adjusting edge weights. Li et al. [15] developed QUINT, a learning method for finding a query-specific optimal network. QUINT modifies the network topology including edge weights. In many real-world scenarios, however, modi- fying the graph structure would not be allowed. On the contrary, our SuRe method controls the behavior of the random surfer without modifying the graph structure, and provides better prediction accuracy than other com- petitors as shown in Section 4. 6 Conclusion We propose Random Walk with Extended Restart (RWER), a novel relevance measure using distinct restart probabilities for each node. We also propose SuRe, a data-driven algorithm for learning restart probabilities of RWER. Experiments show that our method brings the best performance for ranking and link prediction tasks, outperforming the traditional RWR and recent supervised learning methods. Specifi- cally, SuRe improves MAP by up to 15.8% on the best competitor. Future works include designing distributed algorithms for computing and learning RWER. References [1] L. A. Adamic and E. Adar. Friends and neighbors on the web. Social networks, 25(3):211–230, 2003. [2] A. Agarwal and S. Chakrabarti. Learning random walks to rank nodes in graphs. In ICML, 2007. [3] A. Agarwal, S. Chakrabarti, and S. Aggarwal. Learn- ing to rank networked entities. In KDD, 2006. [4] R. Andersen, F. Chung, and K. Lang. Local graph partitioning using pagerank vectors. In FOCS, 2006. [5] L. Backstrom and J. Leskovec. Supervised random walks: predicting and recommending links in social networks. In WSDM, 2011. [6] T. H. Haveliwala. Topic-sensitive pagerank. In WWW, 2002. [7] J. He, M. Li, H.-J. Zhang, H. Tong, and C. Zhang. Manifold-ranking based image retrieval. In MM, 2004. [8] W. Jin, J. Jung, and U. Kang. Supplementary material and codes. http://datalab.snu.ac.kr/sure. [9] J. Jung, W. Jin, L. Sael, and U. Kang. Personalized ranking in signed networks using signed random walk with restart. In ICDM, 2016. [10] J. Jung, N. Park, L. Sael, and U. Kang. Bepi: Fast and memory-efficient method for billion-scale random walk with restart. In Proceedings of the 2017 ACM Interna- tional Conference on Management of Data, SIGMOD Conference 2017, Chicago, IL, USA, May 14-19, 2017, pages 789–804, 2017. [11] J. Jung, K. Shin, L. Sael, and U. Kang. Random walk with restart on large graphs using block elimination. TODS, 41(2):12, 2016. [12] U. Kang, M. Bilenko, D. Zhou, and C. Faloutsos. Ax- iomatic analysis of co-occurrence similarity functions. CMU-CS-12-102, 2012. [13] U. Kang, H. Tong, and J. Sun. Fast random walk graph kernel. In SDM, pages 828–838. SIAM, 2012. [14] J. M. Kleinberg. Authoritative sources in a hyperlinked environment. JACM, 46(5):604–632, 1999. [15] L. Li, Y. Yao, J. Tang, W. Fan, and H. Tong. Quint: On query-specific optimal networks. In KDD, 2016. [16] D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. Journal of the Amer- ican society for information science and technology, 58(7):1019–1031, 2007. [17] M. C. Mozer. Optimizing classifier performance via an approximation to the wilcoxon-mann-whitney statistic. 2003. [18] L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: bringing order to the web. 1999. [19] K. B. Petersen, M. S. Pedersen, et al. The matrix cookbook. Technical University of Denmark, 7:15, 2008. [20] W. H. Press, B. P. Flannery, S. A. Teukolsky, W. T. Vetterling, et al. Numerical recipes, volume 3. cam- bridge University Press, cambridge, 1989. [21] Y. Saad and M. H. Schultz. Gmres: A generalized minimal residual algorithm for solving nonsymmetric linear systems. SIAM Journal on scientific and statis- tical computing, 7(3):856–869, 1986. [22] G. Salton and M. J. McGill. Introduction to modern information retrieval. 1986. [23] M. Shahriari and M. Jalili. Ranking nodes in signed social networks. Social Network Analysis and Mining, 4(1):172, 2014. [24] K. Shin, J. Jung, S. Lee, and U. Kang. Bear: Block elimination approach for random walk with restart on large graphs. In SIGMOD, 2015. [25] J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos. Neighborhood formation and anomaly detection in bipartite graphs. In ICDM, 2005. [26] H. Tong and C. Faloutsos. Center-piece subgraphs: problem definition and fast solutions. In KDD, 2006. [27] H. Tong, C. Faloutsos, B. Gallagher, and T. Eliassi- Rad. Fast best-effort pattern matching in large at- Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited tributed graphs. In KDD, 2007. [28] H. Tong, C. Faloutsos, and J.-Y. Pan. Fast random walk with restart and its applications. 2006. [29] C. Wang, F. Jing, L. Zhang, and H.-J. Zhang. Im- age annotation refinement using random walk with restarts. In MM, 2006. [30] Z. A. Zhu, S. Lattanzi, and V. S. Mirrokni. A local algorithm for finding well-connected clusters. In ICML, 2013. Copyright c(cid:13) 2018 by SIAM Unauthorized reproduction of this article is prohibited
1910.05736
1
1910
2019-10-13T12:09:12
Collective Link Prediction Oriented Network Embedding with Hierarchical Graph Attention
[ "cs.SI", "physics.soc-ph" ]
To enjoy more social network services, users nowadays are usually involved in multiple online sites at the same time. Aligned social networks provide more information to alleviate the problem of data insufficiency. In this paper, we target on the collective link prediction problem and aim to predict both the intra-network social links as well as the inter-network anchor links across multiple aligned social networks. It is not an easy task, and the major challenges involve the network characteristic difference problem and different directivity properties of the social and anchor links to be predicted. To address the problem, we propose an application oriented network embedding framework, Hierarchical Graph Attention based Network Embedding (HGANE), for collective link prediction over directed aligned networks. Very different from the conventional general network embedding models, HGANE effectively incorporates the collective link prediction task objectives into consideration. It learns the representations of nodes by aggregating information from both the intra-network neighbors (connected by social links) and inter-network partners (connected by anchor links). What's more, we introduce a hierarchical graph attention mechanism for the intra-network neighbors and inter-network partners respectively, which resolves the network characteristic differences and the link directivity challenges effectively. Extensive experiments have been conducted on real-world aligned networks datasets to demonstrate that our model outperformed the state-of-the-art baseline methods in addressing the collective link prediction problem by a large margin.
cs.SI
cs
Collective Link Prediction Oriented Network Embedding with Hierarchical Graph A(cid:130)ention Yizhu Jiao Yun Xiong Shanghai Key Laboratory of Data Science, Shanghai Institute for Advanced Communication and Data Science, Shanghai Key Laboratory of Data Science, Shanghai Institute for Advanced Communication and Data Science, School of Computer Science, Fudan University, Shanghai, China, [email protected] School of Computer Science, Fudan University, Shanghai, China, [email protected] 9 1 0 2 t c O 3 1 ] I S . s c [ 1 v 6 3 7 5 0 . 0 1 9 1 : v i X r a Jiawei Zhang IFM Lab, Department of Computer Science Florida State University, Tallahassee, FL, USA [email protected] Yangyong Zhu Shanghai Key Laboratory of Data Science, Shanghai Institute for Advanced Communication and Data Science, School of Computer Science, Fudan University, Shanghai, China, [email protected] ABSTRACT To enjoy more social network services, users nowadays are usually involved in multiple online sites at the same time. Aligned social networks provide more information to alleviate the problem of data insu(cid:129)ciency. In this paper, we target on the collective link predic- tion problem and aim to predict both the intra-network social links as well as the inter-network anchor links across multiple aligned social networks. It is not an easy task, and the major challenges involve the network characteristic di(cid:130)erence problem and di(cid:130)erent directivity properties of the social and anchor links to be predicted. To address the problem, we propose an application oriented net- work embedding framework, Hierarchical Graph A(cid:138)ention based Network Embedding (HGANE), for collective link prediction over directed aligned networks. Very di(cid:130)erent from the conventional general network embedding models, HGANE e(cid:130)ectively incorpo- rates the collective link prediction task objectives into consideration. It learns the representations of nodes by aggregating information from both the intra-network neighbors (connected by social links) and inter-network partners (connected by anchor links). What's more, we introduce a hierarchical graph a(cid:138)ention mechanism for the intra-network neighbors and inter-network partners respec- tively, which resolves the network characteristic di(cid:130)erences and the link directivity challenges e(cid:130)ectively. Extensive experiments have been conducted on real-world aligned networks datasets to demonstrate that our model outperformed the state-of-the-art base- line methods in addressing the collective link prediction problem by a large margin. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a fee. Request permissions from [email protected]. CIKM '19, Beijing, China © 2019 ACM. 978-1-4503-6976-3/19/11...$15.00 DOI: 10.1145/3357384.3357990 CCS CONCEPTS •Information systems → Data mining; Social networks; •Computing methodologies → Knowledge representation and reasoning; KEYWORDS Multiple Aligned Networks, Collective Link Prediction, A(cid:138)ention, Embedding ACM Reference format: Yizhu Jiao, Yun Xiong, Jiawei Zhang, and Yangyong Zhu. 2019. Collective Link Prediction Oriented Network Embedding with Hierarchical Graph A(cid:138)ention. In Proceedings of (cid:138)e 28th ACM Inter- national Conference on Information and Knowledge Management, Beijing, China, November 3 -- 7, 2019 (CIKM '19), 10 pages. DOI: 10.1145/3357384.3357990 1 INTRODUCTION Nowadays, online social networks have become very popular and extensively used in our lives. To enjoy more services, it is ubiq- uitous for users to participate in multiple online social platforms concurrently. For example, users may share photos with Instagram and check the latest news information via Twi(cid:138)er. To simplify the sign up/in process, most social platforms usually allow users to use their existing Twi(cid:138)er/Facebook/Google IDs to create their accounts at these new social sites, which will align di(cid:130)erent online networks together naturally. Each of these platforms can be repre- sented as a massive network where nodes represent user accounts and intra-network links represent the social relationships among users. Especially, accounts owned by the same user in di(cid:130)erent networks are de(cid:128)ned as anchor nodes [9] and inter-network cor- responding relationships between the anchor users are de(cid:128)ned as anchor links [9]. Di(cid:130)erent online networks connected by anchor links are de(cid:128)ned as multiple aligned social networks [31]. In recent years, there has been a surge of interest in multi- network analysis. Traditional methods that target on one single network require su(cid:129)cient information to build e(cid:130)ective models. However, as proposed in [25], this assumption can be violated seri- ously when dealing with the cold start [10] and data sparsity prob- lems. (cid:140)e study of multiple aligned networks provides a direction to alleviate the data insu(cid:129)ciency problem. Some research works propose to transfer information across networks by anchor links to enhance the link prediction results within multiple networks mu- tually [1, 30, 31]. Besides, many existing works aim at anchor link formation prediction [11, 12, 21]. However, most of these works study either intra-network or inter-network link prediction tasks separately. As discovered in [26], multiple link prediction tasks in the same networks can actually be done simultaneously and enhanced mutually due to their strong correlations. Predicting multiple kinds of links among users across multiple aligned networks is de(cid:128)ned as the collective link prediction prob- lem in [23]. (cid:140)e collective link prediction problem covers several di(cid:130)erent link formation prediction tasks simultaneously including both the intra-network social link prediction and the inter-network anchor link prediction. It can take advantage of the strong cor- relations between these di(cid:130)erent tasks to enhance the prediction performance across these aligned networks synergistically. Fig- ure 1 shows an example of the collective link prediction tasks of two social networks. In the (cid:128)gure, black lines with the arrow indi- cate existing directed intra-network social links and the gray lines indicate the existing inter-network anchor links instead. (cid:140)ese directed/undirected red dashed lines with question marks signify the potential intra-network and inter-network links to be predicted, respectively. (cid:140)e problem of collective link prediction is worth exploring due to both its importance and novelty. Some existing methods have been introduced to tentatively address the problem [23]. However, these existing methods mostly ignore the contradiction of di(cid:130)erent characteristics of aligned networks or adopt (cid:128)xed parameters to control the proportion of information di(cid:130)used across networks, which usually need to be (cid:128)ne-tuned manually. Besides, these works also fail to consider the connectivity of the links within and across networks. (cid:140)e collective link prediction problem studied in this paper is also very challenging to solve due to the following reasons: • Network characteristic di(cid:130)erences: Since users nor- mally join in di(cid:130)erent networks for di(cid:130)erent purposes, each network usually has di(cid:130)erent characteristics and re- veals di(cid:130)erent aspects of the users. For example, profes- sional relations are established on LinkedIn while personal social-tiers are built in Twi(cid:138)er. (cid:140)us, information trans- ferred from other networks may be di(cid:130)erent from the target network that we want to study. Previous work found in- formation transfer could also deteriorate the performance of intra-network link prediction [31]. Correspondingly, anchor link prediction can be more susceptible as anchor links are directly related to information transferred across networks. (cid:140)erefore, it is more crucial but challenging to overcome network characteristic di(cid:130)erence problem for collective link prediction. • Link directivity di(cid:130)erences: (cid:140)e intra-network social links are usually uni-directed from the initiator pointing Figure 1: An example of collective link prediction over mul- tiple aligned networks to the recipient instead. For the users involved in the so- cial network, the social links pointing to them re(cid:131)ect the objective recognition from the community, whereas that from them to others re(cid:131)ect their personal social interest. (cid:140)us, these social relations collaboratively de(cid:128)ne a unique character in social networks. However, the inter-network anchor links are bi-directed according to the de(cid:128)nition. Such di(cid:130)erent directivity properties on social links and an- chor links should be carefully considered in the prediction model. In this paper, we propose a novel application oriented network embedding framework, namely Hierarchical Graph A(cid:138)ention based Network Embedding (HGANE), to solve the collective link pre- diction problem over aligned networks. Very di(cid:130)erent from the conventional general network embedding models, HGANE e(cid:130)ec- tively incorporates the collective link prediction task objectives into consideration. It learns node embeddings in multiple aligned net- works by aggregating information from the related nodes, including both the intra-network social neighbors and inter-network anchor partners. What's more, we introduce a hierarchical graph a(cid:138)en- tion mechanism for the intra-network neighbors and inter-network partners respectively, which handles the network characteristic di(cid:130)erences and link directivity di(cid:130)erences. HGANE balances be- tween the prediction tasks of both the intra-network social link and inter-network anchor link and the learned embedding results can resolve the collective link prediction problem e(cid:130)ectively. We conduct detailed empirical evaluations using several real-world datasets and show that our model outperforms other competitive approaches. We summarize the main contributions of this paper as follows: • We propose a novel embedding framework to learn the representations of nodes by aggregating information from both the intra-network neighbors (connected by social links) and inter-network partners (connected by anchor links). • We introduce a hierarchical graph a(cid:138)ention mechanism. It includes two levels of a(cid:138)ention mechanisms (cid:128)(cid:148) one at the node level and one at the network level (cid:128)(cid:148) to resolve the network characteristic di(cid:130)erences and link directivity challenges e(cid:130)ectively. • HGANE incorporates the collective link prediction task objectives into consideration and balances between the prediction tasks of the intra-network social link and inter- network anchor link, respectively. • Extensive experiments are conducted on two real-world aligned social network datasets. (cid:140)e results demonstrate that the proposed model outperforms existing state-of-the- art approaches by a large margin. (Multiple Aligned Social Networks) : 2 PRELIMINARY In this De(cid:128)nition 1. paper, we follow the de(cid:128)nitions introduced in [9]. Given n networks {G(1), . . . , G(n)} with shared users, they can be de- (cid:128)ned as multiple aligned networks G = ((G(1), G(2), · · · , G(n)), (A(1,2), A(1,3), · · · , A(1,n), A(2,3), · · · , A(n−1,n))), where G(i) (V (i), E(i)), i ∈ {1, 2, · · · , n} is a network consisting of nodes and links, and A(i, j) represents the anchor links between G(i) and G(j). For two nodes v(i) ∈ V (i) and v(j) ∈ V (j), node pair (v(i), v(j)) ∈ A(i, j) i(cid:130) v(i) and v(j) are the accounts of the same user in networks G(i) and G(j) respectively. For two online networks, such as Foursquare and Twi(cid:138)er used in this paper, we can represent them as two aligned social networks G = ((G(1), G(2)),(A(1,2))), which will be used as an example to illustrate the model. A simple extension of the proposed framework can be applied to multiple aligned networks conveniently. = Table 1: Descriptions of notations in our framework. Notation ui vj uin i vin j ur e i vr e j Ni(ui) Nr(ui) Na(ui) ein(ui , uj) ein(ui , vj) er e(ui , uj) er e(ui , vj) Description Node i in G(1) Node j in G(2) Initiator feature of ui in G(1) Initiator feature of vi in G(2) Recipient feature of ui in G(1) Recipient feature of vi in G(2) Inter-network anchor partners of ui Intra-network neighbors of ui as the initiator Intra-network neighbors of ui as the recipient Intra-network initiator a(cid:138)ention of ui to uj Inter-network initiator a(cid:138)ention of ui to vj Intra-network recipient a(cid:138)ention of ui to uj Inter-network recipient a(cid:138)ention of ui to vj Problem De(cid:128)nition : (cid:140)e collective link prediction problem studied in this paper includes simultaneous prediction of both intra- network social links and inter-network anchor links. Formally, given two aligned networks G = ((G(1), G(2)),(A(1,2))) where both of G(1) and G(2) are directed social networks. We can represent all the unknown social links among the nodes in G(k) as U (k) = V (k) × V (k)\(E(k) ∪ {(u, u)}u∈V (k)) where k ∈ {1, 2}. And the unknown anchor links across G(1) and G(2) can be denoted as U (1,2) = V (1) × V (2)\A(1,2). We aim at building a mapping f : U (1)∪U (2)∪U (1,2) → [0, 1] to project these intra-network social links and inter-network anchor links to their formation probabilities. 3 PROPOSED METHOD In this section, we will introduce the framework HGANE in detail. For the convenience of elaboration, we provide the main notations used through this paper in Table 1. At the beginning, the hierar- chical graph a(cid:138)ention mechanism will be introduced to handle the problems of network characteristic di(cid:130)erences and link directivity challenges. A(cid:137)er that, we will propose a novel node embedding method in multiple aligned networks. Finally, we will introduce the application oriented network embedding framework which can resolve the collective link prediction problem e(cid:130)ectively. 3.1 Hierarchical Graph Attention Mechanism Social networks consist of nodes and social links, while multiple aligned social networks consist of many social networks and anchor links across them. (cid:140)erefore, multiple aligned social networks have a hierarchical structure, which is illustrated in Figure 2. Besides, for the target node, it is observed that the relevance of di(cid:130)erent Figure 2: Hierarchical structure of multiple aligned net- works neighbors is di(cid:130)erent. For the target network, other networks are di(cid:130)erentially informative since they have di(cid:130)erent characteristics. Furthermore, as each node is cooperatively characterized by its neighbor nodes and anchor partners in other networks, their im- portance is highly dependent on node embeddings. (cid:140)erefore, we propose the hierarchical graph a(cid:138)ention mecha- nism in this section. It includes two levels of a(cid:138)ention mechanisms (cid:128)(cid:148) one at the node level and the other at the network level (cid:128)(cid:148) to make our model pay more or less a(cid:138)ention to di(cid:130)erent neighbor nodes and networks when constructing the node representations. (cid:140)ese two levels of a(cid:138)ention mechanisms are formally called the intra-network social a(cid:136)ention and the inter-network anchor a(cid:136)ention. (cid:140)ey are essential to resolve the problems of network characteristic di(cid:130)erences and link directivity challenges in the multiple aligned networks. In the following subsections, we will introduce the de(cid:128)- nitions and motivations of these two a(cid:138)ention mechanisms. Intra-Network Social A(cid:130)ention. 3.1.1 Given two aligned networks G = ((G(1), G(2)),(A(1,2))), the an- chor links are de(cid:128)ned to be bi-directed; while the intra-network social links are usually uni-directed from the initiator pointing to the recipient instead. (cid:140)us, every node plays these two roles within the social network. Normally, we represent each node ui i ∈ Rd and with two vector representations, the initiator feature uin i ∈ Rd, where d is the feature dimension. the recipient feature ur e (cid:140)e initiator feature uin represents the characteristic of the node i as the initiator following others while the recipient feature ur e i represents the characteristic of the node as the recipient followed by others. By distinguishing the initiator and recipient features for each node, we can lay the foundation for resolving the problem of link directivity challenges e(cid:130)ectively. For the target node ui, we de(cid:128)ne the nodes followed by it as its intra-network recipient neighbors. (cid:140)e set of intra-network recipient neighbors of the initiator ui is denoted as Ni(ui). (cid:140)e node uj ∈ Ni(ui) i(cid:130) (ui , uj) ∈ E(1). Similarly, the nodes following ui are de(cid:128)ned as its intra-network initiator neighbors and the set of these neighbors of the recipient ui is denoted as Nr(ui). (cid:140)e node uj ∈ Nr(ui) i(cid:130) (uj , ui) ∈ E(1). Here, based on the two node roles, we introduce intra-network initiator a(cid:136)ention and intra-network recipient a(cid:136)ention, to leverage the structural information within the social network. For intra-network social neighbors, the characteristic of the initiator is relevant to the recipient. (cid:140)e intra-network initiator a(cid:138)ention mechanism computes the coe(cid:129)cients to judge the impor- tance of the intra-network recipient neighbor to the target initiator. Here, the concept of intra-network initiator a(cid:138)ention mechanism can be represented formally. De(cid:128)nition 2. (Intra-Network Initiator A(cid:138)ention) : For the target node ui and its intra-network recipient neighbor uj ∈ Ni(ui), the intra-network initiator a(cid:138)ention coe(cid:129)cient of ui to uj can be given as (cid:16) where ·T represents transposition and (cid:107) is the concatenation op- (1) (1) in ∈ Rd(cid:48)×d and W r e ∈ Rd(cid:48)×d are the weight matrixes eration. W applied to every node as the initiator and the recipient for shared (1)T linear transformation in G(1). a in ∈ R2d(cid:48) is a weight vector and (1)T σ denotes the activation function. a will be r e used with similar meanings. ein(ui , uj) = σ (1,2)T and a r e (cid:13)(cid:13)(cid:13)W (1,2)T , a in (1) in uin i (1) r e ur e j (1)T a in (cid:105)(cid:17) (cid:104) W , Similarly, since the characteristics of the initiator and the recipi- ent are correlative, we can introduce the de(cid:128)nition of intra-network initiator a(cid:138)ention mechanism formally to obtain the importance of the intra-network initiator neighbor to the target recipient. De(cid:128)nition 3. (Intra-Network Recipient A(cid:138)ention) : For the target node ui and its intra-network initiator neighbor uj ∈ Nr(ui), the intra-network recipient a(cid:138)ention coe(cid:129)cient of ui to uj can be given as (cid:16) (cid:104) er e(ui , uj) = σ W is also a weight vector. (1)T a r e (1) r e ur e i (1) in uin j (cid:13)(cid:13)(cid:13)W (cid:105)(cid:17) , (1)T where a r e With these two kinds of intra-network a(cid:138)ention mechanism, our model can pay more a(cid:138)ention on useful information and neglect harmful information within the social networks. It is signi(cid:128)cant to resolve the problem of directivity challenges e(cid:130)ectively and leverage structural information within social networks. Inter-Network Anchor A(cid:130)ention. 3.1.2 Di(cid:130)erent from the intra-network social a(cid:138)ention mechanism which targets at the node level, the inter-network anchor a(cid:138)ention is for the network level. (cid:140)e anchor links connecting multiple networks play a crucial role in cross-network information transfer. However, due to the problem of network characteristic di(cid:130)erences, information transferred from other networks could also undermine the learned embeddings of the target network. To handle this problem, we introduce the inter-network anchor a(cid:138)ention mechanism. For the target node, the inter-network anchor a(cid:138)ention coe(cid:129)cient to its anchor partners in the other network indicates the importance of information transferred from that net- work. As mentioned in the last section, each node is represented by the initiator and recipient embeddings. To transfer the directed structural information within networks, two kinds of inter-network anchor a(cid:138)ention will be introduced according to these two roles of the nodes. Di(cid:130)erent from uni-directed social links, since the anchor nodes reveal the information of the same user from di(cid:130)erent aspects, it is intuitive that their initiator and recipient features in di(cid:130)erent networks can be related correspondingly. For the target node and its anchor partner in some network, the inter-network initiator a(cid:138)ention coe(cid:129)cient indicates the importance of information from that network to the target node as the initiator. Firstly, we represent the set of the inter-network anchor partners in the other network for the target node ui as Na(ui). If the node pair (ui , vj) ∈ A(1,2), vj ∈ Na(ui). And the de(cid:128)nition of inter-network initiator a(cid:138)ention is introduced as follows. De(cid:128)nition 4. (Inter-Network Initiator A(cid:138)ention): For the target node ui and its inter-network anchor partner vj ∈ Na(ui), the intra- network initiator a(cid:138)ention coe(cid:129)cient of ui to vj as the initiator can be given as , W (1) in uin i (1,2)T a in (1,2) in vin j is a weight vector. ein(ui , vj) = σ (1,2) where W is the weight matrix applied to every anchor node in in G(2) as the initiator while transferring information to G(1) and (1,2)T a in Similarly, considering the recipient role of nodes, it is intuitive that the recipient features of anchor partners are related. Based on this, we give the concept of inter-network recipient a(cid:138)ention, which denotes the importance of information from that network to the target node as the recipient. De(cid:128)nition 5. (Inter-Network Recipient A(cid:138)ention) : For the target node ui and its inter-network anchor partner vj ∈ Na(ui), the intra- network recipient a(cid:138)ention coe(cid:129)cient of ui to vj as the recipient can be given as (cid:13)(cid:13)(cid:13)W (cid:105)(cid:17) (cid:16) (cid:16) (cid:104) (cid:104) (cid:13)(cid:13)(cid:13)W (cid:105)(cid:17) , er e(ui , vj) = σ (1,2) where W r e (1,2)T the recipient and a r e (1,2)T a r e (1) r e ur e i W (1,2) r e vr e j is the weight matrix for every anchor node in G(2) as is also a weight vector. Inter-network anchor a(cid:138)ention mechanism can make a great con- tribution to e(cid:130)ective cross-network information transfer. It handles the problem of network characteristic di(cid:130)erences by making our model focus on more important networks with useful information. Besides, to make multiple coe(cid:129)cients easily comparable across di(cid:130)erent nodes, we normalize all the coe(cid:129)cients mentioned above across all choices of intra-network neighbors and inter-network partners using the so(cid:137)max function. (cid:140)us, the four kinds of at- tention coe(cid:129)cients of the concerned nodes within networks and across networks can be rewri(cid:138)en into a uni(cid:128)ed formula: (eop(ui , uj/vj)) op ui αop(ui , uj/vj) = so(cid:135)maxuj/vj , where op ∈ {in, re} indicates the role of the target node. And the denominator is set as = exp(eop(ui , uj/vj))(cid:46) exp(eop(ui , uk)) +  =  exp(eop(ui , vk)) SU M op ui SU M uk ∈Nop(ui) vk ∈Na(ui) 3.2 Multiple Aligned Network Embedding With the hierarchical graph a(cid:138)ention introduced in the previous section, we will introduce the cross-network embedding framework HGANE in this part. HGANE is based on the cross-network graph neural network model, which extends the traditional graph neural network (GNN) model [16] to the multiple aligned social networks scenario. According to the principle of GNN, embeddings can cap- ture the localized structural features by utilizing information propa- gated from the intra-network social neighbors. What's more, it can preserve more comprehensive features by leveraging cross-network information transferred by anchor links. (cid:140)erefore, HGANE learns the node representations by aggregating information from both the intra-network neighbors and inter-network partners. At the same time, HGANE takes advantage of the hierarchical graph a(cid:138)ention mechanism to focus on more important information to handle the problems of network characteristic di(cid:130)erences and link directivity challenges. (cid:140)e architecture of HGANE is illustrated in Figure 3. , ac- cording to its two role in social networks. (cid:140)e implicit initiator and (cid:48) ∈ Rd(cid:48) recipient representations of the node are represented as uin i (cid:48) ∈ Rd(cid:48) of the potentially di(cid:130)erent dimension d(cid:48). and ur e i Each node is represented by two embeddings, uin i (cid:140)e initiator embedding of ui, uin i , which indicates its features as the initiator in the social network, depends on its intra-network recipient neighbors. (cid:140)erefore, for the node uj ∈ Ni(ui), ur e j with the coe(cid:129)cient, αin(ui , uj), determined can contribute to uin i by intra-network initiator a(cid:138)ention. We de(cid:128)ne the intra-network neighbor recipient contribution (NRC) from uj to ui as and ur e i N RC(ui , uj) = αin(ui , uj)W (1) r e ur e j As to inter-network anchor partners, node embeddings can pre- serve more comprehensive information by taking their features of the same role in other networks into consideration. For the anchor node vj ∈ Na(ui), its initiator embedding vin also contribute to j the initiator embedding uin of the target node. To overcome the i problem of network characteristic di(cid:130)erences, the inter-network initiator a(cid:138)ention will compute the weights of information from di(cid:130)erent networks. (cid:140)e inter-network partner initiator contribution (PIC) from vj to ui is introduced as PIC(ui , vj) = αin(ui , vj)W (1,2) in vin j Formally, we can obtain the initiator embedding of ui by aggre- gating the intra-network neighbor recipient contribution and the inter-network partner initiator contribution as (cid:16)  uj ∈Ni(ui) N RC(ui , uj) +  PIC(ui , vj)(cid:17) , vj ∈Na(ui) (cid:48) uin i = σ where σ denotes a nonlinearity. Besides, the recipient embedding of ui, ur e , can be generated in the similar way. Inter-network and i inter-network recipient a(cid:138)ention will determine the importance of di(cid:130)erent related nodes' contribution. As the recipient, ui is naturally characterized by its intra-network initiator neighbors who actively follow it in social networks. Such intuition leads to the contribution from every node, such as uj ∈ Nr(ui), to ui. (cid:140)e intra-network neighbor initiator contribution (NIC) from uj to ui can be de(cid:128)ned as (1) N IC(ui , uj) = αr e(ui , uj)W in uin j (cid:140)e inter-network anchor partners provide more information about the recipient role of the target node from di(cid:130)erent sources. (cid:140)us, the recipient embedding of ui will aggregate the information from other networks by the anchor nodes with di(cid:130)erent weights computed by the inter-network recipient a(cid:138)ention in other net- works. We can obtain the inter-network partner recipient contribu- tion (PRC) from uj to ui to be PRC(ui , vj) = αr e(ui , vj)W (1,2) r e vr e j By combining these contributions from intra-network initiator neighbors and inter-network partners, the recipient embedding of ui can be represented formally as N IC(ui , uj) +  PRC(ui , vj)(cid:17) (cid:48) = σ ur e i (cid:16)  uj ∈Nr (ui) vj ∈Na(ui) To stabilize the learning process of node embeddings, we have found extending our mechanism to employ multi-head a(cid:138)ention to be bene(cid:128)cial, inspired by Vaswani et al. 2017 [20]. Speci(cid:128)cally, K independent a(cid:138)ention mechanisms execute the above transforma- tion, and then their embeddings are concatenated, resulting in the following initiator and recipient feature representations: (cid:16)  (cid:16)  σ σ K(cid:110) K(cid:110) k =1 uj ∈Ni(ui) k =1 uk ∈Nr (ui) N RCk(ui , uj) +  N ICk(ui , uj) +  vj ∈Na(ui) PICk(ui , vj)(cid:17) PRCk(ui , vj)(cid:17) vj ∈Na(ui) (cid:48) = uin i (cid:48) = ur e i where NRC, PIC, NIC and PRC with the subscript k in the formu- las denote the contributions computed with the k-th hierarchical a(cid:138)ention mechanism. With reference to above equations, the formula derivation of computing the node embeddings for G(2) can be obtained in the similar way. (cid:140)ey are not listed due to the page limit. 3.3 Collective Link Prediction Oriented Network Embedding Framework (cid:140)e embeddings of each node in multiple aligned networks can be generated by aggregating information from both the intra-network neighbors and inter-network partners as introduced in last section. In this part, we will introduce the network embedding optimization framework oriented to collective link prediction. (cid:140)e task includes Figure 3: HGANE model architecture. Each node is represented by the initiator and recipient embeddings (the orange and green little squares) in the aligned networks. (cid:135)e le(cid:133) plot provides the example of learning node embeddings (u1 in Net1) by aggregating information from both the intra-network neighbors (u2, u3 in Net1) and inter-network partners (v1 in Net2), which is weighted by hierarchical graph attention. (cid:135)e right plot illustrates how HGANE resolves the collective link prediction with the learned embeddings. the simultaneous prediction of the social links within each network and the anchor links between every two networks. For a node pair (ui , uj) within the social network, we de(cid:128)ne the probability of the intra-network social link formation from the initiator ui pointing to the recipient uj as p(cid:0)ui , uj (cid:1), T · ur e j i (cid:1) = σ(cid:0)uin (cid:1) +  {(um,un)} where σ(x) = 1/(1+exp(−x)) is the sigmoid function. And we adopt the approach of negative sampling [13] to de(cid:128)ne the objective of intra-network social link formation from the initiator uj to the recipient ui as (cid:0)ui , uj (cid:1) = log p(cid:0)ui , uj Lsoc log(cid:0)1 − p(cid:0)um, un (cid:1)(cid:1), where {(um, un)} denotes the set of the negative social links random sampled from the unknown links among nodes in G(1). In the objective, the (cid:128)rst term models the existing social links while the second term models the negative links. By adding the objective of each intra-network social link, the (cid:128)nal objective for G(1) can be formally represented as L(1) =  (ui,uj)∈E(1) Lsoc(ui , uj) Similarly, we can de(cid:128)ne the objective for the embedding results for G(2), which can be formally represented as L(2). Besides, anchor nodes re(cid:131)ect information of same users. (cid:140)ere- fore, their features tend to be in a close region in the embedding space whether as the initiator or the initiator. For the cross-network node pair (ui , vj) where ui ∈ E(1) and vi ∈ E(2), we concatenate the initiator and recipient embeddings of each node to de(cid:128)ne the the probability of the inter-network anchor link formation as p(cid:0)ui , vj (cid:1) = σ(cid:0)(cid:0)uin i (cid:107)ur e i (cid:1)T ·(cid:0)vin j (cid:107)vr e j (cid:1)(cid:1) Similarly with the objective of the intra-network social link formation, the objective of node alignment with negative sampling can be de(cid:128)ned as (cid:0)ui , vj (cid:1) = log p(cid:0)ui , vj (cid:1) +  log(cid:0)1 − p(cid:0)um, vn (cid:1)(cid:1), Lach {(um,vn)} where {(um, vn)} denotes the set of the negative anchor links ran- dom sampled from the unknown anchor links across G(1) and G(2). By aligning anchor nodes, we can leverage information from mul- tiple sources to learn the node embeddings comprehensively. In- formation transfer across networks is achieved based on every inter-network anchor link. Formally, the information transfer ob- jective between G(1) and G(2) is represented by summing up the the objective of each anchor link as L(1,2) =  (ui,vj)∈A(1,2) (cid:0)Lach (cid:0)ui , vj (cid:1)(cid:1) To incorporate the collective link prediction task into a uni(cid:128)ed framework, we learn the node representations with rich informa- tion by jointly training the objective function including the ob- jective for networks G(1), G(2), and the objective of information transfer, which can be denoted as (1) , G G = L(1) + L(2) + α · L(1,2) + β · Lr e❕ L(cid:16) (2)(cid:17) (cid:140)e parameter α denotes the weight of the information transfer objective to balance between the several prediction tasks of both the intra-network social link and the inter-network anchor link. In the objective function, the term Lr e❕ is added to avoid over(cid:128)(cid:138)ing and the parameter β denotes the weight of it. By optimizing the above objective function, the node embeddings can be learned to resolve the collective link prediction problem e(cid:130)ectively. Table 2: Statistics of datasets Dataset Twi(cid:138)er Foursquare Facebook Twi(cid:138)er #Nodes 5,223 5,392 4,137 4,137 #Social Links 164,920 76,972 57,528 147,726 #Anchor Links 3,388 4,137 4 EXPERIMENT 4.1 Datasets We conducted experiments using two real-world aligned social networks: Twi(cid:138)er-Foursquare and Facebook-Twi(cid:138)er(Statistical in- formation in Table 2): • Twitter-Foursquare [9]: Twi(cid:138)er is the most popular worldwide microblog site and Foursquare is the famous location-based social network. (cid:140)ere are 5,223 users and 164,920 follow links in Twi(cid:138)er and 5,392 users and 76,972 social links in Foursquare. Among these crawled Foursquare users, 3,388 of them are aligned by anchor links with Twi(cid:138)er. • Facebook-Twitter [2]: Facebook is another worldwide online social media. (cid:140)e Facebook and Twi(cid:138)er accounts of 4,137 users were crawled. Every node has a counterpart in the other network. (cid:140)ere are 57,528 social links in Facebook and 147,726 follow links in Twi(cid:138)er among these users. It is noted that these two datasets were crawled respectively and there is no overlap of these two Twi(cid:138)er subnetworks. Source Code: (cid:140)e source code of HGANE is available in h(cid:138)p: //github.com/yzjiao/HierarchicalGraphA(cid:138)ention. 4.2 Comparison Methods Table 3: Comparision of di(cid:130)erent models Method DeepWalk Node2Vec GAT IONE DIME MNN CLF HGANE Multiple Networks Links Directi. Di(cid:130)ere. Network Charact. Di(cid:130)ere. Predict Social Link Predict Anchor Link ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! (cid:140)e network embedding methods used in the experiment are listed as follows (summarized in Table 3): • DeepWalk [15]: Skip-gram based vertex embedding method for a single network that extends the word2vec [14] to the network scenario. • Node2Vec [6]: Word-to-vector approach for a single net- work that modi(cid:128)es the random walk strategy in DeepWalk into a more sophisticated schemes. • GAT [20]: A neural network architecture for a single net- work to learn node representation by leveraging masked self-a(cid:138)ention layers. • IONE [12]: A representation learning model for multiple aligned network by preserving the proximity of users with (cid:128)similar(cid:128) followers/followees in the embedded space for network alignment. • DIME [30]: An embedding framework for multiple het- erogeneous aligned network with aligned autoencoders to transfer information and improve the link prediction in emerging networks. • MNN [1]: A multi-neural-network framework for intra- network link prediction over aligned networks. It is not suitable for anchor link prediction as it assigns anchor users with the same feature vectors. • CLF [23]: A method aiming at collective link prediction by propagating the probabilities of predicted links across the partially aligned networks with collective random walk. 4.3 Experiment Setting In our experiment, we will target on the collective link prediction task and concern the performance of social link prediction in G(1), G(2), and anchor link prediction across these two networks. (cid:140)ese three subtasks will be denoted as Soc1, Soc2, Ach in the experiment results. As link prediction is regarded as a binary classi(cid:128)cation task, the performance will be evaluated with Area Under the Curve (AUC) metric. All the existing links in the two aligned networks are used as the positive link set, including social links within two networks and anchor links across these two networks. We sample a subset of unknown links among nodes in the same network randomly as the negative social link set, which is of the double size of the positive social link set. (cid:140)e negative anchor link set is generated by the random sample of unknown cross-network links. (cid:140)e size of the negative anchor link set is (cid:128)ve times of that of the positive set. A proportion of the links in the positive and negative sets are sampled as the training set, the rest as the test set. For our embedding framework HGANE, we initialize the initiator and recipient features of each node with the common initiator and recipient neighbor features within its networks. (cid:140)ere are two a(cid:138)ention-based layers involved for each network. (cid:140)e (cid:128)rst layer consists of K = 8 a(cid:138)ention heads computing 256 features each, followed by an exponential linear unit (ELU) [4] nonlinearity. (cid:140)e second layer is a single a(cid:138)ention head to compute node embeddings, followed by a so(cid:137)max activation. (cid:140)e dimension of the embeddings is 100. During training, we apply dropout [17] to the normalized a(cid:138)ention coe(cid:129)cients. And we train for 3000 epochs using the Adam optimizer [8] with the learning rate of 0.005. (cid:140)e parameters α = 1.0 and β = 0.0005 are used in the experiments. For the comparison methods that target at one single network, such as Node2vec, DeepWalk and GAT, we preprocess the datasets by merging two networks into one and regarding anchor links as social links within networks. We apply the linear SVM classi(cid:128)er Table 4: Performance comparison with di(cid:130)erent methods. Soc1, Soc2 and Ach indicate social link prediction in the (cid:128)rst and second network and anchor link prediction respectively. Training Ratio Dataset Method Twi(cid:138)er & Foursquare Facebook Twi(cid:138)er & DeepWalk Node2Vec GAT IONE DIME MNN CLF HGANE DeepWalk Node2Vec GAT IONE DIME MNN CLF HGANE 0.4 Soc2 76.9% 80.9% 86.9% 81.7% 80.3% 81.1% 80.5% 0.6 Soc2 79.7% 84.3% 90.3% 84.7% 83.0% 86.1% 84.2% 0.2 Soc2 72.5% 77.4% 78.2% 75.7% 76.2% 72.4% 78.7% Ach 75.4% 78.9% 80.9% 87.4% 84.9% Ach 57.9% 64.3% 65.5% 72.1% 74.8% - 70.9% Ach 67.3% 72.1% 75.8% 85.6% 82.6% - 83.1% Ach 63.1% 66.1% 68.9% 78.0% 76.3% - 75.2% Soc1 85.7% 89.3% 92.6% 88.7% 92.0% 96.3% 92.3% Soc1 82.2% 86.4% 92.5% 88.2% 89.8% 94.8% 90.9% Soc1 80.3% 84.6% 91.5% 86.2% 88.4% 92.9% 86.7% Soc1 75.8% 82.5% 85.5% 83.2% 85.1% 89.2% 84.5% 87.1% 94.4% 90.3% 76.7% 96.4% 95.1% 85.8% 97.1% 96.8% 90.0% 97.5% 97.5% 93.0% 78.9% 76.3% 83.2% 83.0% 87.3% 85.5% 92.1% 82.8% 87.1% 87.5% 88.6% 84.9% 90.4% 91.8% 90.9% 84.8% 95.2% 94.8% 93.4% 97.1% 96.9% 95.8% 98.1% 97.5% 97.1% 70.3% 81.5% 86.1% 79.1% 86.2% 87.1% 81.1% 81.6% 87.5% 92.8% 85.1% 90.0% 93.1% 88.9% 75.2% 85.7% 90.0% 82.6% 87.3% 91.3% 85.9% 81.5% 86.6% 92.0% 85.9% 88.4% 92.4% 88.7% 84.0% 88.8% 94.7% 87.4% 89.8% 94.4% 91.4% 90.9% 91.3% 95.7% 90.9% 94.0% 95.7% 93.1% 86.5% 88.2% 93.4% 89.1% 92.2% 94.8% 90.2% 70.9% 76.2% 78.5% 85.4% 81.9% - 84.2% 77.7% 81.0% 83.5% 89.4% 85.1% - 87.6% 55.8% 58.6% 60.2% 77.9% 74.3% - 80.5% - - 0.8 Soc2 82.5% 88.3% 92.3% 84.7% 85.2% 87.6% 86.5% Table 5: Validation of the design of represent each node with two embeddings to resolve the link directivity di(cid:130)erences problem. Our full model outperforms two variants with ei- ther the initiator or recipient features. Feature initiator recipient both Facebook&Twi(cid:138)er Twi(cid:138)er&Foursquare Ach Ach Soc1 95.8% 85.2% 93.4% 93.0% 96.2% 85.6% 97.2% 96.8% 93.0% 98.1% 97.5% 97.1% Soc2 93.2% 93.7% Soc1 97.0% 97.1% Soc2 94.9% 95.1% for those embedding methods that can't directly predict the forma- tion of links. Notably, we have chosen optimal hyper-parameters carefully for di(cid:130)erent baselines in this paper to ensure the fairness of comparison experiments. 4.4 Experiment Result In the collective link prediction task, we compare the performance of eight di(cid:130)erent embedding methods under di(cid:130)erent training rate λ ∈ {20%, 40%, 60%, 80%}. Table 4 shows the performance of our model and other seven baseline methods evaluated by AUC with di(cid:130)erent training rate λ. (cid:140)e method we proposed in this paper, HGANE, performs much be(cid:138)er than the other methods in the three subtasks simultaneously, which shows its e(cid:130)ectiveness in the col- lective link prediction task. HGANE incorporates the task-oriented objectives into consideration and thus balance between the predic- tion tasks of both the intra-network social link and inter-network anchor link simultaneously. Considering the experiments with di(cid:130)erent training rate λ, as the ratio drops, the performance of all the methods deteriorates. However, the performance degradation of the proposed model is rather moderate compared to other methods since we leverage the information of the multiple aligned networks and handle the prob- lem of network characteristic di(cid:130)erences. Even when the training rate λ is as low as 20%, the baseline models will su(cid:130)er from the information sparsity a lot, but our model can still obtain very good performance. To demonstrate the e(cid:130)ectiveness of considering the directivity, we compare our full model to its two variants with either the initia- tor features or the recipient features. (cid:140)e experiment results show in Table 5 with the training ratio as 0.8. We found that the two variants can give be(cid:138)er results than other baselines but their perfor- mance is much inferior to that of the full model. According to the experimental statistics of two datasets, the performance of social link prediction within the more dense network can be improved more by distinguishing nodes' initiator and recipient roles. 4.5 Hypothesis Veri(cid:128)cation As mentioned in the method part, in our framework, each node is represented with the initiator and recipient features and it is crucial to determine how to aggregate information from the neigh- bors connected by social links and anchor links. If the neighbor's initiator and recipient features contribute to the target node' s re- cipient and initiator respectively, we name it as cross-contribution. Conversely, if the initiator and recipient features of two neighbor nodes are related correspondingly, we name it direct-contribution. By combining two mechanisms with two kinds of links, there are four di(cid:130)erent hypotheses as illustrated in Figure 4. (cid:140)e hypotheses SC+AD is adopted in our framework. To validate it, we study the variants of our full model with the other three hypotheses and compared their performances on the collective link Figure 4: Four hypotheses about how the neighbors con- tribute to the target node. (cid:135)ere are two kinds of contribu- tion modes for social neighbors and anchor partners respec- tively. prediction task in Table 6. (cid:140)e experimental results indicate the model with SC+AD can achieve the best performance in both social link prediction and anchor link prediction. If direct-contribution is replaced with cross-contribution for anchor links, AUC of the anchor link prediction decreases a lot in two datasets. And the performances of the social link prediction are a(cid:130)ected if we adopt direct-contribution for social links. Table 6: Hypothesis veri(cid:128)cation. SC+AD is adopted in our framework and achieves the best results. Hypothesis SC+AC SD+AD SD+AC SC+AD Facebook&Twi(cid:138)er Twi(cid:138)er&Foursquare Ach Soc1 Ach 96.0% 89.4% 97.2% 95.3% 82.8% 91.8% 91.8% 94.3% 82.1% 97.2% 96.7% 92.4% 98.1% 97.1% 96.7% Soc2 97.0% 95.2% 95.3% Soc2 96.0% 91.3% 91.3% Soc1 98.1% 97.0% 96.9% 4.6 Parameter Analysis Now we examine the in(cid:131)uence of three key parameters in our framework: the embedding size d and the weight of the information transfer objective α and the weight of the regularization β. (cid:140)e three sub(cid:128)gures on the le(cid:137) in Figure 5 show the sensitivity analysis on the (cid:128)rst dataset while the rest is about the second dataset. (cid:140)e results in the (cid:128)rst two sub(cid:128)gures indicate that se(cid:138)ing the embedding size d to 100 can provide the best performance on both two datasets. Even when d is as low as 10, our model can achieve good results on three kinds of link prediction simultaneously. (cid:140)e parameter α denotes the strength of aligning the two net- works. (cid:140)e two sub(cid:128)gures about α in the middle show how di(cid:130)erent values of α can a(cid:130)ect the results on di(cid:130)erent datasets. (cid:140)e optimal α is near 1.0. When se(cid:138)ing α in [1, 3], all the link prediction tasks perform well and stably. Anchor link prediction and social link prediction in sparser networks are a(cid:130)ected as α increases. How- ever, social link prediction in the dense networks is still stable. For the weight parameter β, the best se(cid:138)ing is in [0.1, 0.2] according to the last two sub(cid:128)gures. It has a certain impact on anchor link Figure 5: Hyperparameter analysis. Our method is robust to choices of d, α and β on two datasets prediction across the network while social link prediction within the network is not that sensitive to the parameter β on both two datasets. 5 RELATED WORK Multi-Network Analysis Traditional network embedding meth- ods focus on one single network [6, 15, 32] and su(cid:130)er from the data insu(cid:129)ciency problem in the cold start scenarios. (cid:140)erefore, multi-network analysis has been a hot research topic and studied for data enrichment for several years on which dozens of works have been published [24, 28]. Some work studied on information transfer across networks by anchor links to improving the quality of inter-network link prediction [1, 25, 26, 30, 31]. Besides, many ex- isting works aim at anchor link formation prediction automatically [9, 27]. However, most of these works study either intra-network or inter-network link prediction tasks separately. Zhang et al. (cid:128)rst proposed the collective link prediction task [23]. (cid:140)e existing meth- ods mostly ignore the contradiction of di(cid:130)erent characteristics of aligned networks or adopt (cid:128)xed parameters to control the propor- tion of information di(cid:130)used across networks, which usually need to be (cid:128)ne-tuned manually. Besides, these works also fail to consider the link connectivity of the links within and across networks. 10501001502002503000.80.850.90.95dAUCTwitter&FoursquareSoc1Soc2Ach10501001502002503000.80.850.90.95dAUCFacebook&TwitterSoc1Soc2Ach12345101520250.80.850.90.95αAUCTwitter&FoursquareSoc1Soc2Ach12345101520250.80.850.90.95αAUCFacebook&TwitterSoc1Soc2Ach0.0010.010.10.20.30.40.50.60.80.850.90.95βAUCTwitter&FoursquareSoc1Soc2Ach0.0010.010.10.20.30.40.50.60.80.850.90.95βAUCFacebook&TwitterSoc1Soc2Ach Neural attention mechanism Neural a(cid:138)ention mechanism has inspired many state-of-the-art models in several machine learn- ing tasks including image caption generation [22], machine trans- lation [5, 19] and semantic role labeling [18]. Its e(cid:130)ectiveness is owed to making the model focus on more important detailed in- formation and neglecting the useless information. In recent years, some works have also investigated the use of a(cid:138)ention on graphs [3, 20, 29]. Our work propose the hierarchical graph a(cid:138)ention to model multiple aligned networks and overcome network character- istics contradiction to transfer more e(cid:130)ective information across networks. 6 CONCLUSION In this paper, we study the collective link prediction problem in multiple aligned social networks. We propose a novel applica- tion oriented network embedding framework, namely Hierarchical Graph A(cid:138)ention based Network Embedding (HGANE) to learn node embeddings. (cid:140)e hierarchical graph a(cid:138)ention mechanism is introduced to resolve the network characteristic di(cid:130)erences and link directivity di(cid:130)erences. We conduct detailed empirical evaluations using several real-world datasets and the results demonstrate that our model outperforms other competitive approaches and handles the collective link prediction problems e(cid:130)ectively. ACKNOWLEDGMENTS (cid:140)is work is supported in part by the National Natural Science Foundation of China Projects No.U1636207 and NSF through grant IIS-1763365. (cid:140)is work is also partially supported by the Shang- hai Science and Technology Development Fund No. 16JC1400801 and the National Natural Science Foundation of China Projects No.91546105. REFERENCES [1] Xuezhi Cao, Haokun Chen, Xuejian Wang, Weinan Zhang, and Yong Yu. 2018. Neural link prediction over aligned networks. In (cid:138)irty-Second AAAI Conference on Arti(cid:128)cial Intelligence. [2] Xuezhi Cao and Yong Yu. 2016. ASNets: A benchmark dataset of aligned social networks for cross-platform user modeling. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management. ACM, 1881 -- 1884. [3] Edward Choi, Mohammad Taha Bahadori, Le Song, Walter F Stewart, and Jimeng Sun. 2017. GRAM: graph-based a(cid:138)ention model for healthcare representation learning. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 787 -- 795. [4] Djork-Arn´e Clevert, (cid:140)omas Unterthiner, and Sepp Hochreiter. 2015. Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs). CoRR abs/1511.07289 (2015). arXiv:1511.07289 h(cid:138)p://arxiv.org/abs/1511.07289 Jonas Gehring, Michael Auli, David Grangier, and Yann Dauphin. 2017. A Convolutional Encoder Model for Neural Machine Translation. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Vol. 1. 123 -- 135. [6] Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 855 -- 864. [7] Adrien Guille, Hakim Hacid, Cecile Favre, and Djamel A Zighed. 2013. Informa- tion di(cid:130)usion in online social networks: A survey. ACM Sigmod Record 42, 2 (2013), 17 -- 28. [8] Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic opti- mization. arXiv preprint arXiv:1412.6980 (2014). [9] Xiangnan Kong, Jiawei Zhang, and Philip S Yu. 2013. Inferring anchor links across multiple heterogeneous social networks. In Proceedings of the 22nd ACM [5] [12] Li Liu, William K Cheung, Xin Li, and Lejian Liao. 2016. Aligning Users across international conference on Information & Knowledge Management. ACM, 179 -- 188. [10] Vincent Leroy, B Barla Cambazoglu, and Francesco Bonchi. 2010. Cold start link prediction. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 393 -- 402. [11] Yongjun Li, You Peng, Zhen Zhang, Hongzhi Yin, and (cid:139)anqing Xu. 2018. Match- ing user accounts across social networks based on username and display name. World Wide Web (2018), 1 -- 23. Social Networks Using Network Embedding.. In IJCAI. 1774 -- 1780. [13] Tomas Mikolov, Kai Chen, Greg Corrado, and Je(cid:130)rey Dean. 2013. E(cid:129)cient Estimation of Word Representations in Vector Space. CoRR abs/1301.3781 (2013). arXiv:1301.3781 h(cid:138)p://arxiv.org/abs/1301.3781 [14] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Je(cid:130) Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111 -- 3119. [15] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learn- ing of social representations. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 701 -- 710. [16] Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, and Gabriele Monfardini. 2009. (cid:140)e graph neural network model. IEEE Transactions on Neural Networks 20, 1 (2009), 61 -- 80. [17] Nitish Srivastava, Geo(cid:130)rey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from over(cid:128)(cid:138)ing. (cid:138)e Journal of Machine Learning Research 15, 1 (2014), 1929 -- 1958. [18] Zhixing Tan, Mingxuan Wang, Jun Xie, Yidong Chen, and Xiaodong Shi. 2018. Deep semantic role labeling with self-a(cid:138)ention. In (cid:138)irty-Second AAAI Conference on Arti(cid:128)cial Intelligence. [19] Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. A(cid:138)ention is all you need. In Advances in Neural Information Processing Systems. 5998 -- 6008. [20] Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Li`o, and Yoshua Bengio. 2017. Graph A(cid:138)ention Networks. CoRR abs/1710.10903 (2017). arXiv:1710.10903 h(cid:138)p://arxiv.org/abs/1710.10903 [21] Yaqing Wang, Chunyan Feng, Ling Chen, Hongzhi Yin, Caili Guo, and Yunfei Chu. 2018. User identity linkage across social networks via linked heterogeneous network embedding. World Wide Web (2018), 1 -- 22. [22] BaJ XuK, CourvilleA KirosR, et al. 2015. Show, a(cid:138)end and tell: Neural image cap- tion generation with visual a(cid:138)ention. Proceedings of the International Conference on Machine Learning. Lille, France 2048 (2015), 2057. [23] Qianyi Zhan, Jiawei Zhang, and S Yu Philip. 2018. Integrated anchor and social link predictions across multiple social networks. Knowledge and Information Systems (2018), 1 -- 24. Jiawei Zhang. 2018. Social Network Fusion and Mining: A Survey. arXiv preprint arXiv:1804.09874 (2018). Jiawei Zhang, Xiangnan Kong, and S Yu Philip. 2013. Predicting social links for new users across aligned heterogeneous social networks. In 2013 IEEE 13th International Conference on Data Mining. IEEE, 1289 -- 1294. Jiawei Zhang, Xiangnan Kong, and Philip S Yu. 2014. Transferring heteroge- neous links across location-based social networks. In Proceedings of the 7th ACM international conference on Web search and data mining. ACM, 303 -- 312. Jiawei Zhang and S Yu Philip. 2015. Multiple anonymized social networks alignment. In 2015 IEEE International Conference on Data Mining. IEEE, 599 -- 608. Jiawei Zhang and S Yu Philip. 2019. Broad Learning (cid:138)rough Fusions: An Applica- tion on Social Networks. Springer. Jiani Zhang, Xingjian Shi, Junyuan Xie, Hao Ma, Irwin King, and Dit-Yan Yeung. 2018. Gaan: Gated a(cid:138)ention networks for learning on large and spatiotemporal graphs. arXiv preprint arXiv:1803.07294 (2018). Jiawei Zhang, Congying Xia, Chenwei Zhang, Limeng Cui, Yanjie Fu, and S Yu Philip. 2017. BL-MNE: emerging heterogeneous social network embedding through broad learning with aligned autoencoder. In 2017 IEEE International Conference on Data Mining (ICDM). IEEE, 605 -- 614. Jiawei Zhang, Philip S Yu, and Zhi-Hua Zhou. 2014. Meta-path based multi- network collective link prediction. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 1286 -- 1295. [32] Yao Zhang, Yun Xiong, Xiangnan Kong, and Yangyong Zhu. 2017. Learning node embeddings in interaction graphs. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. ACM, 397 -- 406. [33] Xiaoping Zhou, Xun Liang, Xiaoyong Du, and Jichao Zhao. 2018. Structure based user identi(cid:128)cation across social networks. IEEE Transactions on Knowledge and Data Engineering 30, 6 (2018), 1178 -- 1191. [26] [28] [24] [25] [31] [27] [29] [30]
1809.00320
2
1809
2018-09-07T18:57:13
Network Alignment by Discrete Ollivier-Ricci Flow
[ "cs.SI", "cs.CG" ]
In this paper, we consider the problem of approximately aligning/matching two graphs. Given two graphs $G_{1}=(V_{1},E_{1})$ and $G_{2}=(V_{2},E_{2})$, the objective is to map nodes $u, v \in G_1$ to nodes $u',v'\in G_2$ such that when $u, v$ have an edge in $G_1$, very likely their corresponding nodes $u', v'$ in $G_2$ are connected as well. This problem with subgraph isomorphism as a special case has extra challenges when we consider matching complex networks exhibiting the small world phenomena. In this work, we propose to use `Ricci flow metric', to define the distance between two nodes in a network. This is then used to define similarity of a pair of nodes in two networks respectively, which is the crucial step of network alignment. %computed by discrete graph curvatures and graph Ricci flows. Specifically, the Ricci curvature of an edge describes intuitively how well the local neighborhood is connected. The graph Ricci flow uniformizes discrete Ricci curvature and induces a Ricci flow metric that is insensitive to node/edge insertions and deletions. With the new metric, we can map a node in $G_1$ to a node in $G_2$ whose distance vector to only a few preselected landmarks is the most similar. The robustness of the graph metric makes it outperform other methods when tested on various complex graph models and real world network data sets (Emails, Internet, and protein interaction networks)\footnote{The source code of computing Ricci curvature and Ricci flow metric are available: https://github.com/saibalmars/GraphRicciCurvature}.
cs.SI
cs
Network Alignment by Discrete Ollivier-Ricci Flow Chien-Chun Ni1[0000−0002−9082−7401], Yu-Yao Lin2[0000−0001−9761−5156], Jie Gao3[0000−0001−5083−6082], and Xianfeng Gu3[0000−0001−8226−5851] 1 Yahoo! Research, Sunnyvale CA 94089, USA [email protected] 2 Intel Inc., Hillsboro OR 97124, USA 3 Stony Brook University, Stony Brook NY 11794, USA [email protected] {jgao,gu}@cs.stonybrook.edu Abstract. In this paper, we consider the problem of approximately aligning/matching two graphs. Given two graphs G1 = (V1, E1) and G2 = (V2, E2), the objective is to map nodes u, v ∈ G1 to nodes u(cid:48), v(cid:48) ∈ G2 such that when u, v have an edge in G1, very likely their correspond- ing nodes u(cid:48), v(cid:48) in G2 are connected as well. This problem with subgraph isomorphism as a special case has extra challenges when we consider matching complex networks exhibiting the small world phenomena. In this work, we propose to use 'Ricci flow metric', to define the distance between two nodes in a network. This is then used to define similarity of a pair of nodes in two networks respectively, which is the crucial step of network alignment. Specifically, the Ricci curvature of an edge describes intuitively how well the local neighborhood is connected. The graph Ricci flow uniformizes discrete Ricci curvature and induces a Ricci flow metric that is insensitive to node/edge insertions and deletions. With the new metric, we can map a node in G1 to a node in G2 whose distance vector to only a few preselected landmarks is the most similar. The robustness of the graph metric makes it outperform other methods when tested on various complex graph models and real world network data sets (Emails, Internet, and protein interaction networks)4. 1 Introduction Given two graphs G1 and G2 with approximately the same graph topology, we want to find the correspondence of their nodes -- node v in G1 is mapped to a node f (v) in G2 such that whenever u, v is connected in G1, f (u), f (v) are likely to be connected in G2 as well. This is called the network alignment problem and has been heavily studied [10] with numerous applications including database schema matching [19], protein interaction alignment [59,9,15,45], ontology matching [58], pattern recognition [48] and social networks [71,23]. 4 The source code of computing Ricci curvature and Ricci flow metric are available: https://github.com/saibalmars/GraphRicciCurvature 2 C.-C. Ni et al. Network alignment is a hard problem. A special case is the classical problem of graph isomorphism, in which we test whether or not two graphs have ex- actly the same topology under a proper correspondence. The most recent break- through by László Babai [3] provides an algorithm with quasi-polynomial run- ning time O(exp ((log n)O(1))), where n is the number of nodes. It still remains open whether the problem is NP-complete or not. For special graphs, polynomial time algorithms have been developed (e.g. trees [2], planar graphs [28], graphs of bounded valence [43]). For general graphs what has been commonly used in- clude heuristic algorithms such as spectral methods [59,1,54], random walks [63], optimal cost matching method [32] and software packages such as Nauty, VF, and VF2, see [47,11]. The subgraph isomorphism problem, i.e., testing whether one graph is the subgraph of the other, is NP-complete and has been heavily studied as well. See the survey [10,69,16]. For practical settings, the problem is often formulated as finding a matching in a complete bipartite graph H = (V1, V2, E), in which V1 are nodes in G1, V2 are nodes in G2, and edges E carry weights that indicate similarity of the two nodes. Here similarity can be either attribute similarity or structural similarity (quantifying their positions in the network). The two graphs are aligned by tak- ing a matching of high similarity in graph H. Many algorithms use this approach and they differ by how to define node similarity: L-Graal [46], Natalie [14], NetAl- ignMP++ [6], NSD [35], and IsoRank [59]. In this paper, our main contribution is to provide a new method to compute node structural similarity using the idea of graph curvature and curvature flow. Our Setting. We mainly focus on complex networks that appear in the real world. Consider the Internet backbone graphs captured at two different points in time, we wish to match the nodes of the two graphs in order to understand how the network has evolved over time. Or, consider two social network topologies on the same group of users. It is likely that when two users are connected by a social tie in one network (say LinkedIn), they are also connected in the other network (say Facebook). A good alignment of two networks can be useful for many applications such as feature prediction [18], link prediction [67], anomaly detection [51], and possibly de-anonymization [22,55]. We work with the assumption that a small number k (say 2 or 3) of nodes, called landmarks, are identified. Often a small number of landmarks could be discovered by using external information or properties of the networks. For ex- ample, in networks with power law degree distributions, there are often nodes with really high degree that can be identified easily. Given the landmarks, we can find a coordinate for each node u as [d(u, (cid:96)1), d(u, (cid:96)2),··· , d(u, (cid:96)k)], where d(u, (cid:96)i) captures the similarity of u with the ith landmark. This coordinate vec- tor captures the structural position of a node in the network and can be used in the network alignment problem -- two nodes u1 ∈ V1 and u2 ∈ V2 can be aligned if their respective coordinates are similar. This approach is motivated by localization in the Euclidean setting, in which three landmarks are used to define the barycentric coordinates of any node in the plane. In the complex network setting, this approach faces two major challenges that need to be addressed. Network Alignment by Discrete Ollivier-Ricci Flow 3 (a) Ricci Curvature: The Original (b) Ricci Curvature: After Ricci Flow Fig. 1. An example of Ricci curvature on the karate club graph before and after Ricci flow. The col- ors represent the Ricci curvature while the thickness represents the edge weight. Ricci flow deformed the edge weights until Ricci curvatures converged (−0.0027 in this case). First, a proper metric that measures the distance from any node to the landmarks in the network is needed. The easiest metric is probably the hop count -- the number of edges on the shortest path connecting two nodes in the network. While the hop count is often used for communication networks, for complex networks it is less helpful as these networks often have a small diameter. To look for a better measure, edges shall be properly weighed which is highly application dependent. For the Internet setting [39], measures such as Round- Trip Time (RTT) are used. In a social network setting, it is natural to weight each edge by its tie strength. But these weights are not easy to obtain. Many graph analysis methods use measures that capture local graph structures by common neighborhood, statistics generated by random walks [56,24], etc. Second, the approach of using distances to landmarks to locate a node in the network is truly geometric in nature [20,33]. But a fundamental question is to decide what underlying metric space shall be used. Low-dimensional Eu- clidean spaces are often used [26,37] and spectral embedding or Tutte embedding are popular. But it is unclear what is the dimensionality of a general complex network and robustness of these embeddings is not fully understood. Our Approach. We address the above problems by using the tool of graph curvature and curvature flow. In the continuous setting of a two dimensional surface, the curvature of a point captures how much it deviates from being flat at the point. The tip of a bump has positive curvature and a saddle point has negative curvature. Curvature flow is a process that deforms the surface (chang- ing the metric) and eventually makes the curvature to be uniform everywhere. In our setting, we look at discrete curvatures and curvature flow defined on a graph and argue that by curvature one can encode and summarize graph struc- tures. As will be explained later in more details and rigor, edges that are in a densely connected 'community' are positively curved while edges that connect two dense communities are negatively curved. Further, we can define curvature flow (which is an adaptation of surface Ricci flow to the graph setting) such that weights are given to the edges to make all edges have the same curvature. This Ricci CurvatureRicci Curvature 4 C.-C. Ni et al. (a) Spectral (Avg: 7.9 ± 7.2(%)) (b) RF Metric (Avg: 1.9 ± 1.1(%)) Fig. 2. A comparison of stretch ratios under different metrics started from node 4 labeled in yellow. Here the stretch ratio defined by the ratio of shortest path changed when nodes or edges are removed from graph. For graph G and G \ {v2v7, v26v29}, the stretch ratios of shortest paths from node 4 to all other nodes are labeled in color. Here the top five stretches paths are labeled by its ratios next to the nodes. With just two edges removed, the stretch ratios of spring and spectral metric changed drastically while RF metric remains stable. process in some sense 'uniformizes' the network and can be imagined as em- bedding the network in some intrinsic geometric space. These weights are again intuitive -- edges in a dense community are short while edges that connect two far away communities are long, see Figure 1. We call the shortest path length under such weights as the Ricci flow metric. The Ricci flow metric is designed to improve robustness under insertions and deletions of edges/nodes -- when an edge is removed, the shortest path distance between the two endpoints in the original graph can possibly change a lot and Ricci flow reduces such imbalance. This is useful for matching two graphs that are different topologically. Our curvature based coordinates depend only on the network topology and thus are purely structural. But they can also be combined with node attributes (when available) to produce an alignment score. In our evaluation we have focused on methods that use structural similarities and embeddings such as hop counts, metrics induced by spectral embedding [44] or spring/Tutte em- bedding [64], and topology based network alignment algorithm IsoRank [59] and NSD [35]. We evaluated our network alignment algorithms on a variety of real world data sets (Internet AS graphs [60], Email networks [25,36], protein networks [18,36]) and generated model networks (random regular graphs, Erdös- Rényi graphs [17], preferential attachment model [5] and Kleinberg's small world model [34]). Experimental evaluations show that the Ricci flow metric greatly outperforms other alternatives. In particular, most of the embedding methods perform poorly on random regular graphs due to identical node degree. Meth- ods using hop counts suffer from the problem of not being descriptive, especially when there are only a small number of landmarks. There might be too many nodes with same coordinate under the landmark based coordinates. The spec- tral embedding and the spring embedding are less robust under edge insertion and deletion. IsoRank compares local similarity in a pair of graphs. In a large complex network, it is possible to have nodes that look similar in terms of local +40%+9.1%+9.1%+9.7%-29%+4.3%+3.4%+3.1%+3.1%-3.3% Network Alignment by Discrete Ollivier-Ricci Flow 5 structures but globally should not be matched. This may explain why IsoRank does not scale well. In the following, we first present background knowledge on curvature and Ricci flow [27,62]. We then present graph curvature and curvature flow, how they are used in network alignment, and empirical evaluations. 2 Background Curvature and Ricci Flow on Surfaces. Curvature is a measure of the amount by which a geometric object deviates from being flat/straight and has multiple definitions depending on the context. Ricci flow was introduced by Richard Hamilton for Riemannian manifolds in 1982 [27]. A surface Ricci flow is the process to deform the Riemannian metric of the surface, proportional to the Gaussian curvature, such that the curvature evolves like heat diffusion and becomes uniform at the limit. Intuitively, this behaves as flattening a piece of crumpled paper. Surface Ricci flow is a key tool in the proof of the Poincaré conjecture on 3-manifolds, and has numerous applications in image and shape analysis. In engineering fields, surface Ricci flow has been broadly applied on a triangulated surface setting for tackling many important problems, such as parameterization in graphics [30] and deformable surface registration in vision [70]. Discrete Ricci Curvature. Curvatures for general graphs have only been stud- ied over the past few years [53,40,8,4,42,61,7]. The definitions of curvatures that are easier to generalize to a discrete graph setting are sectional curvature and Ricci curvature. Consider a point x on a surface M and a tangent vector v at x whose endpoint is y. Take another tangent vector wx at x and imagine trans- porting wx along vector v to be a tangent vector wy at y. Denote the endpoints of wx, wy as x(cid:48), y(cid:48). If the surface is flat, then x, y, x(cid:48), y(cid:48) would constitute a paral- lelogram. Otherwise, the distance between x(cid:48), y(cid:48) differs from v. The difference can be used to define sectional curvature [53]. Sectional curvature depends on two tangent vectors v, w. Averaging sectional curvature over all directions w gives the Ricci curvature which only depends on v. Intuitively, if we think of a direction w at x as a point on a small ball Sx centered at x, on average Ricci curvature controls whether the distance be- tween a point of Sx and the corresponding point of Sy is smaller or larger than the distance d(x, y). To allow for a general study, Ollivier [53] defined a Ricci curvature by using a probability measure mx to represent the ball Sx. Later Ollivier Ricci curvature has been applied in different fields, for distinguishing between cancer-related genes and normal genes [57], for understanding phyloge- netic trees [68], and for detecting network features such as backbone and con- gestions [50,65,66,49,31]. There was very limited amount of theory on discrete Ollivier-Ricci curvature on graphs, and nearly none on graph Ricci flow. In the future work section of [52] Ollivier suggested that people should study the dis- crete Ricci flow in a metric space (X, d) by evolving the distance d(x, y) on X 6 C.-C. Ni et al. according to the Ricci curvature κ(x, y) between two points x, y ∈ X: d(x, y) = −κ(x, y)d(x, y). d dt We are the first to study Ollivier-Ricci flow in the graph setting. We also suggest variants of the Ollivier-Ricci curvature that admits much faster computation and empirically evaluate properties of the Ricci flow metrics and applications in network alignment. 3 Theory and Algorithms Ricci Curvature on Graphs For an undirected graph G = (V, E), the Ollivier-Ricci curvature of an edge xy is defined as follows. Let πx denote the neighborhood of a node x ∈ V and Deg(x) is the degree of x. For a parameter α ∈ [0, 1], define a probability measure mα x: α mα x (xi) = (1 − α) / Deg(x) 0 if xi = x if xi ∈ πx otherwise , Suppose w(x, y) is the weight of edge xy and d(x, y) the shortest path length between x and y in the weighted graph. The optimal transportation distance y is defined as the best way of transporting the mass (OTD) between mα distribution mα y : x to the mass distribution mα x and mα W (mα x , mα y ) = inf M d(xi, yj)M (xi, yj) (cid:88) xi,yj∈V where M (xi, yj) is the amount of mass moved from xi to yj along the shortest path (of length d(xi, yj)) and we would like to take the best possible assign- ment (transport plan) that minimizes the total transport distance. The discrete Ollivier-Ricci curvature [53] is defined as follows κw(x, y) = 1 − W (mα x , mα y ) . d(x, y) In this paper, κw(x, y) is called the OTD-Ricci curvature. The OTD-Ricci curvature describes the connectivity in the local neighbor- hood of xy [50]. If xy is a bridge so the nodes in πx have to travel through the edge xy to get to nodes in πy, W (mα y ) > d(x, y) and the curvature of xy is negative. Similarly, if the neighbors of x and the neighbors of y are well connected (such that W (mα y ) < d(x, y)), the curvature on xy is positive. The optimal transportation distance can be solved by linear programming x , mα x , mα (LP) to find the best values for M (xi, yj): d(xi, yj)M (xi, yj) M (xi, yj) = mα x (xi),∀i and (cid:88) i M (xi, yj) = mα y (yj),∀j j Minimize: (cid:88) s.t. (cid:88) i,j Network Alignment by Discrete Ollivier-Ricci Flow 7 The computation of the linear program on large networks may be time- consuming. To address the computational challenges, we define a variant of the OTD-Ricci curvature by using a specific transportation plan instead of the optimal transportation plan. We take the average transportation distance (ATD) A(mα y ), in which we transfer an equal amount of mass from each neighbor xi of x to each neighbor yj of y and transfers the mass of x to y. One could easily verify that this is a valid transportation plan. Thus, the discrete Ricci curvature by the average transportation distance (ATD) is defined as: x , mα κa(x, y) = 1 − A(mα x , mα y ) d(x, y) , Since we remove the LP step in the computation, the computational complexity of the ATD-Ricci curvature is drastically improved. As will be presented later, our experimental results show that computing discrete Ricci flow using the ATD- Ricci curvature maintains and even enhances the robustness of graph alignment. In this paper, we fix α = 0.5 and simplify the notation of discrete Ricci curvature by κ(x, y) in the discussion of discrete Ricci flow. Discrete Ricci Flow Ricci flow is a process that deforms the metric while the Ricci curvature evolves to be uniform everywhere. For any pair of adjacent nodes x and y on a graph G = (V, E), we adjust the edge weight of xy, w(x, y), by the curvature κ(x, y): wi+1(x, y) = wi(x, y) −  · κi(x, y) · wi(x, y), ∀xy ∈ E, where κi(x, y) is computed using the current edge weight wi(x, y). The step size is controlled by  > 0 and we take  = 1 in our experiment. After each iteration we rescale the edge weights so the total edge weight in the graph remains the same, since only relative distances between nodes matter in a graph metric. A pseudo-code is presented in the appendix. Ricci Flow Metric When graph Ricci flow converges, each edge xy is given a weight w(x, y). We denote the shortest path metric with such weights to be the Ricci Flow Metric, denoted as d(x, y). To understand the metric, notice that when the Ricci flow converges the following is true. Here we take step size  = 1: where (w(x, y) − κ(x, y) · w(x, y)) · N ≈ w(x, y) (cid:80) xy∈E(w(x, y) − κ(x, y)w(x, y)) E . N = Denote the transportation distance between the two probability measures mα x and mα y to be T (x, y), we have κ(x, y) ≈ 1 − T (x, y) d(x, y) , T (x, y) d(x, y) ≈ 1 N . To understand what this means, recall that T (x, y) represents the distances from x's neighborhood to y's neighborhood. Before we run Ricci flow, this value 8 C.-C. Ni et al. for different edges can vary a lot -- in the neighborhood of positively curved edges there are many 'shortcuts' making T (x, y) to be significantly shorter than d(x, y), while in the neighborhood of negatively curved edges T (x, y) is longer than d(x, y). The purpose of Ricci flow is to re-adjust the edge weights to reduce such imbalance. Suppose we remove an edge xy with negative curvature before Ricci flow and break the shortest path from x(cid:48) (a neighbor of x) to y(cid:48) (a neighbor of y). The alternative path from x(cid:48) to y(cid:48) in the neighborhood of xy tends to become much longer, as T (x, y)/d(x, y) is large. Thus, the change to the shortest path metric is significant. However, after the Ricci flow, with the new edge weights, the alternative path from x(cid:48) to y(cid:48) in the neighborhood of xy may still get longer but not as long. Thus, the change in the shortest path length is less significant. The Ricci flow metric is more robust when edges and nodes are randomly removed. To capture this property, we define the uniformity of graph metric using the variation of T (x, y)/d(x, y) for different edges xy. Definition 1 (Metric Uniformity). Given a graph G = (V, E) with edge weight w(x, y) on xy ∈ E, the metric uniformity is defined by the interquar- tile range (IQR), i.e., of T (x, y)/d(x, y) over all edges, the difference between 75th and 25th percentiles. The metric uniformity measures the diversity of T (x, y)/d(x, y) over all edges around the median. Lower metric uniformity indicates that T (x, y)/d(x, y) are less dispersed about the median. Therefore, the corresponding metric is more robust upon node/edge insertions and deletions. 4 Network Alignment by Ricci Flow Metric Given two graphs G1 and G2, suppose there are k landmarks L = {(cid:96)ii = 1, 2,··· , k} in both G1 and G2 with known correspondence, k is a small con- stant such as 3 or 4. These landmarks may be known beforehand by external knowledge. We use these landmarks to find the correspondence of nodes in G1 and G2. Specifically, we represent each node v ∈ Gj by its relative positions to the landmarks vL = [dj(v, (cid:96)1), dj(v, (cid:96)2),··· , dj(v, (cid:96)k)], where dj(v, (cid:96)i) denotes the shortest distance from v to (cid:96)i in graph Gj using the Ricci flow metric. We define the cost of matching u ∈ G1 with v ∈ G2 by the 2-norm of the difference between uL and vL, Cuv = uL − vL2. The smaller Cuv is, the more similar u, v are. The alignment problem can be formulated as finding a low-cost matching in the complete bipartite graph H = (V1 ∪ V2, E) where the edge in E connecting u ∈ V1 and v ∈ V2 has weight Cuv. Matching Algorithms. To find a low cost matching in the bipartite graph or a similarity matrix, we can apply the following two algorithms. minimizes(cid:80) -- The Hungarian min-cost matching algorithm [29] finds a matching which u∈G1,v∈G2 Cuv in O(V 3) time. Network Alignment by Discrete Ollivier-Ricci Flow 9 -- A greedy matching method iteratively locates the minimal Cuv, records the node pair (u, v), and removes all elements involving either u or v, until the nodes of either G1 or G2 are all paired. We note that in prior network alignment algorithms, such as IsoRank and NSD, greedy matching was unanimously selected due to its efficiency. We tested both algorithms with the results on Hungarian algorithms presented in the appendix. Matching Accuracy. To evaluate the accuracy of the matching results, one idea is to count how many nodes are correctly matched with respect to their IDs in the ground truth. But this measure may be too strict. For example, if G1 and G2 are both complete graphs of the same size, any matching of nodes in G1 and nodes in G2 should be considered to be correct. It is well known that social networks have community structures and many different levels of node equivalence and symmetry. There are different definitions for two nodes u, v in a graph G to be equivalent: -- Structural equivalence: u and v have exactly the same set of neighbors; -- Automorphic equivalence: if we relabel the nodes in an automorphic transfor- mation (i.e., the graph after relabeling is isomorphic to the original graph), the labels of u, v are exchanged; -- Regular equivalence [41]: u, v are connected if they are equally related to equivalent others. That is, regular equivalence sets are composed of nodes who have similar relations to members of other regular equivalence sets. Regular equivalence is the least restrictive of the three definitions of equivalence, but probably the most important for the sociologists as it captures the sociologi- cal concept of a "role". Previous quantitative measures of regular equivalence [38] unfortunately, are not very effective in identifying the global symmetric struc- tures. For example, the two terminal nodes of a path graph cannot be classified to the same regular equivalence class. Connected Equivalence. Motivated by regular equivalence, we would like to consider two nodes to be connected equivalence if they have similar connections to other nodes. Specifically, we compute the length of shortest paths (using the Ricci flow metric) from u and v to all other nodes, except u, v themselves, in a fixed order in G1 or G2, and denote the results by two vectors uL and vL. If the two vectors are similar (i.e., uL − vL2 <  for some small  > 0), then we say that u, v are equivalent and the matching of u to v is correct. 5 Evaluation In this section, we demonstrate the performance of Ricci flow metric and its power on network alignment. Since Ricci flow metric only used topology feature, we compare RF-OTD, RF-ATD with two topology based network alignment al- gorithms IsoRank [59] and NSD [35] (other network alignment algorithms require node label/attributes), and three different embedding metrics: spectral embed- ding, spring embedding, and hop count. We evaluated the performance of these 10 C.-C. Ni et al. algorithms in both model graphs and real world data. The descriptions of these methods as well as the data sets are presented in Appendix B and Appendix C. Our main observations are as follows: 1. Ricci flow metrics (both RF-OTD and RF-ATD) are much more robust against edge/node insertion and deletions compared to others on noisy graph alignment problem. 2. Ricci flow metrics greatly outperform previous topological based network alignment algorithms (IsoRank, NSD) as well as other metrics and similar- ity measures on noisy graph alignment problem. In many experiments our algorithm achieves more than 90% matching accuracy while other methods achieve accuracy below 30%. 3. While greedy matching performs well in model graphs, min-cost matching (i.e, Hungarian algorithm) is more suitable for real world graph. Due to space limit, please refer to Appendix E for further discussion. Experiment Setup. Given a graph G1, we remove n nodes or edges (less than 1% ) uniform randomly to create G2 as a noisy graph. We then perform the alignment of G1 and G2. Notice that in this case, we can also regard G2 as a graph with random noises added to G1. Therefore, we only present the results of node deletion cases. The graph alignment problem is solved in two steps. First we construct a similarity matrix that records the cost of matching node i in G1 with node j in G2 for all possible i, j; then we perform Hungarian algorithm or greedy matching to match nodes in G1 with nodes in G2. We evaluate the algorithm performance by using connected equivalence. For IsoRank and NSD, the similarity matrix is the output of the algorithm; for landmark based method, the similarity matrix is defined by (cid:96)2 norm of their landmark distance vectors. Here the distance metric is defined by RF-OTD and RF-ATD5, distances induced by spectral embedding (dim=2), spring embedding, and hop count respectively. The performance of each metric is evaluated by varying the number of removed nodes/edges n and the number of landmarks k. To eliminate the dependency of landmark selection, the matching accuracy is averaged by 10 experiments on different sets of landmarks. These landmarks are chosen such that every newly added landmark is furthest away from the landmarks chosen so far. Metric Uniformity We first analyze the metric uniformity over all metrics on a random regular graph with 1000 nodes and 6000 edges. The box plot result is illustrated in Figure 3(a). RF-ATD yields the best metric uniformity with the smallest IQR of 2e− 5. RF-OTD also performs well with IQR as 0.002. Spectral and spring embedding behave poorly. These performances are directly related to the accuracy in graph alignment. The metric with low metric uniformity is more stable when nodes/edges are missing, see Figure 2. Notice that hop count metric generates a small IQR=0.001. This is because there are often multiple 5 With 50 Ricci flow iterations,  = 1, α = 0.5 Network Alignment by Discrete Ollivier-Ricci Flow 11 (a) Metric uniformity comparison (b) Stretch ratios comparison Fig. 3. Figure 3(a) shows metric uniformity comparison of all metrics. The box plot is for T (x, y)/w(x, y) with respect to each metric. We define the IQR (InterQuartile Range) of the box plot to be the metric uniformity. The smaller the metric uniformity is, the more robust the metric is under random edge removals. Figure3(b) demonstrates a comparison of the stretch ratios of shortest path length over all methods. shortest paths (in terms of hop count) connecting two nodes in the network so hop count is actually a fairly robust measure. But using it for graph alignment is still limited by its lack of descriptive power. (u, v))/dm G1 For further analysis that metric uniformity indeed captures the robustness of shortest path metric, we compute the stretch of the shortest path length between a pair of nodes in a random regular graph when 10 edges are randomly removed, shown in Figure 3(b). Consider two nodes u, v in both G1 and G2, we denote (u, v) under a metric m, where the length of the shortest path from u to v by dm (u, v) − Gi i = 1, 2. We define the stretch ratio of G1 and G2 as s(u, v) = (dm G1 (u, v). The stretch ratio captures the changes of the shortest path dm G2 length. A larger stretch ratio means the shortest path length changes more. In Figure 3(b), we collect the stretch ratios from one random node to all of the other nodes based on different metrics, and plot the distribution of these stretch ratios as a histogram. It turns out that hop count, Ricci flow metric with OTD and with ATD result in smaller stretch ratios, while spectral embedding is the most vulnerable one with edge deletions. Similarity Matrix Here we test the similarity matrix of every pairwise node similarity of two graphs G1, G2. G1 is a random regular graph with 1000 nodes Fig. 4. The comparison of the similarity rank of all methods. The similarity matrix represents the pairwise similarity between a random regular graph with 1000 nodes and 6000 edges and the previous graph with 10 random nodes and 120 corresponding edges removed. IQR: 0.002IQR: 0.011IQR: 0.022IQR: 0.001IQR: 0.00002T(x, y) / w(x, y)10−310−210−11RF Metricwith OTDSpectralSpringHop CountRF Metric with ATDRandom Regular (1000 nodes, 6000 edges)Histogram of RF Metric with ATDHistogram of Hop CountHistogram of SpringHistogram of SpectralHistogram of RF Metric with OTDPercentage in Bin (log)11001100110011001100Shortest Path Stretch Ratio−2.0−1.5−1.0−0.500.51.0Random Regular (1000 nodes, 6000 edges) with 10 edges removedIQR: 4IQR: 502IQR: 163IQR: 56IQR: 483IQR: 443IQR: 502Similarity Rank (log)1101001000RF Metric with ATD #landmark=2IsoRankHop CountBtwness CetralitySpringSpectralNSDRandom Regular (1000 nodes, 6000 edges) v.s. (-10 Nodes, -120 edges) 12 C.-C. Ni et al. (a) Random Regular Graph (b) Protein-Protein Interaction Fig. 5. A comparison of noisy graph alignment results by Hungarian algorithm and connected equiv- alence on a random regular graph(Figure 5(a)) and protein-protein interaction graph(Figure 5(b)). and 6000 edges and G2 removes 10 nodes randomly from G1. We check the performance of the similarity matrix as follows. For every node n1 ∈ G1 and the corresponding node n2 in G2 in the ground truth, we check the rank of n2 in the sorted list ranked by similarity values with n1. A good similarity matrix should rank n2 as the most similar one. A lower ranking indicates better performance of the similarity matrix. We show the results in Figure 4 with 2 landmarks. Thanks to the metric uniformity, our method yields the best performance with average similarity rank of 2 while other methods are at least 10 times higher. Network Alignment Here we demonstrate the matching accuracy results on noisy graph alignment problem for a random regular graph (1000 nodes and de- gree 12 as G1, and G2 by randomly removing 1 node and 12 edges from G1) and a real word protein-protein interaction graph (to be aligned with a graph of 10 edges randomly removed). Figure 5 shows that while most of the methods failed to align the graph correctly, the Ricci flow metric performs well with only 2 landmarks. Here since IsoRank and NSD method do not require landmarks, the performance over different landmark is shown as a straight line. The result shows that RF-ATD, which is computationally much more efficient, performs equally well as RF-OTD. Notice that the methods with poor metric uniformity as shown in Figure 3 also result in poor performance here. This supports the importance of metric uniformity in network alignment. More evaluation on different model networks and real networks also support this claim. The performance of align- ment accuracy also effected by the portion of nodes and edges added/removed, the noisy graph alignment problem become harder with more noise. Please see Appendix C for further details. 6 Conclusion In this paper, we have presented a framework to endow a graph with a novel metric through the notion of discrete Ricci flow with an application to network alignment. From the experimental results, we found that 1) the graph Ricci curvature converges through the discrete Ricci flow and; 2) Ricci flow metric on Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRicci Flow(OTD)Recovery Accuracy00.20.40.60.81.0# Landmark23456Random Regular (1000 nodes, 6000 edges) v.s. (-1 Node, -12 edges)Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRicci Flow(OTD)Recovery Accuracy00.20.40.60.81.0# Landmark23456Protein-Protein Interaction (2217 Nodes, 6418 Edges) V.S. (-10 Edges) Network Alignment by Discrete Ollivier-Ricci Flow 13 a graph is fairly stable when edges are inserted or removed. Providing theoretic proofs of these observations are currently open and will be the next direction of our future work. Acknowledgement The authors would like to thanks the funding agencies NSF DMS- 1737812, CNS-1618391, CCF-1535900, DMS-1418255, and AFOSR FA9550-14-1-0193. References 1. Aflalo, Y., Bronstein, A., Kimmel, R.: On convex relaxation of graph isomorphism. Proceedings of the National Academy of Sciences 112(10), 2942 -- 2947 (2015) 2. Aho, A.V., Hopcroft, J.E.: The Design and Analysis of Computer Algorithms. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1st edn. (1974) 3. Babai, L.: Graph isomorphism in quasipolynomial time. CoRR abs/1512.03547 (2015), http://arxiv.org/abs/1512.03547 4. Bakry, D., Émery, M.: Diffusions hypercontractives. In: Séminaire de probabilités, XIX, 1983/84, pp. 177 -- 206. Springer, Berlin, Berlin, Heidelberg (1985) 5. Barabasi, A., Albert, R.: Emergence of scaling in random networks. Science 286, 509 -- 512 (1999) 6. Bayati, M., Gleich, D.F., Saberi, A., Wang, Y.: Message-Passing algorithms for sparse network alignment. ACM Trans. Knowl. Discov. Data 7(1), 3:1 -- 3:31 (Mar 2013) 7. Bonciocat, A.I.: A rough curvature-dimension condition for metric measure spaces - Springer. Central European Journal of Mathematics (2014) 8. Chung, F.R.K., Yau, S.T.: Logarithmic Harnack inequalities. Math. Res. Lett 3(6), 793 -- 812 (1996) 9. Clark, C., Kalita, J.: A comparison of algorithms for the pairwise alignment of biological networks. Bioinformatics 30(16), 2351 -- 2359 (Aug 2014) 10. CONTE, D., Foggia, P., Sansone, C.: Thirty years of graph matching in pattern recognition. International Journal of Pattern Recognition and Artificial Intelligence 18(03), 265 -- 298 (2004) 11. Cordella, L.P., Foggia, P., Sansone, C., Vento, M.: A (sub)graph isomorphism algo- rithm for matching large graphs. Pattern Analysis and Machine Intelligence, IEEE Transactions on 26(10), 1367 -- 1372 (Oct 2004) 12. Diamond, S., Boyd, S.: CVXPY: A Python-embedded modeling language for con- vex optimization. Journal of Machine Learning Research 17(83), 1 -- 5 (2016) 13. Eades, P.: A heuristic for graph drawing. Congressus numerantium 42, 149 -- 160 (1984) 14. El-Kebir, M., Heringa, J., Klau, G.W.: Natalie 2.0: Sparse global network alignment as a special case of quadratic assignment. Algorithms 8(4), 1035 -- 1051 (Nov 2015) 15. Elmsallati, A., Clark, C., Kalita, J.: Global alignment of Protein-Protein inter- action networks: A survey. IEEE/ACM Trans. Comput. Biol. Bioinform. 13(4), 689 -- 705 (Jul 2016) 16. Emmert-Streib, F., Dehmer, M., Shi, Y.: Fifty years of graph matching, network alignment and network comparison. Information Sciences 346-347, 180 -- 197 (Jun 2016) 17. Erdos, P., Renyi, A.: On random graphs. Publicationes Mathematicae 6, 290 -- 297 (1959) 14 C.-C. Ni et al. 18. Ewing, R.M., Chu, P., Elisma, F., Li, H., Taylor, P., Climie, S., McBroom- Cerajewski, L., Robinson, M.D., O'Connor, L., Li, M., Taylor, R., Dharsee, M., Ho, Y., Heilbut, A., Moore, L., Zhang, S., Ornatsky, O., Bukhman, Y.V., Ethier, M., Sheng, Y., Vasilescu, J., Abu-Farha, M., Lambert, J.P., Duewel, H.S., Stew- art, I.I., Kuehl, B., Hogue, K., Colwill, K., Gladwish, K., Muskat, B., Kinach, R., Adams, S.L., Moran, M.F., Morin, G.B., Topaloglou, T., Figeys, D.: Large-scale mapping of human protein -- protein interactions by mass spectrometry. Molecular Systems Biology 3 (Mar 2007) 19. Fan, W., Wang, X., Wu, Y.: Incremental graph pattern matching. ACM Transac- tions on Database Systems (TODS) 38(3), 18 (Aug 2013) 20. Fang, Q., Gao, J., Guibas, L., de Silva, V., Zhang, L.: GLIDER: Gradient landmark- based distributed routing for sensor networks. In: Proc. of the 24th Conference of the IEEE Communication Society (INFOCOM). vol. 1, pp. 339 -- 350 (March 2005) 21. Fruchterman, T.M., Reingold, E.M.: Graph drawing by force-directed placement. Software: Practice and experience 21(11), 1129 -- 1164 (1991) 22. Fu, H., Zhang, A., Xie, X.: Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information. ACM Transactions on Intelligent Systems and Technology (TIST) 6(4), 49 -- 29 (Aug 2015) 23. Goga, O., Loiseau, P., Sommer, R., Teixeira, R., Gummadi, K.P.: On the reliabil- ity of profile matching across large online social networks. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 1799 -- 1808. KDD '15, ACM, New York, NY, USA (2015) 24. Grover, A., Leskovec, J.: node2vec. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '16 (2016) 25. Guimerà, R., Danon, L., Díaz-Guilera, A., Giralt, F., Arenas, A.: Self-similar com- munity structure in a network of human interactions. Physical Review E 68(6), 065103 (Dec 2003) 26. Ham, J., Lee, D.D., Saul, L.K.: Semisupervised alignment of manifolds. In: AIS- TATS. pp. 120 -- 127 (2005) 27. Hamilton, R.S.: Three manifolds with positive Ricci curvature. Journal of Differ- ential Geometry 17, 255 -- 306 (1982) 28. Hopcroft, J.E., Wong, J.K.: Linear time algorithm for isomorphism of planar graphs (preliminary report). In: Proceedings of the Sixth Annual ACM Symposium on Theory of Computing. pp. 172 -- 184. STOC '74, ACM, New York, NY, USA (1974). https://doi.org/10.1145/800119.803896 29. Hopcroft, J.E., Karp, R.M.: An n5/2 algorithm for maximum matchings in bi- partite graphs. SIAM Journal on computing 2(4), 225 -- 231 (1973) 30. Jin, M., Kim, J., Luo, F., Gu, X.: Discrete surface Ricci flow. IEEE TVCG 14(5), 1030 -- 1043 (2008) 31. Kennedy, W.S., Narayan, O., Saniee, I.: On the hyperbolicity of large-scale net- works. arXiv preprint arXiv:1307.0031 (2013) 32. Khan, A., Wu, Y., Aggarwal, C.C., Yan, X.: NeMa: Fast Graph Search with Label Similarity . Proceedings of the VLDB Endowment 6(3), 181 -- 192 (2013) 33. Kleinberg, J., Slivkins, A., Wexler, T.: Triangulation and embedding using small sets of beacons. In: Proc. 45th IEEE Symposium on Foundations of Computer Science. pp. 444 -- 453 (2004) 34. Kleinberg, J.M.: The small-world phenomenon - an algorithmic perspective. STOC (2000) Network Alignment by Discrete Ollivier-Ricci Flow 15 35. Kollias, G., Mohammadi, S., Grama, A.: Network similarity decomposition (nsd): A fast and scalable approach to network alignment. IEEE Transactions on Knowledge and Data Engineering 24(12), 2232 -- 2243 (2012) 36. Kunegis, J.: KONECT. In: Proceedings of the 22nd International Conference on World Wide Web - WWW '13 Companion. pp. 1343 -- 1350. ACM Press, New York, New York, USA (2013) 37. Lafon, S., Keller, Y., Coifman, R.R.: Data fusion and multicue data matching by diffusion maps. IEEE Trans. Pattern Anal. Mach. Intell. 28(11), 1784 -- 1797 (Nov 2006) 38. Leicht, E.A., Holme, P., Newman, M.E.: Vertex similarity in networks. Physical Review E 73(2), 026120 (2006) 39. Lim, H., Hou, J.C., Choi, C.H.: Constructing internet coordinate system based on delay measurement. IEEE/ACM Trans. Netw. 13(3), 513 -- 525 (Jun 2005) 40. Lin, Y., Lu, L., Yau, S.T.: Ricci curvature of graphs. Tohoku Mathematical Journal 63(4), 605 -- 627 (2011) 41. Lorrain, F., White, H.C.: Structural equivalence of individuals in social networks. J. Math. Sociol. 1(1), 49 -- 80 (1 Jan 1971) 42. Lott, J., Villani, C.: Ricci curvature for metric-measure spaces via optimal trans- port. Annals of Mathematics. Second Series 169(3), 903 -- 991 (2009) 43. Luks, E.M.: Isomorphism of graphs of bounded valence can be tested in polynomial time. Journal of computer and system sciences 25(1), 42 -- 65 (1982) 44. Luxburg, U.: A tutorial on spectral clustering. Statistics and Computing 17(4), 395 -- 416 (Dec 2007). https://doi.org/10.1007/s11222-007-9033-z 45. Malod-Dognin, N., Ban, K., Pržulj, N.: Unified alignment of protein-protein inter- action networks. Scientific Reports 7(1), 953 (2017) 46. Malod-Dognin, N., Pržulj, N.: L-GRAAL: Lagrangian graphlet-based network aligner. Bioinformatics 31(13), 2182 -- 2189 (Jul 2015) 47. McKay, B.D., Piperno, A.: Practical graph isomorphism, ii. Journal of Symbolic Computation 60(0), 94 -- 112 (2014) 48. Melnik, S., Garcia-Molina, H., Rahm, E.: Similarity Flooding - A Versatile Graph Matching Algorithm and Its Application to Schema Matching. ICDE (2002) 49. Narayan, O., Saniee, I.: Large-scale curvature of networks. Physical Review E 84(6), 066108 (2011) 50. Ni, C.C., Lin, Y.Y., Gao, J., Gu, X., Saucan, E.: Ricci curvature of the Internet topology. In: 2015 IEEE Conference on Computer Communications (INFOCOM). pp. 2758 -- 2766. IEEE (2015) 51. Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '03. pp. 631 -- 636. University of Texas at Arlington, Arlington, United States (2003) 52. Ollivier, Y.: A survey of Ricci curvature for metric spaces and Markov chains. Probabilistic approach to geometry (2010) 53. Ollivier, Y.: Ricci curvature of Markov chains on metric spaces. Journal of Func- tional Analysis 256(3), 810 -- 864 (Feb 2009) 54. Patro, R., Kingsford, C.: Global network alignment using multiscale spectral sig- natures. Bioinformatics 28(23), 3105 -- 3114 (2012) 55. Peng, W., Li, F., Zou, X., Wu, J.: A Two-Stage Deanonymization Attack against Anonymized Social Networks. Ieee Transactions on Computers 63(2), 290 -- 303 (Feb 2014) 16 C.-C. Ni et al. 56. Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: Online learning of social represen- tations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD '14. pp. 701 -- 710. New York (2014) 57. Sandhu, R., Georgiou, T., Reznik, E., Zhu, L., Kolesov, I., Senbabaoglu, Y., Tan- nenbaum, A.: Graph Curvature for Differentiating Cancer Networks. Scientific Re- ports 5, 12323 (Jul 2015) 58. Shvaiko, P., Euzenat, J.: Ontology matching: State of the art and future challenges. IEEE Trans. Knowl. Data Eng. 25(1), 158 -- 176 (Jan 2013) 59. Singh, R., Xu, J., Berger, B.: Global alignment of multiple protein interaction networks with application to functional orthology detection. Proceedings of the National Academy of Sciences 105(35), 12763 -- 12768 (Sep 2008) 60. Spring, N., Mahajan, R., Wetherall, D.: Measuring isp topologies with rocketfuel. SIGCOMM Comput. Commun. Rev. 32(4), 133 -- 145 (Aug 2002) 61. Sturm, K.T.: On the geometry of metric measure spaces - Springer. Acta Mathe- 62. Tao, T.: Ricci flow. Tech. rep., Technical report, Department of Mathematics, matica (2006) UCLA (2008) 63. Tong, H., Faloutsos, C., Gallagher, B., Eliassi-Rad, T.: Fast best-effort pattern matching in large attributed graphs. In: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '07. pp. 737 -- 746. Carnegie Mellon University, Pittsburgh, United States (2007) 64. Tutte, W.T.: How to draw a graph. Proceedings of the London Mathematical Society. Third Series 13, 743 -- 767 (1963) 65. Wang, C., Jonckheere, E., Banirazi, R.: Wireless network capacity versus Ollivier- Ricci curvature under Heat-Diffusion (HD) protocol. In: Proceedings of the Amer- ican Control Conference. pp. 3536 -- 3541. University of Southern California, Los Angeles, United States, IEEE (Jan 2014) 66. Wang, C., Jonckheere, E., Banirazi, R.: Interference constrained network control based on curvature. In: Proceedings of the American Control Conference. pp. 6036 -- 6041. University of Southern California, Los Angeles, United States, IEEE (Jul 2016) 67. Wang, D., Pedreschi, D., Song, C., Giannotti, F., Barabasi, A.L.: Human mobility, social ties, and link prediction. ACM, New York, New York, USA (Aug 2011) 68. Whidden, C., Matsen IV, F.A.: Ricci-Ollivier Curvature of the Rooted Phylogenetic Subtree-Prune-Regraft Graph. ANALCO pp. 106 -- 120 (2016) 69. Yan, J., Yin, X.C., Lin, W., Deng, C., Zha, H., Yang, X.: A short survey of recent advances in graph matching. In: Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval. pp. 167 -- 174. ICMR '16, ACM, New York, NY, USA (2016). https://doi.org/10.1145/2911996.2912035 70. Zeng, W., Samaras, D., Gu, X.D.: Ricci flow for 3D shape analysis. IEEE Transac- tions on Pattern Analysis and Machine Intelligence (IEEE TPAMI) 32(4), 662 -- 677 (2010) 71. Zhang, J., Yu, P.S.: Multiple anonymized social networks alignment. In: 2015 IEEE International Conference on Data Mining. pp. 599 -- 608 (Nov 2015) Network Alignment by Discrete Ollivier-Ricci Flow 17 A Algorithm Pseudo-code Algorithm 1 shows the steps of our Ricci flow algorithm. Algorithm 1: Ricci flow on a graph Input : An undirected graph G. Output: A weighted graph G in which the Ricci curvature on all edges are the same. 1 Initialize w0(x, y) = 1, ∀xy ∈ E; 2 Compute the Ricci curvature κ0(x, y), ∀xy ∈ E; 3 Update the edge weight by wi+1(x, y) ← wi(x, y) −  · κi(x, y) · wi(x, y); 4 Normalize the edge weight by wi+1(x, y) ← wi+1(x, y) · xy∈E wi+1(x, y) 5 Repeat 2 − 4 until the curvature values do not change much. (cid:80) E ; B Evaluation Datasets For generality, the network alignment experiments are evaluated over both model and real world network graphs. Here we give an overview of these graphs. The statistics of these graphs are listed in Table 1. Table 1. Graph properties for networks. Pref. Attach. Data Set G(n,p) Kleinberg #Node #Edge Avg.Deg. Diam. Mean SP 4979 1000 5462 900 3984 1000 Random Regular 1000 6000 Random Regular 10000 40000 2071 5451 6418 895 1133 Protein Network 2217 3.259 3.272 3.138 3.05 4.816 5.944 3.606 3.844 9.958 12.138 7.968 12 8 4.628 9.62 5.789 6 5 5 4 7 13 8 10 AS: 3967 Email 18 C.-C. Ni et al. B.1 Model Networks Erdős-Rényi The Erdős-Rényi model [17], also known as the G(n, p) model, connects each pair of nodes {i, j} by an edge with probability p independent of every other edge. We choose (n, p) = (1000, 0.01) in our model. Kleinberg The Kleinberg graph [34] begins with an n × n squared graph. Each node is represented by {(i, j) : i, j ∈ {1, 2,··· , n}}. The distance between two nodes (i, j) and (k, l) is defined by d((i, j), (k, l)) = k − i + l − j. For any node u, q long-range connections to endpoint v are constructed by probability proportional to d(u, v)−r. Here we take (q, r) = (4, 2). Preferential Attachment We choose the Barabási-Albert model [5] as the pref- erential attachment model. The model starts with k nodes and then adds nodes one by one. Each newcomer node connects k edges to the existing nodes. For each edge, the endpoint is selected with probability proportional to its current degree. We take (n, k) = (1000, 4) in our example. Random Regular A random d−regular graph is a graph with n nodes and each node randomly connected to other d nodes. We take (n, d) = (1000, 12) in our example. B.2 Real Networks Router Network A router network graph is composed of routers as nodes and the physical connections as edges. We take the data set 'AS:3967, Exodus' from the Rocketfuel project [60]. Email Network We take the email communication network at the University Rovira i Virgili. In the graph, nodes are users and edges represent emails between users [25,36]. Protein Network We choose the protein-protein interaction network in human cells. Here every node in graph is a protein and an edge represents the interaction between proteins [18,36]. C Comparisons With Other Methods We compared our method with other topology-based methods in literature. The brief introduction of these methods are described as follows. All experiments were performed in Python on a 2012 Retina Macbook Pro with 16G ram and 2.6 GHz Intel Core i7. We used CVXPY+ECOS [12] as the Linear Programming solver. Network Alignment by Discrete Ollivier-Ricci Flow 19 Spectral Embedding The spectral embedding method [44] uses the eigenvectors of the graph Laplacian matrix to embed nodes into the corresponding eigenspace. It has been widely applied to graph matching and data clustering such as image segmentation. Spring Embedding Spring embedding is an iterative process first introduced by Eades [13]. An advanced algorithm was later developed by Fruchterman and Reingold [21]. A graph can be treated as a spring system such that the nodes with initial positions oscillate until they find their own stable positions. The spring embedding can be regarded as an evolution process, therefore, it is useful to observe the change of the same dataset overtime. IsoRank IsoRank was proposed by Singh et al. [59] for biological network align- ment. A matching score is defined on each pair of nodes between two networks. The matching score interprets not only the matching quality of the pair of node but also that of their neighbors. Network Similarity Decomposition (NSD) NSD [35] is an improvement of Iso- Rank in terms of running time. It is performed by pre-processing two input graphs separately and decomposing the computation of similarity matrix. D Running Time of ATD and OTD. Here we analyze the speed performance of Ricci flow metric with ATD and OTD in Figure 6. In all settings, the computation time of Ricci flow metric with ATD is up to 3X faster than that of OTD. This is because ATD does not need linear programming computation for computing the optimal transport cost. In fact, most of the computation time in Ricci flow metric by ATD is to compute the all pair shortest path, which can be easily parallelized for further speed improvement. E More Alignment Results In the following experiment we consider the case with random edge removal, spectral embedding with 2 dimensions, and up to 5 landmarks. We use Ricci Flow metric with ATD, Hungarian algorithm, and connected equivalence in the following results. Figure 7 shows the results of graph matching on different model networks, when G2 removes 0, 1, 10, 100 edges from G1 respectively. In all the graphs, Ricci flow metric yields the best performance of matching accuracy, even with only 2 or 3 landmarks, and with a large number of removed edges. The accuracy of spring embedding and hop count are low when the number of landmarks is small. Notice that spectral embedding shows sensitivity with edge removal. In a random regular graph, even with only 1 edge removed, the accuracy drops dra- matically. This is because the stability of spectral embedding is highly influenced 20 C.-C. Ni et al. Fig. 6. A comparison of computation times between Ricci flow metric with apportioned Ricci curvature and Ollivier Ricci curvature. by the connectivity of the graph. If a graph has more tree-like edges, its spectral embedding is more likely to be affected by edge removal. Figure 8 illustrates the matching results on real networks. Again, Ricci flow metric performs the best on all of the graphs. Spectral embedding behaves rel- atively better on real networks than on model networks. This is because real networks do have high clustering coefficient and edges with high Jaccard coef- ficient (Figure 10(b)). Notice that the matching accuracy of spring embedding and hop count on AS:3967 and protein-protein interaction graph are low, this may be caused by the larger diameter of these two graphs. In Figure 9, the result of noisy graph alignment using greedy matching instead of Hungarian algorithm is presented. With greedy matching, most of the methods experience performance degradation except for Ricci flow metric. In AS graph (Figure 9(a)), all methods performs poorly with greedy matching because of the graph's tree like structure and large graph diameter. F Tree-Like Graphs To capture how much would the results be affected by tree-like edges in the graphs, we evaluate the Jaccard coefficient on each edge as displayed in Fig- ure 10(a). For an edge uv, the Jaccard coefficient of this edge is defined as πu ∩ πv/πu ∪ πv. If an edge has a large Jaccard coefficient, it is likely to be an interior edge of a cluster or a community; if an edge has a small Jaccard coefficient, it then acts more like a tree edge or a bridge between clusters. In Figure 10(a), it is clear that Kleinberg model has more edges with high Jaccard coefficients, its spectral embedding is more robust and supports our results in Figure 7(d). Ricci Flow Metric with ATDRicci Flow Metric with OTDComputation Time (sec)0100020003000AS: 3967EmailG(n,p)KlienbergPref. Attach.ProteinRandomRegular Network Alignment by Discrete Ollivier-Ricci Flow 21 (a) G(n, p) (b) Preferential Attachment (c) Random Regular (d) Kleinberg Fig. 7. Result of approximate graph matching on model networks using Hungarian algorithm. (a) AS: 3967, Exodus (b) Email Fig. 8. Result of approximate graph matching on real networks using Hungarian algorithm. (c) Protein-protein interaction -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345G(n, p) (1000 Nodes, 4979 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Preferential Attachment (1000 Nodes, 3984 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Random Regular (1000 Nodes, 6000 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Kleinberg (900 Nodes, 5462 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345 AS:3967, Exodus (895 Nodes, 2071 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Email Network (1133 Nodes, 5451 Edges) / Edge removal -0 -1 -10 -100RF Metric -0 -1 -10 -100Spectral -0 -1 -10 -100Spring -0 -1 -10 -100Hop CountAccuracy00.51.0Accuracy00.51.0# Landmark12345# Landmark12345Protein-Protein Interaction (2217 Nodes, 6418 Edges) / Edge removal 22 C.-C. Ni et al. (a) AS: Greedy Matching (b) PPI: Greedy Matching Fig. 9. Result of noisy graph alignment with greedy matching and connected equivalence. (c) Random Regular: Greedy Matching (a) Model Networks (b) Real Networks Fig. 10. Histogram of Jaccard Coefficient on edge over networks. Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRecovery Accuracy00.20.40.60.81.0# Landmark23456AS:3967, Exodus (895 Nodes, 2071 Edges) V.S. (-10 Edges)Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRecovery Accuracy00.20.40.60.81.0# Landmark23456Protein-Protein Interaction (2217 Nodes, 6418 Edges) V.S. (-10 Edges)Ricci Flow(ATD)SpringSpectralNSDISORankHop CountRicci Flow(OTD)Recovery Accuracy00.20.40.60.81.0# Landmark23456Random Regular (1000 nodes, 6000 edges) v.s. (-1 Node, -12 edges)Histogram of G(n, p)Histogram of Pref. AttachHistogram of Random RegularHistogram of Kleinberg1103110311031103Jaccard Coefficient00.20.40.60.8Histogram of AS: 3967Histogram of Email NetworkHistogram of Protein-Protein110210411021041102104Jaccard Coefficient00.20.40.60.8 Network Alignment by Discrete Ollivier-Ricci Flow 23 G More Tests of Spectral and Spring Embedding In Figure 11, we tested the influence of spectral embedding into Euclidean space in Euclidean spaces of different dimensions. The improvement of alignment ac- curacy with increasing dimensionality is still limited. Fig. 11. A comparison of graph alignment results between Ricci flow metric and spectral embedding of different dimensions. Ricci FlowSpectral (dim=2)Spectral (dim=3)Spectral (dim=4)Random Regular -50 node (Spectral)Recovery Accuracy (log)0.010.11# Landmark05101520
1708.02000
1
1708
2017-08-07T06:23:53
Analysis of Social Group Dynamics
[ "cs.SI", "physics.soc-ph" ]
In this thesis the method for social group evolution discovery, called GED, is analyzed. Especially, GED method is compared with other methods tracking changes in groups over time with focus on accuracy, computational cost, ease of implementation and flexibility of the methods. The methods are evaluated on overlapping and disjoint social groups. Finally, GED method is run with different user importance measures.
cs.SI
cs
1 Wydział Informatyki i Zarządzania kierunek studiów: Informatyka specjalność: Multimedialne Systemy Informacyjne Praca dyplomowa - magisterska Analysis of Social Group Dynamics Stanisław Saganowski keywords: social network, community evolution, communities in social networks, social network analysis, groups dynamics, GED short abstract: In this thesis the method for social group evolution discovery, called GED, is analyzed. Especially, GED method is compared with other methods tracking changes in groups over time with focus on accuracy, computational cost, ease of implementation and flexibility of the methods. The methods are evaluated on overlapping and disjoint social groups. Finally, GED method is run with different user importance measures. opiekun pracy dyplomowej .................................................. Tytuł/stopień naukowy/imię i nazwisko ....................... ....................... ocena podpis Do celów archiwalnych pracę dyplomową zakwalifikowano do:* a) kategorii A (akta wieczyste) b) kategorii BE 50 (po 50 latach podlegające ekspertyzie) * niepotrzebne skreślić Wrocław 2011 2 TABLE OF CONTENT Abstract ...................................................................................................................................... 4 Streszczenie ................................................................................................................................ 4 1. Introduction ............................................................................................................................ 5 1.1. Aim and Objectives ......................................................................................................... 5 1.2. Research Questions ......................................................................................................... 5 1.3. Chapters Content ............................................................................................................. 6 2. Social Network ....................................................................................................................... 7 2.1. General Concept of Social Network ................................................................................ 7 2.2. Notation and Representation of Social Group ................................................................. 7 2.3. Social Network Analysis ................................................................................................. 7 2.4. Measures in Social Network Analysis ............................................................................ 9 2.4.1. Social Position .......................................................................................................... 9 2.4.2. Centrality Degree ................................................................................................... 10 2.4.3. Centrality Closeness ............................................................................................... 10 2.4.4. Centrality Betweenness .......................................................................................... 11 2.5. Temporal Social Network ............................................................................................. 11 3. Related Work ........................................................................................................................ 13 3.1. Methods for Group Extraction ...................................................................................... 13 3.1.1. Clique Percolation Method ..................................................................................... 13 3.1.2. Fast Modularity Optimization ................................................................................ 13 3.1.3. Algorithm of Girvan and Newman ......................................................................... 14 3.1.4. Radicchi et al. Method ........................................................................................... 14 3.1.5. Lancichinetti et al. Method ..................................................................................... 15 3.1.6. iLCD Algorithm ..................................................................................................... 15 3.1.7. Other Methods ........................................................................................................ 15 3.2. Methods for Tracking Group Evolution ........................................................................ 15 3.2.1. Asur et al. Method .................................................................................................. 15 3.2.2. Palla et al. Method .................................................................................................. 17 3.2.3. Chakrabarti et al. Method ....................................................................................... 18 3.2.4. Kim and Han Method ............................................................................................. 18 3.2.5. FacetNet ................................................................................................................. 19 3.2.6. GraphScope ............................................................................................................ 19 4. Group Evolution Discovery Method .................................................................................... 20 4.1. Community Evolution ................................................................................................... 20 4.2. Inclusion Measure ......................................................................................................... 22 3 4.3. Algorithm ...................................................................................................................... 23 4.4. Pseudo-code .................................................................................................................. 25 5. Group Evolution Discovery Platform .................................................................................. 26 5.1. Data Structures .............................................................................................................. 26 5.1.1. Import Module ........................................................................................................ 27 5.1.2. GED Module .......................................................................................................... 27 5.1.3. Asur Module ........................................................................................................... 28 5.1.4. Palla Module .......................................................................................................... 28 5.1.5. Analysis Module .................................................................................................... 29 6. Email Communication Data ................................................................................................. 30 6.1. Data Description ............................................................................................................ 30 6.2. Data Pre-processing ....................................................................................................... 30 7. Experiments .......................................................................................................................... 33 7.1. Test Environment .......................................................................................................... 33 7.2. Experiment Based on Overlapping Groups Extracted by CPM .................................... 33 7.2.1. GED Method .......................................................................................................... 34 7.2.2. Method by Asur et al. ............................................................................................. 39 7.2.3. GED Method vs. Asur et al. Method ...................................................................... 40 7.2.4. Method by Palla et al. ............................................................................................. 42 7.2.5. GED Method vs. Palla et al. Method ..................................................................... 43 7.3. Experiment Based on Disjoint Groups Extracted by Blondel ....................................... 44 7.3.1. GED Method. ......................................................................................................... 44 7.3.2. Method by Asur et al. ............................................................................................. 48 7.3.3. GED Method vs. Asur et al. Method ...................................................................... 48 7.4. Experiment Based on Different User Importance Measures ......................................... 48 8. Conclusions and Future Work .............................................................................................. 52 9. References ............................................................................................................................ 55 Abstract 4 The continuous interest in the social network area contributes to the fast development of this field. New possibilities of obtaining and storing data allows for more and more deeper analysis of the network in general, as well as groups and individuals within it. Especially interesting is studying the dynamics of changes in social groups over time. Having such knowledge ones may attempt to predict the future of the group, and then manage it properly in order to achieve presumed goals. Such ability would be a powerful tool in the hands of human resource managers, personnel recruitment, marketing, etc. The thesis presents a new method for exploring the evolution of social groups, called Group Evolution Discovery (GED). Next, the results of its use are provided together with comparison to two other algorithms in terms of accuracy, execution time, flexibility and ease of implementation. Moreover, the method was evaluated with various measures of user importance within a group. dynamics. Obtained results suggest that GED is the best method for analyzing social group Streszczenie Nieustające zainteresowanie tematem sieci społecznych przyczynia się do szybkiego rozwoju tej dziedziny nauki. Nowe sposoby pozyskiwania i magazynowania danych pozwalają na coraz to głębszą analizę sieci jako ogółu, a także grup oraz jednostek w niej występujących. Szczególnie interesujące jest badanie dynamiki zmian zachodzących w grupach społecznych na przestrzeni czasu. Mając taką wiedzę można próbować przewidzieć przyszłość grupy, a następnie odpowiednio nią kierować aby osiągnąć założone cele. Taka umiejętność byłaby potężnym narzędziem w rękach osób zajmujących się zarządzaniem zasobami ludzkimi, doborem personelu, marketingiem, itp. W pracy przedstawiono nową metodę do odkrywania ewolucji grup społecznych nazwaną Group Evolution Discovery (GED). Następnie pokazano wyniki jej użycia oraz porównano z dwoma innymi algorytmami pod kątem dokładności i szybkości działania, a także elastyczności i łatwości implementacji. Ponadto, metoda została sprawdzona z różnymi miarami ważności użytkowników w grupie społecznej. społecznych. Otrzymane wyniki sugerują, że GED jest najlepszą metodą do badania dynamiki grup 5 1. Introduction Social network in a simplest form is a social structure consisting of units that are connected by various kinds of relations like friendship, common interest, financial exchange, dislike, knowledge or prestige [27]. The easiest way to present social network in a mathematical way is graph representation where members are nodes of the graph and relations are edges between those nodes. Social Network Analysis (SNA), which focuses on understanding the nature and consequences of relations between individuals or groups [61], [67] has become progressively attractive area within the social sciences for investigating human and social dynamics. The earliest basic text known of dealing exclusively with social network analysis is Knoke and Kuklinski's Network Analysis, published in 1982 [50]. The development of SNA is so fast that the publications on methods and applications for analyzing social networks are updated almost every year. [29], [7]. Changes in technology and society creates a powerful mix of forces that will revolutionize the way all businesses – not just media companies – act, produce goods, and relate to customers [3]. There are plenty of reasons why SNA area should be examined, e.g. SNA can be used to help companies adapt to rapid economic changes [62], find key target markets, build up harmonious and successful project teams [10], help people find jobs [24], and more. Social networks are dynamic by nature. A dynamic network consists of relations between members that evolves over time. Although, the idea is very simple and intuitive, tracking changes over time, especially changes within social groups is still uncharted territory on the social network analysis map. There are only a few methods dealing with this problem, and the need for more methods is tremendous. This thesis presents new method for discovering group evolution in the social network. The method is evaluated on the email communication data in order to show its features and usefulness in the social network analysis area. The first results of the method were already presented in [70] and [71]. 1.1. Aim and Objectives The goal with this project is to identify and analyze the changes occurring in the social groups over the time. Additional objectives are: 1. to conduct research in literature on existing methods for detecting groups within the social network, 2. to extract social groups from large email communication dataset, 3. to conduct research in literature on existing methods for tracking group evolution, 4. to develop new algorithm for group evolution discovery working on both overlapping and disjoint group, 5. to identify and analyze changes occurring in social groups, 6. to prepare and conduct experiments which compare the new algorithm with existing ones. 1.2. Research Questions The thesis addressed following research questions: 1. Which methods for detection groups within social network, methods based on fast modularity or methods based on cliques, are faster for the large datasets? 2. How changes of a social group over time can be noticed and evaluated? 3. What are the most common event types occurring in social group evolution? 6 4. What is the difference between various methods for tracking group evolution? 5. Which methods for discovering group evolution can be successfully used on overlapping groups? 1.3. Chapters Content The rest of the thesis is organized as follows. Chapter 2 describes general concept of the social network and basis of the SN theory together with notation and representation of social group, also description of the social network analysis and measures used in the SNA and presentation of the temporal social network is provided. Chapter 3 describes the most common and valuable methods for group extraction and methods for quantifying group evolution in the social network. Chapter 4 presents the idea of new method for tracking group evolution preceded by theoretical basis, such as event types or inclusion measure required to understand the algorithm. Formula and pseudo-code is also provided in this section. Chapter 5 includes general scheme of all GED Platform's modules and detailed description of their tasks. Chapter 6 describes the email communication data used in the study together with data pre-processing needed to conduct the experiments. In Chapter 7 evaluation of the Group Evolution Discovery method focused on accuracy and flexibility is presented. Other aspects, such as execution time, ease of implementation and design are also mentioned. Moreover, exhaustive comparison with two other methods for tracking group evolution is provided. Chapter 8 includes outcomes from running experiments with answers for research questions. Additionally, development direction of GED method is revealed. Chapter 9 presents a lists of tables and figures occurring in the thesis, and finally Chapter 10 contains sorted list of the literature used in the thesis. 7 2. Social Network 2.1. General Concept of Social Network There is no universally acceptable definition of the social network. Network analysed in this thesis can be described as set of actors (network nodes) connected by relationships (network edges). Many researchers proposed their own concept of social network [25], [61]. [67]. [68]. Social networks, as an interdisciplinary domain, might have different form: corporate partnership networks (law partnership) [40], scientist collaboration networks [48], movie actor networks, friendship network of students [4], company director networks [57], sexual contact networks [44], labour market [42], public health [8], psychology [51], etc. The easiest to investigate, social networks, are online social networks [12], [20], web- based social networks [23], computer-supported social networks [69] or virtual social networks. The reason for this is simple and continuous way to obtain data from which those social networks can be extracted. Depending on the type of social network, data can be found in various places, e.g.: bibliographic data [21], blogs [2], photos sharing systems like Flickr [32], e-mail systems [65], [30], telecommunication data [6], [33], social services like Twitter [28] or Facebook [17], [64], video sharing systems like YouTube [11], Wikipedia [67] and more. Obtaining data from mentioned "data sources" allows to explore more than single social network in specific snapshot of time. Using proper techniques it is possible to evaluate changes occurring in social network over time. Especially interesting is following changes of social groups (communities) extracted from social networks. 2.2. Notation and Representation of Social Group As there is no definition of the social network, there is also no common definition of the groups (communities) in social networks [18], [54]. Several different definitions are used, sometimes they are even simplified just to criteria for existence of the group [14], [19], [35]. Biologists described group as a cooperating entities, existing in the same environment. For sociologists community is a group of units sharing common area. Both definitions are focused on location of a members of a group. However, caused by fast propagation of the Internet, community is no more associated with geographical position. A general concept of a social group assumes that community is a set of units in given population (social network), who collaborate together more often than with other units of this population (social network). This general idea can be easily moved to the graph theory, where social network is represented as a graph and a community is a set of nodes (vertices) with high density of links (edges) within community, and lower density of a links directed outside the community. Moreover, communities can also be algorithmically determined, as the output of the specific clustering algorithm [43]. In this thesis, such a definition will be used, i.e. a group G extracted from the social network SN(V,E) is a subset of vertices from V (GV), extracted using any community extraction method (clustering algorithm). 2.3. Social Network Analysis The term social networks have been used for the first time in the middle of 1950, but only in the 1980s researchers began to explore social relationships. Since then social network analysis (SNA) becomes necessary in an increasing number of application domains, including community discovery (as formation and evolution), social dynamics (as consensus, agreement and uniformity), recommendation systems and so on [22]. 8 General idea of social network analysis is projecting and measuring of relationships and flows between people, communities, institutions, computers, web sites, and other knowledge processing units. SNA provides both a visual and a mathematical analysis of units relationships [36]. While performing social network analysis four main tasks can be observed. First step is selection of a sample which will be analyzed. Then the data can be collected using any existing method for collecting data, e.g. interviews, questionnaires, observation. There are two types of data that might be investigated, members and relations between them. Third step in SNA is choice and implementation of a social network analysis method. There are three approaches to the analyzing procedure (Figure 2.1): Figure 2.1. Visualisation of social network analysis methods (figure from [31]).  Full network methods are collecting and analyzing data about the whole network. None of the members nor relationships is omitted. This approach is the most accurate but also the most expensive when it comes to computational cost or time needed for processing. Another inconvenience may be problem with collecting data for entire network [25].  Snowball methods starts with single local member or small set of members and follow its relations in order to reach another members. Ones the method reach them the whole process is repeated until all members are investigated or the predefined number of iteration is exceeded. This method works very well for finding well connected groups in big networks but it also has some disadvantages. The method can omit members who are isolated or loosely connected, or in worst case the method can end on the first member because of lack in relations [25]. 9  Ego-centric methods are focused only on the single member and its neighbourhood (and also on relations between them). This method is useful for analyzing the local network and what influence has this network on considered member. Because of local character the method is very fast and computationally efficient [25]. The final step in social network analysis is drawing conclusions [20]. There are plenty of reasons why SNA area should be investigated, e.g. SNA can be used to identify target markets, create successful project teams and serendipitously identify unvoiced conclusion [10]. 2.4. Measures in Social Network Analysis While analyzing social network it is sometimes crucial to investigate which member is the most powerful (central). Or, looking from another angle, how important is the specific member within the social group, which he belongs to. To do so, one of the measures listed below may be used. 2.4.1. Social Position Social position is a measure which express the user importance within social network and is calculated in the iterative way. The social position for network SN(V,E) is calculated as follows [45]: (2.1) where: – the social position of member x after the n+1st iteration, – the coefficient from the range (0;1), – the commitment function which expresses the strength of the relation from y to x, . Characteristic for the social position is that it takes into account both, the value of social positions of member's x relations and their commitment in connections to x. In general, the greater social position one have the more profitable this user is for the entire network [45]. Algorithm of a method can be easily presented as follows: 1. For each member in a network assign SP0 = 1. 2. For each edge e(x,y) in a network recalculate SP of y according to: 3. For each member in a network recalculate SP according to: 4. Repeat steps 2 and 3 until gain in SP for each member in a network is below presumed threshold. Directed social network presented in Figure 2.2 contains commitment values between social position of members is members. Based on these values and coefficient value calculated in Table SN1. Each column represents one iteration of algorithm. Calculations stops when difference between successive iterations is 0,01 or lower. The final value of social position determines the rank of particular member within examined social network, the higher social position the higher position in the ranking. In the example illustrated in Figure 2.2 member C has the highest SP (and rank) due to the number of relations and their high commitment value from other members. Member D, in turn, has second place in the ranking VynnxyCySPxSP11)(1xSPnxyCVxxSPeach for 1)(0yxCxSPySPySPnnn1xSPxSPnn15,0 as a result of just one relation, but it is relation from the most important member in the network. As easily seen in Table 2.1 the algorithm found the final ranking in the second iteration. In general, the smaller network the less iterations needed to calculate social positions. 10 Figure 2.2. Members of a directed social network with assigned commitment values. Member SP0 SP1 SP2 SP3 SP4 SP5 SP6 SP7 Rank A B C D E 1 0,60 0,565 0,565 0,565 0,568 0,567 0,566 1 0,65 0,650 0,650 0,678 0,665 0,665 0,667 1 1,75 1,410 1,393 1,458 1,440 1,434 1,440 1 1,375 1,205 1,196 1,229 1,220 1,217 1 1 1 1 1,188 1,103 1,098 1,115 1,110 5 4 1 2 3 Table 2.1. Social position of a members in successive iterations of algorithm. Last column contains ranking of a members in social network. 2.4.2. Centrality Degree The way of calculating centrality degree is very simple and intuitive. It is the number of direct connections of member x with other members [45]: (2.2) where: – the number of members which are directly connected to member x, m – the number of members in a network. 2.4.3. Centrality Closeness In a centrality closeness the member's location within the network is more important than the number of connections with other members (like in a centrality degree measure). A 1)(mxdxCDxd 11 centrality closeness measure determines how close the member is to all other members in a network and counts how quick this member can get in touch with other members[45]: (2.3) where: – a function describing the distance between members x and y, m – the number of members in a network. 2.4.4. Centrality Betweenness A centrality betweenness focuses on how many times member is located between two other members and how often the path goes through this member. Importance of the members with high centrality betweenness lies on fact that other members are connected with each other only by them. The measure is determined using [45]: (2.4) where: – the number of shortest paths from x to y that goes through z, – the number of all paths from x to y, m – the number of members in a network. 2.5. Temporal Social Network Temporal social network TSN is a list of succeeding timeframes (time windows) T. Each timeframe is in fact one social network SN(V,E) where V is a set of vertices and E is a set of directed edges (2.5) Example of a temporal social network is presented in Figure 2.3. TSN consists of five timeframes, and each timeframe is social network created from data gathered in particular interval of time. In the simplest case one interval starts when previous interval ends, but based on author's needs intervals may overlap by a set of time or even contain full history of previous timeframes. VyxyyxcmxCC,1)(yxc,1)(,mbzbxCBVyxzyxxyxyzbxyxybyxVyxyx,,:,miyxVyxyxEmiEVSNTNmTTTTSNiiiiiim,...,2,1,,:,,...,2,1),,(,,....,,21 12 Figure 2.3. Example of temporal social network consisting of five timeframes. 13 3. Related Work 3.1. Methods for Group Extraction Methods for group extraction, also called community detection methods or grouping methods, are the first step in analyzing social networks. The aim of these methods is to identify (extract) groups within a social network by only using the information contained in the network's graph. Two main types of the community detection methods can be distinguished, the one which assign each member to a single group, and the one which allows members to be the part of more than one community. The groups extracted with the first type of methods are called disjoint groups (they do not share any nodes), while the communities obtained by utilizing the second type of methods are called overlapping groups (they do share nodes). In further sections the most common and valuable methods for group extraction in the social network are presented. 3.1.1. Clique Percolation Method The clique percolation method (CPM) proposed by Palla et al. [54], [15] is the most widely used algorithm for extracting overlapping communities. The CPM method works locally and its basic idea assumes that the internal edges of a group has a tendency to form cliques as a result of high density between them. Oppositely, the edges connecting different communities are unlikely to form cliques. A complete graph with k members is called k- clique. Two k-cliques are treated as adjoining if number of shared members is k–1. Lastly, a k- clique community is the graph achieved by the union of all adjoining k-cliques [1]. Such a assumption is made to represent fact that it is crucial feature of a group that its nodes can be attained through densely joint subsets of nodes. Algorithm works as follows: 1. All cliques are found for different values of k. 2. A square matrix , where n is the number of cliques found, is created. Each cell [i, j] contains number of nodes shared by cliques i and j. 3. All cliques of size equal or greater than k are selected and between cliques of the same size connections are found in order to create a k-clique chain. Palla et al. proposing their method aim for algorithm which is not too rigorous, takes into account the density of edges, works locally, and allows nodes to be a part of several groups. All the requirements were fulfilled, moreover Palla and co-workers [18] implemented CPM algorithm in software package called CFinder, which is freely available at [26]. 3.1.2. Fast Modularity Optimization The method by Blondel et al. [6] is designed to deal with the large social networks. It provides good quality of the extracted disjoint groups in low computation time, what is more a complete hierarchical community structure is also supplied. In the first step algorithm creates a different community for each member of the network. Then, repeating iteratively members are moved to neighbours' communities, but only if such action will improve the modularity of the considered group. Gain in modularity ΔQ obtained by adding node i into a community C is calculated as follows: nnM 14 (3.1) where: – the sum of the weights of the links inside community C, – the sum of the weights of the links incident to nodes in community C, – the sum of the weights of the links incident to node i, – the sum of the weights of the links from node i to nodes in community C, Algorithm stops when none of the members cannot increase the modularity of its m – the sum of the weights of all the links in the network. neighbours' group. Algorithm, step by step, is presented below. 1. Each node is assigned to separate group. 2. Each node is removed from its group and added to the neighbour's group, gain in modularity is counted and node stays in group where gain is the biggest. If the gain in modularity is below zero for all neighbours' groups, the node goes back to its original group. 3. Step 2 is repeated until modularity cannot be improved any more. 4. New network is created, where groups are represented by super-nodes. Super-nodes are connected if there is at least one connection between groups represented by super- nodes. The weight of the connection equals sum of weights of connections between groups. 5. Steps 1 – 4 are repeated until the network consist of one super-node. The biggest advantages of the method are intuitive concept of grouping nodes, ease of implementation, extremely low computational cost, and unfolding hierarchical community structure. Method by Blondel et al. is implemented for example in a Workbench for Network Scientists (NWB) [49]. 3.1.3. Algorithm of Girvan and Newman Method by Girvan and Newman [21] [46] is one of the best known algorithms for extracting disjoint groups. This method focuses on the edges which are least central in order to remove them from the network. To determine the weakest edges, those which are most "between" groups, Girvan and Newman used slightly modified betweenness centrality measure (mentioned in section 2.4.4.). The edges are iteratively removed from the network, based on the value of their betweenness. After each iteration betweenness of the edges affected by the removal is recalculated. Algorithm stops when there are no edges to remove, which means that all groups have been disjointed. 3.1.4. Radicchi et al. Method Radicchi et al. in [55] proposed faster version of Girvan-Newman method. A divisive algorithm requires the consideration of only local quantities. The authors used edge-clustering coefficient to single out edges connecting members belonging to different groups. Having the same accuracy as algorithm of Girvan and Newman, method by Radicchi et al. works much faster, allowing to investigate far bigger networks. 222,22222mkmmmkmkQitotinitotiniinintotikinik, 15 3.1.5. Lancichinetti et al. Method Algorithm by Lancichinetti et al. [39] identifies the natural communities of the members based on their fitness. The fitness is calculated from the internal and external degrees of the members in communities. Counting fitness for every node in graph will cover it by the overlapping groups. Due to the parameter controlling the size of the communities there is a possibility to find hierarchical dependencies between groups. The method is very flexible, fitness function can be designed for particular type of network, e.g. weighted networks. 3.1.6. iLCD Algorithm In order to detect communities, Cazabet et al. in [56] focused not only on edges and nodes within group, but also on its particular pattern of development. When new member appears in the network algorithm looks for groups which will suites new node. Suits in this case means that (1) the number of neighbours inside the community which new member can access with a path of length two or less is higher than the mean number of second neighbours within community, and (2) the number of neighbours inside the community which new member can access with a path of length two or less, by at least two different paths is greater than the mean number of robust second neighbours within community. The intrinsic Longitudinal Community Detection (iLCD) algorithm allows groups to overlap, which makes it optional for CPM method. 3.1.7. Other Methods Apart from the most common, presented above, methods for detecting groups in a network, researchers developed many other, e.g. Fast greedy modularity optimization by Clauset, Newman and Moore [13], Markov Cluster Algorithm [66], Structural algorithm by Rosvall and Bergstrom [59], Dynamic algorithm by Rosvall and Bergstrom [60], Spectral algorithm by Donetti and Muñoz [16], Expectation-maximization algorithm by Newman and Leicht [47], Potts model approach by Ronhovde and Nussinov [58]. Most of them are analyzed and evaluated by Lancichinetti and Fortunato in [38]. 3.2. Methods for Tracking Group Evolution One aspect of the social network analysis is to investigate dynamics of a community, i.e., how particular group changes over time. To deal with this problem several methods for tracking group evolution have been proposed. Almost all of them as a input data needs the social network with communities extracted by one of the grouping methods. In a consequence specific methods for tracking evolution works better on disjoint groups or on overlapping groups. Further paragraphs provides the basic ideas behind the most popular methods for analyzing social group dynamics. 3.2.1. Asur et al. Method The method by Asur et al. [5] has simple and intuitive approach for investigating community evolution over time. The group size and overlap are compared for every possible pair of groups in the consecutive timeframes and events involving those groups are assigned. When none of the nodes of community from timeframe i occur in following timeframe i+1, Asur et al. described this situation as dissolve of the group. 16 (3.2) where: – community number k in timeframe number i, – the set of the vertex (nodes) of community number k in timeframe number i. In opposite to dissolve, if none of the nodes of community from timeframe i+1 was present in previous timeframe i, group is marked as new born. (3.3) Community continue its existence when identical occurrence of the group in consecutive timeframe is found. Situation when two communities from timeframe i joint together overlap with more of the single group in timeframe i+1, is called merge. (3.4) (3.5) Opposite case, when two groups from timeframe i+1 joint together overlap with more of the single group in timeframe i, is marked as split. than than (3.6) the events described by Asur et al. are presented in Figure 3.1. Communities Authors of the method suggested 30% or 50% as a value for threshold. Example of and continue between timeframes 1 and 2, then merge into one community in timeframe 3. In timeframe 4 community splits into three groups , and , next in timeframe 5 new community forms and finally in timeframe 6 the biggest community dissolves. 1such that no iff 111jikijikiVVCCDissolvekiCkiV1such that no iff 111jikijikiVVCCFormjikijikiVVCCContinue11 iff 1,%2 and 2 and%,such that iff 1,,11111lijilikijikijilikijilikijilikiCVVCVVVVVMaxVVVCCCMerge%2 and 2 and%,such that , iff 1,1111111111lijilikijikijilikijilikilikijiCVVCVVVVVMaxVVVCCCSplit11C21C13C13C14C24C34C45C15C 17 Figure 3.1. Possible group evolution by Asur et al. (figure from [5]). Method provided by Asur et al. allows also to investigate behaviour of individual members in a community life. Node can appear in a network, disappear from a network, and also join and leave community. detection, nor if method works for overlapping groups. Unfortunately, Asur et al. did not specify which method should be used for community 3.2.2. Palla et al. Method Palla et al. in their method [52], [53] used all advantages of the clique percolation method (described in section 3.1.1.) for tracking social group evolution. Social networks at two consecutive timeframes i and i+1 are merged into single graph Q(i, i+1) and groups are extracted using CPM method. Next, the communities from timeframes i and i+1, which are the part of the same group from joint graph Q(i, i+1), are considered to be matching i.e. community from timeframe i+1 is considered to be an evolution of community from timeframe i. It is common that more than two communities are contained in the same group from joint graph (Figure 3.2b and Figure 3.2c). In such a case matching is performed based on the value of their relative overlap sorted in descending order. The overlap is calculated as follows: (3.7) where: – the number of common nodes in the communities A and B, – the number of nodes in the union of the communities A and B. However, the authors of the method did not explain how to chose the best match for the community, which in next timeframe has the highest overlap with two different groups. BABABAO,BABA 18 Figure 3.2. Most common scenarios in the group evolution by Palla et al.. The groups at timeframe t are marked with blue, the groups at timeframe t+1 are marked with yellow, and the groups in the joint graph are marked with green. a) a group continue its existence, b) the dark blue group swallows the light blue, c) the yellow group is detached from the orange one (figure from [53]). Palla et al. proposed several event types between groups: growth, contraction, merge, split, birth and death, but no algorithm to assign them is provided. The biggest disadvantage of the method by Palla et al. is that it has to be run with CPM, no other method for community evolution can be used. Despite some lacks, the method is considered the best algorithm tracking evolution for overlapping groups. 3.2.3. Chakrabarti et al. Method Chakrabarti et al. in their method [9] presented original concept for the identifying group changes over time. Instead of extracting communities for each timeframe and matching them, the authors of the method introduced the snapshot quality to measure the accuracy of the partition Ct in relation to the graph formation at time t. Then the history cost measures difference between partition Ct and partition at the previous timeframe Ct-1. The total worth of Ct is the sum of snapshot quality and history cost at each timeframe. Most valuable partition is the one with high snapshot quality and low history cost. To obtain Ct from Ct-1, Chakrabarti et al. use relative weight cp (tuned by user) to minimize difference between snapshot quality and history cost. Chakrabarti et al. did not mention if method work for overlapping groups. 3.2.4. Kim and Han Method Kim and Han in their method [34] used links to connect nodes at timeframe t–1 with nodes at timeframe t, creating nano-communities. The nodes are connected to their future occurrences and to their future neighbours. Next, the authors analyzed the number and density 19 of the links to judge which case of relationship occurs for given nano-community. Kim and Han stated most common changes, which are: evolving, forming and dissolving. Evolving of a group can be distinguished into three different cases: growing, shrinking and drifting. Community Ct grows between timeframes t and t+1 if there is a group Ct+1 in the following timeframe containing all nodes of Ct. Group Ct+1 may, of course, contain additional nodes, which are not present in Ct. In opposite, community Ct shrinks between timeframes t and t+1 when there is a group Ct+1 in the next timeframe which all nodes are contained in Ct. Finally, group Ct is drifting between timeframes t and t+1 if there is group Ct+1 in the following timeframe which has at least one node common with Ct. Kim and Han did not specify if the method is designed for overlapping or disjoint groups, but the drifting event suggest that method will not work correctly for overlapping groups. 3.2.5. FacetNet Lin et al. used evolutionary clustering to create FacetNet [41], a framework allowing members to be a part of more than one community at given timeframe. In contrast to Chakrabarti et al. method, Lin et al. used the snapshot cost and not the snapshot quality to calculate adequate of the partition to the data. Kullback-Leibler method [37] has been used for counting snapshot cost and history cost. Based on results of FacetNet it is easier to follow what happens with particular nodes, rather than what happens with a group in general. The algorithm is not assigning any events, but user can analyze results and assign events on his own. Unfortunately, FacetNet is unable to catch forming and dissolving events. 3.2.6. GraphScope Sun et al. presented parameter-free method called GraphScope [63]. At the first step partitioning is repeated until the smallest encoding cost for a given graph is found. Subsequent graphs are stored in the same segment Si if encoding cost is similar. When examined graph G has higher encoding cost than encoding cost of segment Si, graph G is placed to segment Si+1. Jumps between segments marks change-points in graph evolution over time. The main goal of this method is to work with a streaming dataset, i.e. method has to detect new communities in a network and decide when structure of the already existing communities should be changed in the database. Therefore, to adapt GraphScope for tracking group evolution, some extensions are needed. 20 4. Group Evolution Discovery Method The small number of algorithms for tracking community evolution, as well as their low flexibility and accuracy suggest a gap in the knowledge. Therefore, in this thesis, the new method for the group evolution discovery, called GED, is proposed. Further sections presents the particular elements of the method and explains their usefulness. 4.1. Community Evolution Evolution of particular social community can be represented as a sequence of events (changes) following each other in the successive timeframes within the temporal social network. Possible events in social group evolution are: Figure 4.1. The events in community evolution. 21  Continuing (stagnation) – the community continue its existence when two groups in the consecutive time windows are identical or when two groups differ only by few nodes but their size is the same. Intuitively, when two communities are so much similar that it is hard to see the difference.  Shrinking – the community shrinks when some members has left the group, making its size smaller than in the previous time window. Group can shrink slightly, losing only few nodes, or greatly, losing most of its members.  Growing (opposite to shrinking) – the community grows when some new members have joined the group, making its size bigger than in the previous time window. A group can grow slightly as well as significantly, doubling or even tripling its size.  Splitting– the community splits into two or more communities in the next time window when few groups from timeframe Ti+1 consist of nodes of one group from timeframe Ti. Two types of splitting can be distinguished: (1) equal, which means the contribution of the groups in split group is almost the same and (2) unequal, when one of the groups has much greater contribution in the split group. In second case for the biggest group the splitting might looks similar to shrinking.  Merging (reverse to splitting) – the community has been created by merging several other groups when one group from timeframe Ti+1 consist of two or more groups from the previous timeframe Ti. Merge, just like the split, might be (1) equal, which means the contribution of the groups in merged group is almost the same, or (2) unequal, when one of the groups has much greater contribution into the merged group. In second case for the biggest group the merging might looks similar to growing.  Dissolving happens when a community ends its life and does not occur in the next time window, i.e., its members have vanished or stop communicating with each other and scattered among the rest of the groups.  Forming (opposed to dissolving) of new community occurs when group which has not existed in the previous time window Ti appears in next time window Ti+1. In some cases, a group can be inactive over several timeframes, such case is treated as dissolving of the first community and forming again of the, second, new one. The examples of events described above are illustrated in Figure 4.1. The easiest way to track whole evolution process for the particular community is to combine all changes during its lifetime to a single graph (Figure 4.2) or table (Table 4.1). Figure 4.2. Evolution of the single community presented on a graph. 22 In the examples presented in Figure M2. and in Table M1. the network consists from eight timeframes. Group G1 forms in T2, which means that members of G1 have no relations in T1 or relations are rare. Next, by gaining four new nodes, community grows in T3. In following timeframe T4 group G1 splits into G2 and G3. By losing one node, group G2 shrinks in T5 while group G3 remains unchanged. Then new group G4 forms in T6, while both communities G2 and G3 continue their existence. In timeframe T7 all groups merges into one community G5 but in last timeframe T8 group dissolves preserving only few relations between its members. Event T2 Event T3 Event T4 Event form G1 growth G1 form G1 growth G1 - split G2 shrink G2 continue G2 merge G5 dissolve split G3 continue G3 continue G3 merge G5 dissolve dissolve T6 Event T7 Event T5 Event - - - - Table 4.1. Evolution of the communities presented in a table. form G4 merge G5 - - - 4.2. Inclusion Measure To be able to track social community evolution, the groups from successive timeframes have to be matched into pairs. The most common and simplest approach is counting the overlapping of those groups: (4.1) where: – the number of shared nodes. – the size of the bigger group. However, overlap function can easily miss important relationships, e.g., when one group is small and another one is huge overlapping will be low and the methods for tracking evolution will ignore this pair of the groups. To avoid such a situations and to emphasize relations within the community a novel measure called inclusion is proposed. This measure allows to evaluate the inclusion of one group in another. Therefore, inclusion of group G1 in group G2 is calculated as follows: (4.2) where: – value of social position of the member x in G1. The unique structure of this measure takes into account both the quantity and quality of the group members. The quantity is reflected by the first part of the inclusion measure ,i.e., what portion of G1 members is shared by both groups G1 and G2, whereas the quality is expressed by the second part of the inclusion measure, namely what contribution of important members of G1 is shared by both groups G1 and G2. It provides a balance between the groups which contain many of the less important members and groups with only few but key members. 212121,,GGMAXGGGGO21GG21,GGMAX%100qualitygroupquantitygroup,1121112121GxGGGxGxSPxSPGGGGGIxSPG1 23 The one might say that inclusion formula is "unfair" for not identical groups, because if community differ even by only one member, inclusion is reduced for not having all nodes and also for not having social position of those nodes. Indeed, it is slightly "unfair" (or rather strict), but using social position measure, which is calculated based on members' relations, causes that inclusion focuses not only on nodes (members) but also on edges (relations) giving great advantage over overlapping measure. Naturally, instead of social position (SP) any other measure which indicates user importance can be used e.g. centrality degree, closeness degree, betweenness degree, etc. But it is important that this measure is calculated for the group and not for social network in order to reflect node importance in community and not in the whole social network. 4.3. Algorithm As mentioned before, the overlap measure has a tendency to missing important evolutions, therefore inclusion is counted for both groups separately. Then, even if the inclusion of huge group in small one is low, the opposite inclusion, the inclusion of small group in huge group can still have high value. In such a case, the method will not skip any meaningful evolutions. Intuitively, between two groups <G1, G2> only one event may occur, e.g. community G1 cannot shrinks and merge into community G2 at the same time. Of course one community in timeframe Ti may have several events with different communities in Ti+1, e.g. G1 can split into G2 and G3. Assigning events with GED method is based on the size of the communities and on the inclusion values of both groups, if at least one of the inclusions exceeds the thresholds set by the user, the event is assigned, (see Figure M3.). The exceptions are events forming and dissolving, which are assigned with special condition. In order to assign forming (dissolving) event members of a community cannot have relations in previous (next) timeframe or relations have to be rare, i.e. considered group must have very low inclusions level with all groups in previous (next) timeframe. In this thesis a very low level is regarded as a value below 10%, argumentation for that is presented in experimental section. The user can set value of each threshold individually, α threshold is for inclusion of group G1 in G2, while β threshold is for inclusion of G2 in G1. The value of thresholds has to be from range <0%, 100%>, however it is recommended to choose values above 50% to guarantee good inclusion of matching communities. An advantage of counting two inclusions instead of one was already provided, what is the profit of using two thresholds? Primarily, the method gains on flexibility and the user has possibility to obtain the results which he needs. The extensive explanation on setting value of thresholds and their influence on results are provided in experimental section of this thesis. Input: GED – Group Evolution Discovery Method TSN in which at each timeframe Ti groups are extracted by any community detection algorithm; calculated any user importance measure. 1. For each pair of groups <G1, G2> in consecutive timeframes Ti and Ti+1 inclusion of G1 in G2 and G2 in G1 is counted according to equations (MW2). 2. Based on inclusion and size of two groups one type of event may be assigned: a. Continuing: I(G1,G2)  α and I(G2,G1)  β and G1 = G2 24 b. Shrinking: I(G1,G2)  α and I(G2,G1)  β and G1 > G2 OR I(G1,G2) < α and I(G2,G1)  β and G1  G2 and there is only one match (matching event) between G2 and all groups in the previous timeframe Ti c. Growing: I(G1,G2)  α and I(G2,G1)  β and G1 < G2 OR I(G1,G2)  α and I(G2,G1) < β and G1  G2 and there is only one match (matching event) between G1 and all groups in the next timeframe Ti+1 d. Splitting: I(G1,G2)  α and I(G2,G1) < β and G1  G2 and there is more than one match (matching events) between G2 and all groups in the previous time window Ti OR I(G1,G2) < α and I(G2,G1)  β and G1  G2 and there is more than one match (matching events) between G2 and all groups in the previous time window Ti e. Merging: I(G1,G2)  α and I(G2,G1) < β and G1  G2 and there is more than one match (matching events) between G1 and all groups in the next time window Ti+1 OR I(G1,G2) < α and I(G2,G1)  β and G1  G2 and there is more than one match (matching events) between G1 and all groups in the next time window Ti+1 f. Dissolving: for G1 in Ti and each group G2 in Ti+1 I(G1,G2) < 10% and I(G2,G1) < 10% g. Forming: for G2 in Ti+1 and each group G1 in Ti I(G1,G2) < 10% and I(G2,G1) < 10% in the method is presented in Figure 4.3. The scheme which facilitate understanding of the event selection for the pair of groups Group Evolution Discovery in Social Networks GED Calculating I(G1,G2)  α < α Calculating I(G2,G1)  β < β  β < β Comparing groups sizes G1 = G2 G1 > G2 G1 < G2 G1  G2 G1 < G2 G1  G2 G1 < G2 Any Assigning the event Continue Shrink Growth Split, Shrink Merge Growth Split, Shrink Merge Growth Form, Dissolve Figure 4.3. Decision tree for assigning the event type to the group. 25 between each two successive timeframes, the group evolution is created (Figure 4.2). Based on the list of extracted events, which have occurred for selected community 4.4. Pseudo-code Pseudo-code of the algorithm can be implemented in any programming language, however the lowest execution time can be achieved with SQL languages, which are aimed for processing large datasets, e.g. T-SQL language. Input: GED – Group Evolution Discovery Method TSN in which at each timeframe Ti groups are extracted by any community detection algorithm; calculated any user importance measure. Output: The list of communities matched into pairs with assigned event type and calculated inclusions. begin for (each group in Ti) do begin for (each group in Ti+1) do begin calculate inclusions I(G1,G2) and I(G2,G1) assign the event based on Figure 4.3 and add matched pair to the list end; end; for (each pair on the list) update splitting/shrinking, merging/growing begin if (there is only one match between G2 and all groups in the previous (next) else set splitting (merging) end; end. timeframe) set shrinking (growing) 26 5. Group Evolution Discovery Platform The Group Evolution Discovery Platform (GED Platform) was created for the purposes of conducting experiments (Section 7.). The main aim was to implement the GED method and methods by Asur et al. and by Palla et al. Additionally, GED Platform was used to analyze and compare mentioned methods. The scheme of GED Platform, containing all modules, is presented in Figure 5.1. Figure 5.1. Modules in GED Platform. 5.1. Data Structures Each module consists of at least one table. Relations between them are illustrated in Figure 5.2. Figure 5.2. Relations between tables within GED Platform. 27 5.1.1. Import Module Primarily, import module reads data about groups within social network from text files and stored them in GED Platform's database. User provides tab-delimited files, where each row consists of three columns: group number, member id, timeframe number. All timeframes of a particular social network are stored in one table named Groups, different networks or networks obtained with different grouping methods are stored in separate tables. Scheme of the table is presented in Table 5.1. PK Column name Data type Allow nulls group_id node_id timeframe smallint int tinyint No No No Table 5.1. Scheme of table Groups, storing data about groups and members within social network. For the needs of GED module another data, data about commitment value in the entire network, are imported as well. Each row of tab-delimited files consist of four columns: from node, to node, weight, timeframe. The data for the whole network are stored in the same table named Edges. Structure of the table is presented in Table 5.2. PK Column name Data type Allow nulls from_node to_node weight timeframe int int float tinyint No No No No Table 5.2. Scheme of table Edges, storing data about commitment value within network. Palla module, in turn, demands data about groups in the joint graph achieved by joining two consecutive timeframes. The data are stored in table Groups_Joint, which structure is identical to table Groups presented in Table 5.1. 5.1.2. GED Module The main task of GED module is tracking group evolution according to GED method (Section 4.). To make it possible GED module also has to calculate social position (Section 2.4.1.) of a members in all groups from a network. To do so data gathered by import module are used, especially data about groups and members within social network (Table 5.1) and commitment value between members (Table 5.2). Groups with calculated social position are stored in table named Groups_SP, which scheme is presented in Table 5.3. PK Column name Data type Allow nulls group_id node_id sp ranking timeframe smallint int float int tinyint No No Yes Yes No Table 5.3. Scheme of table Groups_SP, storing data about groups, members and their social position within social network. Having data about groups, members and their social position GED module can proceeds its main task – tracking group evolution. By calculating inclusion measures and following GED method's rules new table named Evolutions_GED is filled with the data about groups evolutions. Structure of the table is showed in Table 5.4. PK Column name Data type Allow nulls 28 id_evolutions event_type group1 timeframe1 group2 timeframe2 alpha beta threshold int varchar int tinyint int tinyint tinyint tinyint varchar No No Yes Yes Yes Yes Yes Yes No Table 5.4. Scheme of table Evolutions_GED, storing data about groups evolutions found with GED method. 5.1.3. Asur Module The only task of Asur module is discovering group evolution according to Asur et al. method (Section 3.2.1.). Based on the data from Table 5.1 overlapping is calculated and new table named Evolutions_Asur is filled with the data about groups changes. Scheme of the table is presented in Table 5.5. PK Column name Data type Allow nulls id_evolutions event_type group1 timeframe1 group2 timeframe2 overlap int varchar int tinyint int tinyint float No No Yes Yes Yes Yes Yes Table 5.5. Scheme of table Evolutions_Asur, storing data about groups evolutions discovered with Asur et al. method. 5.1.4. Palla Module The last module for uncovering communities evolutions is Palla module. Based on the data from tables Groups and Groups_Joint new table named Contained is filled with data about groups from the single timeframes contained in groups from the joint graphs. Structure of the table is showed in Table 5.6. Next, groups located in the same joint graph are matched based on the highest overlap and results are saved in table Matched, which structure is presented in Table 5.7. 29 PK Column name Data type Allow nulls id_contained group_id timeframe group_joint timeframe_joint int int tinyint int tinyint No Yes Yes Yes Yes Table 5.6. Scheme of table Contained, storing data about groups from the single timeframes contained in groups from the joint graphs. PK Column name Data type Allow nulls id_matched group1 timeframe1 group2 timeframe2 overlap int int tinyint int tinyint float No Yes Yes Yes Yes Yes Table 5.7. Scheme of table Matched, storing data about matched groups. 5.1.5. Analysis Module The last module in GED Platform is module for analyzing and comparing results. Functions implemented in this module allows to find differences between methods for tracking group evolution. All functions are briefly described in Table 5.8. Function name (input) Inclusion (group1, group2) Migration (group1) Compare (table1, table2) Evolution (group1) Evolution (table1) Description Provides detailed information about selected groups, such as: inclusions, sizes, social position of cores, total social positions, intersection. Provides detailed information about single group evolution, such as: size, core size, number of nodes migrated, average ranking of migrated nodes before migration, average ranking of migrated nodes after migration, size of new group. Joins results from two methods for tracking evolution in order to show which events are assigned to each pair of groups by both methods. Also provides events found by one method and omitted by second one. Provides evolution of selected group in next/previous timeframe, i.e. shows which groups are matched with selected group. Shows all possible processes of evolution for all groups from all timeframes. Tables used Groups_SP Groups_SP Evolutions_GED, Evolutions_Asur, Matched_Palla Evolutions_GED, Evolutions_Asur, Matched_Palla Evolutions_GED, Evolutions_Asur, Matched_Palla Table 5.8. Functions implemented in analysis module. 30 6. Email Communication Data The email communication data was gained from Wroclaw University of Technology (WrUT), which extracted exchange of messages from its server logs. 6.1. Data Description Data set was delivered in WrUT.zip and it size was 2.7 MB. Unpacked data was divided into fourteen text files (1.txt – 14.txt) and their size was 20.2 MB. All text files contained information about temporal social network (see section 2.5.) which consists from fourteen 90-days timeframes (timestamps from server logs were used to determine exact dates). Timeframes are overlapping with the 45-days overlap, i.e., the first timeframe begins on the 1st day and ends on the 90th day, second begins on the 46th day and ends on the 135th day and so on. The whole data set was collected within period of February 2006 – October 2007 and consists of 5.845 members and 149.344 relations. Each row of the single text file means relation between two members of Wroclaw University of Technology. The relation in this case is exchanging emails and is represented by pair of members and weight of relation between them, Figure 6.1. 4376;27588;0,001924927815206929740 4376;28598;0,004812319538017324350 4376;59745;0,000962463907603464870 Figure 6.1. Example of the data. WrUT member 1 id (•), WrUT member 2 id (•), weight of relation (•). Basic information about data:  Provider – Wroclaw University of Technology  Size – 20.2 MB (plain text)  Time period from February 2006 to October 2007  Number of members – 5.845  Number of relations – 149.344  Number of timeframes – 14  Timeframe interval – 90 days  Timeframe overlap – 45 days 6.2. Data Pre-processing First, the data had to be converted to fulfil the input requirements of both algorithms for extracting groups. Fortunately both methods, CPM implemented in CFinder [26] and Blondel implemented in a Workbench for Network Scientists (NWB) [49], allowed common data format, tab–delimited text files. Therefore, semicolon was replaced by tab and comma in weight of relation was replaced by point. In order to improve execution time of the algorithms, weight of relation between members was rounded to four decimal places. New format of the data is presented in Figure 6.2. 31 4376 4376 4376 27588 28598 59745 Figure 6.2. The data after conversion. WrUT member 1 (•), WrUT member 2 (•), 0.0019 0.0048 0.0010 weight of relation (•). Next, each timeframe of the temporal social network of email communication data was grouped using both methods. Output file of the CFinder software contained the groups sorted in ascending order with assigned members of WrUT, Figure 6.3. The groups may share members, in Figure 6.3 member 615 belongs to group 14 and 16. 14: 14151 1154 96 615 1153 5383 15: 2865 853 1225 15866 315 4132 16: 4513 14151 615 1160 6535 5861 Figure 6.3. The output of the CFinder software. Group number (•), members of the particular group (•), member 615 (•). Output file of the NWB application contained the members assigned to the groups on particular hierarchy level. Each member might be a part of only one community at each level of hierarchy, Figure 6.4. 63 64 65 "83" "community_12" "292" "community_12" "628" "community_27" "community_3" "community_3" "community_6" "community_3" "community_3" "community_6" Figure 6.4. The output of the NWB application. ID (•), member id (•), members communities at particular hierarchy level – from the lowest to the highest (•). Both output data sets were converted to the same format, tab–delimited text files containing group number, member id, timeframe number, Figure 6.5. 15 15 16 178 228 292 7 7 7 Figure 6.5. The data after final conversion. Group number (•), member id (•), timeframe number (•). After final conversion data sets were imported to the common MS SQL database, but to separate tables. Output of the CFinder was imported to the table Groups_CPM, and output of the NWB was imported to the table Groups_Blondel. Both tables had the same structure consisted of three columns: group_id was the type of smallint, node_id was the type of int, timeframe was the type of tinyint. Number of rows in the table Groups_CPM was 29.650, while in the table Groups_Blondel 65.639. At this stage data sets were ready to run method for tracking evolution provided by Asur et al. The GED method with the simplified version of inclusion measure could be also run at this point of data preparations, however it is recommended to use any measure determining members importance within a group. Therefore, according to [45] an algorithm for calculating social position (SP) was implemented in T-SQL language and run on data from the tables Groups_CPM and Groups_Blondel. As a result new tables were created, Groups_CPM_SP and Groups_Blondel_SP, with additional column of float type for SP value. 32 Method by Palla et al. required more preparations, because each pair of following timeframes had to be merged into single networks (graphs) and extracted again by CFinder. When grouping was finished output files were converted to format presented in Figure 6.5, but in this case timeframe number referred to the first timeframe in the pair. Afterwards, data set was imported to the database to the table Groups_CPM_Joint, which had identical structure as the table Groups_CPM. Number of rows in this table was 36.153. All tables in the database necessary to conduct experiments are presented in Table 6.1. Table name Groups_CPM Groups_Blondel Groups_CPM_SP Groups_Blondel_SP Groups_CPM_Joint Description List of members assigned to groups in each timeframe, extracted with CPM List of members assigned to groups in each timeframe, extracted with Blondel List of members and their social position, assigned to groups in each timeframe, extracted with CPM List of members and their social position, assigned to groups in each timeframe, extracted with Blondel List of members assigned to groups in networks obtained by joining two following timeframes, extracted with CPM Size [MB] No. of rows 29.650 0,695 1,016 65.639 1,188 29.650 1,656 65.639 0,883 36.153 Table 6.1. Basic information about tables required for experiments. 33 7. Experiments The main aim of the experiments was to investigate the features of GED method, such as accuracy, flexibility, execution time, etc. Accuracy of a method is the ability to catch evolutions, i.e. how many pairs of groups from different timeframes which share nodes can be found by the algorithm. Flexibility, in turn, determines how much influence on a results has user by adjusting methods parameters. Moreover, the influence of thresholds values on the results was examined. Differences in results obtained by GED with different user importance measures were also investigated. Lastly, GED method and methods by Asur et al. and by Palla et al. were compared on groups obtained with CPM algorithm and Blondel algorithm. The study was focused on accuracy, flexibility and execution time of particular methods, but other aspects, e.g. ease of implementation, design, were also took into account. 7.1. Test Environment The first step of the experiments, extraction of the communities by grouping algorithms, was conducted on stationary computer with computational power 3 GHz (Intel Pentium Dual Core) and 2 GB of RAM memory, the operating system was Microsoft Windows 7 Professional. Both software packages, CFinder and NWB, required Sun's Java Runtime Environment (JRE) in version not lower than 1.4. All single timeframes were extracted without any problems, but extraction of networks obtained by joining two consequence timeframes was unsuccessful because of the size and density of those networks. Therefore, another computer, with computational power 2,8 GHz (Intel Pentium Core 2 Duo) and 8 GB of RAM memory, was used to extract mentioned networks, this time with success. For the next step, implementing methods for group evolution discovery, another computer, with computational power 1,7 GHz (Intel Pentium Core Duo) and 2 GB of RAM memory, was used. The platform used for implementing methods was Microsoft SQL Server Management Studio 2005. A list of the hardware and software utilized in experiments together with tasks performed on each computer is presented in Table 7.1. Id Computational power 1. Intel Pentium Dual Core 3 Software needed CFinder, NWB. GHz, 2 GB of RAM. 2. Intel Pentium Core 2 Duo 2,8 GHz, 8 GB of RAM. CFinder. 3. Intel Pentium Core Duo 1,7 GHz, 2 GB of RAM. MS SQL 2005. Tasks Extracting communities from each timeframes. Extracting communities from networks obtained by joining two consecutive timeframes. Data set conversions (pre-processing), implementing and running methods for tracking community evolution. Table 7.1. A list of hardware and software used in experiments. 7.2. Experiment Based on Overlapping Groups Extracted by CPM In the first experiment, as a method for group extraction, CPM implemented in CFinder (www.http://cfinder.org/) was used. The groups were discovered for k=6 and for the directed and unweighted social network. CFinder extracted from 80 to 136 groups for the timeframe (avg. 112 per timeframe, Table 7.2). The time needed to extract single time window on computer 1. from Table 7.1 varied from 1minute to 20 hours, depending on the size and density of the network. The average size of the group was 19 nodes (Table 7.2), the smallest groups had size 6, because of k parameter, and the biggest one was 613 in time window 10. Time window No of nodes in network Number of Avg size of groups a group 34 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Avg Table 7.2. Results of CPM method extraction. 1585 1616 1579 1131 1067 1867 2056 1999 2351 2323 2139 1557 955 536 1626 136 128 129 82 105 96 117 123 108 119 98 125 121 80 112 15,7 17,2 16,8 17,4 13,9 23,6 23 21,6 26,8 24,8 27 16,9 11,2 9,3 19 7.2.1. GED Method As already mentioned, the GED method was implemented in T-SQL language. The method was run frequently with different value of α and β thresholds to analyse the influence of these parameters on the method, the results are presented in Table 7.3. The time needed for single run was about 6 minutes. The lowest checked value for the thresholds was set to 50%, which guarantee that at least half of the considered group was contained in the matched group. The highest possible value was of course 100% and means that the studied group is identical with the matched group. The thresholds for forming and dissolving event was set to 10% based on average group size and intuition. Average group size is 19 and average core size in this case is 8. Social position of this core is 11 what means that, with threshold 10% for forming (dissolving), groups cannot have more than 4-5 strong nodes (core nodes) or 6-7 weak nodes (nodes outside the core) existing together in one group from previous (next) timeframe in order to assign forming (dissolving) event. – calculations inclusion < 10%. for strong nodes (core nodes). Event assigned, – calculations for few strong and few weak nodes. Event not assigned, inclusion > 10%. – calculations for weak nodes (nodes outside the core). Event assigned, inclusion < 10%. %7,9197195spcore%12196197spmixed%8194197spweak Threshold Number of α β 50 50 50 60 50 70 50 80 50 90 50 100 60 50 60 60 60 70 60 80 60 90 60 100 70 50 70 60 70 70 70 80 70 90 70 100 80 50 80 60 80 70 80 80 80 90 80 100 90 50 90 60 90 70 90 80 90 90 90 100 100 50 100 60 100 70 100 80 100 90 100 100 form 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 122 dissolve shrink growth continue 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 186 204 204 202 203 199 199 190 191 187 187 181 179 179 180 177 174 165 161 172 173 170 165 157 152 172 174 171 165 154 148 176 177 173 166 154 148 180 173 157 149 154 156 177 170 152 144 148 149 176 170 156 149 150 152 169 154 137 127 128 129 169 152 132 121 123 123 167 149 127 116 117 115 127 124 124 122 122 122 124 120 119 117 117 117 123 119 113 111 111 111 120 117 111 97 96 96 120 117 111 96 91 91 120 117 111 96 91 90 35 total 1734 1678 1612 1522 1486 1468 1689 1630 1559 1462 1419 1399 1613 1549 1470 1364 1315 1293 1555 1482 1396 1272 1215 1191 1521 1443 1346 1217 1151 1126 1505 1425 1322 1188 1119 1091 split 517 464 400 311 279 261 531 475 409 314 277 259 543 486 418 317 277 259 553 495 426 324 276 257 553 494 425 324 276 257 549 491 423 323 276 257 merge 398 405 421 429 424 422 359 366 384 392 388 387 284 286 298 305 304 302 233 235 244 251 250 249 199 198 199 203 199 199 185 183 180 179 173 173 Table 7.3. The results of GED computation on overlapping groups extracted by CPM. Analogously, small groups of size 6 and average core size of 2.5 with social position 3, can contain maximum 2 weak nodes existing in the same group from previous (next) timeframe to be treated as new born (dissolved). – calculations for two strong nodes (core nodes). Event not assigned, inclusion > 10%. %176362spcore 36 – calculations for one strong node and one weak node. Event not assigned, inclusion > 10%. – calculations for two weak nodes (nodes outside the core). Event assigned, inclusion < 10%. While analysing Table 7.3, it can be observed that with the increase of α and β thresholds, the total number of events is decreasing, when α and β equals 50% the number is 1734, and with thresholds equal 100% the number is only 1091. This means that the parameters α and β can be used to filtering results, preserving events where groups are highly overlapped. Another advantage of having parameters is possibility to adjust the results to ones needs. Setting appropriate levels for α and β thresholds effects in tendency to assign particular event more often than another one. For example group G40 from timeframe T6 match group G68 from timeframe T7 with inclusions equals respectively I1(G40, G68)=82% and I2(G68, G40)=76%. Then, event assigned between considered groups depends on the value of α and β, Table 7.4. Threshold β α 50 70 60 70 70 70 80 70 90 70 70 100 50 100 60 100 70 100 80 100 100 90 100 100 Group1 Time window1 Event type Group2 Time window2 I1 I2 40 40 40 40 40 40 40 40 40 40 40 40 6 6 6 6 6 6 6 6 6 6 6 6 growing growing growing merging merging merging merging merging merging no event no event no event 68 68 68 68 68 68 68 68 68 68 68 68 7 7 7 7 7 7 7 7 7 7 7 7 82% 82% 82% 82% 82% 82% 82% 82% 82% 82% 82% 82% 76% 76% 76% 76% 76% 76% 76% 76% 76% 76% 76% 76% Table 7.4. Influence of thresholds values on assigning event type. The linear increase of threshold α causes close to linear reduction in number of merging events and slightly decrease of the number of growing events, Figure 7.1 and Figure 7.2. %116262spmixed%84162spweak s t n e v e g n i g r e m f o r e b m u N 450 400 350 300 250 200 150 37 beta = 50 beta = 60 beta = 70 beta = 80 beta = 90 beta = 100 trendline 50 60 70 80 90 100 Threshold alpha Figure 7.1. Number of merging events for different values of alpha and beta thresholds. s t n e v e g n i w o r g f o r e b m u N 190 180 170 160 150 140 130 120 110 beta = 50 beta = 60 beta = 70 beta = 80 beta = 90 beta = 100 trendline 50 60 70 80 90 100 Threshold alpha Figure 7.2. Number of growing events for different values of alpha and beta thresholds. In contrast, with linear increase of threshold β, the number of splitting events decrease in almost linear way and the number of shrinking events slightly decrease as well, Figure 7.3 and Figure 7.4. s t n e v e g n i t t i l p s f o r e b m u N 590 540 490 440 390 340 290 240 alpha = 50 alpha = 60 alpha = 70 alpha = 80 alpha = 90 alpha = 100 trendline 50 60 70 80 90 100 Threshold beta Figure 7.3. Number of splitting events for different values of beta and alpha thresholds. s t n e v e g n i k n i r h s f o r e b m u N 210 200 190 180 170 160 150 140 alpha = 50 alpha = 60 alpha = 70 alpha = 80 alpha = 90 alpha = 100 trendline 50 60 70 80 90 100 Threshold beta 38 Figure 7.4. Number of shrinking events for different values of beta and alpha thresholds. It is a consequence of the algorithm structure, raising the thresholds makes it harder to match the groups (see Figure 4.3). Furthermore, dissolving event occurs more often than forming event. The main reason is the fact that the last timeframe covers only the period of summer holidays, and as a result the email exchange is very low. This causes the groups to be small and have low density. 100%. GED method found 90 continue events when both inclusions of groups are equal to 39 7.2.2. Method by Asur et al. The method by Asur et al. was implemented in T-SQL language as well. The authors suggested to set 30% or 50% as an overlapping threshold for merge and split. In experiment threshold was set to 50%. It took more than 5.5 hours to calculate events between groups in all fourteen time windows. The total number of events found by Asur et al. method is 1526, from which 90 are continuation, 18 are forming, 29 are dissolving, 703 are merging and 686 are splitting. Such a small number of continuing events is caused by very rigorous condition, which requires for groups to remain unchanged. Small amount of forming (dissolving) events came from another strong condition, which state that none of the nodes from the considered group can exist in network at previous (following) time window. A huge number of merging (splitting) events is a result of low overlapping threshold for merge (split). However, it has to be noticed that these numbers are slightly overestimated. Method by Asur et al. allows that one pair of groups has assigned more than one type of event. This leads to anomalies presented in Figure 7.5a and in Table 7.5. Figure 7.5. Evolution of two overlapping groups. a) anomalies generated by Asur et al. method, b) simplified case, when groups are disjoint c) events assigned correctly by GED method. Community coloured red overlaps with community coloured yellow in timeframe Ti by sharing four members. In next timeframe Ti+1 community marked with red has exactly the 40 same structure, while yellow community brake up relations with three members from shared area. If these groups were disjoint, the events would be assigned without any doubt (Figure 7.5b). But they are not, and it is up to matching algorithm to deal with this situation. Intuition says that red community continue its existence, while yellow shrinks or splits into two groups, both events are correct (but not both at the same time). According to method by Asur et al. community coloured red is continuing and also merging with yellow one. In the meantime community marked with yellow splits into communities marked with yellow and red, and also merges with red community (Figure 7.5a and Table 7.5). Such a case should not appear when condition for continuing event in Asur et al. method is so rigorous. What is more, Asur et al. defined merging event as a joining members (implicitly different members) from two groups into single one, and in the situation presented above joining members are shared by both groups, so there should be no merging event at all. Possible explanation for anomalies is that method by Asur et al. is not designed for overlapping communities. Further experiments with disjoint groups should clarify this assumption (section 7.3.2.). Group1 Time window1 Event type Group2 Time window2 Overlap 13• 13• 13• 1• 1• 1• 1• 1• 1• 1• splitting splitting merging merging continuing 2• 9• 9• 9• 9• 2• 2• 2• 2• 2• 57% 57% 57% 100% 100% Table 7.5. Anomalies generated by Asur et al. method. Colours marks groups illustrated in Figure 7.5. The total number of anomalies is 128 cases, 8% of all results. More than a half of these cases are groups with split and merge event into another group at the same time. The rest of the cases are even worse, because one group has continue and split or merge event into another group simultaneously (Figure 7.5a, Table 7.5). Therefore the total number of "distinct" events found by Asur et al. is 1398. A great advantage of the method is ease of implementation. Asur et al. provided simple formulas, together with pseudo-code (section 3.2.1.), which can be implemented in any programming language. On the other hand, a big disadvantage of the method is very low flexibility. Only threshold for splitting/merging can be adjusted, all other thresholds are constant. 7.2.3. GED Method vs. Asur et al. Method As already mentioned, the computation time for Asur et al. method was more than 5.5 hours, while for GED it took less than 4 hours to calculate whole Table 7.3. The single run of GED method lasted less than 6 minutes, so it is over 50 times faster than method by Asur et al. The GED method run with thresholds equals 50% found 721 events which method by Asur et al. has not. Such a big lack in results obtained with Asur et al. method is caused mostly by rigorous conditions for assigning events and almost no flexibility of the method. From the other hand Asur et al. method found 399 events which GED method run with thresholds 50% has not. However, it is not treated as a lack in GED's results because all these events have both inclusions below 50%, therefore GED algorithm skips them in purpose (because of thresholds value). To prove this, GED method was run with thresholds equal 10% and this time none of events found by Asur et al. method were skipped by GED method. 41 Furthermore, Asur et al. did not introduced shrinking and growing events, which effects in assigning splitting and merging events or, in the worst case, missing the event, Figure 7.6. When two groups in successive time windows differ only by one node they will not be treated as continuation (since the overlapping is below 100%) and might not be treated as merging (splitting) if there does not exist another group fulfilling the requirements for merging (splitting). Such a case is not possible in GED method, which through the change of inclusion thresholds allows to adjust the results to user's needs. As demonstrated in Figure 7.6a, the community at timeframe Ti+1 has three members, who not belongs to the group at timeframe Ti. Additionally, the members are not present at timeframe Ti in any other group what, results in omitting the event by Asur et al. method despite the fact that overlapping is 63%. In case when mentioned members are present at timeframe Ti in any group (Figure 7.6b) the method assigns merging event, which in this case is not perfect but still better than nothing. In the situation presented in Figure 7.6a GED method assigns growing event (Figure 7.6c) and in the second considered case GED decides based on the size of the groups at timeframe Ti and social position of their members in the community at the following timeframe Ti+1. In this case GED assigned growing event to bigger group and merging event to smaller one (Figure 7.6d), however if the groups would be more equal or core of the group at timeframe Ti+1 would come from the pink group (smaller one) then GED method would assign merging event to both groups at timeframe Ti. Figure 7.6. Lack of the growing event in method by Asur et al. Lastly, GED method is free of anomalies occurs in Asur et al. method. While algorithm by Asur et al. is assigning multiple events between two groups (Figure 7.5a), GED method assigns correct events (Figure 7.5c). In the exampled picture method assigned shrinking event between yellow communities because core of the group (the most important members) stayed in the group. If the members who left the group had higher social position than rest of the group, then algorithm would assigned splitting event, which is also correct in this situation. In most cases events assigned by both methods are the same, however stated analysis proves that GED method is not only faster but also more accurate and much more flexible than method by Asur et al. 42 7.2.4. Method by Palla et al. The method delivered by Palla et al. was also implemented in T-SQL language, but it required more preparations with data set than method by Asur et al. Apart from extracting groups in all time windows, another group extraction was needed. The data from two consecutive timeframes were merged into single graphs, from which groups were extracted with CPM method. As easy to count, group extraction had to be calculated additional thirteen times, some of them took only five minutes to calculate, but there were also those that lasted up to two days. Palla et al. designed method in order to catch all matched pairs of groups, even if they overlap in the slightest way, sharing only one node. The great advantage of this approach is that no event will be ignored. However, if one takes into account the fact, that Palla et al. only showed which event types may occur (and did not provide the algorithm to assign them), analysis of the group evolution during its life is very difficult and cumbersome. Each case of assigning event must be considered individually and with a huge number of possibilities it is very hard to find key match. On average one group from joint graph contains five groups from single timeframes, what gives not less than three and up to six possibilities of matching the groups. Data in Table 7.6 presents groups extracted from the single timeframes T8 and T9 contained in the group G19 extracted from the joint graph T8,9. Three of the groups are from timeframe T8 and another three from T9, therefore groups can be matched on nine different ways, Table 7.7. Group Time Joins Time id 68 83 102 23 26 49 window 8 8 8 9 9 9 id 19 19 19 19 19 19 windows 8-9 8-9 8-9 8-9 8-9 8-9 Table 7.6. Groups from the single timeframes T8 and T9 contained in the group G19 extracted from the joint graph T8,9. Group1 Time window1 Group2 Time window2 Overlap 68 68 68 83 83 83 102 102 102 8 8 8 8 8 8 8 8 8 23 26 49 23 26 49 23 26 49 9 9 9 9 9 9 9 9 9 13% 8% 53% 6% 69% 8% 0% 50% 4% Table 7.7. All possibilities of matching groups presented in Table 7.6. In bold the highest overlapping for each group from time window1. Then pairs can be sorted based on overlap in descending order and only the highest overlap for each group is taken. In Table 7.8 green colour marks final matching, each group from timeframe T8 has assigned one group in T9. Colour red marks the group from timeframe T9 which is not assigned to any of the groups from previous timeframe. Authors of the method did not describe how to treat groups like this. Moreover, Palla et al. in did not explain how to choose best match for the community, which in the next timeframe has the highest overlapping value with two different groups. The authors only defined case when there is single highest overlapping for each group. 43 Group1 Time window1 Group2 Time window2 Overlap 83 68 102 68 83 68 83 102 102 8 8 8 8 8 8 8 8 8 26 49 26 23 49 26 23 49 23 9 9 9 9 9 9 9 9 9 69% 53% 50% 13% 8% 8% 6% 4% 0% Table 7.8. Final matching of groups based on the highest overlap. Groups marked with green are matched, G23 marked with red is not assigned to any group from previous timeframe. The total number of matched pairs found by Palla et al. method is 9797, from which 4183 pairs have overlap higher than 0%. The authors did not specify how to interpret the groups matched with overlap equal 0%, but intuition suggests to omit these records, since they do not share any nodes. There are 90 cases when matched pairs have overlap equal 100%, which corresponds to continuation event in Asur et al. method. 7.2.5. GED Method vs. Palla et al. Method As noted before, the method by Palla et al. needed additional preparations to run the experiment, which lasted almost week, therefore GED method, despite the fact that it requires calculated social position, is incomparable faster. Great advantage of method by Palla et al. is catching all matched pairs of groups. As in case when comparing GED method with algorithm by Asur et al., Palla et al. method found more matched pairs than GED method run with thresholds equal 50%. Again, it is not treated as a lack in GED's results since all these events have both inclusions below 50%, Table 7.9. To confirm that, results obtained with GED on thresholds equal 10% were compared, and this time all matched pairs found by Palla et al. method have both inclusions below 10%. What is more, GED method found 308 events which method by Palla et al. has not. These events are forming and dissolving. Group1 Time window1 Group2 Time window2 Overlap I1 I2 65 44 78 81 72 117 91 1 6 12 9 10 3 9 115 78 94 54 96 23 3 2 7 13 10 11 4 10 45% 40% 31% 20% 13% 7% 1% 40% 19% 13% 11% 2% 11% 10% 25% 46% 27% 7% 11% 0% 0% Table 7.9. Events found with method by Palla et al. omitted by GED method because of low inclusions values. 44 Another problem with Palla et al. method is lack of algorithm for assigning events. It is very difficult and time consuming to determine event for the group in the next timeframe, not to mention all fourteen, Table 7.6, Table 7.7, Table 7.8. So, the GED method with its fully automatic algorithm for assigning events is much more useful and convenient. Summing up, GED method is beyond compare when it comes to execution time, it is also definitely more specific in assigning events and therefore much more effective for tracking group evolution. Method by Palla et al. was helpful only to check if GED method found all events between groups. Additionally, Palla et al. method requires usage of CPM method which is big disadvantage because it cannot be utilized with other community extraction method, while GED method may be applied for any existing group extraction algorithms. 7.3. Experiment Based on Disjoint Groups Extracted by Blondel In the second experiment Blondel et al. method was used for community detection. The algorithm is implemented for example in a Workbench for Network Scientists (NWB). The groups were discovered, again, for the directed and unweighted social network. NWB extracted from 46 to 209 groups for the timeframe (average 88 per timeframe, Table 7.10). Algorithm by Blondel et al. works very fast, time required to extract single time window on computer 1. from Table 7.1 was below 30 seconds. All timeframes were extracted in less than 7 minutes. The average size of the group this time was 64 nodes (Table 7.10), the smallest groups had size 2, and the biggest one was 750 in time window 8. Time window No of nodes in network Number of Avg size of groups a group 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Avg 4479 4502 4382 4456 4527 4856 4893 4950 4965 4904 4870 4771 4670 4414 4689 55 82 95 117 103 72 64 64 47 57 61 73 139 210 89 82,9 55,6 46,6 38,4 44,4 68,4 77,7 78,6 108 87,6 81,2 66,3 33,8 21,1 63,6 Table 7.10. Results of Blondel et al. method extraction. 7.3.1. GED Method. As previously for data grouped with CPM method, the GED method have been run with different value of α and β thresholds, the results are presented in Table 7.11. The time needed for single run was about 13 minutes. The thresholds for the forming and dissolving event was again set to 10%. Threshold Number of 45 α β form dissolve shrink growth continue merge total 1231 50 50 1192 50 60 1150 50 70 1105 50 80 1046 50 90 1010 50 100 1198 60 50 1158 60 60 1110 60 70 1063 60 80 1003 60 90 963 60 100 1174 70 50 1129 70 60 1076 70 70 1025 70 80 955 70 90 907 70 100 1139 80 50 1087 80 60 1025 80 70 968 80 80 885 80 90 831 80 100 1092 90 50 1036 90 60 967 90 70 899 90 80 788 90 90 721 90 100 1068 100 50 1009 100 60 938 100 70 868 100 80 737 100 90 100 100 663 Table 7.11. The results of GED computation on disjoint groups extracted by Blondel et al. split 411 378 338 294 250 224 417 383 338 294 250 218 429 396 345 299 245 204 436 402 350 304 235 191 442 407 355 310 228 178 439 404 352 307 228 178 167 161 156 153 143 143 166 159 155 151 140 140 164 158 154 150 139 138 165 158 152 147 140 140 172 161 152 139 130 131 168 154 144 129 110 109 269 275 280 283 293 293 237 244 247 251 262 262 216 219 221 225 236 237 180 178 176 177 184 184 126 124 118 116 114 113 106 104 97 95 83 80 187 181 179 178 164 154 181 176 174 171 156 148 169 163 164 159 144 137 162 157 156 151 138 128 157 153 152 146 133 116 160 156 155 149 133 114 135 135 135 135 134 134 135 134 134 134 133 133 134 131 130 130 129 129 134 130 129 127 126 126 133 129 128 126 121 121 133 129 128 126 121 120 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 23 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 39 method. The total number of events found with thresholds equal 50% was 1231, and with thresholds equal 100% only 663. This indicates that parameters α and β influence on number of events found even more than in case of CPM method. The linear relationship between increase of α threshold and reduction in number of merging and growing events is preserved, Figure 7.7 and Figure 7.8. s t n e v e g n i g r e m f o r e b m u N 300 250 200 150 100 50 46 beta = 50 beta = 60 beta = 70 beta = 80 beta = 90 beta = 100 trendline 50 60 70 80 90 100 Threshold alpha Figure 7.7. Number of merging events for different values of alpha and beta thresholds. s t n e v e g n i w o r g f o r e b m u N 180 170 160 150 140 130 120 110 100 beta = 50 beta = 60 beta = 70 beta = 80 beta = 90 beta = 100 trendline 50 60 70 80 90 100 Threshold alpha Figure 7.8. Number of growing events for different values of alpha and beta thresholds. The linear relationship between increase of β threshold and reduction in number of splitting and shrinking events is also preserved, Figure 7.9 and Figure 7.10. s t n e v e g n i t t i l p s f o r e b m u N 450 400 350 300 250 200 150 alpha = 50 alpha = 60 alpha = 70 alpha = 80 alpha = 90 alpha = 100 trendline 50 60 70 80 90 100 Threshold beta Figure 7.9. Number of splitting events for different values of beta and alpha thresholds. s t n e v e g n i k n i r h s f o r e b m u N 190 180 170 160 150 140 130 120 110 alpha = 50 alpha = 60 alpha = 70 alpha = 80 alpha = 90 alpha = 100 trendline 50 60 70 80 90 100 Threshold beta 47 Figure 7.10. Number of shrinking events for different values of beta and alpha thresholds. Opposed to the experiment with CPM method, this time dissolving event occurred less times than forming event. The reason is design of method by Blondel et al., which detects groups consisting even of only two members. Therefore it is hard for group to vanish completely. Unless the threshold is set above 50%, slightly changes by few percent will not generate more forming/dissolving events. GED method found 120 continue events when both inclusions of groups are equal to 100%, which corresponds to continuation event in Asur et al. method. The experiment confirmed that GED method can be successfully used for both, overlapping and disjoint groups. If one needs overlapping groups for a small network then 48 CPM can be used, but if one needs to extract groups very fast and for a big network then the method proposed by Blondel et al. can be utilized. That is a big advantage because most methods can be used only for either overlapping or disjoint groups. 7.3.2. Method by Asur et al. The method provided by Asur et al. needed almost 6 hours to calculate events between groups in all fourteen time windows. The overlapping threshold for merging and splitting events was again set to 50%. The total number of events found by Asur et al. method is 747, from which 120 are continuation, 23 are forming, 16 are dissolving, 255 are merging and 333 are splitting. As previously, small number of continuing, forming, and dissolving events is caused by too rigorous conditions. In turn, great number of merging (splitting) events is a result of low overlapping threshold for merge (split) and lack of growing (shrinking) event. In contrast to previous experiment, the number of events found on data grouped by Blondel et al. method is not overestimated. This time method by Asur et al. has not generate any anomalies, what confirms the assumption that the method is designed for disjoint groups. in experiment with disjoint groups. All other outcomes from experiment conducted on overlapping groups were confirmed 7.3.3. GED Method vs. Asur et al. Method GED method needed less than 8 hours to calculate whole Table 7.11, while one run of Asur et al. method was almost 6 hours. Single run of GED method was only 13 minutes, so it is still much faster than method by Asur et al. The GED method run with thresholds equals 50% found 613 events which method by Asur et al. has not. Again, big lack in results obtained with Asur et al. method is caused mostly by rigorous conditions for assigning events and almost no flexibility of the method. Like in case of CPM method, Asur et al. method found events which GED method skipped because of thresholds value. Reducing the thresholds effected in not omitting mentioned groups. for overlapping as well as for disjoint methods of grouping social network. Provided considerations confirms that GED method is better than Asur et al. method 7.4. Experiment Based on Different User Importance Measures In the last experiment GED method was run: (1) with degree centrality measure instead of social position measure and (2) without any measure, in order to investigate influence of the measure on calculations of inclusion values and also on results of the method. Like in case of the first experiment, overlapping groups extracted with CPM were used. The results obtained with degree centrality as a measure of user importance and results derived without any measure are very similar to the results obtained with social position measure, Table 7.12. Measure Execution time [min] Social Position Degree Centrality No measure 6 5:55 5:30 Events found 1470 1447 1483 Threshold β α 70 70 70 70 70 70 Table 7.12. Results of GED method with different user importance measures. 49 Execution time for GED with degree centrality was slightly better than for GED with social position because degree centrality value is given as a integer, while the type for social position value is float. Summing integers is faster than summing floats, thus the difference. Of course the best execution time was for GED without a measure as a effect of less calculations needed to proceed. Although, the number of events found in all three cases is more or less the same, it can be observed that GED without user importance measure found more events than GED with any of the measures. It is a consequence of the inclusion formula (see equation 4.2) which consists of two fractions The second fraction is always present, whether GED is run with or without user importance measure, but the first one occurs only when a measure is used. Therefore when calculating inclusions of two groups with a measure, it is almost always lower than without any measure. The exceptions are groups where inclusions are equal 100% and groups which do not share any nodes (inclusions equals 0%). And here comes the question again: why GED uses a measure of user importance, since it is obvious that it will lower the inclusion? The answer already provided in Section 4.2 this time is supported by clear evidences. Figure 7.11. Events assigned by GED method with different user importance measures. a) GED with social position measure, red colour marks the core of the group b) GED with degree centrality c) GED without a measure. 50 As illustrated in the example in Figure 7.11, two communities G46 and G47 from timeframe T6 overlaps by five members and both groups have the same size – seven members. In the next timeframe T7 there is only one group G18 which consists of all members from the group G47 from the previous timeframe, and one new member. Two members from the community G46 vanished in the following time window. GED method run with social position measure assigned growing event to the community G47 and merging event to the group G46. GED method run with degree centrality measure also assigned merging event to the group G47, but did not assign any event to the community G46. Finally, GED without any user importance measure assigned growing events to both groups from timeframe T6. To have a closer look into the first case, social position of members is presented in Table 7.13. It is clearly visible that the core of the blue group from timeframe T6 is identical to the core of the blue group from the next time window T7. The situation is marked with red colour in the Figure 7.11a and with red dots in the Table 7.13. Additionally, members occurring in all the groups are marked green. Now it is obvious that GED with social position measure assigned growing event to group G47 because it is almost identical to group G18, and "only" merging event to group G46 because the cores of both groups have nothing in common. It has to be mentioned once again that, thanks to the user importance measure, GED method takes into account both the quantity and quality of the group members providing very accurate and specified results. Group Time window Node SP Rank 46 46 46 46 46 46 46 47 47 47 47 47 47 47 18 18 18 18 18 18 18 18 6 6 6 6 6 6 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 7 1443 3145 7564 1326 11999 14151 1,48 1,33 0,96 0,86 0,85 0,77 0,75 621 1,31 2066• 1,30 7328• 1,28 7564• 11999• 1,04 0,80 1326 0,67 14151 0,60 621 1,49 2066• 1,35 7328• 1,29 7564• 11999• 1,24 0,75 1326 0,71 14151 0,66 0,51 621 4632 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 8 Table 7.13. Social position of members presented in Figure 7.11a. GED method run with degree centrality measure was even more strict in the studied case, Figure 7.11b. Low degree centrality within the group G46 causes that no event was assigned. In turn, similar structure between groups G47 and G18 effects in assigning merging event. Structure of all groups and degree centrality of all members is presented in Table 7.14. Again, green colour marks members occurring in all groups. Group Time window Node DC Rank 51 46 46 46 46 46 46 46 47 47 47 47 47 47 47 18 18 18 18 18 18 18 18 6 6 6 6 6 6 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 7 11999 14151 1443 3145 7564 1326 621 2066 7328 7564 11999 1326 14151 621 7564 7328 2066 11999 1326 14151 621 4632 3 3 2 2 2 2 2 5 5 4 4 4 3 3 7 5 5 5 5 4 4 3 1 1 3 3 3 3 3 1 1 3 3 3 6 6 1 2 2 2 2 6 6 8 Table 7.14. Degree centrality of members presented in Figure 7.11a. Figure 7.11c expresses in the best way how GED method without a user importance measure understands the communities. There is no core, all members are equal and relations between them are not considered at all. Such simplification causes that events assigned to the groups are not the most adequate to situation (but only when comparing with events assigned by GED with user importance measure). Having only information about members in the groups, not about their relations, events are assigned correctly. So, if researchers investigating group evolution are not interested in groups structure and relations between members, a simpler and faster version of GED method may be successfully used. However, if there is enough time and possibility to calculate any user importance measure, it is recommended to use GED method in the original version. 52 8. Conclusions and Future Work The number of social systems in which people are communicating with each other is rising at an unprecedented rate. That creates endless need to analyse them. One part of such analysis is communities detection and investigation of their evolution over time in order to understand the mechanisms governing the development and variability of social groups. The research in area of extracting social groups showed that dozens of methods are existing, and depending on the characteristic of the social network one or several of them can be successfully used to detect groups. As Section 7.3 shows, methods based on fast modularity are much faster than methods based on cliques for detecting groups from large datasets. The problem was formulated in the research question no. 1. Thereby, groups are prepared for further analysis in which their tendencies and behaviour may be studied. To do so, proper methods or techniques are required. The research in this area revealed gap in the knowledge since the existing methods are either computational too expensive or too less accurate or simply not able to explore basic types of social networks such as overlapping networks and disjoint networks. To meet most demanding needs of researchers facing problem of tracking changes in community life the new method called GED (Group Evolution Discovery) was proposed and evaluated in this thesis. Answering the research question no 2. whole process of tracking evolution is described in Section 4.3. Based on the information about social network at succeeding intervals of time, especially based on the social position of members within communities extracted from these networks method assigns events to the groups indicating changes. A set of the events assigned to a single community throughout several timeframes represents the history of evolution of this group. Such history allows to study birth (forming), death (dissolving), splitting and merging, shrinking and growing, and finally stagnation (continuing) of the community, which are the most common event types occurring in social group evolution – the research question no. 3.  be accurate – catch all possible evolutions of a group,  be flexible – allows to adjust method to the ones needs,  work fast and with low computational costs,  be easily in implementation,  be intuitive. The results of experiments and comparison with the existing methods for discovering changes in community life (Section 7) leads to the conclusion that desired features were achieved exemplary, and the new method may become one of the best method for tracking group evolution. In order to answer research question no. 4, two experiments based on both types of groups were conducted and Sections 7.2 and 7.3 presents results obtained with various methods for tracking group evolution. More specifically, GED method is incredibly faster and flexible than methods by Palla et al. and by Asur et al. Additionally, GED method is more accurate than method by Asur et al. and much more specific when it comes to naming changes of a group than method by Palla et al. Experiments conducted on Asur et al. method (Section 7.2.2 and Section 7.3.2) showed that this method is barely flexible and therefore skips evolutions, what disqualifies the method for any studies regarding group evolutions. Furthermore, the method generates anomalies, when working on overlapping groups, which implies that method is designed for working only on disjoint groups – the research question no. 5. Other investigated aspects: computation cost, ease of implementation and execution time, came out promising, however in comparison with GED method they were much worst. The requirements for the new method were substantial, the method had to: 53 Experiment run with Palla et al. method (Section 7.2.4) demonstrated that great idea and unique design of the method are wasted by the lack of formula for assigning events and by few smaller ambiguities in the method. Despite the fact that method by Palla et al. is computationally extremely expensive and can be use only on groups extracted by CPM, the method is still considered the best algorithm tracking evolution for overlapping groups – the research question no. 5. Although, straight comparison with GED method revealed that method by Palla et al. is very cumbersome and useful only to test accuracy of GED method. The last experiment demonstrates usefulness of the social position measure and convinces that GED method should be always run with user importance measure in order to fully benefit all features of the algorithm. Summing up, the GED method was designed to be as much flexible as possible and fitted to both, overlapping and disjoint groups but also to have low and adjustable computational complexity. The GED method, described and analysed in this paper, uses not only the group size and comparison of groups members, but also takes into account their position and importance in the group to determine what happened with the group. The first results of GED method were presented in [70] and [71]. Next, more exhaustive analysis was conducted within this thesis, but the method is still in the development phase. In the next step method will be extended by migration event, which focuses on the core of the group (the most important members – leaders) and tracks whether members outside the core followed the leaders or not. Acknowledgement This work was supported by MSc. Piotr Bródka, Ph.D. Przemysław Kazienko – Wrocław University of Technology, Institute of Informatics and Social Network Group – Wrocław University of Technology. 54 55 9. References [1] Adamcsek B., Palla G., Farkas I. J., Derényi I., and Vicsek T. CFinder: Locating cliques and overlapping modules in biological networks. Bioinformatics 22, 2006, 1021-1023. [2] Agarwal N., Galan M., Liu H., and Subramanya S., WisColl: Collective Wisdom based Blog Clustering. Information Sciences, vol. 180, no. 1, 2010, 39-61. [3] Ahlawat R., Market Penetration: One percent to 5 percent of target audience. Hype Cycle for Wireless Networking, 2006. [4] Amaral L. A. N., Scala A., Barthelemy M., and Stanley H. E., Classes of small–world networks. In Proceedings of the National Academy of Sciences, USA, vol. 97, 2000, 11149-11152. [5] Asur S., Parthasarathy S., and Ucar D., An event-based framework for characterizing the evolutionary behaviour of interaction graphs. ACM Trans. Knowl. Discov. Data. 3, 4, Article 16, November 2009, 36 pages. [6] Blondel V. D., Guillaume J-L., Lambiotte R., and Lefebvre E., Fast unfolding of communities in large networks. Journal of Statistical Mechanics, P10008, 2008. [7] Carrington P. J., Scott J., and Wasserman S., Models and Methods in Social Network Analysis. Eds. Cambridge University Press, 2005. [8] Cattell V., Poor people, poor places, and poor health: the mediating role of social networks and social capital. Social Science and Medicine, vol. 52, no. 10, 2001, 1501- 1516. [9] Chakrabarti D., Kumar R., and Tomkins A., Evolutionary Clustering. In KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (ACM, New York, NY, USA), 2006, 554-560. [10] Charron C., Favier J., and Li C., Social Computing: How Networks Erode Institutional Power, and What to Do about It. Forrester Customer Report, 2006. [11] Cheng X., Dale C., and Liu J., Statistics and social networking of ,YouTube videos. In Proceedings of the 16th International Workshop on Quality of Service, IEEE, 2008, 229- 238. [12] Chiu P. Y., Cheung C. M. K., and Lee M. K. O., Online Social Networks: Why Do "We" Use Facebook?. In Proceedings of the First World Summit on the Knowledge Society, Communications in Computer and Information Science, vol. 19, Springer, 2008, 67-74. [13] Clauset A., Newman M. E. J., and Moore C., Finding community structure in very large networks. Phys. Rev. E 70, 066111, 2004. [14] Coleman J. S., An Introduction to Mathematical Sociology. London, UK, Collier- Macmillan, 1964. [15] Derényi I., Palla G., and Vicsek T., Clique percolation in random networks. Phys. Rev. Lett. 94, 160202, 2005. [16] Donetti L., and Muñoz M. A., Detecting network communities: a new systematic and efficient algorithm. Journal of Statistical Mechanics P10012, 2004. [17] Ellison N. B., Steinfield C., and Lampe C., The benefits of Facebook "friends:" Social capital and college students' use of online social network sites. Journal of Computer- Mediated Communication, vol. 12, no. 4, article 1, 2007. [18] Fortunato S., Community detection in graphs. Physics Reports, Volume 486, Issues 3-5, February 2010, 75-174. 56 [19] Freeman L. C., The Development of Social Network Analysis: A Study in the Sociology of Science. BookSurge Publishing, 2004. [20] Garton L., Haythorntwaite C., and Wellman B., Studying Online Social Networks. Journal of Computer-Mediated Communication, vol. 3, no. 1, 1997, 75-105. [21] Girvan M., and Newman M. E. J., Community structure in social and biological networks. In Proceedings of the National Academy of Sciences, USA, vol. 99, no. 12, 2002, 7821- 7826. [22] Gliozzo A. M., Bonafede C. E., and D'agata A., State of the art in social network analysis and its applications to the BONy's use case. BONy project, 2009. [23] Golbeck J., and Hendler J., FilmTrust: movie recommendations using trust in web-based social networks. In Proceedings of Consumer Communications and Networking Conference, IEEE Conference Proceedings, vol. 1, 2006, 282-286. [24] Granovetter M., The strength of weak ties: Network theory revisited. American Journal of Sociology, 78, 1973, 279-288. [25] Hanneman R., and Riddle M., Introduction to social network methods. Published in digital form at http://faculty.ucr.edu/~hanneman/, Riverside, CA: University of California, 2005. [26] http://cfinder.org/. [27] http://en.wikipedia.org/wiki/Social_network – 2011.05.30. [28] Huberman B., Romero D., and Wu F., Social networks that matter: Twitter under the microscope. First Monday, 2009, 1-5. [29] Huisman M., and van Duijn M. A. J., Software for Social Network Analysis. In Models and Methods in Social Network Analysis, Carrington, P. J., Scott, J., and Wasserman, S. Eds. Cambridge University Press, 2005, 270-316. [30] Jung J. J., Juszczyszyn K., and Nguyen N. T., Centrality Measurement on Semantically Multiplex Social Networks: Divide-and-Conquer Approach. International Journal of Intelligent Information and Database Systems, vol. 1, no. 3/4, 2007, 277-292. [31] Kazienko P., and Musiał K., Sieci Społeczne i Analiza Sieci. Available: http://www.zsi.pwr.wroc.pl/~sna/prezentacje/SN_SNA_25.10.2007.pdf [32] Kazienko P., Musial K., and Kajdanowicz T., Multidimensional Social Network and Its Application to the Social Recommender System. IEEE Transactions on Systems, Man and Cybernetics - Part A: Systems and Humans, March 2011. [33] Kazienko P., Ruta D., and Bródka P., The Impact of Customer Churn on Social Value Dynamics. International Journal of Virtual Communities and Social Networking, vol. 1, no. 3, 2009, 60-72. [34] Kim M.-S., and Han J., A Particle and Density Based Evolutionary Clustering Method for Dynamic Networks. In Proceedings of 2009 International Conference on Very Large Data Bases, Lyon, France, 2009. [35] Kottak C. P., Cultural Anthropology. New York, USA, McGraw-Hill, 2004. [36] Krebs V., The Social Life of Routers. Internet Protocol Journal, 3, December 2000, 14-25. [37] Kullback S., and Leibler R. A., On Information and Sufficiency. Annals of Mathematical Statistics 22, 49, 1951. [38] Lancichinetti A., and Fortunato S., Community detection algorithms: A comparative analysis. Phys. Rev. E 80, 056117, 2009, 11 pages. [39] Lancichinetti A., Fortunato S., and Kertész J., Detecting the overlapping and hierarchical community structure in complex networks. New Journal of Physics 11, 033015, 2009. 57 [40] Lazega E., The Collegial Phenomenon. The Social Mechanism of Co–operation Among Peers in a Corporate Law Partnership. Oxford, Oxford University Press, 2001. [41] Lin Y.-R., Chi Y., Zhu S., Sundaram H., and Tseng B. L., FacetNet: A Framework for Analyzing Communities and Their Evolutions in Dynamic Networks. In WWW '08: Proceedings of the 17th international conference on the World Wide Web (ACM, New York, NY, USA), 2008, 685-694. [42] Montgomery J., Social Networks and Labor-Market Outcomes: Toward an Economic Analysis. American Economic Review 81, vol. 5, 1991, 1407-1418. [43] Moody J., and White D. R., Structural cohesion and embeddedness: A hierarchical concept of social groups. American Sociological Review. 68(1), 2003, 103. [44] Morris M., Sexual network and HIV. AIDS, vol. 11, 1997, 209-216. [45] Musiał K., Kazienko P., and Bródka P., User position measures in social networks. In Proceedings of the 3rd Workshop on Social Network Mining and Analysis (SNA-KDD '09). ACM, New York, NY, USA, , Article 6 , 9 pages, 2009. [46] Newman M. E. J., and Girvan M., Finding and evaluating community structure in networks. Phys. Rev. E 69, 026113, 2004. [47] Newman M. E. J., and Leicht E. A., Mixture models and exploratory analysis in networks. Proceedings of the National Academy of Sciences of the United States of America, 104(23), 2007, 9564-9569. [48] Newman M. E. J., The structure of scientific collaboration networks. In Proceedings of the National Academy of Sciences, USA, vol. 98, 2001, 404-409. [49] NWB Team. (2006). Network Workbench Tool. Indiana University, Northeastern University, and University of Michigan, http://nwb.slis.indiana.edu [50] Otte E., and Rousseau R., Social network analysis: a powerful strategy, also for the information sciences. Journal of Information Science 28, 2002, 441. [51] Pagel M., Erdly W., and Becker J., Social networks: we get by with (and in spite of) a little help from our friends. Journal of Personality and Social Psychology, vol. 53, no. 4, 1987, 793-804. [52] Palla G., Barabási A. L., and Vicsek T., Quantifying social group evolution. Nature 446, 2007, 664-667. [53] Palla G., Barabási A. L., and Vicsek T., Quantifying social group evolution. Supplementary information. Nature 446, 2007. [54] Palla G., Derényi I., Farkas I., and Vicsek T., Uncovering the overlapping community structure of complex networks in nature and society. Nature 435, 2005, 814-818. [55] Radicchi F., Castellano C., Cecconi F., Loreto V., and Parisi D., Defining and identifying communities in networks. PNAS, vol. 101 , 2 March 2004, 2658-2663. [56] Rémy C., Frédéric A., and Chihab H., Detection of overlapping communities in dynamical social networks. In Proceedings of the 2010 IEEE International Conference on Social Computing, Minneapolis, USA, 2010. [57] Robins G. L., and Alexander M., Small Worlds Among Interlocking Directors: Network Structure and Distance in Bipartite Graphs, Computational & Mathematical Organization Theory, vol. 10, no. 1, Kluwer Academic Publisher, 2004, 69-94. [58] Ronhovde P., and Nussinov Z., Local resolution-limit-free Potts model for community detection. Phys. Rev. E 80, 016109, 2009. 58 [59] Rosvall M., and Bergstrom C. T., An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences USA 104, 2007, 7327-7331. [60] Rosvall M., and Bergstrom C. T., Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences USA. 105, 2008, 1118-1123. [61] Scott J., Social Network Analysis: A Handbook. London, UK, SAGE Publications, 2000. [62] Stark D., and Vedres B., Social times of network spaces: Network sequences and foreign investment in Hungary. (No. 2005-06-023). Santa Fe, NM: Santa Fe Institute, 2005. [63] Sun J., Faloutsos C., Papadimitriou S., and Yu P. S., GraphScope: Parameter-free Mining of Large Time-evolving Graphs. In KDD '07: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining 103 (ACM, New York, USA), 2008, 687-696. [64] Traud A. L., Kelsic E.D ., Mucha P. J., and Porter M. A., Community structure in online collegiate social networks. Eprint arXiv:0809.0690, 2009. [65] Tyler J. R., Wilkinson D. M., and Huberman B. A., Email as spectroscopy: Automated In Communities and discovery of community structure within organizations. Technologies, Kluwer, B. V., Deventer E., The Netherlands, 2003, 81-96. [66] Van Dongen S., Performance criteria for graph clustering and Markov cluster experiments. Ph.D. thesis, Dutch National Research Institute for Mathematics and Computer Science, University of Utrecht, Netherlands, 2000. [67] Wasserman S., and Faust K., Social network analysis: Methods and applications. New York: Cambridge University Press, 1994. [68] Watts D. J., and Strogatz S., Collective dynamics of 'small-world' networks. Nature, vol. 393, 1998, 440-444. [69] Wellman B., Salaff J., Dimitrova D., Garton L., Gulia M., and Haythornthwaite C., Computer Networks as Social Networks: Collaborative Work, Telework, and Virtual Community. Annual Review of Sociology, vol. 22, no. 1, 1996, 213-238. [70] Bródka P., Saganowski S., and Kazienko P., Group Evolution Discovery in Social Networks. ASONAM 2011, The 2011 International Conference on Advances in Social Network Analysis and Mining, Kaohsiung, Taiwan, 25-27 July 2011, IEEE Computer Society, 2011. [71] Bródka P., Saganowski S., and Kazienko P., Tracking Group Evolution in Social Networks. SocInfo 2011, The Third International Conference on Social Informatics, Singapore, 6-8 October 2011. Under review.
1205.3212
1
1205
2012-05-14T22:57:15
SportSense: Real-Time Detection of NFL Game Events from Twitter
[ "cs.SI", "physics.soc-ph" ]
We report our experience in building a working system, SportSense (http://www.sportsense.us), which exploits Twitter users as human sensors of the physical world to detect events in real-time. Using the US National Football League (NFL) games as a case study, we report in-depth measurement studies of the delay and post rate of tweets, and their dependence on other properties. We subsequently develop a novel event detection method based on these findings, and demonstrate that it can effectively and accurately extract game events using open access Twitter data. SportSense has been evolving during the 2010-11 and 2011-12 NFL seasons and is able to recognize NFL game big plays in 30 to 90 seconds with 98% true positive, and 9% false positive rates. Using a smart electronic TV program guide, we show that SportSense can utilize human sensors to empower novel services.
cs.SI
cs
SportSense: Real-Time Detection of NFL Game Events from Twitter Technical Report TR0511-2012 Siqi Zhao* Lin Zhong* Jehan Wickramasuriya§ Venu Vasudevan§ Robert LiKamWa* Ahmad Rahmati* *Department of Electrical & Computer Engineering, Rice University, Houston, Texas, USA §Betaworks, Applied Research Center, Motorola Mobility, Libertyville, Illinois, USA ABSTRACT We report our experience in building a working system, SportSense, which exploits Twitter users as human sensors of the physical world to detect events in real-time. Using the US National Football League (NFL) games as a case study, we report in-depth measurement studies of the delay and post rate of tweets, and their dependence on other properties. We subsequently develop a novel event detection method based on these findings, and demonstrate that it can effectively and accurately extract game events using open access Twitter data. SportSense has been evolving during the 2010-11 and 2011-12 NFL seasons and is able to recognize NFL game big plays in 30 to 90 seconds with 98% true positive, and 9% false positive rates. Using a smart electronic TV program guide, we show that SportSense can utilize human sensors to empower novel services. 1. Introduction Twitter has over 200 million users, who can be can be collectively regarded as human sensors that provide quick, brief output for whatever motivates them to tweet. Many have attempted to interpret the output of these human sensors, including efforts that detect major social and physical events such as earthquakes [1], celebrity deaths [2], and presidential elections [3]. However, these work have significant delays and usually perform their processing off-line. In this work, we answer a complementary question: how good are these human sensors for the real-time detection of less significant but more frequent events, such as those happening in a nationally televised sports game? The insights gained from answering this question will fuel novel applications that leverage the human sensors in real-time. For example, TV program guide can be enhanced with real- time game information before ESPN discloses game scores, as we will show in Section 6. We envision other applications as well, such as reporting traffic accidents. the above question, we make To answer three (i) We contributions: present a first-of-its-kind measurement study of the key sensing properties of human sensors, i.e., delay and post rate, and their dependency on other properties such as device being used, user activeness, and the length of tweets. We find that tweets from different user categories had different properties in terms of delay and post rate. (ii) We leverage these properties to devise a novel detection algorithm that employs matched filter 1 detector and form different event templates for these three (iii) Finally, we fundamental categories of tweets. implement the solutions to improve an in-house built web service, http://sportsense.us, to analyze tweets collected during US National Football League (NFL) games to detect big plays, such as scoring events and turnovers, tens of seconds after they happen. SportSense has been continuously operational for the past two NFL seasons, providing game information to NFL fans through web browser as well as its API, usually faster than EPSN website updates. While SportSense was built for and tested through NFL games, its techniques can be readily applied to other sports games and even TV shows that have a similarly sized fan population and similar frequencies of major events, e.g., soccer, baseball, and reality shows. The keyword-based tweet retrieval method adopted by SportSense allows it to be easily revised for detecting other events of the physical world by updating the keywords. 2. Related Work To the best of our knowledge, the measurements of human sensor delay and its dependency on other properties are novel. There has been extensive work done on related topics, from topological properties, users’ properties, to event and sentiment detection. None of the existing solutions can detect or aim at detecting events in seconds. Most of the solutions are intended to be used off-line, instead of in real-time. Many of the existing solutions treat tweets as text documents and apply text mining techniques to extract topics, classify and cluster tweets, e.g., TwitterStand [2], Tweet the debates [3], and Topical clustering of tweets [4]. Some have extracted information about social and physical events using Twitter or similar services [1, 5-11]. A particularly relevant work, TwitInfo [12], presented a system for visualizing and summarizing events on Twitter. None of the above work can detect targeted events in seconds despite the “real-time” claim by some. For example, TwitInfo has a delay in the magnitude of minutes. The solution in [1] detects an earthquake from Twitter in a matter of hours. In contrast, we are interested in detecting events in seconds; and SportSense is able to reliably detect touchdowns in a few tens of seconds, even before ESPN updates the score on the web page. Event detection for sports games has been studied by the video analysis research community [6, 13-16]. Unfortunately, the video content and text information irrelevant tweets. We found this to be very effective, retrieving 60% of the game related tweets with a false positive rate (percentage of irrelevant tweets with these keywords) below 5% [20]. 3.2 Ground Truth of Event Timing To evaluate how quickly SportSense can detect an event, we must know the ground truth of the timing of the event, which is surprisingly not readily available. While many media sources (e.g. ESPN, NFL Network) report game events, they only offer game clock timestamps of events. However, because the game clock pauses and resumes during a game, we cannot use a game clock to determine the passage of time between events. Instead, we observed the broadcasts of 18 games, spanning the 2011 Super Bowl, some 2011-12 regular season games and the 2012 Super Bowl, which include 100 touchdowns. We monitored regular season games at different times and cities, making our sample as random as possible. We manually marked the real clock time of game events. (Due to copyright issues of rebroadcasting games, we were not able to crowdsource this task.) 4. Characterizing the Human Response to Events In this section, we examine the properties of tweets from various users after an event. We analyze the tweet responses of 100 touchdown events across 18 NFL games, investigating characteristics such as the device type, location, user activeness, and the number of words in a tweet. By modeling the nature of the tweets from these groups, we can later develop a precise event detection method (in Section 5). To analyze this, we use a Human Delay metric. Numerically, this is the interval between the event occurrence and the tweet’s timestamp. Human delay is influenced by how fast users perceive an event, react to an event, and type a tweet. We show the tweet response following an event in Figure 1. The x-axis represents the human delay of the tweets, while the y-axis represents the volume of tweets posted per second. We use the error bar to present one standard deviation of uncertainty to represent the variation between the events. From the figure, we can see there are few tweets in the first 50 seconds after an event happens, but the post rates both increase to a peak at 75 seconds after the event happens. Interestingly, among all the games we observed, the first touchdown-related tweet arrived between 7 seconds and 50 seconds after events. 4.1 Mobile Devices Have Higher Post Rate Many Twitter users post tweets from their mobile devices, e.g., smartphones and tablets. Because of the immediate availability of mobile devices and the significantly different user interfaces, we expect tweets from these different classes of devices to have different delay characteristics. Figure 1: The tweet response among all tweets. Figure 2: The tweet response from mobile and non- mobile devices. leveraged by the above work is not always available, especially in real-time. 3. NFL Game Tweet Collecting and Event Tagging During American football games, Twitter has a high volume of tweets from football fans, tweeting about football events they find exciting or notable. that SportSense leverages this activity, associating particular streams of tweets with game events (e.g. Touchdowns, Field Goals) to perform robust event detection. 3.1 Collecting Related Twitter Data Twitter provides various Application Programming Interfaces (APIs) for third parties to retrieve tweets from the general public. SportSense uses the free Streaming API [17], which provides a continuous flow of tweets in real- time. This API returns public tweets that match one or more filter predicates (e.g. keyword, username, and location). The latency from tweet creation to delivery on the API is typically within one second [18]. The Streaming API is subject to a few limitations. According to Twitter, excessive connection attempts result in an IP address ban. Additionally, broad predicates retrieve a sampled stream with only ~1% sample rate [19]. During the 2011 and 2012 Super Bowl, we discovered an undocumented limit of about 50 tweets per second [20]. Therefore, when analyzing tweets in real-time for a topic of interest, it is of utmost importance to focus on only relevant tweets. Irrelevant tweets not only take up precious collection space, but also incur computation cost in our analysis, where speed is critical to achieve real-time performance. To avoid these issues, SportSense employs team names and game event keywords to suppress 2 Figure 3: The tweet responses for active and inactive users. We compare mobile and non-mobile responses as shown in Figure 2. The response magnitude on mobile device is twice as large. The peak delays are close; mobile devices reached the peak 2 seconds earlier, but their average delay was longer by 4 seconds. More importantly, we find that the event response on non-mobile devices is more consistent, as evident by the smaller deviation. To identify tweets posted from mobile devices, we examined the client source information enclosed in the tweet metadata. Approximately 40% of the game-related tweets are posted from Twitter clients on recognizable mobile devices, i.e., iPhone, BlackBerry, Android, HTC, MOTO, as well as mobile browsers and short messages (txt). Tweets on non-mobile clients comprise 30% of the game-related tweets. The remaining 30% tweets are posted from clients that exist in both non-mobile and mobile form. Thus, we do not consider them here. We hypothesize that typing speed and device/network delay influence the different delays. The typing speed on mobile devices is still lower than that on PC or laptops. Often, users need to unlock the device and open the Twitter application before tweeting. In addition, mobile devices may suffer from slow network conditions [21]. However, mobile devices are more portable and convenient to use when in front of a TV, at home, in bars, etc. 4.2 Active Users Post Slower During NFL games, we find that users have diversified activeness. While most users post fewer than 5 tweets in a game, some post dozens of tweets. We define the activeness as how many tweets the user has posted since the beginning of the game. During the game, we track how many tweets a user has posted and compute the average number of tweets per user. At a certain time, if the user has posted more tweets than the average, they are considered active users. Otherwise, they are considered inactive users. Next we compare the tweet responses of active and inactive users and illustrate it in Figure 3. For both active and inactive users, the post rates start increasing rapidly from 30 seconds after event happens and reach the peak at the same time. They have similar errors between the template signal and actual signals, but the errors increase 3 Figure 4: The tweet responses of short and long tweets. when the post rate decreases. Overall, the average and median delays for active users are about 5 seconds longer than for inactive users. Thus, although active users post more frequently than inactive users, their responses are typically more delayed. 4.3 More Short Tweets after an Event In this section we focus on the word count of tweets after an event happens. We observed that users often post short tweets with exclamation marks and repeated letters to e.g., New York Jets express their excitement. Touchdownnnnn!!! Therefore, we expect tweets with few words to correlate with the event. In our data, we found that the tweet word count decreased shortly after an event. In particular, the average word count of tweets decreases from 12 words to 6 words within 60 seconds after an event. To leverage this result, we categorize tweets into long and short tweets by comparing the tweet word count with the average word count value during a game. The average value fluctuates, as tweets are collected in real-time. If a tweet contains more words than the average word count, it will be considered as long tweet. Otherwise, it will be considered as short tweet. Figure 4 shows the tweet response based on tweet word count. The average and median delay of long tweets is 3 and 10 seconds more than short tweets, respectively. More significantly, the post rate of short tweets is twice that of the long tweets. In addition to the device, activeness, and tweet length, we also attempted to analyze tweets posted from verified users and users in stadiums. However, due to data unavailability (verified and in-stadium users are less than 0.5% of total users), we could not obtain representative results. 5. Event Detection A key technical contribution of the paper is to detect events, such as touchdowns and field goals, from our streams of game-related tweets. SportSense utilizes matched filtering to detect game events. To improve the fidelity of the detector, we create a separate template for different groups of Twitter users, and perform the matched filter separately for each group’s tweets. We combine the results of all of the matched filters to achieve accurate and timely event detection. We also elaborate on the proper Figure 5: The tradeoff between the event detection delay and the true positive rate. window size and threshold parameters to achieve the best tradeoff between detection delay and true positive rate. 5.1 Event Detection with Matched Filtering Our event detection strives to analyze Twitter streams to detect events. An event occurrence is routinely followed by a patterned volume of event-related time tweets as progresses. In Section 3.1, we consider tweets that contain a specific event keyword or its variant, e.g., “touchdown” and “TD”, as event-related tweets. By aggregating a history of previous events, we can determine the shape of the pattern of tweets that follows an event, i.e., the event template. For our event template, we use the tweet response (Figure 1). Our event template accounts for the tweet volume until a certain amount of time has passed after an event. We call this amount of time the window size of our event template. To improve the fidelity of the detector, we create a separate template for the different groups of Twitter users that were explored in Section 4. Once the event templates are established, to perform detection, we adopt matched filtering, a technique widely used in signal detection theory to correlate a received signal with a given template. Matched filtering is proven to be the optimal linear filter when dealing with dealing with independent additive noise, and is known to perform well in other scenarios as well [22], The matched filter is applied separately for each user group. The matched filtering process is as follows: (1) Take our event template V over the window W and take its time-reversed conjugate to form our matched filter H. H(t)=V*(W - t) (2) Convolve the current window of the ongoing tweet stream X with the matched filter H. m = X * H (3) If the resulting signal m rises above a threshold, our system detects an event occurred at that time. In our dataset, the interval between two adjacent events is always larger than 5 minutes. If m remains above the 4 Figure 6: Tradeoff between true positive rate and false positive rate in threshold selection threshold within 5 minutes after a detected event, we consider it is the same event to prevent repetitive reports of the same event. 5.2 Addressing User Diversity As noted in section 4, we found that tweets from different user categories had different properties. In particular, mobile and inactive users typically exhibit less of a delay of tweeting about an event than non-mobile and active users. Furthermore, users usually post shorter tweets with event keyword after event happened. Noting these characteristic differences, we form different event templates from their unique tweet responses. Thus, the event templates can be seen in Figure 2, Figure 3, and Figure 4 In order to combine the outputs of the various matched filters, mi(t), to form the output, mcomb(t), we evaluated three prominent combination mechanisms; the Maximum Rule, the Mean Rule, and the Product Rule. The Maximum Rule calculates the outcome as the maximum of the matched filters. Formally, mmax(t) = max { mi(t) } The Mean Rule calculates the outcome as the average of the three matched filters. Formally, mmean(t) = 1/3 · Σ{mi(t)} The Product Rule calculates the outcome as the product of the three matched filters. Formally, mprod(t) = Π{mi(t)} In addition to these three prominent mechanisms, we also evaluated the combination of inactive users and short tweets which exhibit shorter delay. mdelay(t) = 1/2 · ( minactive(t) + mshort(t) ) We compared the performance of these four methods, and found that the Mean Rule performs best. Indeed, the Mean Rule is known to be especially resilient to noise [23], and useful when inputs are highly correlated. We use mmean(t) in the remainder of the paper, and define m(t) = mmean(t) Figure 7: Architecture of SportSense web service implementation. 5.3 Parameter Selection To obtain the optimal window size and threshold, we iterate this matched filter detector method with different window sizes and thresholds through our history of events. An appropriate window size should be chosen to reduce detection delay while maintaining high accuracy. A short window will not allow for robust event detection; a lengthy time-series is needed to form a pattern for an event template, and the window should be no shorter than this pattern. However, as the window size increases, the delay of event detection also increases, as we need to sample more tweets before a decision can be made about a particular time. Figure 5 shows the effects of window-size on the accuracy and delay of touchdown detection. Likewise, the choice of threshold parameter impacts the accuracy of the event detection. A low threshold will recognize events when there are none (false negatives), while a high threshold will fail to recognize events (false positives). The tradeoff in threshold choice is shown in Figure 6. An appropriate threshold must be found to balance this tradeoff to fulfill accuracy requirements. We rely on historical event data to perform optimal parameter selection. With our Touchdown data, we find the optimal window size to be 30 and threshold to be 8. With these parameters, we achieve 97% true positive rate and less than 4% false positives rate, which confirms the efficacy of our Touchdown event detection. 6. Implementation and Evaluation We have implemented SportSense as a real-time web service that visualizes event detection. In this section, we present the details of our web service followed by the thorough evaluation of the performance of SportSense. Finally, we present SportEPG, a sample EPG application built on SportSense. We present the results based on the 2010-11 and 2011-12 NFL seasons. 6.1 Web Service Realization We have implemented the SportSense web service in PHP. It consists of the backend for data collection and analysis, 5 Figure 8: The RoC curves for different combination mechanisms of matched filter detectors. The mean rule outperforms the others. and the frontend for web visualization, as illustrated in Figure 7. We host the web service on Amazon EC2, a reliable and reasonably priced cloud computing platform. The backend consists of a MySQL database and two modules. The data collection module collects game-related tweets through the Twitter Streaming API. The event detection module retrieves tweets from the database, assigns them to unique games, and detects game events. The frontend retrieves the results from the event detection module, and visualizes them. We implemented the website frontend using the JavaScript drawing library and Google Charts API. SportSense also provides an API to enable others to leverage analysis results for novel applications. The API provides detected events with timestamps, the temporal trend of posting volume, and the ranking of the most discussed game according to the tweets volume. The SportSense website has been running for 2 years monitoring NFL games in 2010-11 and 2011-12 Seasons. The event detection method has also been evolving during this period. The original SportSense utilizes the temperature-based method to detect peaks in tweet volume which is similar to existing methods in the related work [1, 12]. However, because our new goal is to achieve event detection within seconds, we devised variable window sizes to reduce detection delay. SportSense starts from the shortest window size and measures (i) the percentage increase of the volumes in a sliding window (ii) the post volume in the window. If the percentage increase of post volume is high enough and there are enough event- indicative tweets to make a reliable decision, it declares an event has happened. Otherwise, SportSense increments the window size until an event is detected or the largest window size is reached. This method can detect events around 40 seconds after an event happens, with 90% true positive rate and 8% false positive rate [20]. 6.2 Evaluation To evaluate the effectiveness of the matched filter detector of SportSense, we use leave-one-out cross-validation (LOOCV) on all the 18 games that we have ground truth as Figure 9: RoC curves for basic temperature based and matched filter detectors. Matched filter performs better for touchdowns and field goals. introduced in Section 3.2. LOOCV uses a single game as the validation data, and the remaining games as the training data. There are in total 100 touchdowns, an average of 5 or 6 touchdowns per game. We show that the combination of matched filter detector of different user types can achieve 98% true positive rate and 9% false positive rate. Figure 8 shows the Receiver Operating Characteristics (RoC) Curves for our single matched filter detector and the combination of matched filter detectors for different user groups. The single matched filter detector approach achieves 96% true positive rate and has 13% false positive rate. On the other hand, the combination matched filter detectors performs better, achieving 98% true positive rate and has 9% false positive rate. Figure 9 shows the performance of the basic temperature based method and matched filter method for touchdowns and field goals. The basic temperature-based method performs significantly poorer than the matched filter methods. We also examine the delay of our detection, which is introduced from two parts, our system and the detection stage. To minimize the system delay, we use parallel data collection and data analysis in our implementation. The delay from the detection stage includes computation delay and the delay due to the matched filter window size. The computation as introduced in Section 5.1 is mainly a convolution operation, which is very fast. Figure 10 shows the delay of events detected. All three methods have an average delay around 45 seconds. The median value of the temperature-based method is 5 seconds shorter than the other two methods but the temperature-based method detects fewer events due to the tradeoff between accuracy and window size. Interestingly, the combination of inactive and short tweets does not outperform the matched filter method. Both have similar detection delay distribution. For the purpose of comparison, we note that EPSN takes about 90 seconds to update their webpage. SportSense detects 60% of events within 40 seconds which is mainly because of the window size. All detected events have delay less than 90 seconds. As a result, SportSense can update results faster than ESPN updates their web page. 6 Figure 10: The distribution of event detection delay. 6.3 SportSense Powered EPG Application We have developed the SportEPG application to demonstrate the effectiveness of the SportSense system and its APIs. A primary function of electronic program guides, or EPGs, is to assist users in selecting their desired channel. SportEPG achieves this goal by using the SportSense API to identify and highlight the most tweeted programs in real time. Thanks to the flexibility of the keyword-based data collection method, we feed TV program names to the Streaming API to support general TV content. Our event detection is still focused on NFL games. When events take place in sports game, an event icon will show up in the corresponding grid. We leverage AJAX (Asynchronous JavaScript And XML) methods to retrieve analysis results from the SportSense server asynchronously, without interfering with the existing page. One of the benefits of a real-time updating EPG is that it is accessed frequently and presumably in most cases on a companion device such as a smartphone or a tablet. In turn, the frequent, constant attention to the EPG can be exploited through relevant advertising. 7. Conclusion In this work, we pushed the limit of Twitter as a real-time human sensor. We demonstrated that moderately frequent and diverse social and physical events like those of NFL games can be reliably recognized within 90 seconds using tweets properly collected in real-time. Our results also suggest that the keyword-based method is effective in Twitter-based event detection and the Twitter API limits can be overcome using proper scoping and event detection keywords. We hope this new capability will inspire more applications in the pervasive computing community. On the other hand, our work is limited to events for which keywords can be predetermined, such as for NFL games. What would be more useful and challenging is to recognize events that are not anticipated, and therefore do not have predefined keywords. Leveraging the work reported here, we are actively pursuing this goal. [2] 8. References [1] T. Sakaki, M. Okazaki, and Y. Matsuo, "Earthquake shakes Twitter users: real-time event detection by social sensors," presented at the ACM World wide web, Raleigh, North Carolina, USA, 2010. J. Sankaranarayanan, H. Samet, B. E. Teitler, M. D. Lieberman, and J. Sperling, "TwitterStand: news in tweets," presented at the ACM SIGSPATIAL Advances in Geographic Information Systems, Seattle, Washington, 2009. [3] D. A. Shamma, L. Kennedy, and E. F. Churchill, "Tweet the debates: understanding community annotation of uncollected sources," presented at the SIGMM workshop on Social media, Beijing, China, 2009. [4] K. D. Rosa, R. Shah, B. Lin, A. Gershman, and R. Frederking, "Topical Clustering of Tweets," in ACM SWSM, 2011. J. Weng and B. S. Lee, "Event detection in twitter," in AAAI, 2011. [6] C. Xu, Y. Zhang, G. Zhu, Y. Rui, H. Lu, and Q. Huang, "Using Webcast Text for Semantic Event Detection in Broadcast Sports Video," Multimedia, IEEE Transactions on, vol. 10, pp. 1342-1355, 2008. [7] S. Vieweg, A. L. Hughes, K. Starbird, and L. Palen, "Microblogging during two natural hazards events: what twitter may contribute to situational awareness," presented at the ACM Human factors in computing systems, Atlanta, Georgia, USA, 2010. J. Hannon, K. McCarthy, J. Lynch, and B. Smyth, "Personalized and automatic social summarization of events in video," presented at the ACM Intelligent user interfaces, Palo Alto, CA, USA, 2011. [9] D. Chakrabarti and K. Punera, "Event summarization using tweets," in AAAI ICWSM, 2011. [10] S. A. Golder and M. W. Macy, "Diurnal and Seasonal Mood Vary with Work, Sleep, and Daylength Across Diverse Cultures," Science, vol. 333, pp. 1878-1881, September 30, 2011 2011. [11] J. Bollen, A. Pepe, and H. Mao, "Modeling public mood and emotion: Twitter sentiment and socio- economic phenomena," in AAAI ICWSM, 2009. [12] A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger, S. Madden, and R. C. Miller, "Twitinfo: aggregating and [5] [8] visualizing microblogs for event exploration," presented at the ACM Human factors in computing systems, Vancouver, BC, Canada, 2011. [13] A. Ekin, A. M. Tekalp, and R. Mehrotra, "Automatic soccer video analysis and summarization," Image Processing, IEEE Transactions on, vol. 12, pp. 796- 807, 2003. [14] Y. Rui, A. Gupta, and A. Acero, "Automatically extracting highlights for TV Baseball programs," presented at the ACM Multimedia, Marina del Rey, California, United States, 2000. [15] D. Zhang and S.-F. Chang, "Event detection in baseball video using superimposed caption recognition," presented at the ACM Multimedia, Juan-les-Pins, France, 2002. [16] K. Petridis, S. Bloehdorn, C. Saathoff, N. Simou, S. Dasiopoulou, V. Tzouvaras, S. Handschuh, Y. Avrithis, Y. Kompatsiaris, and S. Staab, "Knowledge representation and semantic annotation of multimedia content," Vision, Image and Signal Processing, IEE Proceedings -, vol. 153, pp. 255-262, 2006. [17] B. R. Journal. The Twitter Streaming API -- How It Works and Why It's A Big Deal, http://borasky- research.net/2010/01/06/the-twitter-streaming-api- how-it-works-and-why-its-a-big-deal/. [18] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi, "Measuring user influence in Twitter: The million follower fallacy," 2010. [19] Twitter API Documentation. Streaming API Concept, https://dev.twitter.com/docs/streaming-api/concepts. [20] S. Zhao, L. Zhong, J. Wickramasuriya, and V. Vasudevan, "Human as Real-Time Sensors of Social and Physical Events: A Case Study of Twitter and Sports Games," Arxiv preprint arXiv:1106.4300, 2011. [21] Z. Wang, X. Lin, L. Zhong, and M. Chishtie, "Why are web browsers slow on smartphones?," in HotMobile, 2011. [22] R. D. Hippenstiel, Detection theory: applications and digital signal processing: CRC, 2002. [23] J. Kittler, M. Hatef, R. P. W. Duin, and J. Matas, "On Combining Classifiers," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, pp. 226- 239, 1998. 7
1206.3963
1
1206
2012-06-18T15:23:37
Small-world topology of functional connectivity in randomly connected dynamical systems
[ "cs.SI", "physics.data-an", "physics.soc-ph", "q-bio.NC", "stat.AP" ]
Characterization of real-world complex systems increasingly involves the study of their topological structure using graph theory. Among global network properties, small-world property, consisting in existence of relatively short paths together with high clustering of the network, is one of the most discussed and studied. When dealing with coupled dynamical systems, links among units of the system are commonly quantified by a measure of pairwise statistical dependence of observed time series (functional connectivity). We argue that the functional connectivity approach leads to upwardly biased estimates of small-world characteristics (with respect to commonly used random graph models) due to partial transitivity of the accepted functional connectivity measures such as the correlation coefficient. In particular, this may lead to observation of small-world characteristics in connectivity graphs estimated from generic randomly connected dynamical systems. The ubiquity and robustness of the phenomenon is documented by an extensive parameter study of its manifestation in a multivariate linear autoregressive process, with discussion of the potential relevance for nonlinear processes and measures.
cs.SI
cs
Small-world topology of functional connectivity in randomly connected dynamical systems J. Hlinka,1 D. Hartman,1 and M. Palus1 Institute of Computer Science, Academy of Sciences of the Czech Republic, Pod vodarenskou vezi 2, 18207 Prague, Czech Republic (Dated: 1 May 2014) Characterization of real-world complex systems increasingly involves the study of their topological structure using graph theory. Among global network properties, small-world property, consisting in existence of rel- atively short paths together with high clustering of the network, is one of the most discussed and studied. When dealing with coupled dynamical systems, links among units of the system are commonly quantified by a measure of pairwise statistical dependence of observed time series (functional connectivity). We argue that the functional connectivity approach leads to upwardly biased estimates of small-world characteristics (with respect to commonly used random graph models) due to partial transitivity of the accepted functional connec- tivity measures such as the correlation coefficient. In particular, this may lead to observation of small-world characteristics in connectivity graphs estimated from generic randomly connected dynamical systems. The ubiquity and robustness of the phenomenon is documented by an extensive parameter study of its manifes- tation in a multivariate linear autoregressive process, with discussion of the potential relevance for nonlinear processes and measures. PACS numbers: 89.75.Fb,07.05.Kf,05.45.Tp,87.19.L- In the field of complex systems study, new mea- surement and computational resources have lead to increased interest in analysis of large networks. These networks are observed across many disci- plines spanning from social sciences through bi- ology to climate research. For characterization of the structure of these networks, graph-theoretical measures have proven to be useful. These charac- teristics capture some global features of the net- work topology such as the density or level of clus- tering (tendency of neighbors of a node to be also neighbors to each other) as well as specific roles of important nodes serving as ‘hubs’ in the network. Among the interesting properties of many real- world networks belongs the small-world property, a global property of a network characterized by a relatively high level of clustering while con- serving on average short paths among nodes of the network, compared to a random network of corresponding density. This small-world prop- erty has been related to some convenient prop- erties of the network including efficiency of infor- mation transfer, and therefore reports of small- world architecture in real-world networks have received much attention. In some complex dy- namical systems, including global climate or hu- man brain, the knowledge of physical connections among its subsystems is far from perfect, and therefore other methods of characterizing interac- tions among these have been extensively applied. In particular, interactions among the areas are commonly quantified by a dependence measure such as the linear correlation between the local time series of variables of interest. This gives rise to the so-called functional connectivity ma- trix of a system. Applying the graph-theoretical approach to functional connectivity matrices has lead to reports of small-world properties of many real-world systems. However, as we document in this report, even for a simplistic dynamical sys- tem with linear dynamics and random coupling matrix the functional connectivity approach gen- erates networks with small-world characteristics. These spurious detections of small-world topol- ogy is related to partial transitivity of functional connectivity measures such as the correlation co- efficient. I. INTRODUCTION Characterization of complex systems commonly in- cludes the study of their structure using graph theory. This typically involves identification of the systems sub- units (nodes of a network) and assessment of existence (or strength) of pair-wise relations among those, leading to representation of the system by a (weighted) graph. The local, mesoscale or global topology of the graph (or alterations thereof) are subsequently studied using vari- ous graph-theoretical measures with a goal of identifying systems properties key to its function. Among the most widely discussed properties are modularity, scale-freeness or small-world topology. Since the paradigmatic publication of Watts and Stro- gatz in Nature1, the small-world property entailing rela- tively short graph paths and high clustering has received much attention in many application areas dealing with complex systems. This includes such diverse fields as neuroscience2 and climate science3. When working with such complex dynamical systems, for both practical and theoretical reasons, the links among nodes are commonly quantified by the dependence of the observed time series rather than the underlying physical or coupling network of connections. In the neu- roscience community, this corresponds to the distinction between functional and structural (anatomical) connec- tivity. We adopt this useful terminology in this paper and suggest the general term functional connectivity approach to construction of graph representation of complex dy- namical system by deriving the links through quantifica- tion (and potential thresholding) of the pair-wise statis- tical dependence measure (typically correlation) among the local time series of activity or other key variable of the nodes of the studied system. As the exact values of quantitative graph-theoretical indices crucially depend on parameters such as network size or density, the interpretation of graph-theoretical properties of real-world networks is usually based on the comparison with ‘corresponding’ random graph models of Erdos–R´enyi4 or Maslov–Sneppen5. Some complications with the outlined analysis ap- proach have recently been suggested in literature, partic- ularly discussing the biasing effects related to sampling problems such as spatial oversampling6 and finite size temporal samples and their autocorrelation7. However, we argue that there is a more fundamen- tal problem with intepretation of the graph-theoretical properties of functional connectivity matrices. In partic- ular, functional connectivity matrices are biased towards a specific structure due to their construction method; ir- respective of particular time series length and/or sam- pling parameters. We focus particularly on functional connectivity matrices constructed using linear correla- tion as a measure of dependence. A specific example of an in-built bias of a linear correlation matrix is its ‘weak’ transitivity property: for any three random vari- ables X, Y, Z a strong positive correlation between two pairs of them implies a positive correlation within the third pair, including specific ‘hard limitations’, such as that ρ2 Y Z > 1 implies ρXZ > 0, i.e. positivity of the third correlation coefficient (for a proof of a general form of this inequality see8). Such implicit dependence among the entries of the correlation matrix has been com- monly overlooked in the interpretation of graph analysis of functional connectivity matrices. XY + ρ2 In the presented study, we focus on the effects of this dependence on the graph-theoretical properties of the functional connectivity matrices. In particular, we show that there are tendencies towards specific graph struc- tures in functional connectivity matrices computed from activity time-series of randomly structurally connected networks. A prime example of such an effect is the in- creased level of clustering, further affecting the estimates of small-world indices, potentially leading to serious mis- interpretation of real-world data. 2 II. METHODS A. Functional connectivity Functional connectivity is most commonly quantified by the linear (Pearson’s) correlation coefficient. While also non-linear connectivity measures are in use, for data with approximately Gaussian distribution is linear cor- relation practically sufficient9,10. The correlation ma- trix can be subsequently transformed into an unweighted graph (‘binarized’) by choosing a threshold and assign- ing links only to pairs of nodes with over-threshold cor- relation. In practice, the threshold is commonly chosen adaptively to achieve a predefined density of the result- ing graph, although statistical testing may be applied as well11–13. B. Graph-theoretical characteristics Formally, in the graph-theoretical approach a network is represented by an unweighted graph G = (V, E), where V is the set of nodes of G, N = #V is the number of nodes and E ⊆ (cid:0)V 2(cid:1) is the set of the edges of G. In some cases a separate function w : E → R can be used to extend the graph concept by defining a weighted graph G = (V, E, w), however throughout the current paper we only deal with unweighted graphs. For any pair of nodes i, j ∈ V we define an edge indi- cator ai,j = 1 if and only if {i, j} ∈ E (the graph con- tains an edge linking nodes i and j), otherwise ai,j = 0, node degree as ki = Pj∈V ai,j, and finally a path of length ℓ from node i to node j as a sequence of edges {m0 = i, m1}, {m1, m2}, . . ., {mℓ−1, mℓ = j} where all mi ∈ V are distinct nodes of the graph. The length of the shortest path between nodes i and j is denoted as di,j. A graph G can be characterized by its global proper- ties, including the average path length L = 1 N (N − 1) X i,j and the clustering coefficient C = 1 N X i∈V ci, di,j (1) (2) where ci denotes the local clustering coefficient defined for ki ≥ 2 as ci = Pj,ℓ ai,jaj,ℓaℓ,i ki(ki − 1) (3) and for ki ∈ {0, 1} as ci = 0. Note that for disconnected graphs, some pairs of nodes are not connected by a path and the respective di,j is not well defined (or set to infinity). In this case we compute the average path length by averaging only over pairs for which a finite path exists, see also the discussion section. In their original paper, Watts and Strogatz1 suggested the term “small-world” for networks that have a similar average path length, but an increased clustering coeffi- cient compared to a corresponding random graph (which corresponds to a relative average path length and clus- tering coefficient λ = L ≫ 1) and also provided a simple generative model for such net- works. The small-world property has been more recently proposed to be summarized in the small-world index σ = γ & 1, γ = C Crand Lrand λ ≫ 114. Although generally accepted, the interpretation of the small-world index has been critically discussed for var- ious reasons including the potential confounding effects of spatial oversampling of the underlying system6, finite- time estimation effects7 or unclear interpretation of paths in the functional connectivity graphs15. In the following, we show that the functional connectivity approach with a common choice of dependence measure leads to a sub- stantial upward bias in the small-world index σ. Under- standing this phenomenon is key for accurate interpreta- tion of experimental findings and their comparison across methodologies. 3 matrix (diagonal elements of the FC matrix are first set to zero). The respective matrices are shown in Figure 1. A visual inspection shows that while the entries of the structural connectivity matrix are random and mutually independent, the functional connectivity matrix shows a specific structure. This can be quantified by the graph- theoretical measures. In this particular realization, we have LS = 2.157, LF = 2.308, CS = 0.1081, CF = 0.2355. As SC and F C have the same densities, SC is effectively a realization of the Erdos-R´enyi model corresponding to the density of F C, and we obtain the relative graph mea- sures: λ = 1.07, γ = 2.18, σ = 2.04. The values indicate increased clustering and approximately conserved aver- age path length with respect to a corresponding random graph. Together this signifies a small-world like struc- ture of the functional connectivity matrix, even though the coupling structure of the generating system is com- pletely random. In view of the results of this simple experiment, it is important to ask what the significance of the findings of increased clustering and small-world structure in depen- dence matrices of real-world data is. For simplicity, consider an autoregressive process of order 1 (AR(1)): D. Asymptotic behavior of correlation matrix: Parametric study settings Xt = c + AXt−1 + et, (4) where c is a N × 1 vector of constants, A is a N × N matrix and et is a N × 1 vector of error terms. For simplicity we choose c = 0N,1 and et ∼ N (0, 1) and A = s(SC + αI)/λmax, with the symmetric binary struc- tural connectivity matrix SC = SC(N, p) generated as a realization of the Erdos-R´enyi model G(N, p). In partic- ular, each nondiagonal entry of the N × N SC matrix is assigned randomly and independently either with value 1 (edge exists, with probability p) or value 0 (edge does not exist, with probability 1 − p); diagonal elements are set to 0. I here denotes the identity matrix. The pa- rameter s ∈ (0, 1) modulates the relative strength of the autoregressive and noise terms in (4) with the normaliza- tion by λmax – the largest (in absolute value) eigenvalue of the matrix SC + αI. The parameter α varies the re- lation between the autocorrelation and cross-correlation component of the AR process (4). C. Finite time series example As a motivational example, we generate a finite sample of stochastic process with length T = 300 with parameter setting pSC = 0.1, N = 100, s = 0.1, α = 2, and compute the corresponding functional connectivity matrix F C by binarizing the sample Pearson correlation matrix. The binarization threshold is chosen such that the density pF C of the binarized functional connectivity matrix is equal to the density pSC of the structural connectivity In the following we focus on investigating this effect in a more detail, studying its strength as a function of some of the most relevant parameters of the underlying pro- cess. For the sake of tractability we still limit ourselves to AR(1) process, but vary the following parameters: size of the network N , density pSC of the coupling matrix SC, balance of the autocorrelation and cross-correlation (by parameter α), balance between the autoregressive and noise terms by parameter s and the level of threshold- ing by changing the required density pF C of the matrix F C. While the strength of the effect is also dependent on the length of the sample T , the finite size of the sample is not crucial, as the upward bias does not vanish even asymptotically. The covariance matrix Σ for the AR(1) AiAiT process (4) is given by the infinite sum Σ = ∞ X i=0 (for derivation see e.g.16), which due to symmetry of the matrix A = AT leads to a Neumann series that con- verges to Σ = (I − A2)−1. From this expression the correlation matrix is easily obtained by trivial normal- izations using diagonal elements of Σ. Thus the choice of the rather trivial AR(1) model gives us the possibility to study asymptotic behavior of correlation matrices with- out additional effects of sampling or series length which are not negligible when the correlation matrices are esti- mated from time series. Notwithstanding the dimensionality of the investi- the parameter ranges were gated parameter space, chosen to cover reasonably the parameter space, in particular we used values N ∈ {50, 200, 500}, s ∈ 4 FIG. 1. An example of binary functional connectivity matrix (right) generated from random structural connectivity matrix (left) by thresholding the correlation matrix of AR-model generated time series (center, light shades of gray indicate higher correlation values). Network with N = 100 nodes shown. Note that the functional connectivity matrix shows a specific structure although the entries of the generating structural connectivity matrix were chosen randomly. See text for further details. {0.2, 0.5, 0.75, 0.9, 0.99}, α ∈ {0, 1}. We further varied pSC and pF C logarithmically in 24 steps within the (0, 1) interval – more exactly both variables are defined as 2n where n is an arithmetic progression from 0 to −6.9 with step −0.3. The lowest density was therefore smaller than 0.01. For robustness of evidence, for each parameter setting we compute 20 independent realizations of the coupling matrix, and each of the resulting matrices F C is com- pared to its own corresponding realization of the random Erdos-R´enyi matrix G (and secondarily also to Maslov- Sneppen random graph model5, see discussion). The computations were carried out using the NDW-Graph Toolbox (http://ndw.cs.cas.cz/software/ndw-graph), a C++/MATLAB toolbox for complex network analysis developed within the authors’ NDW group and available to the public under GPL license. III. RESULTS The simulations have shown that the studied effect (small-world property of functional connectivity matrix of a randomly connected dynamical system) is present throughout the covered parameter space, although with a variable strength. A representative selection of results is shown in Figure 2, obtained for network size N = 500 nodes, s = 0.75 and α = 1. The results for other investi- gated parameter choices are qualitatively similar and are summarized for completeness in Figures 1 and 2 of the Supplemental Material17. Within the studied parameter range, we have observed values of small-world index σ up to the order of hun- dreds. The effect has also proven statistically robust with respect to different realizations of the structural matrix SC. In particular, we observed relatively low spread of the σ values, with σ > 1 in all 20 assessed realizations of the process (4) for overwhelming majority of param- eter vector values. This corresponds to robust statis- tical significance in most cases (p-values < 10−5, sign test of hypothesis of median equal to 1, no correction for multiple comparisons; similar results obtained for t-test). The only exceptions were observed for the case of exactly equal densities of structural and functional connectivity matrix, when this commong density was very low (e.g. only for pF C = pSC . 0.03 for the specific settings in Figure 2), where the σ values were relatively close to 1; this special case is discussed later. In general, σ increases with increasing thresholding (that is decreasing density pF C of the F C matrix). The dependence on the density of the underlying structural connectivity pSC is not monotonous (see Figure 2). Ap- proximately, the effect is weakest if the density of the binarized functional connectivity matrix is the same as of the underlying structural connectivity matrix, but the depth of this minimum further depends on the value of parameter α. The values of σ are comparable for both α = 1 and α = 0, with the exception of the above- described non-monotonicity being more pronounced with α = 1. With other parameters fixed, network size N and strength of coupling s do not affect σ strongly within the sampled parameter region (see Supplemental Material17 Figure 1). However, for small networks (especially N = 50) and small densities of the F C matrix pF C < 0.1, the σ is often not well defined, mostly due to zero values of the clus- tering coefficient of the corresponding random matrix. Moreover, in a part of the parameter space, the result- ing graphs are not connected. This generally happens for small density, however the exact threshold is further modulated by network size and other network parame- ters. The interpretation of some graph-theoretical measures for disconnected graphs and their comparison to con- nected graphs is not straightforward. In practice, for disconnected graphs the average path length is computed only for the largest component of the graph1, or rede- fined as the mean of the finite elements of the distance 1.000 0.536 0.287 0.154 0.082 0.044 0.024 0.013 C F f o y t i s n e D 1.000 Density of SC 0.008 10 9 8 7 6 5 4 3 2 1 FIG. 2. Average values of the small-world index σ of the bi- narized functional connectivity matrix F C generated by AR model with random structural connectivity matrix SC. In most of the parameter space, σ ≫ 1, suggesting small-world topology. Note marked dependence on values of the density of SC and F C (the latter modulated by adjusting the bina- rization threshold). Other parameter values: s = 0.75, α = 1, N = 500. Logarithmic scale used both for the ordinate and the abscissa. Undefined values (for SC = 1; F C 6= 1) are shown as 0 (in white). (Results for other parameter settings are available in the Supplemental Material17.) matrix, omitting the unconnected node pairs. In the cur- rent study we adopt the latter approach, used previously in similar context6. However, from theoretical perspective it could be ar- gued that this could potentially have biasing effects on the small-world index estimates, supporting a conserva- tive approach of only dealing with connected graphs. To check that our results are not driven only by loss of con- nectedness of the graphs with decreasing density or the related redefinition of average path, we plot separately the results obtained from connected graphs. While this severely limits the parameter space, even within this area σ values attained values up to ∼ 10 (see Supplemental Material17, Figure 3). As the parameter the admissible area of space monotonously grows with the network size, this docu- ments that even the conservative connectedness require- ment in principle does not limit the values of σ and there- fore the strength of the confounding effect. 1.000 0.536 0.287 0.154 0.082 0.044 0.024 0.013 C F f o y t i s n e D 1.000 Density of SC 0.008 5 10 9 8 7 6 5 4 3 2 1 FIG. 3. Average values of the relative clustering coefficient γ of the binarized functional connectivity matrix F C gener- ated by AR model with random structural connectivity ma- trix SC. In most of the parameter space, γ ≫ 1, contributing to small-world topology. Note the similarity to Figure 2, sug- gesting the critical role of increased clustering in the observed small-world topology of F C. Parameter values as in Figure 2. Logarithmic scale used both for the ordinate and the abscissa. 1.000 0.536 0.287 0.154 0.082 0.044 0.024 0.013 C F f o y t i s n e D 1.1 1 0.9 0.8 0.7 0.6 0.5 1.000 Density of SC 0.008 FIG. 4. Average values of the relative average path length λ of the binarized functional connectivity matrix F C generated by AR model with random structural connectivity matrix SC. In most of the parameter space, λ ∼ 1, in agreement with small- world topology. Parameter values as in Figure 2. Logarithmic scale used both for the ordinate and the abscissa. See text for more discussion. The contributions of relative clustering coefficient γ and relative average path length λ to the observed small- world property is documented in Figures 3 and 4. The results show that the observed small-world property is mostly attributable to increased clustering with respect to corresponding random graphs (note the similarity be- tween Figure 2 and Figure 3). In most of the studied parameter space, λ is very close to 1 (i.e. L similar to that of a random graph); lower values appear in general for parameter values that lead to disconnected graphs, typically with more components than random graph of corresponding density. Because the small-world index σ is computed by com- parison with random networks, it is clear that the par- ticular choice of the random network model may affect the σ values. While Erdos-R´enyi model is still stan- dard for these applications, several recent studies used the Maslov-Sneppen model5 that conserves not only the density but also degree distribution of the graph. We have explored the σ values observed using the Maslov- Sneppen random graph model using the same framework; the general observation was that of weakening, but not a complete mitigation of the effect (see Supplemental Ma- terial17 Figure 4). This suggests that degree distribution in functional-connectivity-based graphs is indeed differ- ent from that of Erdos–R´enyi model, yet it does not fully explain the specific properties of the functional connec- tivity matrix, in particular the increased level of cluster- ing. With other parameters fixed, we commonly observe the weakest effect if the resulting FC graph has the same density as the generating SC. This can be understood since in our model only the direct structural links are likely to generate the strongest (and quite homogeneous) temporal correlations. If the number of the functional connectivity links is set equal to that of structural links, the indirect and therefore weaker links are very likely to be discarded through the thresholding. The practi- cal utilization of this fact is limited due to two points. Firstly, the density of underlying structural connectivity is typically not known in practice. Secondly, the strength of the structural links is commonly not homogeneous. Then, some indirect links can become stronger than some weaker direct links, causing increase in the minimum σ value. This effect was observed in separate runs of the simulations that used Gaussian or uniform distribution for the strengths of structural links (see Supplemental Material17, Figure 5 and 6). IV. DISCUSSION We have shown that the approach of constructing net- work connectivity graphs from correlations of activity time series of local nodes leads to particular graph struc- tures, characterized by increased clustering compared to common random graph models. This may lead to at- tribution of small-world properties to networks possess- ing purely random structural connectivity. By extensive mapping of strength of the effect as function of model parameters, we documented that this phenomenon is not a special theoretical case or a negligible effect, but is a rather pronounced and general phenomenon. While the coverage of parameter space was necessarily limited, it is sufficient not only to demonstrate the existence of the ef- fect, but also its potential strength and existence of com- plex modulation by system parameters. The strength of the effect suggests it is of a scale relevant for inter- pretation of real-world results, considering that reports of small-world properties of real-world networks show σ values comparable to those observed in our model – from the order of several units in smaller, relatively dense net- works (e.g. σ ∼ 1.5 in18) to several tens in larger and less dense networks (see e.g.19). Note that reports of small-world network topology based on functional con- nectivity analysis of measured time series is becoming increasingly used not only in brain imaging (see20 and references therein), but also in other fields such as cli- 6 mate science3,21 or economics22. As one of the most widely discussed concepts in the emerging field of complex network analysis, the small- world phenomenon has already received some attention regarding the methodology of its quantification. The two most notable attempts in this direction focused on the confounding effects of inadequate spatial sampling6 and finite-size temporal window estimation of correlation coefficient7. Some other reasons for a careful interpreta- tion of graph-theoretical analysis of functional connectiv- ity matrices have been noted in recent reviews15,23,24. In the current study we bring a direct theoretical argument supported by extensive quantitative simula- tions proving that the interpretation problems regard- ing correlation-based small-world networks stem from the intrinsic properties of commonly used functional connec- tivity measures, rather than merely from inappropriate sampling. Even without the finite sample size problem, and with no spatial oversampling, functional connectiv- ity matrices of randomly coupled trivial linear processes show small-world properties. The current study utilizes linear statistical dependence measure (namely Pearson’s correlation coefficient) and linear autoregressive model to study the consequences of the functional connectivity approach to construction of network graphs. A list of parameters of the model was varied, covering a large portion of the parameter space. Nevertheless, the computational requirements mo- tivated some limitations of the parameter swipe. The in- creased clustering was documented across a multidimen- sional range of parameter values and for several choices of random distributions of structural links. While the effect was ubiquitous, its strength depended substantially on parameter values – in particular, the highest values were typically obtained for sparse networks, an observation in line with results reported in literature (see25). The accu- rate theoretical description of the parameter dependence of the strength of the effect for a reasonably general class of systems is a subject of future work, as it might help taking the effect properly into account in data-analysis. Indeed, the AR(1) process analyzed here may serve only as a simplest first approximation for some real-world systems studied with the above discussed functional con- nectivity approach. We conjecture that since the origin of the phenomenon is in the partial transitivity prop- erty of correlation matrix of a dependent variable set, the details of the stochastic process and even the fact that the data are generated by a temporal stochastic process are not central to the phenomenon. In particular, the potential for spurious small-world observations may be also relevant to correlation-based networks constructed from other than time series data. Moreover, based on the elementary theoretical argument we conjecture that the main qualitative result generalizes to other depen- dence measures — to the extent to which these alterna- tive measures hold a similar partial transitivity property as the linear correlation. Moreover, if the linear corre- lation is applied on nonlinear systems, the phenomenon should also appear — linear correlation may not be able to capture the dependences fully, but it will still show its specific properties. The detailed treatment of the related issues is a topic of further work. Importantly, in the current paper, we do not challenge the specific findings of small-world structure of the struc- tural networks underlying systems such as human brain. Rather, we only suggest that observations of small-world observations in functional connectivity, although poten- tially appealing, may not per se say much interesting about the underlying system, as these are probably ubiq- uitous in completely randomly connected dynamical sys- tems, in a manner illustrated on a simplistic example of a linear dynamical system in this paper. More gen- erally, this small-world bias is a specific example of the general notion that graph-theoretical properties of func- tional connectivity matrices should be interpreted differ- ently than those of structural matrices. Considering our results, in order to properly support the case that in a particular experimental dataset the observed small-world functional connectivity properties are significantly elevated, one would have to compare the experimental data with appropriate specific null-model (rather than that of Erdos–R´enyi or Maslov–Sneppen) or provide a correction for the bias related to the functional connectivity approach. Unfortunately, the null model of independent linear stochastic processes preserving length, frequency content, and amplitude distribution of the original time series that was proposed in Ref.7, may not be suitable for testing hypothesis regarding network topology, since its alterna- tive includes any set of dependent processes, irrespective of the topology of the pattern of their dependence. Re- jection of the null hypothesis according to Bialonski et al.7 gives statistical support for any dependence struc- ture from the small-world topology on one side, to the randomly connected processes on the other side. As clearly demonstrated in the simulations, the strength of the bias crucially depends on many param- eters of the underlying system, including the density of links and the distribution of their values. On the other side, researchers commonly turn to com- puting “at least” functional connectivity because they consider the full structure of the underlying dynamical system difficult (or impossible) to estimate from avail- able data. Theferore the above named parameters of the underlying system, necessary for determining the size of the small-world bias, are not available in practical situa- tions. This is why constructing a suitable test or correc- tion procedure is not straightforward and constitutes on open problem for further research. Of course, in many situations, the functional connec- tivity approach may still be suitable and remain in wide use; it is just that the interpretation should take properly into account the limitations of the approach. V. CONCLUSIONS 7 the In conclusion, increasingly used functional- connectivity approach to complex network graph con- struction bears an inherent strong bias towards small- world-like properties as measured by the conventional criteria. This should be taken into account when analyz- ing data using this approach in conjunction with graph- theoretical analysis in order to avoid erroneous interpre- tations. Ultimately, principled solutions should be sought to overcome this bias as well as other complications con- cerning the relation between structural and functional connectivity26. Dynamical models of complex networks are likely to play a key role in this challenge. ACKNOWLEDGMENTS This study was supported by the Czech Science Foun- dation project No. P103/11/J068. 1D. Watts and S. Strogatz, “Collective dynamics of ‘small-world’ networks,” Nature 393, 440–442 (1998). 2D. S. Bassett and E. Bullmore, “Small-world brain networks,” Neuroscientist 12, 512–523 (2006). 3A. Tsonis and P. Roebber, “The architecture of the climate net- work,” Physica A 333, 497–504 (2004). 4P. Erdos and A. R´enyi, “On the evolution of random graphs,” in Publication of the Mathematical Institute of the Hungarian Academy of Sciences (1960) pp. 17–61. 5S. Maslov and K. Sneppen, “Specificity and stability in topology of protein networks,” Science 296, 910–913 (2002). 6S. Bialonski, M.-T. Horstmann, and K. Lehnertz, “From brain to earth and climate systems: Small-world interaction networks or not?” Chaos 20, 013134 (2010). 7S. Bialonski, M. Wendler, and K. Lehnertz, “Unraveling spuri- ous properties of interaction networks with tailored random net- works,” PLoS One 6, e22826 (2011). 8E. Langford, N. Schwertman, and M. Owens, “Is the property of being positively correlated transitive?” American Statistitian 55, 322–325 (2001). 9J. Hlinka, M. Palus, M. Vejmelka, D. Mantini, and M. Corbetta, “Functional connectivity in resting-state fmri: Is linear correla- tion sufficient?” NeuroImage 54, 2218–2225 (2011). 10D. Hartman, J. Hlinka, M. Palus, D. Mantini, and M. Corbetta, “The role of nonlinearity in computing graph-theoretical proper- ties of resting-state functional magnetic resonance imaging brain networks,” Chaos 21, 013119 (2011). 11M. A. Kramer, U. T. Eden, S. S. Cash, and E. D. Kolaczyk, “Network inference with confidence from multivariate time se- ries,” Physical Review E 79 (2009). 12E. Bullmore and O. Sporns, “Complex brain networks: graph theoretical analysis of structural and functional systems,” Nature Reviews Neuroscience 10, 186–198 (2009). 13M. Palus, D. Hartman, J. Hlinka, and M. Vejmelka, “Discern- ing connectivity from dynamics in climate networks,” Nonlinear Processes in Geophysics 18, 751–763 (2011). 14M. D. Humphries and K. Gurney, “Network ‘small-world-ness’: A quantitative method for determining canonical network equiv- alence,” PLoS One 3, e0002051 (2008). 15M. Rubinov and O. Sporns, “Complex network measures of brain connectivity: Uses and interpretations,” NeuroImage 52, 1059– 1069 (2010). 16H. Lutkepohl, New introduction to multiple time series analysis (Springer, Berlin [u.a.], 2005). 8 17“See supplementary material available as an ancillary file for the detailed results of parameter study with wide range of parameter settings.” . 18Y. Liu, M. Liang, Y. Zhou, Y. He, Y. Hao, M. Song, C. Yu, H. Liu, Z. Liu, and T. Jiang, “Disrupted small-world networks in schizophrenia,” Brain 131, 945–961 (2008). 19M. P. van den Heuvel, C. J. Stam, M. Boersma, and H. E. H. Pol, “Small-world and scale-free organization of voxel-based resting- state functional connectivity in the human brain,” NeuroImage 43, 528–539 (2008). 20J. Wang, X. Zuo, and Y. He, “Graph-based network analysis of resting-state functional mri,” Frontiers in Systems Neuroscience 4, e00016 (2010). 21J. F. Donges, Y. Zou, N. Marwan, and J. Kurths, “Complex networks in climate dynamics,” European Physical Journal 174, 157–179 (2009). 22W. Deng, W. Li, X. Cai, and Q. A. Wang, “Self-similarity and network perspective of the chinese fund market,” Physica A 390, 3826–3834 (2011). 23C. J. Honey, J.-P. Thivierge, and O. Sporns, “Can structure predict function in the human brain?” NeuroImage 52, 766–776 (2010). 24M. Rubinov and O. Sporns, “Weight-conserving characterization of complex functional brain networks,” NeuroImage 56, 2068– 2079 (2011). 25B. C. M. van Wijk, C. J. Stam, and A. Daffertshofer, “Com- paring brain networks of different size and connectivity density using graph theory,” PLoS One 5, e13701 (2010). 26S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D. U. Hwang, “Complex networks: Structure and dynamics,” Physics Reports 424, 175–308 (2006).
1511.09173
1
1511
2015-11-30T06:15:31
Recognizing Temporal Linguistic Expression Pattern of Individual with Suicide Risk on Social Media
[ "cs.SI", "cs.CL" ]
Suicide is a global public health problem. Early detection of individual suicide risk plays a key role in suicide prevention. In this paper, we propose to look into individual suicide risk through time series analysis of personal linguistic expression on social media (Weibo). We examined temporal patterns of the linguistic expression of individuals on Chinese social media (Weibo). Then, we used such temporal patterns as predictor variables to build classification models for estimating levels of individual suicide risk. Characteristics of time sequence curves to linguistic features including parentheses, auxiliary verbs, personal pronouns and body words are reported to affect performance of suicide most, and the predicting model has a accuracy higher than 0.60, shown by the results. This paper confirms the efficiency of the social media data in detecting individual suicide risk. Results of this study may be insightful for improving the performance of suicide prevention programs.
cs.SI
cs
Recognizing Temporal Linguistic Expression Pattern of Individual with Suicide Risk on Social Media Aiqi Zhang1,2, Ang Li3, Tingshao Zhu1,4* 1Institute of Psychology, Chinese Academy of Sciences, China 2University of Science and Technology of China, Hefei, Anhui, China 3Department of Psychology, Beijing Forestry University, Beijing, China 4Institute of Computing Technology, Chinese Academy of Sciences, China *Corresponding author: Tingshao Zhu [email protected] ABSTRACT Suicide is a global public health problem. Early detection of individual suicide risk plays a key role in suicide prevention. In this paper, we propose to look into individual suicide risk through time series analysis of personal linguistic expression on social media (Weibo). We examined temporal patterns of the linguistic expression of individuals on Chinese social media (Weibo). Then, we used such temporal patterns as predictor variables to build classification models for estimating levels of individual suicide risk. Characteristics of time sequence curves to linguistic features including parentheses, auxiliary verbs, personal pronouns and body words are reported to affect performance of suicide most, and the predicting model has a accuracy higher than 0.60, shown by the results. This paper confirms the efficiency of the social media data in detecting individual suicide risk. Results of this study may be insightful for improving the performance of suicide prevention programs. KEYWORDS: suicidal process, blogs, Chinese, classification model, fast Fourier transformation INTRODUCTION Suicide is one of the leading causes of deaths worldwide. The World Health Organization (WHO) reported that, on average, a suicide occurs in every 40 seconds (World Health Organization, 2014). Furthermore, the effect of completed suicide on families and communities are often devastating (Clark & D Goldney, 2000; Jordan & McIntosh, 2011). Many suicide deaths are preventable (Bailey et al., 2011), which requires to detect individual suicide risk among populations in real-time. However, traditional methods (e.g. self-report ratings, structured interview, and clinical judgment) fail to meet the requirement of early detection (McCarthy, 2010), which suggests the need to improve existing methods. The development and prevalence of social media sheds new light on this direction. Social media users are motivated to disclose themselves online, and some of them even have broadcasted their suicide thoughts and behaviors on social media sites, such as Facebook and Sina Weibo (Murano, 2014). More importantly, social media data is publicly available and can be processed in real-time. It implies that social media might be an efficient platform for detecting individual suicide risk. Because the characteristics of the language use can be indicative of personal inner process (e.g. thoughts, intentions, and motivations), conducting content analysis on personal linguistic materials (e.g. suicide notes) is recognized as an important method for understanding suicidal thoughts and behaviors (Pestian, et al, 2012; Cheung, et al, 2015). Many studies have confirmed correlations between the frequency of any words in social media posts and individual scores on suicide risk, suggesting the linguistic features of the language use can be used as valid indicators for detecting individual suicide risk on social media (McCarthy, 2010; Sueki, 2015). However, few studies focused on the temporal relationships between the changes in patterns of the language use and levels of suicide risk, which may provide insight into the track of the suicidal process on social media. Li et al (2014) used the Chinese Linguistic Inquiry and Word Count (CLIWC) program to analyze a 13-year-old boy’s 193 blogs, which were posted during the year prior to his suicide death. They found that the temporal analysis method can be helpful to understand the suicidal process of completed suicides on social media. Although the temporal analysis on social media data provides an opportunity to identify those at risk of suicide, computational methods of online detection have not yet been fully established (Christensen, et al, 2014). Besides, due to the limited sample size, the performance of the temporal analysis also needs to be tested on a larger population. This paper aims to examine the temporal patterns of suicidal users’ language use and then use of such patterns to build classification models for differentiating people with higher and lower levels of suicide risk. METHOD Because Weibo (weibo.com) is the most popular Chinese micrologging service provider in China, this study was conducted on such platform. This study consists of two steps: Examining temporal patterns of the suicidal language use and Building classification models for identifying people at risk of suicide. Examining temporal patterns of the suicidal language use: We examined temporal patterns of the suicidal language use using a three-step procedure: (1) Collecting Weibo posts; (2) Extracting linguistic features; (3) Exporting time series data; and (4) Conducting cluster analysis on time series data. To identify the unique use of language among suicidal users, we need to collect Weibo posts from individuals with different levels of suicide risk (i.e. individuals who complete suicide, individuals at high risk of suicide, and individuals at low risk of suicide), separately. To find out users who complete suicide, we contacted with a user (逝者如斯夫 dead), who is famous for collecting news reports about suicidal users. He advised us a list of suicidal users. We confirmed the list by both double-checking relevant news reports and looking through comments left on Weibo accounts of those suggested users. Then, we did a further scrutiny of those confirmed suicidal users to exclude the following: (a) users who are not Chinese citizens; (b) users who might update Weibo posts for business purposes (e.g. movie and sports stars); (c) users who updated less than 20 posts. Finally, we got a total of 30 suicidal Weibo users (15 males and 15 females) and downloaded their Weibo posts since registration. To find out users at high or low risk of suicide, we randomly selected 1,500 users from a customized Weibo database composed of 1.06 million active Weibo users (Li, et al., 2014). All 1,500 users were administrated by Suicidal Possibility Scale (SPS), which is an effective screening tool designed to assess suicide risk in adolescents and adults (Gençöz, 2006; Naud, 2010). SPS consists of 36 self-rating items. Participants rated themselves on each item by a 4-point Likert Scale (1=None or little of the time to 4=All of the time). High scores indicate high suicide risk. The Chinese version of SPS was used in this study (Huang et al., 2012). The Cronbach’s Alphas for the whole-questionnaire was ? in our data. All participants were divided into high risk and low risk group based on scores of the test (Li, et al., 2014). In this study, we randomly selected 30 users from each one group and got a total of 60 users. Then, we downloaded Weibo posts of these 60 users since registration. 11540*102 curves of 11540 users 90*102 curves of 90 users fast Fourier transform 11540 periods 90 periods re-extract using the last period groups of users by feature, named 1, 2, 3… clustering of users within each feature new 11540*102 curves new 90*102 curves 90 curves classified into nearest groups matrix of size 90*102, whose entries in the i-th column are names of groups in the i-th feature classification DECISION TREES and PREDICTING MODELS Pre-processing We extracted linguistic features from collected Weibo posts using SCMBWC (Simplified Chinese Micro-blog Word Count Dictionary) and TextMind, based on the Chinese version of LIWC (CLIWC). This provides 80 psychologically meaningful language variables (e.g. emotion words) and other 22 linguistic features indicating the frequency of using different punctuation marks and words, such as the number of word-per-sentence and frequency of latin words. Finally, we got a total of 102 linguistic features (80+22). For each user, we computed feature values per day and produced a time vector (102 × number of observation days) composed of 102 time series data. Sequences of 80 linguistic features and 11 kinds of punctuation were obtained by computing frequency of certain features using day as unit, while sequences of the other 11 features described counting of words and word-per-sentence, rates of Latin word, numbers of URLs and so on. After producing individual time vectors, we found there existed differences in the length of time vectors among different users. For example, among a total of 90 users, the maximum length of the time vector was 1844 (days) and the minimum length was 42 (days). Because some users updated their Weibo posts with few Chinese characters in the last 42 days of the observation period, we cannot make the length of observation uniformly by selecting the minimum length of observation. Besides, because of the different patterns of use, different users have personalized plans for updating Weibo posts. In our dataset, we found that, among different users, the time period for updating the last 100 Weibo posts ranges from 2 days to 2 years. Therefore, we also cannot conduct analysis on a certain number of latest Weibo posts for all users. To solve the problem, for each time series data, we used the algorithm of Fast Fourier Transform (FFT) to compute the Discrete Fourier Transform (DFT), which was recognized as the amplitudes of all possible frequencies. we viewed changes of values to the features by day as personally fluctuations of mental or physical state and used Fourier transformation to compute the period. A fast Fourier transform (FFT) is implemented to decompose the original time sequence as several sin curves with different frequencies. With this we take periods to the maximal amplitudes for the re-extracting of the time sequences. From each user we intercept the last period of his sequence and use 1/12 of the period as time unit. 1/12 is defined because the shortest period is 12 days. By this method we got sequences with fairly good consistency. Besides, to cluster and classify the 90 users into clusters, 11,540 users were chosen randomly from a specific group of Weibo users, of whom the total duration since the accounts opened was between 50 - 1800, consistent with that of the 90’s. By conducting the same process to all the users, we now obtained the final (11540 + 90)*102 time sequences of length 12 for learning and predicting. Smoothing and Fourier transforming Missing values, referred particularly items equaling 0 in the sequences in our case, meant the user didn't post any words in a certain period of time. The missing data effects statistical inference much, since one didn’t post anything online never means that there was no linguistic behavior. To deal with zero values in the sequences, we applied lpint (Martingale estimating equation local polynomial estimator of counting process intensity function) in package lpint to the sequences. Take social-life words (SLW), one of the typical patterns mentioned above, as an example, we model the numbers of SLW by a doubly stochastic Poisson process N(t) with intensity process Y(t)a(t), where Y(t) counts the words of Weibo posts at time t, and a(t) denotes the SLW rate at time t. We estimated the intensity function with the local polynomial intensity estimator proposed in (Chen, Yip, and Lam 2011), and the estimator for a(t) is given by where , , with the convention J(s)/Y(s) = 0 when Y(s) = 0 to protect against division by zero, and with the notations introduced as follows. ei = (0, ..., 0, 1, 0, ..., 0)T is a (p+1)-dimensional unit vector with 1 as its i-th component, g(x) = (1, x, ..., xp/p!)T and Kb(·) = (1/b)K(·/b) is the scaled version of the Epanechnikov kernel where bandwidth b is decided by a data-driven selector. We got an output of a smoothed vector with length longer than length of the input vector by 2. The smoothed sequence was obtained by excising the sub-sequence of the second to the last but one items. By normalizing it we got the final sequence for later processing, while the same method was implemented (11540 + 90) times, covering every user studied. (11540 + 90) smoothed and normalized sequences were obtained. Then we applied Fast Fourier Transformation again to the smoothed sequence to get the period properties of them. For each of the 102 features, we combined descriptive statistics (mean values and standard deviations) with fft coefficients and phase corresponding to the maximum amplitude, which are extracted from the returned values of the fft function, and got a matrix telling characteristics about the given feature.Then we had a number of rows, each represented one of the users with information of time sequence. So in all there were 204 matrices computed, 102 of them based on the 11540 random users and other 102 based on 90 observations with labels 0,1 and 2. K-means clustering The 102 matrices of row number 11540 were for k-means clustering in our case. For each feature, a proper value for the number of clusters k was found out by respectively calculating Silhouette coefficient while k was possibly taken value between 1 and 7. We then applied function kmeans to matrices and got 102 vectors with levels 1 to the selected number of k, each of length 11540, describing nominally which cluster the subjects were in. Correspondingly we got 102 matrices of cluster centers also. Matrices telling properties of sequences of observations with labels were subtracted from the centers obtained from kmeans clustering. Absolute values are calculated to show distances. We classified each user into a certain cluster, which was noted by a number. From this we got a 90*102 matrix with every column nominal scales indicating several classes of time sequences. By binding factor vector with levels 0,1 and 2 and length 90 with the 90*102 matrix we obtained a matrix with 103 columns, the last column dependent variable. On this basis, classification could be implemented and decision trees were to be drawn. Drawing decision trees and predicting We aimed at getting the relevant features to the labels and predicting by classifying and computing decision trees. Two method were applied to do this work: rpart (Recursive Partitioning and Regression Trees) in package rpart and train (Fit Predictive Models over Different Tuning Parameters) gbm (Generalized Boosted Regression Modeling) in package caret. In the rpart method, we draw regression tree based on random 3/4 of all the 90 observations with the not chosen 1/4 used as test set, while by functions in package caret we remove variables whose variance too small and apply function rfe to the training set for feature selection before modeling, sampling as well. 3/4 random users for training and the rest 1/4 for testing. Different from the first method, we set resampling method, the number of folds and the number of complete sets of folds for cross validation and set the range of parameters needed in random forest algorithm when building boosted models. The output of the modeling were selected variables, confusion matrix out from the predicting process compared with the test set, resampling results and computed relative influence of each variable in the gbm object, generated by function summary.gbm. From the two classification model we predicted the level of any unstudied time sequence of Weibo users, corresponding to the factor vector label with levels 0, 1 and 2. Variables with the most significant influence were also obtained, by running several times and finding the most frequently appearing features in the summary part. RESULTS Since training set was random extracted, we got different models with different accuracy every time. Here is a confusion matrix of the learning process using 10-folds. Reference Prediction 0 1 2 0 2 0 1 1 0 3 1 2 1 0 1 Accuracy : 0.6667 95% CI : (0.2993, 0.9251) No Information Rate : 0.3333 P-Value [Acc > NIR] : 0.04242 Kappa : 0.5 Figure 1-5 are decision trees generated by rpart method, followed by confusion matrices interpreting the effect of predicting. ---------------------------------- Confusion Matrix and Statistics Reference Prediction 0 1 2 0 2 1 0 1 0 3 0 2 1 0 2 Accuracy : 0.7778 95% CI : (0.3999, 0.9719) No Information Rate : 0.4444 P-Value [Acc > NIR] : 0.04635 Kappa : 0.6667 To study which of the features influences most to the result, the following shows 3 independent experiment of gbm fitting and summary.gbm. -------------------------------------------- First 5 variables in the summary graph: body words, auxiliary verbs, motion words, parenthesis, and time words By counting frequency of variables during the computed relative influence, we get 10 most significant ones: punctuation_parenth, textmind_achieve, textmind_anx, textmind_auxverb, textmind_body, textmind_feel, textmind_home, textmind_insight, textmind_motion, textmind_ppron Discussion & Comparison with previous case studies Previous studies worked on the correlation between suicide and LIWC features, selecting features with small p values as significant ones (M. Fernández Cabana, 2012). Other reports show comparison of factors like time career age and word type and conclude the most related treatment (Stirman, 2001). Logistic regression is applied to some data as the independent variables were viewed continuous (Masuda1, 2013). There are no studies on suicide dealing with a bunch of users making use of LIWC before. In our case we classify the observations into several groups by features and draw decision trees using group names made in classifying. Since all the features expressed as nominal scales, there was no correlation test to be computed, and instead of p-value showing the relationship between suicide and variables we obtained relatively most significant ones in among all the features and statistics. Future studies, therefore, can start up in logistic regression with Fourier coefficients of the sequences as independent variables. Chinese materials were studied in our case, whereas most previous studies have only analyzed materials written in or translated into English, while the writer’s original psychological meaning and linguistic style may not be completely preserved after translation (Tim M.H. Li, 2014). Our study differs from previous ones using Chinese version of the LIWC in that we studied a number of social network site users and computed decision trees. Chinese-specific categories may further reveal psychological cues of suicide that cannot be used in other languages (Tim M.H. Li, 2014). Notice that we use cluster centers to notify properties of clusters, thus these centers should be showed to demonstrate distinctive features for suicide groups. According to decision trees gained from different training sets, among the 10 most significant features, we got 4 relative to group 0, that is, users who committed suicide. punctuation_parenth AVG SD 0 1 2 Arg1 1 15.13012161 14.51798345 0.395844657 0.287937124 0.205698385 0.031531324 2 2.741153902 2.866167462 0.382331809 0.310391627 0.192305825 0.019072178 3 8.239399639 6.85765465 0.42652605 0.295963262 0.197711739 0.033835113 textmind_auxverb AVG SD 0 1 2 Arg1 1 0.859780602 1.13359216 0.42544777 0.351378434 0.192942227 -0.030703143 2 0.45646321 0.643238929 0.381737123 0.360421457 0.198317093 -0.028562451 3 1.23507966 2.083186149 0.364611951 0.330547531 0.219752759 -0.016703396 4 1.569081052 0.761592293 0.495306702 0.273604439 0.168876502 0.101621611 5 2.746256923 5.222238298 0.300807037 0.307408881 0.230586356 0.007398932 6 2.288426194 2.067912902 0.457584683 0.305631784 0.191989699 0.044695307 7 0.035452023 0.099684427 0.09538323 0.127791217 0.076010697 0.011927493 textmind_ppron AVG SD 0 1 2 Arg1 1 4.886485982 5.88412429 0.390026292 0.309999442 0.20601711 -0.006538162 2 2.605513666 3.248422761 0.4117724 0.320524585 0.206776553 -0.002718911 3 1.357334981 1.392897273 0.410696572 0.324519575 0.187144587 0.005262552 4 3.547252654 1.608387298 0.497152643 0.275347883 0.168847521 0.063698304 textmind_body AVG SD 0 1 Arg1 1 2.395603793 4.59783583 0.301782598 0.318970376 0.037743009 2 0.129525066 0.263360931 0.228623388 0.266353604 -0.012259764 3 1.492920946 0.917740263 0.488347043 0.288160849 0.105404415 4 0.649327344 0.671164326 0.450879339 0.338566756 0.009294324 5 3.877760453 9.115389734 0.219022062 0.296123209 0.038607001 6 0.894588789 1.546070027 0.362208628 0.344195046 -0.012441021 7 1.666291015 2.568380012 0.360546753 0.324560843 0.027588917 From the decision trees we see that in the use of parentheses, the suicide group are matched with time sequences in cluster 2. Relatively low average value, small standard deviation and phases corresponding to max amplitudes near 0 are mainly observed to describe the characteristic of this cluster of curves, among which phases near 0 mean that the sine waves with the largest amplitudes start at somewhere near time 0. For use of auxiliary verbs, group of suicides were found high at both FFT coefficient of 1 Hertz and average value (see at parameters of cluster 2, 4, 5, 6 and 7). The large coefficients corresponding to 1 Hertz may imply that the time sequence curves are of relatively significant property of forming one whole sine period. Besides parentheses and auxiliary verbs we got personal pronouns also relative to classifying groups. All the 4 clusters except the third one are divided to node with suicide group. Comparing parameters we found that cluster 3 has got the lowest level of average value and the smallest standard deviation, which means the suicide group is of relatively much use of personal pronouns, which is in line with previous reports. Another result different from former studies is the use of body words. Cluster 3, 4, 5 and 7 are claimed to be related to suicide group and most curves in these clusters share a similarly high level of phase to the max amplitude. Also coefficients of 0 Hertz are distinctively larger than the other two matched groups, showing that tiny fluctuations are recorded in the curves of suicide group. CONCLUSION Relationship between suicide and linguistic performance has been studied for long. Previous cases used several methods, including method to treat posting frequency, and the studies focused on materials in several languages, on and off-line. We didn’t get the consistent results with former cases except use of pronouns. However there are limitations in our study. 90 is a rather small sample size for classifying users with known labels 0, 1 or 2, and high-score group and low-score group might not be exactly classified. Besides, the CLIWC categories shows only the originally used meanings of the words with no other meanings like irony or sarcasm, not to mention the meaning of the contents. Still, it is an interesting field for future studies to deal with linguistic and behavioral characteristics of suicides. Our work provides a new method to see into the problem and gives different results from previous studies, which may help to the prediction and cure of psychological health. REFERENCE Bailey, R.K., Patel, T.C., Avenido, J., Patel, M., Jaleel, M., Barker, N.C., Khan, J.A., Ali, S., Jabeen, S., (2011). Suicide: current trends. J. Natl. Med. Assoc. 103, 614–617. Cheung, G., Merry, S., & Sundram, F. (2015). Late-life suicide: Insight on motives and contributors derived from suicide notes. Journal of affective disorders, 185, 17-23 Christensen, H., Batterham, P., O'Dea, B., 2014. E-health interventions for suicide prevention. Int. J. Environ. Res. Public Health 11, 8193–8212. Clark, S. E., & Goldney, R. D. (2000). The impact of suicide on relatives and friends. The international handbook of suicide and attempted suicide, 467-484. Fernández-Cabana, M., et al. (2013). "Suicidal Traits in Marilyn Monroe’s Fragments." Crisis 34(2). Gao, Rui, et al. "Developing simplified Chinese psychological linguistic analysis dictionary for microblog." Brain and Health Informatics. Springer International Publishing, 2013. 359-368. Gençöz TOP. (2006). Associated factors of suicide among university students: importance of family environment. Contemporary Family Therapy 28: 261-268. DOI: 10.1007/s10591-006-9003-1. Guan, L., et al. (2014). Identifying Chinese Microblog Users with High Suicide Probability using Internet-based Profile and Linguistic Features: Classification Model. Huang C, Chung C, Hui N, Lin Y, Seih Y, Lam B, Pennebaker J. (2012). The development of the Chinese Linguistic Inquiry and Word Count Dictionary. Chinese Journal of Psychology 55: 185-201. Jordan, J. R., & McIntosh, J. L. (2011). Suicide bereavement: Why study survivors of suicide loss. Grief after suicide: Understanding the consequences and caring for the survivors, 3-17. Li L, Li A, Hao B, Guan Z, Zhu T. (2014). Predicting active users' personality based on micro-blogging behaviors. PLoS ONE9: e84997 DOI 10.1371/journal.pone.0084997. Li, T. M., et al. (2014). "Temporal and computerized psycholinguistic analysis of the blog of a Chinese adolescent suicide." Crisis 35(3). Masuda, N., et al. (2013). "Suicide ideation of individuals in online social networks." 9(1). McCarthy, M. J. (2010). Internet monitoring of suicide risk in the population. Journal of affective disorders, 122(3), 277-279. Murano G. (2014). 8 shocking suicide attempts posted on the Internet. Available at http://www.oddee.com/item 98907.aspx (accessed 8 July 2015). Naud H, Daigle M S. (2010). Predictive validity of the Suicide Probability Scale in a male inmate population. Journal of Psychopathology and Behavioral Assessment 32: 333-342. DOI: 10.1007/s10862-009-9159-8. Pestian, J. P., Matykiewicz, P., Linn-Gust, M., South, B., Uzuner, O., Wiebe, J., ... & Brew, C. (2012). Sentiment analysis of suicide notes: A shared task.Biomedical informatics insights, 5(Suppl 1), 3. Stirman, et al. (2001). "Word use in the poetry of suicidal and nonsuicidal poets." Psychosomatic Medicine 63(4). Sueki, H. (2015). The association of suicide-related Twitter use with suicidal behaviour: A cross-sectional study of young internet users in Japan. Journal of affective disorders, 170, 155-160.doi: 10.1016/j.jad.2014.08.04 Tausczik, et al. (2010). "The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods." Journal of language and social psychology 29(1). World Health Organization, (2014). Preventing Suicide: A Global Imperative. World Health Organisation, Geneva, Switzerland.
1308.6118
1
1308
2013-08-28T10:25:02
Using tf-idf as an edge weighting scheme in user-object bipartite networks
[ "cs.SI", "cs.IR", "physics.soc-ph" ]
Bipartite user-object networks are becoming increasingly popular in representing user interaction data in a web or e-commerce environment. They have certain characteristics and challenges that differentiates them from other bipartite networks. This paper analyzes the properties of five real world user-object networks. In all cases we found a heavy tail object degree distribution with popular objects connecting together a large part of the users causing significant edge inflation in the projected users network. We propose a novel edge weighting strategy based on tf-idf and show that the new scheme improves both the density and the quality of the community structure in the projections. The improvement is also noticed when comparing to partially random networks.
cs.SI
cs
Using tf-idf as an edge weighting scheme in user-object bipartite networks Sorin Alupoaie, P´adraig Cunningham School of Computer Science & Informatics University College Dublin [email protected],[email protected] May 11, 2014 Abstract Bipartite user-object networks are becoming increasingly popular in rep- resenting user interaction data in a web or e-commerce environment. They have certain characteristics and challenges that differentiates them from other bipartite networks. This paper analyzes the properties of five real world user-object networks. In all cases we found a heavy tail object degree dis- tribution with popular objects connecting together a large part of the users causing significant edge inflation in the projected users network. We pro- pose a novel edge weighting strategy based on tf-idf and show that the new scheme improves both the density and the quality of the community struc- ture in the projections. The improvement is also noticed when comparing to partially random networks. 1 Introduction Social networks are becoming increasingly popular for modeling interactions be- tween nodes or individuals of the same kind (one-mode or unipartite) and there is a large amount of work recently focusing on various aspects of social networks. However some real-world networks have a more heterogeneous structure where two kinds of individuals (or items) interact with each other with ties formed be- tween individuals of different types only. Bipartite networks (two-mode) are a natural fit for these sort of systems as they are represented as a graph with two disjoint sets of nodes and edges exists only between nodes from different sets. There are many examples of complex networks that have a bipartite structure, 1 such as actor-movie networks, where actors are linked to movies they played in (Guillaume & Latapy, 2004), authoring or collaboration networks, where authors are linked to the paper they published (Newman, 2001a), human sexual networks, consisting of men an women (Liljeros et al., 2001) and the metabolic networks between chemical reactions and metabolites (Jeong et al., 2000). Even though there is a lot more focus on social networks in the scientific community, research on bipartite or two-mode networks has moved forward in the last couple of years. User-object networks are emerging as a special class of bipartite networks with certain characteristics that are different than the relatively well studied author- paper and actor-movie networks. Users interact continuously with objects, based on their own selection and preference. This representation is appropriate for mod- eling activities in web and e-commerce environments. For example the social tag- ging, music listening activity or movie watching can be modelled as an user-object network. In certain cases these networks can be also referred as consumer-product networks where an edge links a consumer with a product when the former buys or views that particular product (Huang et al., 2007). One particular characteristic of user-object networks is the presence of a sig- nificant number of highly popular objects reflected by the heavy tail distribution of the objects degree (Shang et al., 2010). The heavy tail is believed to be formed through preferential attachment (Barabasi et al., 2002), where users tend to inter- act more with objects that are already popular. These popular objects have a sig- nificant effect on the properties of both bipartite and projected networks, causing significant link inflation in the latter. On the other side they are a poor indicator of users interests, while unpopular objects are the best at describing common tastes shared by users (Shang et al., 2010). In this paper we are proposing a method of (re)assigning weights to edges in a bipartite user-object network based on the popular tf-idf method that will reduce the effect of popular objects while taking into account user’s preferences. We validate the new method by showing that both density and community structure of the projected users network is improved com- pared to both the original projected network and the network generated partially in a random fashion. The remainder of the paper is structured as follows. Next section reviews the state of the art literature on bipartite and user-object networks. In section 3 we provide a comprehensive analysis of user-object networks and their properties and challenges, including density and clustering. Section 4 proposes the new weighting scheme based on tf-idf. In section 5 we validate the proposed approach by comparing densities and modularities of the projected users network to the random case. Finally, we conclude the paper in section 6 by summarizing our findings and pointing out future research directions. 2 2 Related work One popular approach when analyzing two-mode networks is to transform them into one-mode networks through a method known as projection and then use the methods available for social networks. Newman (2001a) and Barabasi et al. (2002) study scientific collaboration networks between authors of scientific papers by projecting the authoring network (author-paper) to an unweighted co-authoring network (author-author). A tie is defined between two authors if they have at least one collaboration together, without taking into account the frequency of collab- oration between the authors. In order to avoid the loss of information through unweighted projection, some authors proposed a weighting method. Ramasco & Morris (2006) and Li et al. (2007) use a simple mechanism to assign weights, based on the number of times those authors collaborated. Other papers propose a different approach to weighting. In Newman (2001b) the contribution of a co- authored article to the weight of an edge between two authors depends on the degree of the article. This is based on the assumption that a low degree article defines a stronger relationship between authors than a high degree one. Li et al. (2005) considers a saturating effect where the increase in strength of a relationship between two authors slows down when more articles are added, as they already know each other well after writing some papers together. In order to avoid loss of information through projection (weighted or un- weighted), several features and methods have been proposed for bipartite net- works, most of them borrowed from social networks. Borgatti & Everett (1997) studies visualization techniques of bipartite networks and defines several proper- ties for these type of networks like density and centrality. Latapy et al. (2008) uses several statistics to analyze two-mode data and proposes new bipartite prop- erties like clustering coefficient and redundancy coefficient. Lind et al. (2005) and Zhang et al. (2008) redefine the clustering coefficient for bipartite networks by considering squares (4-cycles) instead of triangles, which are not possible in a two-mode configuration. Opsahl (2011) proposes a new measure of clustering based on the notion of triadic closure defined between three nodes of the same type. Several community detection methods have been proposed for bipartite net- works (Fortunato, 2010). However most of these methods are not optimized for large networks on the scale seen in web or e-commerce environment. Therefore when detecting communities in bipartite networks a widely used approach is to project them on one of the node sets and apply scalable community detection methods from social networks on the projection. The research work mentioned above focused either on specific networks like collaboration network or generally on bipartite networks. They didn’t consider user-object networks as a particular class of bipartite networks. On the other side, especially in a web or online environment user-object networks with their 3 particularities are becoming increasingly popular in modeling the interaction be- tween users (e.g. customers, listeners, watchers etc) and the online system (e.g. e-commerce, music, video etc). Huang et al. (2007) is analyzing the bipartite consumer-product graphs representing sales transactions in an e-commerce set- ting. They found a larger than expected average path length and tendency of customers to cluster according to their purchases. A new recommendation algo- rithm is proposed based on these findings. Grujic et al. (2009) uses a bipartite representation of interactions between users and web databases to study patterns of clustering based on users common interests. They found a power law degree distribution of objects and a disassortative mixing pattern with high degree (ac- tive) users interacting mostly with low degree (unpopular) objects and low degree (inactive) users interacting mostly with high degree objects (popular). The authors applied a spectral clustering method on the weighted projected network and found communities relevant to subjects of common interests. Recently, Shang et al. (2010) did an empirical analysis of two web-based user- object networks collected from two large-scale web sites and found the same power law degree distribution for objects and disassortative mixing pattern. A new property is proposed called collaborative similarity capturing the diversity of tastes based on the collaborative selection. For the lower-degree objects the au- thors found a negative correlation between object collaborative similarity (how similar are the users interacting with a specific object) and the object degree. Therefore unpopular (low degree) objects are considered a good indicator for the users common interests, while popular objects are less relevant. Starting from this observation we propose a new weighting scheme for user-object bipartite net- works that will increase the relevance of unpopular object in the network and decrease the importance of popular ones. 3 Characteristics of user-object networks A user-object network can be represented as a graph G = (U, O, E), where U is the users set, O is the objects set and E ⊆ (U × O) is the set of edges between users and objects. We denote by nu = U and no = O the number of users and the number of objects, respectively. We denote by m = E the number of links or edges in the bipartite network. We define (cid:104)kU(cid:105) ((cid:104)kO(cid:105)) as the average degree of users (objects) and the density of the network as δ(G) = m nonu In user object networks interactions between the two types of nodes, U and O, are event-driven, occurring continuously, and often the same edge is reinforced multiple times. This reinforcement can be represented as a weight assigned to the edge between the two interacting nodes. On the other side, in most bipartite networks there is only one interaction between two nodes (an actor can only play . 4 Figure 1: Example of weighted bipartite network where users (blue nodes) are connected with objects (red nodes). once in a movie). The behaviour of nodes is also particular. Users are active while objects are passive. This is similar to author-paper networks but different than other bipartite networks such as human sexual networks where both nodes are active (Shang et al., 2010). Figure 1 illustrates a small example of a weighted bipartite network where five users (blue nodes) are interacting with six objects (red nodes). Thickness of an edge shows how strong the interaction is between the user and the object (i.e. how often the user ‘touches‘ the object). The degree of an user u ∈ U, denoted by d(u), represents the number of objects connected to that user. Similarly, the degree of an object o ∈ O, denoted by d(o), is the number of users interacting with that object. In our example, user 1 interacts with three objects a, b and d (has a degree of three). Out of these, objects a and b are local as they are only connected to two users (1 and 2), while object d reaches most of the network by being connected to four out of a total of five users. Therefore objects a and b are more relevant to particular interests of user 1 than object d. 3.1 Data We are using five real-world data sets and look at the characteristics of the related user-object networks such as basic statistics, degree distributions and clustering. The first one is a subset of the Last.fm Million Song Dataset (Bertin-Mahieux et al., 2011), where users are connected to tags, with an edge defined between an user and a tag if that user assigned the tag to an artist. The second dataset was extracted from Twitter and includes tweets related to US Politics, covering the period 01/01/2012 - 19/01/2012. This is a subset of a bigger dataset including the US Presidential Campaign and Elections during 2012. The users in the data are the Presidential candidates, governors, senators, 5 political organisations, and journalists. The objects are the web domains included in their tweets. An edge is formed between an user and a domain if the domain was tweeted by that particular user. The third dataset is a subset of a bigger database published by Audioscrob- bler.com containing information about users and the music they listened. In the network representation, an user is connected to an artist with edges weighted based on how often they listen songs from that artist. The Movielens dataset includes ratings (from 1 to 5) of movies by 2000 users, represented as a network. For the purpose of this paper only edges with ratings 4 and 5 were considered (movies that users actually liked). Finally, the last dataset comes from the popular social bookmarking web site delicious.com and includes the network of 973 users and the tags they used for bookmarking. Data Last.fm Twitter Audioscrobbler Movielens Delicious nu 1,892 1,842 183 2,000 973 no 9,748 3,744 21,443 3,336 28,695 m 35,813 13,864 39,195 192,922 126,007 (cid:104)kU(cid:105) 18 7 214 96 129 (cid:104)kO(cid:105) 3 3 1 57 4 δ(G) 0.19% 0.2% 1% 2.9% 0.45% Table 1: Statistics of the five real-world datasets. The basic statistics for these networks are presented in Table 1. All networks have relatively low density (they are sparse), between 0.19% and 2.9%. This is important because it allows for optimization of clustering and community detec- tion algorithms. As we will see below this is not the case for the projections of these bipartite networks. 3.2 Projection Due to the shortage in tools and notions available for two-mode networks a com- mon approach is to transform such a network into its projection by using one of its sets of nodes as a base. For example one can project the network on the users U (objects O) by setting a (weighted) edge between two users (objects) that have at least one object (user) in common. Based on the number of common objects (users), weights can be assigned to edges in the projected network. We define the users-projected network as GU = (U, EU ) and objects-projected network as GO = (O, EO). The number of edges is mU = EU and mO = EO, respectively. no(no−1), The density of the projected networks is δ(GU ) = 2mU respectively. nu(nu−1) and δ(GO) = 2mO 6 One of the unwanted effects of projection is an inflation of the number of links in the resulted network (Latapy et al., 2008), which can be noticed in random networks as well. Newman et al. (2001) have shown that projecting a random bipartite graph can result in very dense networks with high clustering coefficient. In the real world case these dense networks are limiting the computations that could be performed to extract properties and detect community structure. Data Last.fm Twitter Audioscrobbler Movielens Delicious mU 686,536 446,892 10,453 1,786,647 395,835 mO 322,226 88,044 11,253,485 2,879,932 7,378,472 δ(GU ) δ(GO) 38.3% 0.6% 26.3% 1.2% 62.7% 4.9% 89.3% 51.7% 83.7% 1.8% Table 2: Statistics of projections of the real-world bipartite networks. For example, as shown in Table 2, the density is increasing when projecting the real world networks on both user-nodes and object-nodes. However, the inflation of links is considerably (up to 200 times) larger for the projection on user-nodes, while the projection on object-nodes has a density in most cases only several times higher than the original bipartite network. As we will see below this is caused by the small number of very popular objects, the tail of the power law distribution of object degrees. 3.3 Degree distributions One of the most important structural property of networks is the degree distri- bution. In the case of bipartite networks and users-objects networks specifically, distributions of both types of nodes are considered. According to previous studies, users degree generally follow an exponential distribution (Latapy et al., 2008), or stretched exponential (Laherrere & Sornette, 1998) at most, as shown in Shang et al. (2010) or Grujic et al. (2009). On the other side, according to the same papers, the degree distribution of objects follow a heavy tail distribution (power law or similar). This has important consequences on the structure of the projected network and also on the process of clustering the user nodes. Other bipartite net- works like author-paper or actor-movie doesn’t exhibit this property as there is an inherent constraint on how many authors can write a paper or how many actors can play in a movie. Degree distributions of our sample user-object networks are shown in figures 2 and 3. In order to find the closest model that fits the data, for each such em- pirical distribution we evaluate the goodness of fit of multiple distribution mod- 7 (a) Last.fm Users (b) Twitter Users (c) Audioscrobbler Users (d) Movielens Users (e) Delicious Users Figure 2: Degree distributions of users for the real world data sets els by using loglikelihood ratios as described in Clauset et al. (2009). The best fit is found through comparing multiple models two by two: exponential, power law, log-normal and stretched exponential. In each comparison we calculate the loglikelihood ratio between two candidate distributions. This value will indicate which model is a better fit for the data. Also a p-value is calculated for each comparison showing how significant the result is. In table 3 we show the best distribution fit and the related parameters for each dataset. While degree distribution for users (active nodes) don’t expose a heavy tail in most cases (exponential), the degree distribution for objects (passive nodes) fits to one of the distribution models with a tail that is not exponentially bounded (power law or lognormal). Due to the number of high degree values (highly pop- ular objects), a heavy tail with heterogeneous distribution of degrees has a sig- 8 (a) Last.fm Tags (b) Twitter Domains (c) Audioscrobbler Artists (d) Movielens Movies (e) Delicious Tags Figure 3: Degree distributions of objects for the real world data sets Data Last.fm Twitter Audioscr Movielens Delicious Users Objects Best fit Parameters exponential λ = 0.054 lognormal µ = 1.41 exponential λ = 0.0046 lognormal µ = 4.07 exponential λ = 0.0081 Best fit Parameters lognormal µ = −33.18 powerlaw α = 2.05 µ = −2.75 lognormal lognormal µ = 2.84 µ = −9.34 lognormal Table 3: Best fit for degree distributions, users and objects. nificant impact on the structure of the projected network and consequently on the community structure. 9 3.4 Clustering and impact of highly popular objects Clustering or community structure (Newman & Girvan, 2004) is another property of user-object or consumer-product networks. Users or consumers tend to cluster together based on the common interests represented by the common objects they are interacting with (Huang et al., 2007). This property sits at the core of the recommender systems based on collaborative filtering (Breese et al., 1998). How- ever, detecting communities in bipartite networks is somehow challenging with few optimized options available at large scale (Fortunato, 2010). A popular approach is to project the bipartite network on one of its node sets (U or O) and apply the community detection algorithm on the projected network. As seen above, the projection of user-object networks where degrees of objects follow a power law distribution is causing edge inflation in the resulted network by increasing significantly the density of edges (hundreds of times more). This affects the clustering in two ways. First, it ‘dilutes‘ the clusters and decreases the quality of the community structure because of a highly homogeneous distribution of edges among the nodes (Fortunato, 2010). Second, it causes a drop in per- formance of community detection algorithms, most of them optimized for sparse networks. For example, popular algorithms like Clauset et al. (2004), Raghavan et al. (2007) or Blondel et al. (2008) scale extremely well on sparse data but are much less efficient when networks are very dense (number of links m are much larger than number of nodes n). In our case, due to the heavy-tail distributions of objects, user-projections of all five real-world networks are extremely dense ranging from 26% to 89% (Table 2) causing difficulties such as those described above. For example, by looking at the most popular objects in Table 4 one can see that the highest degree node in each case connects together more than a third of users and in some cases even 50%. On the other side, these highly popular objects contain very little or very high level information about the particularities of the adjacent users and are not very meaningful for grouping users together. For example, while Last.fm tags like ’rock’, ’pop’ or ’alternative’ might con- tain some high level information on the users groups, it doesn’t bring specific information about these. In the meantime, unpopular (degree 5) tags like ’sym- phonic rock’, ’david bowie’ or ’true norwegian black metal’ are showing nar- row user interests. Also, highly popular tweeted domains like ’twitter.com’ or ’facebook.com’ are very broad with little clustering information, while unpopular domains like ’radioamerica.org’ or ’seacoastonline.com’ are much more specific. This is in line with Shang et al. (2010) who found that users connected to unpop- ular objects have much higher similarity to each other than the average. Therefore unpopular objects are considered a better indicator for users common interests 10 Tag rock pop alternative Degree Users linked 35.5% 30.9% 28.1% 673 585 532 Domain twitter.com facebook.com youtube.com Degree Users linked 33.2% 24.5% 17.6% 611 451 324 (a) Last.fm user-tag (b) Twitter user-domain Artist Radiohead Coldplay The Beatles Degree Users linked 35.5% 30.6% 28.9% 65 56 53 Movie American Beauty Star Wars IV Star Wars V Degree Users linked 50.4% 42.7% 42% 1009 855 841 (c) Audioscrobbler user-artist (d) Movielens user-movie Tag design video google Degree Users linked 56.1% 55.8% 50.2% 546 543 489 (e) Delicious user-tag Table 4: Top objects by degree with percentage of users each object connects. than popular ones. One simple way to handle this problem is to remove the objects with the high- est degree, but this will result in loss of information overall, especially in cases when these objects are reinforced frequently by some users. The proposed method in section 4 will address this issue by trying to find a balance between how often an user interacts with an object and how popular an object is in the network. 4 Edge weighting using tf-idf One of the most common methods used in information retrieval is the term fre- quency - inverse document frequency (or tf–idf ), a weighing scheme for quanti- fying the importance of a term to a document in a collection (Salton & Buckley, 1988). The tf–idf weight is assigned to each term-document pair and is propor- tional to the relative frequency of the word in the document, adjusted by the pro- portion of that word over the entire collection. This method and variations of it are used by search engines as a central component for ranking the relevance of a 11 document to a query, but also in other applications like text summarization and classification. The tf–idf weight of a term t for a document d in a collection D is defined as the product of the term frequency and inverse document frequency: wd(t) = fd(t) × log( D {d ∈ D : t ∈ d}) (1) The term frequency fd(t) in equation 1 can be the raw or relative frequency of the term t in the document d. The inverse document frequency (second part of the product) measures whether the term is common or rare across all documents in the collection D and is calculated by taking the logarithm of the fraction of the size of the collection D to the number of documents containing the term t. We propose a similar approach for (re)weighting a user-object bipartite net- work in order to reduce the impact of highly popular objects on projection and clustering. Let us replace the documents in the tf–idf scheme with users and terms with objects, and define a weighting scheme as below: U d(o) wnew(u, o) = f (u, o) × log( ) (2) The new weight (2) of an edge between an user and an object can be recal- culated as the product of the normalized object frequency and the logarithm of the inverse object frequency across all users. The former represents the number of object-user interactions (edge weight) with some normalization technique applied. Normalization is required to prevent a bias towards more active users. For exam- ple one can normalize the weight of an edge between an user and an object by taking the ratio of its value to the maximum weight of any given edge connected to that user (3). f (u, o) = w(u, o) max{w(u, p) : p ∈ N (u)} (3) The last part of the product in equation 2 is similar to the concept of inverse document frequency and measures whether the object is common or rare across all users. It is calculated by dividing the total number of users by the (unweighted) degree of the object (number of users interacting with the object), and taking the logarithm of this value. The re-weighting scheme presented above assigns higher values to frequent interactions between users and objects offset by how popular an object is within the collection of users. Unpopular objects increases the weight of an interaction while very popular ones make the interaction less significant. Once the new weights have been calculated, thresholding can be applied to filter out irrelevant edges. As we’ll see in section 5, this reduces significantly 12 (a) Example network with tf-idf weights (b) Filtered network τ = 0.3 Figure 4: Example of user-object network with tf-idf weighting and filtering ap- plied the edge inflation in the projected networks while increasing the quality of par- titions resulted from community detection and improving the performance of the algorithms. Figure 4 illustrates the network example from section 3 (figure 1) with the proposed tf-idf method applied. Weights are assigned to edges based on their ini- tial value and transformed through equation 2. In our example they vary between 0.1 and 2.3. The thickness of an edge is proportional to the resulted weight after tfidf is applied. As illustrated in figure 4a, the lowest values are assigned to edges pointing at the highest degree object d. This object is connected to four out of five users. The highest weights are assigned to edges connecting users to unpopular or local objects, for example a and b. The initial weight is also taken into consid- eration with higher weights assigned to edges having higher initial value. In our example, edge 1d has higher tfidf weight than 2d, even though both edges end in the same node d. After filtering out all edges with weights smaller than a threshold (in this case τ = 0.3), the resulted network has a simpler and more intuitive structure, con- taining only relevant edges (figure 4b). In the next section, we will validate the proposed approach and confirm this observation on large real-world networks. 5 Evaluation To illustrate the proposed method for user-objects network we apply it to Davis’s Southern Women dataset (Davis et al., 1941) and the five real-world datasets pre- sented in section 3. First we are going to analyse Davis’s data in more detail. 13 (a) Tf-idf weights (b) Filtered network τ = 1 Figure 5: Southern Women dataset with tf-idf weights and filtering applied 5.1 Southern women The Southern women data was collected by Davis et al. (1941) during the 1930s and describes the participation of 18 women in 14 social events. It can be repre- sented as a bipartite network (figure 5) whose nodes are women (blue nodes) and social events (red nodes). Edges are participation of the women in the events. This dataset and the related bipartite network was very well studied by social scientists. Based on the ethnographic information Davis divided the 18 women into two groups: women 1-9 in the first group, women 9-18 in the second. Later, Freeman (2003) analyzed the outcome of 21 different studies, which generally identified almost the same two groups, women 1-9 and 10-18. However in some of these studies women 8, 9 and 16 were often identified as either belonging to both groups or positioned at the periphery of a group. We applied the proposed weighting scheme to the Southern women dataset and represented the resulted network in Figure 5a. As in the previous example, the thickness of an edge is proportional to the tfidf weight. From this figure it is easy to notice that edges connected to very popular events (25, 26 and 27), where most of women participated, were assigned lower weights than edges connected to 14 (a) Lastfm (b) Twitter (c) Audioscrobbler (d) Movielens (e) Delicious Figure 6: Ratio of edges (green-triangle) deleted for each threshold and number of users in the resulted real (blue-diamond) and random (red-square) networks local events (19-24 and 28-32). By applying a threshold and removing the lower weights, two core groups of women are emerging, as in Figure 5b: first group 1-9 and second 10-18. It can be easily noticed that women 8 and 9 have a weaker connection to the first group comparing to the other nodes in the group, while woman 16 remains isolated from both groups. 5.2 Experiments Next we apply the following method to each of the real world datasets. We (re)assign the weights of edges based on the tf-idf formula as in equation 2 and define a range of thresholds τ ∈ {0.1, 0.5, 1, 1.5, . . . , 6}. For each value τ a new network Gτ = (U τ , Oτ , Eτ ) is generated by removing the edges with tfidf weights 15 less than the threshold. Remaining nodes with no edges are removed as well. We project the resulted network on user-nodes (Gτ O) and apply the Louvain method for community detection (Blondel et al., 2008) in the projection. The modularity values of the resulted partition will show the quality of the community structure (Newman & Girvan, 2004). In order to demonstrate that the proposed weighting scheme for user-object networks improves the quality of clustering in the projections while reducing sig- nificantly their density, for each threshold value we generate 100 similar networks with the same number of edges removed randomly. The resulted random networks will have the same size (nodes and edges) as the one resulted after applying the threshold, but instead of deleting edges with tf-idf weights smaller than a thresh- old we remove them at random. We apply the same community detection method on projections of each of these networks and compare the average modularity across all randomly generated networks (random modularity) with the value re- sulted from the network where a threshold was applied. If the random modularity is smaller than the real value then the proposed method improves quality of the community structure in the projected networks. In figure 6 we represent the percentage of edges removed after applying each threshold value as above along with the number of users remaining in both real and random networks. The number of users for random networks was averaged for all 100 generated instances. It is quite obvious from this figure that up to a certain threshold value (which depends on the network) the number of user nodes remains (almost) the same after filtering is applied, even though a significant number of edges were removed. However, in most randomly generated networks the number of user nodes decrease at a steeper rate with the threshold. This observation is particularly visible in Twitter and Audioscrobbler networks where. after deleting 59% (threshold 1.5) and 97% (threshold 2) respectively of edges, the number of user nodes remains the same. In the meantime, in the random case in both net- works there are around 20% less user nodes at the same threshold values. Also, the ratio of edges deleted by applying a threshold is much higher for Audioscrobbler and Delicious networks comparing to the other networks. For example, for these two networks 97%, respectively 96%, of edges are removed for a threshold value of 2, while for the other three networks only 11% (Movielens), 62% (Lastfm) and 67% (Twitter) of edges were removed. This points to a different distribution of tf-idf weights for various networks and this difference has to be considered when selecting the most appropriate range of thresholds. By applying the proposed method and filtering out edges up to a threshold value we are preserving the same number of user nodes (assuming a limit for the threshold), while significantly reducing the number of edges. The resulted network will have a lower density and a more clear structure, reflecting users most important interests. 16 (a) Lastfm (b) Twitter (c) Audioscrobbler (d) Movielens (e) Delicious Figure 7: Density of user-projected network, real (blue-diamond) and random (red-square) Next we calculate the density of the user-projected networks resulted by ap- plying the tfidf weighting scheme with threshold filtering to the original network and projecting it on the user nodes (user-projected network). Both real and ran- dom (edges removed randomly) cases are considered for multiple values of the threshold between 0 and 6. As above, the random density is averaged for all 100 generated instances. As shown in figure 7, density in real networks is lower than in random networks, for all datasets. This difference is particularly visible in Lasfm, Twitter, Movielens and Delicious datasets, where, for some threshold values, den- sity can be up to 60% less comparing to random. If we get the Twitter network for example and select a threshold of 1.5 (no user nodes are removed by filtering) the density of the user-projected network is 4.3, 82% less than the original projected network before filtering (24.6) and 50% less than the averaged density for random 17 (a) Lastfm (b) Twitter (c) Audioscrobbler (d) Movielens (e) Delicious Figure 8: Modularity values for partitions of user-projected network, real (blue- diamond) and random (red-square) network (8.67). Finally, after applying the Louvain method for community detection on the user-projected networks, we calculate the modularity of the resulted partitions and compare the values for real and randomly generated networks (the latter av- eraged over the 100 random instances). These values, for multiple thresholds, are represented in figure 8. As mentioned earlier, thresholds have a bigger impact on Audioscrobbler and Delicious networks with a large part of edges removed (96-95%) for a value of 2 or higher. Therefore in these two cases we limit the threshold to 2.5. It’s easy to notice that modularity is constantly increasing when higher thresh- old values are used and more edges are filtered out. Also, for all of our datasets the modularity values are higher in real networks comparing to random networks, 18 with this difference being quite significant in most of the cases. For example, tak- ing the same threshold value of 1.5 for Twitter dataset, the random modularity is 34% lower than the modularity for the real projected network. Similarly, in the Lastfm dataset random modularity is up to 54% lower (theshold 2) comparing to its value for the real network. The only exception is in Twitter case for the thresh- old value of 3 where the two modularities (real and random) are almost the same. However, we suspect this might be caused by the resolution limit in modularity and perhaps relative instability of the Louvain method (Fortunato & Barthelemy, 2007). From above we saw that applying the proposed tfidf method and filtering out edges below a certain threshold significantly improves both the density of the bi- partite and user-projected networks and the quality of the community structure of the user-projected network as measured by modularity. This improvement is also visibly better than filtering out edges randomly without using the tfidf weights. Therefore the resulted network has a simpler and more intuitive structure, con- taining only edges that are relevant in finding groups of similar users. 6 Conclusion We analyzed the bipartite representation of interactions between users and objects in web or e-commerce systems and shown that due to their scale such user-object networks have certain characteristics and challenges differentiating them from other bipartite networks such as collaboration or actor-movie networks. We ana- lyzed the structural properties of five real world user-object networks and found a heavy tail degree distribution for objects. This heterogeneity is responsible for hy- perinflation of edges in the projected users network resulting in very high density and diluted community structure in these projections. Also, popular objects are connecting together a large number of users, but they contain little or high level information about users interests. In order to diminish the impact of higher degree objects we are proposing a new weighting scheme based on the popular tf-idf method used in information retrieval and text mining. With tf-idf the weight of interactions between users and unpopular objects is amplified while popular objects will bring a lower contribu- tion to the weight of an edge. Filtering can be applied to keep only the relevant edges with higher tf-idf weights, starting from a specific threshold. We used the proposed approach with five real world user-object networks and demonstrate a decrease in density of both original and projected networks. We apply the Lou- vain method (Blondel et al., 2008) to find communities in the projected users network and calculate the modularity of each partition. We find that the quality of the community structure as measured by modularity is significantly improved 19 when compared to the projections of the original networks. This improvement is also observed with similar partially random networks where edges are filtered out randomly. We proposed a simple and efficient method of assigning weights in a bipartite user-object network that will decrease the impact of popular objects and improve density and community structure. Current work can be extended to develop new network-based recommender systems. Data used by such systems has a natural bipartite structure where users are interacting with items in an online environ- ment. Our approach can also be applied to current community detection methods for bipartite networks to improve both their scalability and the quality of results. Further on, due to their simplicity, tf-idf weights can be easily adapted to suit temporal networks that evolve over time. These evolving weighs can be moni- tored and analyzed to detect trends and patterns in user-object event data. References Barabasi, A.L., Jeong, H., N´eda, Z., Ravasz, E., Schubert, A. & Vicsek, T. (2002). Evolution of the social network of scientific collaborations. Physica A: Statisti- cal Mechanics and its Applications, 311, 590–614. Bertin-Mahieux, T., Ellis, D.P., Whitman, B. & Lamere, P. (2011). The million song dataset. In Proceedings of the 12th International Conference on Music Information Retrieval (ISMIR 2011). Blondel, V.D., Guillaume, J.L., Lambiotte, R. & Lefebvre, E. (2008). Fast unfold- ing of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008, P10008. Borgatti, S.P. & Everett, M.G. (1997). Network analysis of 2-mode data. Social networks, 19, 243–269. Breese, J.S., Heckerman, D. & Kadie, C. (1998). Empirical analysis of predictive algorithms for collaborative filtering. In Proceedings of the Fourteenth confer- ence on Uncertainty in artificial intelligence, 43–52, Morgan Kaufmann Pub- lishers Inc. Clauset, A., Newman, M.E. & Moore, C. (2004). Finding community structure in very large networks. Physical review E, 70, 066111. Clauset, A., Shalizi, C.R. & Newman, M.E. (2009). Power-law distributions in empirical data. SIAM review, 51, 661–703. 20 Davis, A., Gardner, B.B. & Gardner, M.R. (1941). Deep south. University of Chicago Press Chicago. Fortunato, S. (2010). Community detection in graphs. Physics Reports, 486, 75– 174. Fortunato, S. & Barthelemy, M. (2007). Resolution limit in community detection. Proceedings of the National Academy of Sciences, 104, 36–41. Freeman, L.C. (2003). Finding social groups: A meta-analysis of the southern women data. Dynamic social network modeling and analysis, 39–97. Grujic, J., Mitrovic, M. & Tadic, B. (2009). Mixing patterns and communities on bipartite graphs on web-based social interactions. In Digital Signal Processing, 2009 16th International Conference on, 1–8, IEEE. Guillaume, J.L. & Latapy, M. (2004). Bipartite structure of all complex networks. Information processing letters, 90, 215–221. Huang, Z., Zeng, D.D. & Chen, H. (2007). Analyzing consumer-product graphs: Empirical findings and applications in recommender systems. Management Sci- ence, 53, 1146–1164. Jeong, H., Tombor, B., Albert, R., Oltvai, Z.N. & Barab´asi, A.L. (2000). The large-scale organization of metabolic networks. Nature, 407, 651–654. Laherrere, J. & Sornette, D. (1998). Stretched exponential distributions in nature and economy:fat tails with characteristic scales. The European Physical Journal B-Condensed Matter and Complex Systems, 2, 525–539. Latapy, M., Magnien, C. & Vecchio, N.D. (2008). Basic notions for the analysis of large two-mode networks. Social Networks, 30, 31–48. Li, M., Fan, Y., Chen, J., Gao, L., Di, Z. & Wu, J. (2005). Weighted networks of scientific communication: the measurement and topological role of weight. Physica A: Statistical Mechanics and its Applications, 350, 643–656. Li, M., Wu, J., Wang, D., Zhou, T., Di, Z. & Fan, Y. (2007). Evolving model of weighted networks inspired by scientific collaboration networks. Physica A: Statistical Mechanics and its Applications, 375, 355–364. Liljeros, F., Edling, C.R., Amaral, L.A.N., Stanley, H.E. & Aberg, Y. (2001). The web of human sexual contacts. Nature, 411, 907–908. 21 Lind, P.G., Gonzalez, M.C. & Herrmann, H.J. (2005). Cycles and clustering in bipartite networks. Physical review E, 72, 056127. Newman, M.E. (2001a). Scientific collaboration networks. i. network construction and fundamental results. Physical review E, 64, 016131. Newman, M.E. (2001b). Scientific collaboration networks. ii. shortest paths, weighted networks, and centrality. Physical review E, 64, 016132. Newman, M.E. & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical review E, 69, 026113. Newman, M.E., Strogatz, S.H. & Watts, D.J. (2001). Random graphs with arbi- trary degree distributions and their applications. Physical Review E, 64, 026118. Opsahl, T. (2011). Triadic closure in two-mode networks: Redefining the global and local clustering coefficients. Social Networks. Raghavan, U.N., Albert, R. & Kumara, S. (2007). Near linear time algorithm to detect community structures in large-scale networks. Physical Review E, 76, 036106. Ramasco, J.J. & Morris, S.A. (2006). Social inertia in collaboration networks. Physical Review E, 73, 016122. Salton, G. & Buckley, C. (1988). Term-weighting approaches in automatic text retrieval. Information processing & management, 24, 513–523. Shang, M.S., L, L., Zhang, Y.C. & Zhou, T. (2010). Empirical analysis of web- based user-object bipartite networks. EPL (Europhysics Letters), 90, 48006. Zhang, P., Wang, J., Li, X., Li, M., Di, Z. & Fan, Y. (2008). Clustering coefficient and community structure of bipartite networks. Physica A: Statistical Mechan- ics and its Applications, 387, 6869–6875. 22
1903.06277
1
1903
2019-03-14T21:59:01
Syntgen: A system to generate temporal networks with user specified topology
[ "cs.SI", "physics.soc-ph" ]
Network representations can help reveal the behavior of complex systems. Useful information can be derived from the network properties and invariants, such as components, clusters or cliques, as well as from their changes over time. The evolution of clusters of nodes (or communities) is one of the major focus of research. However, the time dimension increases complexity, introducing new constructs and requiring novel and enhanced algorithms. In spite of recent improvements, the relative scarcity of timestamped representations of empiric networks, with known ground truth, hinders algorithm validation. A few approaches have been proposed to generate synthetic temporal networks that conform to static topological specifications while in general adopting an ad-hoc approach to temporal evolution. We believe there is still a need for a principled synthetic network generator that conforms to problem domain topological specifications from a static as well as temporal perspective. Here we present such a system. The unique attributes of our system include accepting arbitrary node degree and cluster size distributions and temporal evolution under user control, while supporting tunable joint distribution and temporal correlation of node degrees. Theoretical contributions include the analysis of conditions for "graphability" of sequences of inter and intra cluster node degrees and cluster sizes and the development of a heuristic to search for the cluster membership of nodes that minimizes the shared information distance between clusterings. Our work shows that this system is capable of generating networks under user controlled topology with up to thousands of nodes and hundreds of clusters with strong topology adherence. Much larger networks are possible with relaxed requirements. The generated networks support algorithm validation as well as problem domain analysis.
cs.SI
cs
Syntgen: A system to generate temporal networks with user specified topology Luis Ramada Pereira1*, Rui J. Lopes2, Jorge Lou¸ca3 1 ISTAR Instituto Universit´ario de Lisboa (ISCTE - IUL) Lisbon, Portugal 2 IT-IUL Instituto de Telecomunica¸coes (ISCTE - IUL) Lisbon, Portugal 3 ISTAR Instituto Universit´ario de Lisboa (ISCTE - IUL) Lisbon, Portugal * [email protected] Abstract Network representations can help reveal the behavior of complex systems. Useful information can be derived from the network properties and invariants, such as components, clusters or cliques, as well as from their changes over time. In the last few years the study of temporal networks has progressed markedly. The evolution of clusters of nodes (or communities) is one of the major focus of these studies. However, the time dimension increases complexity, introducing new constructs and requiring novel and enhanced algorithms. In spite of recent improvements, the relative scarcity of timestamped representations of empiric networks, with known ground truth, hinders algorithm validation. A few approaches have been proposed to generate synthetic temporal networks that conform to static topological specifications while in general adopting an ad-hoc approach to temporal evolution. We believe there is still a need for a principled synthetic network generator that conforms to problem domain topological specifications from a static as well as temporal perspective. Here we present such a system. The unique attributes of our system include accepting arbitrary node degree and cluster size distributions and temporal evolution under user control, while supporting tunable joint distribution and temporal correlation of node degrees. Theoretical contributions include the analysis of conditions for "graphability" of sequences of inter and intra cluster node degrees and cluster sizes and the development of a heuristic to search for the cluster membership of nodes that minimizes the shared information distance between clusterings. Our work shows that this system is capable of generating networks under user controlled topology with up to thousands of nodes and hundreds of clusters with strong topology adherence. Much larger networks are possible with relaxed requirements. The generated networks support algorithm validation as well as problem domain analysis. 1 Introduction Networks are all around us: computer, telecommunication, biological and social systems are just a few examples of systems of entities that interact and relate to one another in some specifiable way, producing identifiable phenomena. Graph theory, which had its origins in the 18th century when Leonard Euler published his "Seven Bridges of Konigsberg" problem and its negative solution [12], is the basis of the field of study that has become network science. Network science is concerned with understanding networked systems, describing their micro, meso and macro scale attributes and helping us predict their behavior. Many networks exhibit groups of nodes that are more closely interconnected amongst themselves than with the rest of the network. These groups, referred to as clusters in graph theory or communities in network science, are usually of particular interest to network researchers. They may have an over-sized impact on the network behavior and their identification is often highly useful. 1/22 From its origin in graph theory, network science has focused on static networks, that is, networks "frozen in time" with link permanence. However, real world systems are rarely static: links on webpages are added and removed everyday in the world wide web, amino acid interaction for protein folding occurs over time, friendships are created, age, wither and renew. This realization led to major efforts to extend existing science into temporal networks, with several authors proposing approaches that embed time specific attributes. Communities are no exception, and several constructs have been proposed to characterize the way a community develops over time. Although some of these constructs are problematic since they cannot be derived solely from the network structure, they serve as a base that allow us to build a commonly accepted vocabulary that helps advance this field of study. Time stamped data of empiric systems with known ground truth about communities does not abound. As extensively discussed elsewhere [25] even the concept of community membership is not without its challenges. This makes it more difficult to test systems that effectively recover community node membership over time. Having a system that generates a temporal network under user specified topology, with known ground truth, can help alleviate these challenges. Syntgen1, as described in this article, is such a system. The input required by Syntgen at each time step is a multiset of community sizes and a bijection of two n-tuples representing sequences of total and intra-community node degrees. Optionally the user can specify preferences for joint node degree distributions, temporal node degree correlation and a set of nodes to be eliminated at each time transition. We developed a method which Syntgen uses to test user specifications for graphability and, if successful, generate a compliant temporal network. The user does not specify node membership or edges, these are generated by the system. As there is randomness in the process of network construction, both on node community membership as well as in the network wiring, the same specifications will not typically generate the same network. However, they should asymptotically converge to the same average topology. The user can loosely control the dynamics of the network by changing its input at chosen time steps, with new nodes created and others killed to satisfy input specifications. Changing correlation and joint distribution parameters will also impact the wiring of the network. We provide example sequence generators that sample power laws, exponential and binomial distributions, all of which have been found in empirical networks [26]. These generators include parameters that specify community maximum and minimum size, maximum and minimum node degree, distribution rate parameters and a ratio (r) of intra to total degree, which can be fixed or Bernoulli distributed with P = r. The user can use or adapt these generators or provide their own. Obviously, although the system will assign nodes to communities, these are only meaningful if the ratio of intra links to total links is sufficiently high. This ratio varies depending on the network structure and on the cardinalities of the communities. Larger communities are less stringent with their requirements. A thorough discussion can be found in page 11 of [14]. With this input, Syntgen outputs a temporal network with known ground truth of its community structure for every time interval. To minimize network changes beyond those specified by the user, Syntgen tries to determine the node community membership across time steps that results in the shortest shared information distance between clusterings. This is an NP-Hard problem for which we develop an appropriate heuristic. Our system works for simple networks. Syntgen generates temporal networks with no self loops or multi-edges, non weighted and undirected, with no community membership overlap, with no isolated nodes, in snapshot mode. A new instance is generated at each time step and the overall temporal network is the sequence of generated snapshots. It would be possible to extend this model to a truly continuous streaming network, although a principled approach for node and edge activation would need to be devised to enforce node degree and community size affinities. We believe Syntgen, as a temporal synthetic network generator, is unique in creating networks with arbitrary community sizes and node degree distributions and providing ways to control node joint degree distribution and node degree temporal correlation. 1code available on request from the authors 2/22 Figure 1. Time consecutive slices of a dynamic network as generated by Syntgen This example is color coded according to community and has ≈ 200 nodes, 10 − 9 communities, with multiple community events. A full description can be found in section 3.2.5. In the remainder of this document we review in section 2 other work related to the function and objective of our system. In section 3 we start by describing the general flow of the system, its modules and functionality, followed in section 3.2 by a detailed description of the approach we took to generate a network snapshot respecting the user topology. How we aim to reduce spurious noise when evolving the communities at every timestep is covered in section 3.3, and we conclude with 3 additional sections covering experiments, conclusion and future work. A note on terminology conventions: In this subject area a vast array of terms are used to describe very similar concepts, like communities vs clusters, or partitions vs clusterings. Throughout this document, we adopt the following terminology and symbol conventions: • "Community" refers to groups of nodes more tightly connected amongst themselves than to the rest of the network (in lieu of terms like cluster, or partition) • "Clustering" refers to the splitting of a network into communities (in lieu of partition). See formal definition in 1. • "Temporal" is an attribute of a network that changes over time (in lieu of dynamic or evolving) • "Nodes and Links": Links are connections between nodes at the same time step. Nodes only exist if they connect. There are no isolated nodes in Syntgen. • We call the movement of nodes between communities across time steps, "Node flow". • We define "Graphability" as the property of sequences of community sizes and bijective node total and intra degrees that enable their graphical representation. • We denote sets by an uppercase letter and individual elements by the corresponding lower case letter, optionally subscripted for identification. Frequently used sets and variables have their own dedicated symbol as per table 1. 2 Related Work Work related to Syntgen falls into two categories: • network science, theorems and algorithms that supported the development of our system 3/22 Table 1. Symbol convention Symbol Definition C D E F G L O S T U V Clustering or community set, optionally with a superscript to indicate time step Degree sequence (or ordered total degree sequence, depending on context, bijection with E, optionally with a superscript to indicate community membership). Intra degree sequence ( bijection with F ), optionally with a super- script to indicate community membership. Inter degree sequence , with n = D = E = F and fi + ei = di ∀(1 ≤ i ≤ n), optionally with a superscript to indicate community membership. Network, optionally with a superscript to indicate time step Link set Kill node set (user specification) Multiset of community sizes Time step Flow of nodes between time steps Node set • prior systems that have been developed with similar or related desiderata. In the first category we cover clustering similarity and community lifecycle events, and in the second, benchmarks for community detection algorithms and other temporal community network generators. 2.1 Benchmarks for community detection algorithms Authors in [21] have drawn our attention to the fact that community detection algorithms that perform well in a given network topology may be less accurate in a different topology. Prior to their work, algorithms for community detection were validated mostly against the Girvan-Newman benchmark [25]. This a stochastic block model that only deviates from a typical random Erdos -- R´enyi model by the introduction of a tunable parameter specifying the probabilities of intra and inter community links, transforming the network from a pure random network to a random network of random networks (the communities). From experience we know that empirical networks do not generally follow this model. As an example, most networks generated by preferential attachment, that is networks where new nodes attach to existing nodes with probability that is dependent on their degree [2], end up with long tail distributions of node degrees and community sizes, reasonably approximated by power law distributions. The benchmark introduced in [21] generates networks with power law distributions of community sizes and node degrees, with tunable intra/total ratio (mixing parameter). This benchmark, commonly known by the authors initials (LFR), has been widely accepted and used to test community detection algorithms for static networks. For instance in [20, 32] a lengthy list of algorithms tested against this benchmark can be found. 2.2 Comparing clusterings A clustering, in our context, is the partition of the set V of nodes of a network into disjoint communities, or formally C = {c1,··· , ck} : (ci ∩ cj = ∅ ∀ (1 ≤ i, j ≤ k ∧ i (cid:54)= j) ∧ ∪ k i=1 ci = V (1) Comparing communities at successive timesteps is a key requirement to understand community evolution. Comparing clusterings, on the other hand, is critical in our system so that, after all the information required to construct the network at successive time steps is gathered, we can flow nodes resulting in the 4/22 closest shared information distance between clusterings. Comparing clusterings is an open problem as there is no standard way of measuring the distance between them. Popular methods include several variations of node counting (like the Rand Index) and measures from information theory, like the normalized mutual information and variation of information (VI). A good survey of different methods can be found in [31]. We have selected VI, given its robustness, low computational complexity and the fact that it is a true metric [23]. 2.3 Temporal community graph generators There have been some proposals to generate synthetic temporal networks. In [15] the authors propose a generator for simple networks with a cyclic nature based on a variation of the stochastic block model. In [16] the authors have adapted the LFR benchmark [21], while introducing over time ad-hoc modifications to the network. In [28] the authors propose RDyn, a system to generate temporal networks respecting a power-law distribution of community sizes and node degrees with tunable clustering and injected lifecycle events that, while disrupting cluster quality, are subsequently re-balanced through re-wiring of node links. These systems have obvious affinity with Syntgen. The new contributions introduced by Syntgen include: • no prior specifications of node degree or community size distribution • temporal evolution under user control by searching for the least noisy transition across time steps, i.e. reducing partition artifacts as a result of node flow • support for joint distribution of node degrees and node degree temporal correlation 3 Syntgen: Description, challenges and contributions Syntgen is a system to create temporal networks exhibiting community structure that changes over time. It is parametric and modular. The major modules are: • User specifications. These fall into two separate categories: network topology and heuristics execution. • Node degree and community size sequence generators. The system includes functions that sample parametric distributions for community size, intra and total node degree, but, as long as they are realizable, any sequences can be provided. • Network module. Deals with all aspects of network creation, including node to community assignment, degree to node assignment and node to link assignment. • Transition module. This module manages all aspects of temporal evolution, including heuristics for node flow between timesteps and community lifecycle determination. • Output module. This module generates all output, both textual as well as machine readable for further analysis. In Table 2 we include a summary of all information generated. In the remainder of this section we present the basic algorithmic logic of Syntgen in 3.1, the challenges and solutions of building a static network according to user specifications in 3.2 and the problem of finding a node flow across time steps that maximizes clustering similarity in 3.3. 5/22 i=1 si ∧(cid:80)n -- an n-tuple of positive integers D = {d1,··· , dn} representing a sequence of node total degrees with n =(cid:80)k intra-community degrees with ei ≤ di : 1 ≤ ∀i ≤ n and(cid:80)n -- an n-tuple of positive integers E = {e1,··· , en} representing a sequence of node i=1 ei ∈ {2n : n ∈ N} i=1 di ∈ {2n : n ∈ N} Table 2. Textual Output of Syntgen Content Contingency Matrix Assortativity Coefficient Description Contingency matrix of communities across time steps Joint node degree distribution Temporal Degree Correlation Average Pearsons correlation index for the whole net- Variation of information work VI between clusterings across successive time steps 3.1 Syntgen basic logic The general flow of Syntgen is a sequence of looping steps that produce network snapshots as time progresses. It basically follows algorithm 1. Syntgen requires from the user at each time step the following graph invariants and parameters: • a multiset of k positive integers S = {s1,··· , sk}, representing a sequence of community sizes • a bijection of total and intra community degree sequences: • specifications for joint degree distribution and node degree correlation over time • optionally, a set of nodes O to kill at a step boundary boundary. Depending on the sign of(cid:80) S t −(cid:80) S t+1 − O new nodes are implicitly born or additional The user can loosely control the dynamics of the network by changing S, D, E and O at each time step nodes randomly killed. Correlation and joint distribution parameters have an impact on the wiring of the network. As the data per timestep is gathered, Syntgen executes the following actions: • A bootstrap static network is built. The input elements are independent (with the exception of the number of nodes and the sum of community sizes, which must match) and it is up to the system to assign edges and nodes to communities. We provide parameter-based examples of functions that generate sequences which have been observed in empirical networks ( [8, 26, 27]), sampled from discretized power laws, discretized exponential and binomial distributions, but the user is free to provide his own as adequate to their problem domain. Degree assortativity, a topology attribute that varies with the type of network (typically assortative for social, while dissortative for biological networks [24]), is also parameter driven allowing the user to request a random, weighted assortative or weighted dissortative network. To construct the network we use a modified version of the configuration model [9] in a similar approach to what is found in a popular benchmark for community detection in static networks [21], but developed independently and extended to support joint node degree distributions as described in 3.2.5. Obviously, not all input specifications are possible and we verify feasibility before generating the network. The problem of whether a given node degree distribution can be expressed as a graph has been covered extensively in the literature [7, 11, 29, 30], and theorems, like the Erdos-Gallai condition, can be expressed as an algorithm to test graph feasibility. However, with node degrees as tuples of inter and intra-cluster degrees, different conditions apply. We extended the Erdos-Gallai condition to address this problem, developing the corresponding algorithm to halt (or request new input for) the network generation in case input specifications are infeasible. • After generating the bootstrap network (T0 network) a T1 network is generated, again according to user specifications. The user may select a different degree or community size sequences as well as 6/22 make changes to the network at the end of T0 (selecting nodes for deletion), according to the requirements of the temporal network to be generated. An additional parameter provides the user with the option of enforcing node degree assortativity across timesteps. The system then tries to find the closest possible clusterings between successive timesteps. We found the problem to be NP-hard and impossible to complete in a reasonable amount of time beyond a very small number of communities. To address the inherent complexity, we developed a heuristic based on a greedy anytime algorithm with taboo to search for a solution in an appropriate solution subspace. The objective is to reduce the amount of change (noise) to a minimum, reducing the necessary impact on user specifications. The solution will determine the flow of nodes between communities in timesteps T0 and T1. • This process is repeated for a user-specified number (n) of time steps, evolving the network over a period from T0 to Tn. • At each time step the contingency matrix of node/community evolution is produced, and, at the end, the temporal network is created in a machine readable format for further analysis and visualization. Algorithm 1 General flow of Syntgen. Steps 2,3,6,10 are implemented in the "Network" module. Build Communities assigns degrees to nodes and nodes to communities, while Build N etwork does all the network wiring. Steps 7-9 are implemented in module "Transition". 1: Community Size Sequence, N ode Degree Sequence ← Sequences f rom U ser 2: Build Communities @ Tn ← Community Size Sequence, N ode Degree Sequence 3: Build N etwork@Tn ← Communities 4: while Remaining T imeSteps (cid:54)= 0 do 6: Build Communities @ Tn+1 ← Community Size Sequence, N ode Degree Sequence 7: N etwork @ Tn ← user Events Community Size Sequence, N ode Degree Sequence ← Sequences f rom U ser 5: F low N odes f rom Tn to Tn+1 ← Search M ost Similar T ransition 8: 9: Build N etwork @ Tn+1 10: Report Data f or Tn to Tn+1 11: N etwork @ Tn ← N etwork @ Tn+1 T imeSteps ← T imeSteps − 1 12: 13: end while 14: Output T emporal N etwork Syntgen outputs textual information as the network is created overtime, including network metrics, network events and other supporting information. Syntgen also produces the full temporal network in machine readable format that can be input directly to the Gephi [4] visualization tool. 3.2 Creating a static network Creating a T0 static network involves the following steps: • Receiving community size and node degree sequences from the user . • Testing for "graphability" and requesting from the user new sequences if they are determined not to be "graphable". • Randomly assigning nodes without substitution to communities from the bijection of intra (E) and total degrees (D) with e ∈ E : e < c. • Wiring nodes using a modified version of the configuration model both for intra links as well as inter links respecting assortative specifications. 7/22 3.2.1 Community, node sequences Syntgen does not impose specific restrictions on the user input sequences beyond a coherent total number of nodes, and node intra community degrees that are less or equal to their respective total degree. It follows that Syntgen does not enforce community structure per se. The user must provide a ratio of intra to total degree that is conducive to community structure if a clustered network is preferred. 3.2.2 Supplied distribution samplers The user may opt to generate community and node sequences resorting to functionality provided by Syntgen. There are independent and identically distributed (I.I.D.) samplers of uniform, exponential and power law distributions. All of our supplied samples of sequence generators accept a ratio (r) of intra to total degree similar to the mixing parameter in the LFR benchmark [21]. To alleviate rounding artifacts that are more pronounced for nodes with low degree, we employ stochastic rounding instead of rounding to the nearest integer. The authors in [21] point out that allowing the ratio to change can lead to communities containing nodes that have a higher inter than intra degree (due to random fluctuations), but depending on usage, having a fixed intra to total degree ratio may be too restrictive on the desirable network topologies. Therefore, we let the user choose between a fixed 0 ≤ r ≤ 1 or Bernoulli distributed ratio with P = r. Although we do not challenge if specifications as provided by the user or generated by the supplied distribution samplers are conducive to community structure, we do test for disconnected components inside communities by computing the algebraic multiplicity of the zero eigenvalue for the Laplacian of the adjacency matrix of the community. If higher than one, we warn the user, giving the option to continue or abort the network generation. 3.2.3 Testing for graphability To test user specifications for graphability as a simple network, we make use of the Erdos-Gallai condition [11] that states that a degree sequence D is graphable if: D(cid:88) di ∈ {2n : n ∈ N} ∧ k(cid:88) di ≤ k(k − 1) + min(di, k) ∀ (1 ≤ k ≤ D) (2) i=1 i=1 i=k+1 max(F ) ≤(cid:80) F where d is degree and D the total number of nodes. We apply 2 to every single community using only E, the nodes intra degrees. If completed successfully, we move on to test graphability of the inter degrees sequence F . For this we reduce the network to a multi-graph where each community becomes a single node and the multi-links are the aggregate inter community links of the base network. It is obvious that i=1 di − max(F ) is a necessary condition for graphability, as otherwise there would be not enough links to satisfy the requirements of the largest community inter degree. But it is also not hard to see that if the total number of inter links is even, the condition above is not only necessary but also sufficient, or formally: fi ∈ {2n : n ∈ N} ∧ max(F ) ≤ fi − max(F ) (3) i=1 i=1 To see why, consider a reduced network with 3 nodes (communities), c1, c2, c3 and their respective inter node degree aggregation f1, f2, f3, with f1 ≥ f2 ≥ f3. If f1 = f2 + f3, the network is obviously graphable. If f1 < f2 + f3 and if f1 ∈ {2n : n ∈ N} then (f2 ∈ {2n : n ∈ N} ∧ f3 ∈ {2n : n ∈ N}) ∨ (f2 ∈ {2n + 1 : n ∈ N0} ∧ f3 ∈ {2n + 1 : n ∈ N0}) but as f1 ≥ f2 one can always distribute links from c1 to c2 and c3 such that the remainder degrees to be satisfied are equal. If f1 ∈ {2n + 1 : n ∈ N0} then (f2 ∈ 2n + 1 : n ∈ N0 ∨ f3 ∈ 2n + 1 : n ∈ N0) in which case after one link is added between c1 and c2 or c3 we revert to the previous case. The above is a proof for a 3 community clustering. To generalize the proof, let's consider the addition of a community to the reduced network resulting in the clustering C = {c1,··· , c4}, with node degree 8/22 D(cid:88) F(cid:88) F(cid:88) aggregation D = {f1,··· , f4}, and fi ≥ fi−1 : 2 < ∀i ≤ 4. If we use links from f1 to satisfy f4, we get: f1 − f4 ≥ f2 ∨ f1 − f4 < f2. If f1 − f4 ≥ f2 we reduce to the previous proof as f1 − f4 + f2 + f3 ∈ {2n : n ∈ N} and f1 − f4 ≤ f2 + f3 (remember that f3 ≥ f4). If f1 − f4 < f2 then to reduce to the previous 3-community proof we should have f2 < f3 + (f1 − f4). This is easy to prove by contradiction as f2 > f3 + (f1 − f4) is impossible, given that f1 > f2 would force f3 − f4 < 0 which violates the problem statement. So by contradiction and induction we prove the condition for graphability of the inter links part of the network. In conclusion, a network with V nodes and C communities with size sequence S, each with a bijection of intra and inter degree sequences respectively E ci , F ci ∀i ∈ {1,··· ,C} is graphable under the condition in equation 4. ∀i ∈ {1,··· ,C} : si(cid:88) j=1 k(cid:88) j ∈ {2n : n ∈ N} ∧ ( e ci V (cid:88) j=1 j ≤ k(k − 1) + e ci si(cid:88) j=k+1 min(ei, k)∀(1 ≤ k ≤ si) ∧ (4) V (cid:88) fi ∈ {2n : n ∈ N} ∧ max(F ) ≤ fi − max(F ) i=1 i=1 3.2.4 Node assignment Syntgen assigns nodes to communities randomly at time step T0 from the pool of available nodes, avoiding communities with cardinality smaller than the node intra degree. From T1 onwards nodes keep their community membership except to honour new community size sequences. The process of minimizing membership changes is covered in section 3.3. The user can indirectly control node degree temporal correlation by influencing degree selection from the supplied total degree sequence thru the shape parameters of a beta distribution used to sample the ordered sequence. When α = β = 1 it reverts back to the uniform distribution. 3.2.5 Configuration model In Syntgen we based the generation of networks with user specified degree distributions on a modified version of the configuration model (CM) [2]. We use this modified version to wire nodes inside communities (one community at a time, as if they were separate networks) and to create inter community links. expands the sequence into a list of ((cid:80) D) node "stubs" that are randomly paired, creating links. See The CM can create a network based on arbitrary sequences D of node degrees. To this end, it figure 2 for an example. randomly chosen and as long as(cid:80)n Figure 2. Wiring the configuration model. Example of setting up a first link between node stubs for a network with n = 10 nodes, 15 links and degree sequence D = {4, 4, 3, 3, 4, 3, 3, 2, 2, 2}. Stubs are i=1 Di is even, the process always concludes, albeit with multi edges and self loops. For our purpose, the standard CM presents two difficulties. The first is that nothing prevents a stub from linking back to another stub belonging to the same node, or linking the same nodes multiple times, both of which are incompatible with our aim of building a simple network with no self loops and no multi-links. The second is that we want to provide the user with some capacity to control joint degree 9/22 distribution, while the CM results in the following fixed joint distribution: where kn is the number of stubs of node n and S the total number of stubs =(cid:80) D. pij = kikj S − 1 (5) As the network grows, the probability of self-loops and multi-links decreases. This probability varies with the actual node degree distribution, but it is not unreasonable to disregard self-loops and multi-edges when building the network (see figure 3 for an example), considering however that, (1) stub pairing can fail before all stubs are assigned (that is, a node can have unlinked stubs with no candidate stubs remaining), and (2) that equation 5 is no longer representative of the degree joint distribution. (a) We use a modified CM, and apply it to one community at a time for intra-community links (full stroke linestyle) and to the whole network for inter community links (dashed linestyle) (b) Our modified version of the CM deletes from the link candidate list all the remaining stubs of the linking node (double stroke linestyle) (1), and all the remaining stubs of the linked node for subsequent stubs from the same node (2) Figure 3. CM Plots of a network 3 communities (Blue, red and green), with community size sequence {4, 4, 2} and total and intra degree sequences {4, 4, 4, 3, 3, 3, 3, 2, 2, 2},{3, 3, 3, 2, 2, 2, 2, 1, 1, 1}. (c) Example of the fully connected network The first problem can be circumvented by selectively rewiring nodes randomly from a pool of candidate nodes (those that could satisfy the outstanding stubs but are otherwise taken elsewhere). As we test for graphability beforehand, this completes successfully. The second problem is less relevant as we aim to generate networks with tunable joint degree distribution. We modified the CM so that instead of connecting stubs I.I.D. over a uniform distribution, we connect them I.I.D. over a beta distribution from the ordered node degree sequence. As the 10/22 probability density function (pdf) increases towards the rightmost side of the distribution domain, correlation increases, and vice-versa. The α and β shape parameters of the Beta distribution are specified by the user and enable flexible pdf shapes. Using these parameters, the user can influence the level of the network correlation, subject to structural cutoffs [6, 24]. 3.3 Minimizing Shared Information Distance Once we have constructed the network at time t, injected user changes, created the network N t+1 (all based on user specifications), and created adjustment communities for dead and new nodes, so that the number of nodes across steps remains the same, all that is left is to flow surviving nodes from one network to the next. We want to perform this node flow in such a way that the clusterings C t and C t+1 are as similar as possible, in this way minimizing the changes beyond the user specifications. To measure the changes, we need a way of comparing clusterings. As mentioned previously, there are several approaches to this problem, from node pair counting to information based distance measures. There is no best approach as explained in [23], and we have selected the metric therein proposed, the variation of information (VI) (see figure 4) for its algorithmic simplicity and the fact that it is a true metric [19], respecting positivity, symmetry, and the triangle inequality. V I(X; Y ) = − k(cid:88) l(cid:88) i=1 j=1 [log( rij pi ) + log( rij qj )] (6) Figure 4. Variation of Information V I(X; Y ) where X = {x1,··· , xk} and Y = {y1,··· , yl} are clusterings of a given set S, with n = S, and rij = xi∩yj xi n and qj = n , pi = yi n But let's set briefly aside the proposed method of comparing clusterings and consider the search space of feasible node flows between Nt and Nt+1. One way of looking at the problem is to coalesce Nt and Nt+1 into the weighted bipartite network G(Ct, Ct+1, U ), where the nodes are the communities at successive timesteps and the U the weighted links representing the node flows between them. It is easy to see that the search space consists of the solutions to an under-determined system of Diophantine equations Ax = B where A is the incidence matrix of the fully connected bipartite network i k G = (C t, C t+1, L) and B is the vector {C t i=1 ∪ C t+1 l j=1}. As rank(A) = B − 1, one line of matrix A and the corresponding entry of vector B can be removed. Dimensionality can be further reduced as sum[x] is known, and thus one element of x can be determined from the others. Every solution in the solution space is a vector x whose elements are the number of nodes (u) that should be transferred from communities in C t to communities in C t+1. j Formally we want to find C t+1 s.t. min(V I(C t, C t+1)) with Ax = B as defined above. In topological terms, the space of the solution is a lattice contained in an n − 1 dimensional polytope, where n = C t × C t+1, bounded by n − 1 positive halfspaces (as xi ≥ 0 : ∀i), and by C t + C t+1 − 1 hyperplanes defined by the equations in Ax = B. The number of solutions is equal to the number of lattice points. Counting lattice points in such a polytope is not an easy task [22] and quickly becomes intractable. Barvinok proposed an algorithm for lattice point counting in [3] that has been implemented in systems like Latte [1], software that counts lattice points and performs integration inside convex polytopes. Some experiments we ran in Latte that illustrate the size of the problem can be seen in table 3. The solutions that are of interest to us will have a high degree of sparsity as we are looking for similar clusterings and, intuitively (and experimentally), a high dispersion of nodes across communities will not be conducive to similarity. Higher sparsity solutions correspond to surface features of the polytope lattice, that is, in decreasing sparsity order: vertices, edges, ridges, cells, facets and so on, basically the 1,··· , n − 1 elements of an n-dimensional polytope. We based our heuristic on this intuition, limiting our search space to the hull of the polytope (see figure 5) This can reduce the space significantly depending on the polytope geometry. 11/22 Clustering @ T {20, 16, 12} {16, 16, 16} {13, 11, 10, 10} {13, 11, 10, 10, 9} {1300, 1100, 1000, 1000} Clustering @ T+1 {24, 13, 11} {16, 16, 16} {14, 12, 9, 9} {14, 12, 9, 9, 9} {1400, 1200, 900, 900} {1300, 1100, 1000, 1000, 900} {1400, 1200, 900, 900, 900} Number of solutions 6.46000E + 03 1.17810E + 04 7.80605E + 06 1.58534E + 24 1.09501E + 11 3.18145E + 41 Table 3. Solution space, as reported by the count function of Latte, for 6 examples of clustering pairs. As can be seen, flowing even a small number of communities generates a search space that is for all purposes intractable. Figure 5. Comparing Clusterings similarity as a function of spacial location Plot of all the 16,799,002 solutions of flowing a clustering with community size sequence of {13, 13, 12, 10} to {15,11,11,11}. We compare similarity, as measured by the variation of information, against distance to polytope center and number of polytope surface coordinates in the solution vector. The polytope "center" (cid:18) (cid:80)f max(xi)×n j=1 max(xj ) (cid:19)f i=1 is computed as the vector , where the vector x is the number of nodes flowing between communities (the sequence of edges weights of the fully connected bi-partite network), n is the total number of nodes, f the number of possible flows and max (x) the maximum number of nodes flowing between two communities. It is clearly visible that there is a strong positive correlation between these quantities. To scan the space we find the nullspace of A, formally ker(A) = {x ∈ Nn : Ax = 0}, where n = Ct × Ct+1, and one solution xi to Ax = B. By linearly combining xi with ker(A) we can span the set of solutions to Ax = B. Finding a single solution is trivial, all that is needed is to flow nodes from Ct to Ct+1 until no more nodes are left in Ct. In fact, although the problem as stated is NP-Hard (it is not difficult to reduce it to the partition problem, a well documented NP-complete problem [18]) there are easy ways of finding good solutions with a low VI value. We have implemented a pool of these simple algorithms, with polynomial complexity on the number of communities, that were experimentally best performers amongst themselves. We have built a pool of 5 simple one-pass greedy heuristics with an objective function related either to sparsity or similarity and 12/22 experimentally verified that, although any one of the 5 may achieve best performance, one of them clearly outperforms the others as the number of communities increase (see figure 6). Figure 6. Relative performance of a pool of 5 simple algorithms to select a starting point for a space scan All algorithms achieve top VI-based similarity in some of the 1,000 random runs, but one (MI, based on minimizing the increment of mutual information) vastly outperforms all others as the number of communities increases. In our space scan heuristic, we use these solutions (or the best of them) as starting points for our space search. This is accomplished by an anytime algorithm that greedily searches the solution polytope hull for the lowest VI avoiding previously visited solutions (see algorithm 2). To halt the algorithm, the user can specify thresholds for search restart after a certain number of failed improvement trials and a certain number of failed restarts. Although searching the hull of the polytope vastly reduces the search space in most circumstances, as the network grows the probability of improving on the results from the pool of simple algorithms decreases. For very large networks the user may select to proceed with the best result from the pool and forego the heuristic search for the sake of expediency. In figure 7 an example of an exhaustive search of a very simple temporal network with a total of 279 solutions can be found to illustrate the method. 4 Experiments Syntgen can generate many variants of temporal networks with community structure respecting user defined distributions of community sizes and node degree. In this section we present and discuss network metrics from generated networks according to varying input parameters. Given the time-slicing nature of Syntgen, most of the experiments highlight results from a single point in time, with the understanding that input parameters can be changed by the user on every time slice. Sample Distributions Syntgen provides distribution samplers of node degrees and community sizes. In figure 8 we can see an example of a power-law degree distribution and the effects of different rounding approaches. 13/22 Algorithm 2 Anytime greedy algorithm with taboo 1: currBest ← min(Solution(SimpleAlgorithmP ool)) 2: bestV I ← V I(currBest) 3: globalT ries ← 0 4: visited ← ∅ 5: while globalT ries ≤ globalT riesT hreshold do 6: 7: 8: while localT ries ≤ localT riesT hreshold do localT ries ← 0 globalT ries ← globalT ries + 1 localT ries ← localT ries + 1 localBest ← M AXF LOAT for all v = vector ∈ ker(A) do n ← ((na × v + currBest ∈ solutionSpace) ∧ ((n + 1) × v + currBest /∈ solutionSpace) newSol ← n × v + currBest if newSol /∈ visited then if V I(newSol) ≤ localBest then localBest ← V I(newSol) newSolLocal ← newSol end if end if n ← ((n × v + currBest ∈ solutionSpace) ∧ ((n − 1) × v + currBest /∈ solutionSpace) newSol ← n × v + currBest if newSol /∈ visited then if V I(newSol) ≤ localBest then localBest ← V I(newSol) newSolLocal ← newSol end if end if end for if localbest = M AXF LOAT then 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: else Break Global Tries (Dead end) visited ← visited ∪ newSolLocal if V I(newSolLocal) ≥ bestV I then else localT ries ← localT ries + 1 bestV I ← V I(newSolLocal) currBest ← newSolLocal localT ries ← globalT ries ← 0 37: 38: 39: 40: 41: 42: end while end if end while end if 14/22 Figure 7. Example of a heuristic search to minimize information distance. Example of heuristic search of a small network transition from {10, 8, 6} to {12, 10, 2}. Note that vertex points of the solution lattice have higher than average similarity as measured by the Rand Index. Mix Ratio We studied experimentally the impact of using a fixed vs Bernoulli distributed mix ratio (µ). As expected we did not observe significant differences between both approaches when run over 11 time steps, as can be seen on figure 9. Joint Degree Assortativity As discussed in section 3.2.5, joint degree is tunable by the user thru the shape parameters of the Beta distribution, affecting link generation. However, dependent on network structure, it may be impossible to generate a network with positive correlation. In figure 10 we plot all links of a network with 10,000 nodes and power-law distribution of node degrees and community size on a two-dimensional graph showing the degrees of their connected nodes. As the network is non directional the plots are symmetrical when reflected about the diagonal. The result of applying shape parameters to influence correlation can be clearly seen. We confirm previous findings, noting additionally that clustering has a strong influence on correlation behaviour, potentially limiting the possibility of generating a positively degree correlated network. 15/22 (a) Rounding to nearest integer (b) Stochastic rounding Figure 8. Node degree distribution of networks generated with 100,000 nodes, mix ratio of 0.7, and total node degree varying from 10 to 150. The artifact minimizing effect of stochastic rounding can clearly be seen in these examples. Figure 9. Fixed versus Bernoulli distribute mix ratio Two networks averaged over 11 time steps, with 10,000 nodes, mix ratio µ = .7, power law distribution of community size (Kc = 1.5) and node degree (Kn = 2.5), displaying ground truth modularity and modularity as computed by the community multilevel algorithm [5]. Differences in modularity between experiments are negligible. The differences in number of communities found between the ground truth and the community detection algorithm can be attributed to the resolution limits of the algorithm used for detection [13]. Temporal Correlation We use the same technique of sampling a beta distribution to influence the evolution of node degree. The user can change the distribution shape parameters to sustain a temporally homogeneous node degree, or to generate nodes that are cyclically active. Figure 11 shows the impact of varying shape parameters on the temporal node degree correlation. Sample Network Currently Syntgen outputs machine readable networks in CSV format adequate for loading into Gephi [4]. In figure 12 an example of a Syntgen generated temporal network with lifecycle events can be seen. A simple analysis of the transition from T2 to T3 can be found in table 4. The events were 16/22 (a) Uncorrelated network (α = 1, β = 1, D = 20) (b) Assortative network (α = 21, β = 1, D = 20) (c) Dissortative network (α = 1, β = 21, D = 20) (d) Failed assortative network (α = 21, β = 1, D = 25) Figure 10. Assortative Experiments on power-law networks with 10,000 nodes, varying the average degree from 20 to 25 and maximum degree from 100 to 500, with an average community size of ≈ 168. Every point on the chart is a link with (x, y) coordinates representing the connecting nodes degrees. The point size is directly proportional to the total number of links with equal coordinates. As can be seen, as we increase the average node degree from 20 to 25 by increasing maximum node degree from 100 to 500, it is no longer possible to generate a correlated network with stated metrics even with aggressive beta distribution shape parameters. categorized as a function of the Jaccard Index [17] between communities, based on an external threshold to indicate community continuation. 5 Remarks, Discussion and Conclusion Syntgen is a network generator with constraints. Links between nodes are created I.I.D. over explicit and implicit user specifications. Although a single instance may deviate from the required specifications, the average of a set of generations will converge asymptotically to those specifications. When using the supplied distribution samplers for node degree and community size, the size of the network has an impact on how closely specifications can be followed. For example, a network with a low average number of communities, will have community size distributions that are likely not recognizable 17/22 Figure 11. Temporal node degree correlation as a function of the Beta Distribution shape parameters Evolution of the node degree Pearson's correlation at 11 successive time steps for different specifications of the Beta distribution shape parameters. Community Event @ end of time T2 Continues shrinking in 3 Continues shrinking in 10 Continues shrinking in 2 Continues growing in 6 Continues growing in 9 Split into [12, 11] Merged Into 11 Continues shrinking in 1 Continues growing in 4 Continues in 5 Merged Into 11 3 10 2 6 9 8 8 1 4 5 7 Community Event @ beginning of time T3 12 2 3 10 9 6 1 4 5 11 11 from Split 8 Continued shrinking from 2 Continued shrinking from 2 Continued shrinking from 10 Continued growing from 9 Continued growing from 8 Continued shrinking from 1 Continued growing from 4 Continued from 5 from Split 8 Merged from [8, 7] Table 4. Community events on time step transition Note community 8 as it splits into 12 and merges into 11 continuing in both communities when compared to parameter derived expectations. It is also of note that, although Syntgen proceeds basically I.I.D. when wiring the network, every time a "dead-end" is encountered on graphable specifications, the affected process is restarted after re-wiring adjustments. For instance, if, while generating intra links inside a community, a node exhausts its list of candidate nodes before satisfying its degree, other established links will be broken so that the process can proceed to satisfaction. This, in practice, "breaks" the I.I.D. aspect of the system, although for most specifications the impact will be marginal depending on the density of the communities and of the 18/22 (a) Network at time T2 with 10 communities, numerically and color identified. (b) Network at time T3 with 9 communities with merge and split events. Figure 12. Nodes marked "X" are examples of nodes to be killed across the transition to T3. Nodes with a spiral are example of nodes that changed communities, and nodes marked "B" are examples of new born nodes. Community 8 split from T2 to T3 into community 12 and split-merged with community 5 to community 11. network. Joint degree distribution specifications and node affinity over time is influenced by user parameters, 19/22 but is also restricted by network wiring requirements and structural cutoffs [10]. This is the reason why it is not possible to directly specify node joint degrees or temporal correlation. The ratio of intra to total node degree has a direct impact on the clustering modularity at any given time. The only node information kept by Syntgen is the intra-community and inter-community node degree that the user provides, and its linked nodes and community membership, generated by Syntgen. If specifications are not conducive to a clustered network, community membership will not be recovered from the network structure. In fact, modularity is affected not only by the above ratio, but also by assortativity specifications. In a highly correlated network it is possible that the clustering generated by Syntgen does not exhibit maximum modularity, which can be verified experimentally. The intuition is that, as nodes exhibit connection preferences, communities within communities may appear, resulting in improved modularity with a larger number of communities. The main aim of Syntgen is to provide researchers in network science a tool flexible enough to generate temporal networks that approximates the topology observed in empirical networks. Syntgen can help where real data is not easily accessible, but whose structure and topology is known. In the process of building Syntgen, we developed a method to determine the graphability of intra and inter node degree and community size sequences, and a heuristic to find the node flow that results in the closest clusterings at successive time steps, given a network and a community size sequence. We plan to use the developed search heuristic to determine change points in temporal networks with community structure. The intuition is that change points are correlated with a peak in community activity which would be detected as an increase in the dissimilarity gap between successive snapshots of the network. The gap to the (near) optimal flow would be a proxy of intensive change. Other extensions to our work include the usage of Syntgen to evaluate community detection algorithms on temporal networks and analysing syntgen capabilities to reproduce empirical systems. Acknowledgment This project was partially supported by FCT (Funda¸cao para a Ciencia e Tecnologia) through project UID/Multi/04466/2019. Rui Jorge Lopes was partly supported by the Funda¸cao para a Ciencia e Tecnologia, under Grant UID/EEA/50008/2019 to Instituto de Telecomunica¸coes. The authors are thankful to Gergeley Palla and his team for relevant topical discussions and to Maria J. Pereira for careful review of the draft manuscript. References 1. Baldoni, V., Berline, N., De Loera, J. A., Dutra, B., Koppe, M., Moreinis, S., Pinto, G., Vergne, M. & Wu, J. (2014) A User 's Guide for LattE integrale v1.7.2. . 2. Barab´asi, A.-L. (2015) NETWORK SCIENCE. 4. The scale-free property. Network Science, pp. 1 -- 57. 3. Barvinok, A. & Pommersheim, J. E. (1999) An Algorithmic Theory of Lattice Points in Polyhedra. 38, 91 -- 147. 4. Bastian, M., Heymann, S. & Jacomy, M. (2009) Gephi: An Open Source Software for Exploring and Manipulating Networks. Third International AAAI Conference on Weblogs and Social Media, pp. 361 -- 362. 5. Blondel, V. D., Guillaume, J.-l. & Lefebvre, E. (2008) Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment. 6. Boguna, M., Pastor-Satorras, R. & Vespignani, A. (2003) Cut-offs and finite size effects in scale-free networks. (1), 1 -- 5. 20/22 7. Choudum, S. A. (1986) A simple proof of the Erdos-Gallai theorem on graph sequences. Bulletin of the Australian Mathematical Society, 33(1), 67 -- 70. 8. Clauset, A., Shalizi, C. R. & Newman, M. E. J. (2009) Power-law distributions in empirical data.. SIAM Review, 51(4), 661 -- 703. 9. Clauset, A. S. F. I. (2013) The configuration model. Network Analysis and Modeling, CSI 5352, Lecture 11, (October), 1 -- 6. 10. Dorogovtsev, S. N. & Mendes, J. F. (2002) Evolution of networks. Advances in Physics, 51(4), 1079 -- 1187. 11. Erdos, P. & Gallai, T. (1960) Gr´afok elo´ırt fok´u pontokkal. Matematikai Lapok, 11, 264 -- 274. 12. Euler, L. (1736) Solutio problematis ad geometrian situs pertinentis. Comentarii academiae scientarum Petropolitanae, 8, 128 -- 140. 13. Fortunato, S. & Barth´elemy, M. (2007) Resolution limit in community detection.. Pnas, 104(1), 36 -- 41. 14. Fortunato, S. & Hric, D. (2016) Community detection in networks: A user guide. Physics Reports, 659, 1 -- 44. 15. Granell, C., Darst, R. K., Arenas, A., Fortunato, S. & G??mez, S. (2015) Benchmark model to assess community structure in evolving networks. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 92(1), 1 -- 11. 16. Greene, D. (2010) Tracking the Evolution of Communities in Dynamic Social Networks. 2010 International Conference on Advances in Social Network Analysis and Mining : ASONAM 2010 : proceedings 2010. 17. Jaccard, P. (1912) THE DISTRIBUTION OF THE FLORA IN THE ALPINE ZONE.1. New Phytologist, 11(2), 37 -- 50. 18. Korf, R. E. (1998) A complete anytime algorithm for number partitioning. Artificial Intelligence, 106(2), 181 -- 203. 19. Kraskov, A., Stogbauer, H., Andrzejak, R. G. & Grassberger, P. (2003) Hierarchical Clustering Based on Mutual Information. arXiv:q-bio/0311039v2. 20. Lancichinetti, A. & Fortunato, S. (2009) Community detection algorithms: A comparative analysis. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 80(5), 1 -- 12. 21. Lancichinetti, A., Fortunato, S. & filippo Radicchi (2008) Benchmark graphs for testing community detection algorithms. Physical Review E. 22. Loera, J. A. D. (2005) The Many Aspects of Counting Lattice Points in Polytopes. Mathematische Semesterberichte, 52(2), 175 -- 195. 23. Meila, M. (2007) Comparing clusterings-an information based distance. Journal of Multivariate Analysis, 98(5), 873 -- 895. 24. Newman, M. E. (2003) Mixing patterns in networks. Physical Review E - Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics, 67(2), 13. 25. Newman, M. E. J. (2004) Algorithms for graph partitioning: A survey. Social Networks, 6(2), 1 -- 34. 26. Newman, M. E. J., Strogatz, S. H. & Watts, D. J. (2000) Random graphs with arbitrary degree distributions and their applications. . 21/22 27. Palla, G., Barab´asi, A.-L. & Vicsek, T. (2007) Quantifying social group evolution. Nature, 446(7136), 664 -- 667. 28. Rossetti, G. (2017) RD YN : graph benchmark handling community dynamics. Journal of Complex Networks, (January), 893 -- 912. 29. Stanton, I. & Pinar, A. (2011) Prescribed Joint Degree Distribution. CoRR, abs/1103.4, 1 -- 29. 30. Tripathi, A., Venugopalan, S. & West, D. B. (2010) A short constructive proof of the Erdo{double acute}s-Gallai characterization of graphic lists. Discrete Mathematics, 310(4), 843 -- 844. 31. Wagner, S. & Wagner, D. (2007) Comparing Clusterings - An Overview. KITopen, 4769(001907), 1 -- 19. 32. Yang, Z., Algesheimer, R. & Tessone, C. J. (2016) A Comparative Analysis of Community Detection Algorithms on Artificial Networks. Scientific Reports, 6(August), 30750. 22/22
1908.02575
1
1908
2019-07-27T06:49:47
Alternative Blockmodelling
[ "cs.SI", "cs.LG", "stat.ML" ]
Many approaches have been proposed to discover clusters within networks. Community finding field encompasses approaches which try to discover clusters where nodes are tightly related within them but loosely related with nodes of other clusters. However, a community network configuration is not the only possible latent structure in a graph. Core-periphery and hierarchical network configurations are valid structures to discover in a relational dataset. On the other hand, a network is not completely explained by only knowing the membership of each node. A high level view of the inter-cluster relationships is needed. Blockmodelling techniques deal with these two issues. Firstly, blockmodelling allows finding any network configuration besides to the well-known community structure. Secondly, blockmodelling is a summary representation of a network which regards not only membership of nodes but also relations between clusters. Finally, a unique summary representation of a network is unlikely. Networks might hide more than one blockmodel. Therefore, our proposed problem aims to discover a secondary blockmodel representation of a network that is of good quality and dissimilar with respect to a given blockmodel. Our methodology is presented through two approaches, (a) inclusion of cannot-link constraints and (b) dissimilarity between image matrices. Both approaches are based on non-negative matrix factorisation NMF which fits the blockmodelling representation. The evaluation of these two approaches regards quality and dissimilarity of the discovered alternative blockmodel as these are the requirements of the problem.
cs.SI
cs
Alternative Blockmodelling Oscar Fabian Correa Guerrero Student number: 594842 Supervisors: Dr. Jeffrey Chan and Dr. Vinh Nguyen Number of credit points: 75 Current research unit: COMP60002 Computer Science Research Project Department of Computer Science and Software Engineering THE UNIVERSITY OF MELBOURNE November 2014 Abstract Many approaches have been proposed to discover clusters within networks. Community finding field encompasses approaches which try to discover clusters where nodes are tightly related within them but loosely related with nodes of other clusters. However, a community network configuration is not the only possible latent structure in a graph. Core-periphery and hierarchical network configurations are valid structures to discover in a relational dataset. On the other hand, a network is not completely explained by only knowing the membership of each node. A high level view of the inter-cluster relationships is needed. Blockmodelling techniques deal with these two issues. Firstly, blockmodelling allows finding any network configuration besides to the well-known community structure. Secondly, blockmodelling is a summary representation of a network which regards not only membership of nodes but also relations between clusters. Finally, a unique summary representation of a network is unlikely. Networks might hide more than one blockmodel. Therefore, our proposed problem aims to discover a secondary blockmodel representation of a network that is of good quality and dissimilar with respect to a given blockmodel. Our methodology is presented through two approaches, (a) inclusion of cannot-link constraints and (b) dissimilarity between image matrices. Both approaches are based on non-negative matrix factorisation NMF which fits the blockmodelling representation. The evaluation of these two approaches regards quality and dissimilarity of the discovered alternative blockmodel as these are the requirements of the problem. i Contents Abstract .......................................................................................................................................... i Chapter 1 ....................................................................................................................................... 1 1.1. Background.................................................................................................................... 2 1.2. Contributions of the Thesis ........................................................................................... 4 1.2.1. Proposal of the Alternative Blockmodelling problem in relational data............... 4 Approach to discover a different and plausible alternative blockmodel 1.2.2. representation with respect to a given one .......................................................................... 4 Insights into challenges and problems presented when approaching the 1.2.3. proposed problem by using instance-based constraints ...................................................... 5 Chapter 2 ....................................................................................................................................... 6 2.1. Alternative clustering in non-relational data ................................................................ 6 2.1.1. Information-theoretic approaches ........................................................................ 6 2.1.2. Instance-level constraint-based approaches ........................................................ 7 2.2. Community finding within networks ........................................................................... 10 2.3. Blockmodelling ............................................................................................................ 12 2.4. Conclusions ................................................................................................................. 13 Chapter 3 ..................................................................................................................................... 14 3.1. Fundamental concepts ................................................................................................ 15 3.1.1. Non-negative matrix factorisation NMF ............................................................. 15 3.1.2. Solving SNMTF ..................................................................................................... 18 3.1.3. Normalisation vs. Iterative Lagrangian Solution ................................................. 20 3.2. Outline of our Methodology ....................................................................................... 22 3.3. Approach 1: Inclusion of cannot-link constraints ........................................................ 23 3.4. Approach 2: Dissimilarity between image matrices .................................................... 25 3.4.1. Generalised form ................................................................................................. 26 3.5. Evaluation .................................................................................................................... 27 Chapter 4 ..................................................................................................................................... 29 4.1. The novel Alternative Blockmodelling problem .......................................................... 29 4.2. Approaches to solve this problem .............................................................................. 38 4.2.1. Effect of 𝜷 parameter on both approaches ........................................................ 43 4.3. Considerations about instance-level constraints ........................................................ 44 Chapter 5 ..................................................................................................................................... 47 References ................................................................................................................................... 49 List of Figures Figure 1-1: Blockmodelling ............................................................................................................ 3 Figure 2-1: Cannot link constraints ............................................................................................... 7 Figure 2-2: COALA ......................................................................................................................... 8 Figure 2-3: Communities and Blockmodelling ............................................................................ 10 Figure 2-4: Structural Equivalence .............................................................................................. 12 Figure 3-1: Symmetric Non-negative Matrix Tri-Factorisation SNMTF ....................................... 16 Figure 3-2: Two-mode graph of students and subjects [34] ....................................................... 17 Figure 3-3: iVAT graphic which shows some alternative blockmodels ....................................... 28 Figure 4-1: Zachary's karate club. ............................................................................................... 30 Figure 4-2: Zachary's karate club blockmodel representation of the actual division. ................ 30 Figure 4-3: Alternative Blockmodels for Zachary's karate club dataset. .................................... 31 Figure 4-4: Chosen alternative network division for Zachary's karate club. .............................. 32 Figure 4-5: Core-periphery alternative blockmodel solution for Zachary's karate club. ............ 33 Figure 4-6: Original karate club's blockmodel discovered as alternative. .................................. 34 Figure 4-7: Actual division of books on American politics dataset. ............................................ 35 Figure 4-8: Blockmodel representation of the actual division of books on American politics. .. 36 Figure 4-9: Alternative blockmodels for Books on American politics dataset. ........................... 37 Figure 4-10: Chosen alternative network division for Books on American politics..................... 37 Figure 4-11: Original Adjacency Matrix which was created from mixing two blockmodel structures. ................................................................................................................................... 38 Figure 4-12: Quality measurements with different 𝜷 values for both approaches. ................... 40 Figure 4-13: Dissimilarity measurements with different 𝜷 values for both approaches. ........... 41 Figure 4-14: Similarity measures with respect to the core-periphery blockmodel structure with different 𝜷 values for both approaches. ..................................................................................... 42 Figure 4-15: Number of occurrences of the most common alternative blockmodel with different 𝜷 values for both approaches. ..................................................................................... 43 List of Tables Table 1: Iterative Lagrangian solution [12] ................................................................................. 22 Table 2: Outline of our algorithm ................................................................................................ 22 Table 3: P-value from ANOVA of the linear models of the variables 𝜷 (explanatory) vs. metrics (response).................................................................................................................................... 44 Table 4: P-value from ANOVA of the multiple-regression models of the variables 𝜷 and percentage of correct constraints (explanatory) vs. metrics (response) .................................... 45 Chapter 1 Introduction When an individual is confronted to raw data, among her first reactions would be trying to make sense of them somehow. Getting patterns from data could end being a painful task especially if the amount of data is massive and/or these data has many features. Furthermore, appreciation of the data and their grouping might be correct for certain users, but it may not make sense for others. Therefore, thinking about the existence of a unique grouping of the data is not adequate and even limiting. Extensive research has been carried out on alternative clusterings in non-relational data [1- 7]. When datasets have many features, it is tempting to think that data objects can be clustered regarding a different subset of features each time an alternative solution is searched. For instance, a document repository may contain millions of documents where each of them has metadata and topic features. Then, an algorithm can find a candidate clustering of these documents by taking into account the metadata in first place, and it can also find an alternative clustering by regarding the topic-based features in second place. On the other hand, with respect to relational data, community finding has been a widely studied field which focuses on discovering hidden structures within a network. These structures are called communities and consist of nodes that are tightly related between them but loosely related with the ones of other communities. Nonetheless, unlike non-relational data, most algorithms in community finding do not offer an alternative solution even when another clustering of communities could be more suitable to a determined user. Moreover, a totally different hidden structure can be found since community structure is not the only possible latent configuration. In fact, many real networks follow a power-law degree distribution -- at least asymptotically- where there is a small number of central or "core" nodes with lots of connections and a heavy tail of "periphery" nodes with a few connections. This is the case of social networks, e.g. Twitter®, which has a limited number of very active users with lots of friends and a considerable amount of passive -- not as active as the former- users with fewer connections. Thus, a community structure would be difficult to discover in this kind of networks. Discovering an alternative community clustering or a completely different network structure may be more convenient for certain purposes. A user would rather have more options when she is facing a clustering problem, especially when it is related with a decision-making process. It should be said that the expected alternative solution must be as good as the initial proposed clustering that is, it ought to show a coherent division of the network. However, a trade-off situation might arise between quality and dissimilarity since as dissimilarity increases quality could be affected and vice versa. 1 Besides to the possibility of discovering different network structures, an alternative clustering finding approach in graphs might offer more information. Knowing the structure and cluster membership of the nodes can yield a good understanding of the network, yet it is incomplete. Relationships between clusters help learn how clusters interact, what role each of them plays within the whole. This is deeply true in social network analysis where relations -- block within social analysis jargon- explicitly exist apart of clusters -- position1 is the social term used instead of clusters. For example, within a trade network, consumers and producers are sound candidate positions but there also exists a marked consumer-producer relationship which is needed to explain the network completely. Therefore, this thesis presents a novel approach which overcomes these issues by combining blockmodelling techniques [8] and an efficient and well-proved optimisation approach called non-negative matrix tri-factorisation [9-11]. Firstly, through blockmodelling, it is suitable to represent an entire network by two basic matrices: position membership matrix and an image matrix, i.e. the matrix which shows the relations between clusters. Moreover, blockmodelling manages to summarise a complex network through a smaller comprehensible representation that can encompass different network structures such as communities, core-periphery, and so on. Thus, community finding is a special case of blockmodelling where the image matrix is a diagonal matrix. Secondly, the clustering process can be regarded as a non-convex optimisation problem where a local optimum might be found by decomposing the network adjacency matrix2 into three sub-matrices factors: position membership matrix -- twice- and image matrix. This process is carried out iteratively through multiplicative update rules [11, 12]. Finally, the proposed objective functions enclose both quality and dissimilarity of the alternative blockmodel. The rest of this chapter presents brief background information of relevant terms within the context of this work. Finally, it also highlights the contributions of this research, yet future work is possible. 1.1. Background important related concepts are briefly explained. Graphs, clustering, In this section, blockmodelling and optimisation are terms used intensively throughout this thesis and thus, they need to be explained. Furthermore, contributions of this work are presented. Graphs consist of nodes, edges and their attributes. A node is also known as vertex and may represent any entity within a network, e.g. a Facebook® user, a protein within a protein interaction network or a computer in a LAN3. A node is connected to other nodes through edges. Both, nodes and edges might have attributes. A node attribute could be its name in the 1 Terms position and cluster can be used interchangeably. 2 Adjacency matrix 𝐴 ∈ ℝ𝑛 𝑥 𝑛 is the representation of a network of 𝑛 nodes where each cell 𝑎𝑖𝑗 ∈ ℝ corresponds to the weight of the edge between the 𝑖𝑡ℎ and 𝑗𝑡ℎ nodes. 3 LAN = Local Area Network 2 case of a Facebook® user, whereas an edge attribute could be the level of friendship between two Facebook® users. Clustering is an application of data mining whose aim is to group similar entities within a dataset. In order to complete its task, clustering does not count on user supervision. That is, there is no extra information which would guide its task. However, a recent research field called semi-supervised clustering can lean on the existence of a small number of labelled entities which may help guide the clustering process per se. Furthermore, similarity between entities is an application-dependent measure -- the reader will see that a special similarity criteria is regarded within this work. Blockmodelling (See Figure 1-1) aims to summarise the whole structure of the network -- adjacency matrix- through two matrices: (a) position membership matrix, and (b) image matrix. In the position membership matrix, each row corresponds to a node and each column to a cluster. The resulting cells have either one or zero4, depending on whether the node belongs or not to the cluster. On the other hand, the image matrix has the clusters as both rows and columns, and the cells represent the relation between clusters. Each cell in the image matrix is known as a block and it has a value of one if there is a relation between clusters or zero otherwise5. Both matrices form a blockmodel [8]. Figure 1-1: Blockmodelling An adjacency matrix (left) can be summarised through two matrices (right): position membership matrix and image matrix. In the position membership matrix, each position corresponds to a column and each node to a row. In the image matrix, each cell is called block. A block shows if a relation between two positions does exist (1) or not (0). This is a distinctive characteristic of blockmodelling since it allows a better comprehension of the whole network. Optimisation is a field in mathematics and computer science where the best element is searched within many possible alternatives and it may be bounded by one or more constraints. 4 The values of the position membership matrix are not actually 1 or 0, but within [0-1] range. This is because the matrix factorization process is an approximation of the original adjacency matrix. More details in Chapter 3. 5 Image matrix will also have values within [0-1] range. More details in Chapter 3. 3 1111112345678123456781111111111111111P1P2P3P1P2P3111P1P2P3P1P2P31234567811111111P1P2P3P1P2P3ADJACENCY MATRIXPOSITION MEMBERSHIP MATRIXIMAGE MATRIXCOMMUNITYHIERARCHY Chapter 3 shows our approaches that count on optimisation to find a local minimum for the proposed objective function. 1.2. Contributions of the Thesis This section presents the contributions of this thesis: 1.2.1. Proposal of the Alternative Blockmodelling problem in relational data As far as we know, alternative clustering of a graph through blockmodelling techniques has not been introduced as a problem in the field. There has been extensive research in alternative clustering upon non-relational data [1-7]. There are also many algorithms to discover latent communities within networks [13-23]. However, alternative clustering of relational data in conjunction with its summary through blockmodel representation is a brand-new problem. Thus, the proposed problem consists of not only finding an alternative clustering in a graph given an initial clustering but also revealing interrelations between its clusters through a blockmodel representation. Throughout this thesis, valuable characteristics related with blockmodels are presented. the problem also requires discovering a different alternative blockmodel Finally, representation in relation with a given one, yet preserving a plausible division of the network. 1.2.2. Approach to discover a different and plausible alternative blockmodel representation with respect to a given one We approach the problem based on the clustering potentiality that matrix factorisation has [24]. Moreover, matrix factorisation ends up to be closely linked to a blockmodel representation of a network since the original adjacency matrix is decomposed into two lower- rank matrices. These two matrices correspond to the position cluster membership and image matrices which are the basis of blockmodelling (See Figure 1-1.) Then, a candidate clustering will be the best approximation to the matrix factorisation. Therefore, the problem becomes an optimisation problem. However, this part of the approach would only allow discovering a block model which could even be the same initial clustering. Then, the optimisation problem demands to be bounded somehow such that the discovered clustering is dissimilar to the given one. Hence, the objective function6 requires taking into account the given clustering. 6 Objective function is the equation to be optimized -- minimised or maximised given certain constraints. 4 1.2.3. Insights into challenges and problems presented when approaching the proposed problem by using instance-based constraints Our first approach focused on matrix factorisation and semi-supervised clustering by including instance-level constraints [25]. These constraints were built upon the given clustering in such a way that the discovered alternative blockmodel is dissimilar to it. Although, this approach looks promising since semi-supervised clustering has been successful by benefiting of the presence of very limited supervisory information -- in this case, the given clustering-, it also presents some challenges. These challenges are especially related with their construction and identification. Therefore, we offer some insights into the problems, challenges and future work within the application of instance-level constraints when finding a dissimilar clustering. Chapter 5 shows some conclusions about this approach, but more its challenges and considerations. importantly 5 Chapter 2 Literature Survey Discovering an alternative blockmodel within a graph is related with alternative clustering in non-relational data, community finding within networks and blockmodelling techniques. Nonetheless, none of them strictly finds an alternative blockmodel representation of a network based on a given one. This chapter surveys these techniques and explains why they are different from the proposed problem. 2.1. Alternative clustering in non-relational data Alternative clustering approaches in non-relational data are techniques which discover alternative groupings within multidimensional datasets, e.g. document repositories, protein databases, etc. Alternative clustering has been approached from different perspectives from which we survey two of them: information-theoretic-based and instance-level-constraint- based methods. 2.1.1. Information-theoretic approaches Conditional Information Bottleneck -- CIB- [6] is an information-theoretic approach that minimises the mutual information between the data objects and the cluster labels and maximises the mutual information between the features and cluster labels given the side information -- initial clustering. According to [1], CIB is the most relevant work in alternative clustering field. However, CIB makes some assumptions when estimating the distribution of the random variables, i.e. data objects, features, cluster labels and side information. In contrast to CIB, another information-theoretic approach called minCEntropy offers the possibility of finding a clustering or an alternative clustering without being provided a probability distribution [7]. minCEntropy works in an unsupervised manner which allows discovering a clustering, whereas minCEntropy+ and minCEntropy++, semi-supervised versions of minCEntropy, find alternative clusterings with respect to a given clustering. Similarly to CIB, minCEntropy is an objective-function-oriented approach which minimises the conditional entropy based on the intuition that entropy is the inverse of mutual information. By using mutual information, an algorithm tries to maximise the information between the data and the clustering. Then, clustering by using entropy will minimise it, which is the principle of this approach. 6 A very similar approach to minCEntropy is proposed in [4]. The authors called their method Non-linear Alternative Clustering with Information theory -- NACI-. It is also an information- theoretic method that maximises the information between the clustering and the data objects while minimises the information between the sought alternative and the reference clustering. NACI is oriented to find alternative clusterings on non-linear datasets, that is, it is not limited to spherically shaped clusterings. minCEntropy and NACI benefit from a kernel density estimation tool known as Parzen windows which allows them to estimate the probability densities of their random variables. In this way, the pitfall encountered in CIB, associated with its probability distribution assumption, can be avoided. However, both approaches need to be provided the standard deviation -- width- 𝜎 for the kernel function since they use a Gaussian kernel. Clustering for Alternatives with Mutual Information -- CAMI- is a neat and mathematically well founded information-theoretic approach which has an unsupervised nature [3]. Its objective function is conceived in such a way both clusterings are found at the same time, i.e. the reference and the alternative clusterings, through a Gaussian mixture where each cluster is a multivariate Gaussian distribution. Although CAMI looks similar to CIB, CAMI proved to be more accurate. The explanation resides on CAMI's explicit quality assurance -- likelihood maximisation- which CIB clearly lacks. 2.1.2. Instance-level constraint-based approaches Besides to information-theoretic approaches, there are methods which encode the side information, i.e. the given clustering, as the so called instance-level constraints. Figure 2-1: Cannot link constraints The figure shows two subgraphs within the given clustering. In the first one (top,) one cluster is depicted with blue colour. From these three nodes, 3 cannot-link constraints were created and they are shown in the top of the table. Similarly, in the second subgraph, two clusters are depicted and their cannot-link constraints are also included in the table. An instance-level constraint encapsulates the relationship between two data objects -- instances- within the given clustering. Let 𝑥𝑖, 𝑥𝑗 𝑤ℎ𝑒𝑟𝑒 𝑖 ≠ 𝑗 be two instances in a dataset. If both instances belong to the cluster 𝑐𝑘, a cannot-link constraint is created. Cannot-link constraints identify instances that cannot-be-linked -- cannot belong to the same cluster- in the alternative clustering since they are already linked in the given clustering (See Figure 2-1). 7 13246758CANNOT-LINK121323456778 From Figure 2-1, it can be inferred that every possible cannot-link constraint has been created which is not an appropriate approach since not all of them can be fulfilled when the number of clusters is fixed (See Chapter 5.) On the other hand, it is important to emphasise that the side information -- reference clustering- has been given a negative connotation. In other words, while in the given clustering the known associations between instances of the same clusters may be regarded as positive, they become the contrary when finding an alternative solution, i.e. the constraints negate that link. Nonetheless, cannot-link constraints are not the only possible kind of constraints may be inferred from the given clustering. Must-link constraints indicate the pairs of instances that need to belong to the same cluster. Must-link constraints negate the lack of link between two instances in the given clustering. Let 𝑥𝑖, 𝑥𝑗 𝑤ℎ𝑒𝑟𝑒 𝑖 ≠ 𝑗 be two instances in a dataset. If, in the given clustering, both instances belong to clusters 𝑐𝑘, 𝑐𝑙 respectively where 𝑘 ≠ 𝑙, a must-link constraint is created showing the aim 𝑥𝑖, 𝑥𝑗 end up belonging to the same cluster in the alternative solution. Although this approach looks plausible, issues can arise. Chapter 5 analyses them deeply. Constrained Orthogonal Average Link Algorithm -- COALA- is an instance-level constraint approach which ensures the dissimilarity between the given and the alternative clusterings by including cannot-link constraints in their algorithm [1]. However, dissimilarity of the alternative clustering is not the only aim of this method. Like the previous presented approaches, it also intends to discover a high-quality alternative solution. This is achieved by imposing a lowest quality threshold the alternative clustering must have. Thus, this approach also comprises a trade-off between two competitive objectives: dissimilarity and quality. Figure 2-2: COALA COALA is a hierarchical agglomerative algorithm which starts its execution by considering every data object as an individual cluster -- only one member. Then, an iterative process merge -- agglomerates- the clusters. Each iteration of this process is depicted in this figure. Pair (q1, q2) corresponds to the pair of clusters that has the minimum distance between them. Pair (o1, o2) refers to the pair of clusters that has the minimum distance between them and also satisfies the constraints created in a pre-processing stage. A ratio is computed and compared against a pre- specified threshold ω. If this ratio is greater or equal than ω, the clusters containing instances q1 and q2 are merged. On the contrary, if the ratio is less than ω, clusters containing instances o1 and o2 are merged. 8 Get pair(q1, q2)Get pair(o1, o2)d(q1, q2) / d(o1, o2)>= ω Mergecq1, cq2Mergeco1, co2YN In COALA, a set 𝐿 of cannot-link constraints is generated previous the clustering process as such. This set contains every possible cannot-link constraint, that is, it contains the nodes that cannot be linked -- cannot belong to the same cluster- in the alternative clustering since they are already linked in the given clustering. Afterwards, a customised hierarchical agglomerative clustering process is carried out. This algorithm is represented in Figure 2-2. As a hierarchical agglomerative algorithm, it starts its execution by considering every data object as an individual cluster, that is, it has only one member. The notion of dissimilarity in COALA corresponds to the distance between clusters. Average-linkage7 is the chosen technique to compute such distance. Then, within an iterative process, pairs (q1, q2) and (o1, o2) are computed. The first refers to the pair of clusters that has the minimum distance between them. The second corresponds to the pair of clusters that has the minimum distance between them and also satisfies the constraints in set 𝐿. A ratio between these two distances is computed and compared against the quality threshold ω. If the result is greater or equal, the algorithm merges the first pair of clusters -- ensuring quality. Otherwise, it merges the second -- ensuring dissimilarity. Besides to this algorithm, [1] propose: COALACat, which is a variant of the original COALA algorithm that can be used with categorical datasets; and, a new metric to measure both dissimilarity and quality through a unique score. It is important to mention that since COALA has been built upon a hierarchical clustering method, it suffers from the same limitations of that approach. For example, it cannot handle overlapping clusters and its quadratic running time might be a concern for large datasets. Alternative Distance Function Transformation -- ADFT- is another instance-level constraint- based approach which deals with the side information in a different manner. Instead of negating the links, in the case of instances of the same cluster, this approach does create a set of must-link constraints. Likewise, instead of negating the lack of links between instances that belong to different clusters, it also creates a set of cannot-link constraints. Hence, it is actually characterising the provided information through instance-level constraints. The characterisation process is conceived as a transformation from dataset 𝑋 into clustering 𝐴. From the sets of constraints, a distance function 𝐷 is learnt. Finally, an alternative transformation function 𝐷′ is computed which converts the original dataset from which an alternative clustering 𝐴' is found through any algorithm. Obviously, this is not an exhaustive list and it only focuses on two perspectives. What is important to rescue is that the presented alternative clustering approaches include a trade-off between two competitive objectives: quality and dissimilarity. On the other hand, they are not suitable to find alternative clusterings within relational data since they do not take into account structural characteristics of networks. 7 Average-linkage computes the average distance of all pairwise objects between clusters. 9 2.2. Community finding within networks Community finding tries to discover network latent structures called communities for which there is not a universally accepted definition. Nonetheless, most work on the field consider communities as network structures whose nodes are tightly related within them but loosely related with nodes of other clusters, i.e. there are a noticeable greater number of edges between nodes within a community than the number of edges between nodes of different communities. This conception of communities becomes relevant to our work because communities can be regarded as a special case of blockmodelling where the image matrix is a diagonal matrix. Figure 2-3: Communities and Blockmodelling When communities are considered as structures with densely interconnected nodes within them but with sparse connections between nodes of different communities, community finding is a sub-problem within the blockmodelling field. In this figure, the adjacency matrix has three communities of vertices. Recall that the image matrix shows the relationships between positions -- communities- through blocks. Thus, the image matrix is a diagonal matrix since there is no interrelations between positions in a community finding scheme. Figure 2-3 shows an adjacency matrix which could be partitioned into three communities. In section 1.1, it was mentioned the role image matrix has within a blockmodel representation. Recall that it shows the relationships between positions -- in this case: communities- through blocks. Conceptually, a community does not have relations with other communities -- which actually does not happen. Thus, the image matrix in community finding is a diagonal matrix. By far, communities have been the most studied network structure. It has been approached from different perspectives, however, it has not been solved satisfactorily yet [15]. We briefly explain some of them which we consider important within the field and for our work. An information-theoretic approach known as InfoMod is presented in [26], which considers community detection as a problem of finding an efficient compression of the network. It is worth to notice that this approach is oriented to find communities by maximising mutual 10 1111112345678123456781P1P2P3P1P2P3P1P2P3P1P2P31234567811111111P1P2P3P1P2P3ADJACENCY MATRIXPOSITION MEMBERSHIP MATRIXIMAGE MATRIXCOMMUNITIES11111111111DIAGONALMATRIX information between a model and the actual network. However, [26] mention that constraining the approach to find only communities will not necessarily maximise mutual information. In a second experiment they remove those constraints and find an alternative clustering. Regarding optimisation methods, simulated annealing algorithms, greedy algorithms, spectral methods, extremal optimisation algorithms and so on, have showed noticeable results in the field of community detection [27]. Many of these approaches are based on the optimisation of a widely accepted metric called modularity Q introduced by [20]. Modularity Q can have values within the range [-1, 1] where 1 represents a network with a strong community structure -- good quality. This metric is useful in divisive methods like [20] and [14] where a higher value of Q indicates a satisfactory split. It does not happen in hierarchical divisive clustering methods where it is not well determined when to stop the splitting process. Nonetheless, [16] showed that optimising the modularity Q metric enforces to find clusters at a coarse level. It means that some clusters which are smaller than a certain threshold might not be discovered. Furthermore, the approach proposed in [20] shows an important shortcoming related with its complexity. It takes 𝑂(𝑛3) time on sparse graphs where 𝑛 stands for the number of nodes. Therefore, [13] considered improving approach's complexity in [20] by applying an iterative greedy local algorithm which maximise the modularity Q of the communities in each iteration. [13] demonstrated the computational efficiency of their approach by identifying language communities in a mobile phone network of 118 million nodes and more than one billion of links. Moreover, due also to its high quality results, it has become widely used [27]. [19] proposed a different approach based on modularity but using spectral principles of the network. This new approach takes 𝑂(𝑛2 log(𝑛)) which is considerably better. This method and many other linear approaches based on spectral clustering such as Principal Component Analysis -- PCA-, Independent Component Analysis -- ICA- and eigenvalue decomposition allow the existence of negative values in the resulting matrices after the factorisation process. [22] introduced another information-theoretic algorithm based on random walks called InfoMap also known as Map equation method. This is a remarkable work within community finding field since it outperforms by far many of the proposed algorithms [17, 21]. Moreover, its rationale and its reduced time and space complexities make it a very attractive method. This approach tries to minimise the description length -- MDL8- by using firstly a greedy search algorithm and then, a simulated annealing approach. Although community finding approaches now deal with relational datasets, they are limited to only one possible network structure, the so-called communities. Moreover, none of these approaches tries to find an alternative community structure. 8 Minimum description length is a principle in which the best hypothesis for a given set of data is the one that leads to the best compression of the data. 11 2.3. Blockmodelling Within blockmodelling and Social Network Analysis contexts, similarity between nodes is determined by the so-called structural equivalence. Structural equivalence considers that nodes within a network are structurally equivalent, that is, belong to the same position, if they have exactly the same set of incoming and outgoing relations (See Figure 2-4). However, most real datasets do not contain nodes that are structurally equivalent in the strict sense of the definition. Therefore, the basic objective is to divide the network into positions, each of which contains nodes that are approximately structurally equivalent. For example, when comparing two pairs of nodes, the pair that is more approximately structural equivalent will be the one that has more common relations. Figure 2-4: Structural Equivalence (A) Nodes 1, 2, and nodes 3, 4, 5 are two clusters of structurally equivalent nodes. For example, nodes 1 and 2 can represent two teachers and nodes 3, 4 and 5 can represent their students. In this case, the teachers have the same group of students and this group of students is taught by the same two teachers. Therefore, both teachers and students are two clusters of structurally equivalent nodes. (B) None of the nodes are structurally equivalent. For instance, Twitter users 6 and 8 follow user 7, but user 8 also follows user 9. Thus, these users are not structurally equivalent. [28] proposed a novel framework called FactorBlock to discover blockmodels that are present in noisy and sparse networks. [28] show that a repeated number of experiments using the algorithms introduced by [29] yield incorrect results as the factorisation algorithms penalise equally the edges and non-edges9 -this is especially noticeable in sparse datasets. Therefore, the introduced approach includes a weighting scheme in the objective function. Likewise, noisiness is dealt by including more constraints into the function. The problem of evolving blockmodels has also been studied, yet unlike static blockmodels, the rules to define the structural equivalence within dynamic blockmodels are not well defined. Also, within dynamic graphs is not clear what the best blockmodel is. There is a risk of representing each change with a blockmodel -- overfitting- or only one block model for the whole evolutionary process -- inaccuracy. Therefore, in [30], two definitions of evolving structural equivalence and an information theoretic approach to determine when a new blockmodel is necessary are proposed. In [28], blockmodelling is related with Non-negative matrix factorisation -- NMF-, an essential concept within our work (See section 3.1.1). In fact, [28] shows how the decomposition of an adjacency matrix could lead to the blockmodel representation. Our methodology (See Chapter 3) is based on this effective clustering process. 9 Adjacency matrices of sparse datasets have many blank cells which correspond to non-edges. 12 6789(B)12345(A) Nonetheless, any of the surveyed blockmodelling approaches deals with the problem of discovering an alternative blockmodel representation. 2.4. Conclusions Our survey has presented different approaches to solve problems related to alternative blockmodelling. From these methods, some valuable conclusions can be stated: - Quality and dissimilarity between reference and alternative clusterings are opposite objectives so that a trade-off parameter allows controlling their effect on the whole objective. - Community finding is a special case of blockmodelling where the image matrix is a diagonal matrix. - Blockmodelling techniques identify positions -- clusters- by evaluating structural characteristics of the nodes within a network. The most important equivalence metric in this field is called structural equivalence. 13 Chapter 3 Methodology Based on the proposed problem (See section 1.2.1,) our approach must find an alternative blockmodel representation of a network. This representation is a summary of the adjacency matrix of the network through two sub-matrices: position membership matrix and image matrix. Then, decomposition of the adjacency matrix into factor matrices of lower rank can be thought as a plausible approach to find a summary of the adjacency matrix. For example, PCA is a widely used method for dimensionality reduction by performing either eigenvalue decomposition10 of a data covariance matrix11 or Singular Value Decomposition -- SVD- of a data matrix. Nonetheless, PCA or SVD do not constrain the range of the values within the factor matrices. In other words, the factor matrices might have negative values. Let 𝑋 ∈ ℝ𝑝 𝑥 𝑛 be the adjacency matrix of a network of 𝑛 vertices. Then, 𝑋 ≈ 𝑈𝛴𝑉∗ is the singular value decomposition of 𝑋 into two sub-matrices 𝑈 ∈ ℝ𝑝∗𝑘 and 𝑉 ∈ ℝ𝑛∗𝑘 where 𝑘 is chosen to hold: 𝑘 ∗ (𝑝 + 𝑛) ≪ 𝑝 ∗ 𝑛. Although a summary of the adjacency matrix is achieved through the dimensionality reduction, the presence of negative values in any of the factor sub-matrices makes interpretation harder within a clustering context. Then, a positive matrix factorisation process would accomplish this requirement. But first,  Can we consider matrix factorisation of the adjacency matrix a clustering process?  How is matrix factorisation related with blockmodelling?  Does matrix factorisation identify structural characteristics of the nodes in order to determine similarity/dissimilarity between them? The next section presents fundamental concepts to our methodology which can answer these questions. 10 Eigenvalue decomposition is the factorization of a matrix into eigenvalues and eigenvector matrices. 11 Covariance matrix 𝐶 ∈ ℝ𝑛 𝑥 𝑛 has each cell 𝑐𝑖𝑗 = 𝑐𝑜𝑣(𝑖𝑡ℎ 𝑣𝑒𝑐𝑡𝑜𝑟, 𝑗𝑡ℎ 𝑣𝑒𝑐𝑡𝑜𝑟) where 𝑖𝑡ℎ and 𝑗𝑡ℎ are column vectors within dataset 𝐷 ∈ ℝ𝑚 𝑋 𝑛. 14 3.1. Fundamental concepts 3.1.1. Non-negative matrix factorisation NMF Non-negative matrix factorisation -- NMF- decomposes a matrix into factor sub-matrices with non-negativity constraints. Therefore, NMF is an approximation of the form 𝑋 ≈ 𝑌𝑍𝑇 where 𝑋 ∈ ℝ+ 𝑝∗𝑛, 𝑌 ∈ ℝ+ 𝑝∗𝑘 and 𝑍 ∈ ℝ+ 𝑛∗𝑘 𝑋 is a matrix with non-negative values that could be mapped to the adjacency matrix of a network. Then, the factorisation process becomes an optimisation problem which minimises the error of the approximation 𝑋 ≈ 𝑌𝑍𝑇. In [10], the authors present NMF with its non-negativity constraints. In fact, they demonstrate the importance NMF constraints have as they guide to a parts-based representation of a whole. By restraining to non-negative values, only additive combinations would be present. Hence, NMF is indeed more appropriate when it is compared against linear methods such as PCA and SVD. However, the question arises again: Can we consider NMF of the adjacency matrix a clustering process? Experiments carried out by [31] and [32] showed the effectiveness of NMF in clustering and pattern recognition. Moreover, [9] demonstrated that NMF is related to k-means clustering and graph partitioning methods. Therefore, NMF is an appropriate clustering tool of relational data which has the added value of being interpretable. Nevertheless, the approximation 𝑋 ≈ 𝑌𝑍𝑇 does not resemble the blockmodel configuration. Thus: How is NMF related with blockmodelling? [29] and [33] propose non-negative matrix tri-factorisation -- NMTF- as an option to deal with the blockmodel problem. NMTF is the decomposition of a matrix into three factor sub- matrices. Its general form is shown below: 𝑋 ≈ 𝐹𝑀𝐺𝑇 where 𝑋 ∈ ℝ+ more common that 𝑘 = 𝑙 [9]. 𝑝 𝑥 𝑛, 𝐹 ∈ ℝ+ 𝑝 𝑥 𝑘, 𝑀 ∈ ℝ+ 𝑘 𝑥 𝑙 and 𝐺 ∈ ℝ+ 𝑛 𝑥 𝑙. In this case, 𝑘 ≠ 𝑙 but it is However, this general form does not map to the blockmodel configuration. In order to overcome this issue, a useful consideration is that 𝑋 = 𝑋𝑇 = 𝐴 since 𝑋 represents the 15 adjacency matrix and thus, it is symmetric12. As a consequence 𝐹 = 𝐺 = 𝐶. Then, the symmetric non-negative matrix tri-factorisation -- SNMTF- form follows: 𝐴 ≈ 𝐶𝑀𝐶𝑇 𝑨 represents the adjacency matrix, 𝑪 the position membership matrix and 𝑴 the image matrix. Hence, SNMTF maps nicely to the blockmodel configuration (See Figure 3-1). Figure 3-1: Symmetric Non-negative Matrix Tri-Factorisation SNMTF This figure shows a graphical representation of the symmetric nonnegative matrix tri-factorization approximation. An adjacency matrix is decomposed into three sub-matrices. Does SNMTF similarity/dissimilarity between them? identify structural characteristics of the nodes in order to determine As stated in section 2.3, structural equivalence is the most used criteria in Social Network Analysis when evaluating common structural characteristics of nodes within a network. Recall that structural equivalence considers that two nodes within a network are structurally equivalent if they have exactly the same set of incoming and outgoing relations. This conception of equivalence between nodes imposes a challenge to conventional clustering algorithms on networks. For instance, let's consider a two-mode network of students and subjects taken by these students. A graph of this example is shown in Figure 3-2. In this example, traditional clustering algorithms could not be able to discover clusters of only students or clusters of only subjects. The reason is because there are no explicit relations between students neither between subjects. However, S1, S2 and S3 are structurally equivalent since they have the same set of taken subjects -- incoming and outgoing relations. The good news is that NMF is able to deal with structural equivalence as it is demonstrated by [34] on several real network datasets. Therefore, NMF and its special case SNMTF are the appropriate tools in order to face the proposed problem (See section 1.2.1.) These tools have the competence for clustering relational data. They also fit nicely with the blockmodelling configuration; and, they can deal 12 WARNING: We are considering in our work only undirected networks. 16 TabcdefghijklmnopabcdefghijklmnopP1P2P3P4P1P2P3P41001010000000011P1P2P3P4P1P2P3P4abcdefghijklmnopP1P2P3P4abcdefghijklmnopP1P2P3P4ACCTM with the challenge of equivalence in networks. Furthermore, their ability to handle structural equivalence allows them to discover network structures other than communities. Figure 3-2: Two-mode graph of students and subjects [34] Finally, it is worth to mention NMF offers advantages as a clustering process: - NMF can be used in different types of networks such as non-directional, e.g. a social network like Facebook®; and, directional, e.g. email network. - NMF is able to manage soft and hard13 clustering. In the case of soft clustering, due to the fact that NMF is an approximation of an adjacency matrix through the multiplication of three sub-matrices, the real values within the position membership matrix could be normalised as probabilities of membership of each cluster. On the contrary, to achieve hard clustering, it is only necessary to include orthogonality constraints between the columns of the position membership matrix. Afterwards, NMF is applied with no variation. 13 In soft clustering, nodes within a network can belong to more than one cluster. Hard clustering allows nodes to belong to only one cluster. 17 3.1.2. Solving SNMTF In [11], NMF is regarded as an optimization problem of either the conventional least squares error or the Kullback-Leibler divergence14 -𝐷𝐾𝐿-. Similarly, [29] consider NMTF as a least squares error problem. In both cases, the problem is solved by minimising the corresponding loss function -- least squares error or 𝐷𝐾𝐿 Since our methodology is based on SNMTF, we present the initial objective function that minimises the least squares error between the adjacency matrix and its approximation -the multiplication of three sub-matrices. min 𝐶≥0,𝑀≥0 2 ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 (1) 2 is the square of the Frobenius norm15, 𝐴 ∈ ℝ+ 𝑛 𝑥 𝑛, 𝐶 ∈ ℝ+ 𝑛 𝑥 𝑘 and where ‖∙‖𝐹 𝑘 𝑥 𝑘. 𝑀 ∈ ℝ+ [11] observed that the optimisation problem is convex if one of the two matrices 𝐶 or 𝑀 is fixed; otherwise, when both 𝐶 and 𝑀 are variable, the problem becomes not convex. Thus, SNMTF is a not convex optimisation problem for which only a local optimum solution can be found. [11] also presented a relative efficient iterative algorithm called multiplicative update rules to estimate a local optimum. These rules can be thought as a rescaled gradient descent16 algorithm. They guarantee the accomplishment of the non-negativity constraints since no subtraction is present -- which does not happen in the gradient descent algorithm where variable values might change by subtraction. In our methodology, multiplicative update rules are obtained by restating the objective function (1). Since this optimisation problem encompasses inequality constraints -- non negativity constraints-, Karush-Kuhn-Tucker -- KKT- multipliers are introduced as new variables into (1). Hence, the initial SNMTF objective function becomes: 𝐹(𝐶, 𝑀, 𝜇1, 𝜇2) = ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 2 − 𝑡𝑟(𝜇1𝐶𝑇) − 𝑡𝑟(𝜇2𝑀𝑇) (2) where 𝑡𝑟(∙) is the trace17 of a matrix and 𝜇1 and 𝜇2 are the KKT multipliers. The introduction of KKT multipliers is a strategy to find a local optimum of a function subject to inequality constraints. KKT multipliers are variables within a system of equations 14 Kullback-Leibler divergence 𝐷𝐾𝐿(𝑃𝑄) measures the dissimilarity between two probability distributions 𝑃 and 𝑄: 𝐷𝐾𝐿(𝑃𝑄) = ∑ 𝑙𝑛 (𝑃(𝑖) 15 Frobenius norm is also called Euclidean distance norm and it is obtained as follows: ‖𝐴‖𝐹 = 𝑃(𝑖) 𝑄(𝑖) ) 𝑖 . 𝑛 𝑖=1 𝑚 𝑗=1 2 √∑ ∑ 𝑎𝑖𝑗 16 Gradient descent is an optimisation algorithm which finds a local minimum. First of all, the gradient of the objective function at the current point is obtained -- if it is possible, otherwise, it is estimated. Then, the independent variables changes in the direction of the negative gradient. 17 Trace of a matrix 𝐴: 𝑡𝑟(𝐴) = ∑ 𝑎𝑖𝑖 𝑖 18 corresponding to conditions -- KKT conditions- for a solution to be optimal. An analytical solution to this system of equations is not trivial, thus the multiplicative update rules provide a mechanism to find an approximation. For convenience, in Equation (2), ‖∙‖𝐹 2 can be expressed by using 𝑡𝑟(∙) as: 𝐹(𝐶, 𝑀, 𝜇1, 𝜇2) = 𝑡𝑟(𝐴𝑇𝐴) − 2𝑡𝑟(𝐴𝑇𝐶𝑀𝐶𝑇) + 𝑡𝑟(𝐶𝑀𝑇𝐶𝑇𝐶𝑀𝐶𝑇) − 𝑡𝑟(𝜇1𝐶𝑇) − 𝑡𝑟(𝜇2𝑀𝑇) The partial derivatives of function (3) with respect to 𝐶 and 𝑀 are: 𝜕𝐹 𝜕𝑪 = 2(𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇) − 2(𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇) − 𝜇1 𝜕𝐹 𝜕𝑴 = 2(𝐶𝑇𝐶𝑀𝐶𝑇𝐶) − 2(𝐶𝑇𝐴𝐶) − 𝜇2 The partial derivatives of function (3) with respect to the KKT multipliers are: 𝜕𝐹 𝜕𝝁𝟏 = −𝐶; 𝜕𝐹 𝜕𝝁𝟐 = −𝑀 (3) (4) (5) When 𝜕𝐹 𝜕𝝁𝟏 and 𝜕𝐹 𝜕𝝁𝟐 are equalled to zero, the resulting equations refer to the boundaries of the inequality constraint functions. Thus, these derivatives are not regarded as part of the system of equations from which the multiplicative update rules are defined. The multiplicative update rules for solving equation (3) are shown below: 𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇 𝐶𝑖𝑗 ← 𝐶𝑖𝑗 [ 𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇] 𝑖𝑗 (6) (7) 𝑀𝑖𝑗 ← 𝑀𝑖𝑗 ( 𝐶𝑇𝐴𝐶 𝐶𝑇𝐶𝑀𝐶𝑇𝐶 ) 𝑖𝑗 Equations (6) and (7) are computed iteratively until a stop criterion is reached. Normally, this criterion is the extent of change of the value of the objective function from the previous to the current iteration. If the change is less than a threshold, e.g. < 10-5, it is reasonable to think that the algorithm has converged; then, the algorithm can stop. However, NMF is an initialisation-sensitive algorithm. Its efficiency depends mostly on which point in the search space the matrices 𝐶 and 𝑀 start off. Therefore, in our methodology, the algorithms are run many times with random starting points for those matrices. 19 Up to this point, no alternative-blockmodelling-related strategy has been included in the equations. In this chapter, as part of our methodology we derive two different approaches which append new objectives to the main objective function (1): (a) inclusion of cannot-link constraints, and (b) dissimilarity between image matrices. But before diving into our approaches, let's discuss two possible normalisation strategies. 3.1.3. Normalisation vs. Iterative Lagrangian Solution Random initialisation of the matrices 𝐶 and 𝑀 at the beginning of the algorithm injects uncertainty on finding a local minimum for the objective function. But, this is not the only reason why many different possible solutions could be found after running iteratively the multiplicative update rules. As noticed by [35], in the simpler NMF configuration 𝐹 = 𝐶𝐻𝑇 where 𝐹 ∈ ℝ+ 𝑛 𝑥 𝑚, 𝐶 ∈ ℝ+ 𝑛 𝑥 𝑘 and 𝐻 ∈ ℝ+ 𝑚 𝑥 𝑘. there exist a large number of matrices (𝐴, 𝐵) such that 𝐴𝐵𝑇 = 𝐼, 𝐶𝐴 ≥ 0, 𝐻𝐵 ≥ 0. Hence, (𝐶𝐴, 𝐻𝐵) is a possible solution since it has the same function value 𝐹. Normalisation of the factor matrices is an action to remove part of the uncertainty. Regarding the SNMTF configuration 𝐴 = 𝐶𝑀𝐶𝑇 where 𝐴 ∈ ℝ+ 𝑛 𝑥 𝑚, 𝐶 ∈ ℝ+ 𝑛 𝑥 𝑘 and 𝑀 ∈ ℝ+ 𝑘 𝑥 𝑘. Intuitively, the position membership matrix 𝐶 represents the probability of the nodes to belong to each cluster 𝑐𝑙, 1 ≤ 𝑙 ≤ 𝑘. Therefore, matrix 𝐶 is a right stochastic18 matrix where 𝑘 ∑ 𝐶𝑖𝑙 𝑙=1 = 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛 (8) Therefore, because of removing uncertainty and following the intuition of stochasticity, factor matrices must be normalised. [12] propose two methods besides to conventional normalisation since the authors demonstrate that conventional normalisation suffers from leading to potential poor local optimum and slow convergence rate. From those two methods, our methodology uses the relaxation version of the stochasticity constraints. Then, the objective function (1) becomes 18 There are also left and vectorised stochastic matrices. In a left stochastic matrix, the values of the column 𝑖 sum up to 1 for all 𝑖. In a vectorised stochastic matrix, all values sum up to 1. 20 2 min‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 subject to ∑ 𝐶𝑖𝑙 𝑘 𝑙=1 = 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛 (9) 𝐶 ≥ 0, 𝑀 ≥ 0 In order to deal with the inequality constraints and the new set of equality constraints, KKT and Lagrange multipliers are introduced into the objective function (9). Then, this function, with its constraints, is equivalent to 𝑛 𝑘 𝐹(𝐶, 𝑀, {𝜆𝑖}𝑖=1 𝑛 , 𝜇1, 𝜇2) = ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 2 + ∑ 𝜆𝑖 (∑ 𝐶𝑖𝑙 − 1 ) − 𝑡𝑟(𝜇1𝐶𝑇) − 𝑡𝑟(𝜇2𝑀𝑇) (10) where {𝜆𝑖}𝑖=1 𝑛 are the Lagrange multipliers. 𝑖 𝑙=1 The partial derivative of function (10) with respect to 𝑀 remains the same (See equation (5)), whereas there is a slight variation in the partial derivative of the function with respect to 𝐶 (See equation (4)) as follows: 𝜕𝐹 𝜕𝑪 = 2(𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇) − 2(𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇) − 𝜦 − 𝜇1 (11) where 𝜦 = [𝜆𝑖𝑗] is the matrix of Lagrange multipliers. Following the iterative Lagrangian solution proposed in [12], variables of function 𝐹 can be solved as follows: a. A preliminary update rule ′ ← 𝐶𝑖𝑗 𝐶𝑖𝑗 − + 𝜆𝑖 ∇𝑖𝑗 + ∇𝑖𝑗 where ∇+= (𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇); ∇−= 𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇 b. This preliminary update rule replaces the corresponding term in the equality constraint 𝑘 ∑ 𝑏=1 𝐶𝑖𝑏 = 1 c. Solving for 𝜆𝑖 𝑘 ∑ 𝐶𝑖𝑏 𝑏=1 𝑘 − ∇𝑖𝑏 + + 𝜆𝑖 ∑ ∇𝑖𝑏 𝑏=1 𝐶𝑖𝑏 + ∇𝑖𝑏 = 1 − ∇𝑖𝑏 + ∇𝑖𝑏 𝜆𝑖 = 𝑘 1 − ∑ 𝑏=1 𝐶𝑖𝑏 𝑘 ∑ 𝑏=1 𝐶𝑖𝑏 + ∇𝑖𝑏 21 d. In the preliminary update rule, 𝜆𝑖 is replaced 𝐶𝑖𝑗 ← 𝐶𝑖𝑗 − 𝐺𝑖𝑗 + 1 ∇𝑖𝑗 + 𝐺𝑖𝑗 + 𝐻𝑖𝑗 ∇𝑖𝑗 where (12) 𝐺𝑖𝑗 = ∑ 𝑏 𝐶𝑖𝑏 + ∇𝑖𝑏 ; 𝐻𝑖𝑗 = ∑ 𝐶𝑖𝑏 𝑏 − ∇𝑖𝑏 + ∇𝑖𝑏 Table 1: Iterative Lagrangian solution [12] Equation (12) is the new multiplicative update rule for 𝐶 using the iterative Lagrangian approach. It is worth to mention that the "moving term" trick [36] was applied in step (d). The multiplicative update rule for 𝑀 remains the same (See equation (7)). 3.2. Outline of our Methodology Once we have presented both the suitability of NMF -- particularly SNMTF- to solve the proposed problem (See section 1.2.1) and the algorithm -- multiplicative update rules- to optimise it, we outline our algorithm at a high level,: Step 1: Uniform random initialisation of matrices 𝑀 and 𝐶 with nonnegative values. Step 2: Update 𝑀 Step 3: Update 𝐶 Step 4: Verify the stop criterion Table 2: Outline of our algorithm Iterative multiplicative update rules DEPEND ON THE CHOSEN APPROACH. Our methodology comprises two approaches: cannot-link constraints (See section 3.3), and (b) dissimilarity between image matrices (See section 3.4) inclusion of (a) If the change of the objective function value -- from previous to current iteration- is less than a threshold, e.g. < 10-5, the loop ends; otherwise a new iteration starts from Step 2. In each of our two approaches, the objective function stated in (9) is expanded by adding different objectives which encode the alternative blockmodelling purpose. Finally, evaluation of the alternative blockmodelling solution is carried out in order to show the achievement of the quality and dissimilarity requirements. 22 3.3. Approach 1: Inclusion of cannot-link constraints As mentioned in section 2.1.2, instance-level constraints encode side-information as pairs of instances -- nodes in relational data- in the form of cannot-link and must-link constraints. With respect to our problem, side-information refers to the given or reference clustering. Thus, instance-level constraints translate the information provided by the reference clustering into cannot-link and must-link constraints. Nonetheless, in this approach, we decided to work only with cannot-link constraints (See Chapter 5 for details.) Moreover, we regard the reference clustering as negative information about the sought alternative clustering. That is, this approach is similar to the one proposed by [1] where a pair of instances that belong to the same cluster in the reference clustering becomes a cannot-link constraint. In this way, the clustering process is guided to discover a dissimilar clustering with respect to the given one. Therefore, cannot-link constraints can be included into the objective function (9) in such a way that violation of these constraints is penalised, i.e. min 𝐶≥0,𝑀≥0 ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 2 + 𝒕𝒓(𝜷𝑪𝑻𝚯𝑪) subject to ∑ 𝐶𝑖𝑙 𝑘 𝑙=1 = 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛 (13) 𝐶 ≥ 0, 𝑀 ≥ 0 where Θ corresponds to the cannot-link constraints matrix and 𝛽 is a trade-off 2 and the dissimilarity term parameter between the quality term ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 𝑡𝑟(𝛽𝐶𝑇Θ𝐶). The effect of the new term 𝑡𝑟(𝐶𝑇Θ𝐶) within the objective function (13) is shown in Example 1: 0 𝜃 0 𝜃 0 0 0 0 0 ] , 𝐶𝑡 = [ 1 0 1 0 0 1 ] Example 1: Θ = [ This example shows a cannot-link constraints matrix Θ that is built based on the reference clustering. This matrix states the aim of break the link between nodes 1 and 2 since a value 𝜃 > 0 was placed in positions (1, 2) and (2, 1). It also shows a position membership matrix obtained at time 𝑡 through the multiplicative update rules. Thus, if at this time 𝑡 the objective function (13) is evaluated, the expression 𝑡𝑟 (𝐶𝑡𝑇 Θ𝐶𝑡) = 𝑡𝑟 ([ 1 1 0 0 0 1 ] [ 0 𝜃 0 𝜃 0 0 0 0 0 ] [ 1 0 1 0 0 1 ]) = 𝑡𝑟 ([ 2𝜃 0 0 0 ]) = 2𝜃 23 Whereas, if at time 𝑡 + 1 Then, the expression 𝐶𝑡+1 = [ 1 0 0 1 0 1 ] 𝑡𝑟 (𝐶𝑡+1𝑇 Θ𝐶𝑡+1) = 𝑡𝑟 ([ 1 0 0 0 1 1 ] [ 0 𝜃 0 𝜃 0 0 0 0 0 ] [ 1 0 0 1 0 1 ]) = 𝑡𝑟 ([ 0 𝜃 𝜃 0 ]) = 0 Hence, the effect of 𝑡𝑟(𝐶𝑇Θ𝐶) is indeed the expected, i.e. it penalises the violation of the cannot-link constraint by incrementing the value of the objective function at time 𝑡 by 2𝜃. This approach presents two opposite objectives that represent quality and dissimilarity respectively. Hence, a trade-off parameter 𝛽 is needed to balance the effect of the dissimilarity term on the whole objective. After the inclusion of the new term, the partial derivative (11) shifts to 𝜕𝐹 𝜕𝑪 = 2(𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇) − 2(𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇) − 𝛬 − 𝜇1 + 𝟐𝚯𝑪 (14) Whereas, the partial derivative (5) remains the same. Consequently, the multiplicative update rules for matrices 𝐶 and 𝑀 are where 𝐶𝑖𝑗 ← 𝐶𝑖𝑗 − 𝐺𝑖𝑗 + 1 ∇𝑖𝑗 + 𝐺𝑖𝑗 + 𝐻𝑖𝑗 ∇𝑖𝑗 𝐺𝑖𝑗 = ∑ 𝑏 𝐶𝑖𝑏 + ∇𝑖𝑏 ; 𝐻𝑖𝑗 = ∑ 𝐶𝑖𝑏 𝑏 − ∇𝑖𝑏 + ∇𝑖𝑏 ∇+= (𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇 + 𝜷𝚯𝑪); ∇−= 𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇 𝑀𝑖𝑗 ← 𝑀𝑖𝑗 ( 𝐶𝑇𝐴𝐶 𝐶𝑇𝐶𝑀𝐶𝑇𝐶 ) 𝑖𝑗 24 (15) (16) 3.4. Approach 2: Dissimilarity between image matrices Quality and dissimilarity are the objective functions that compete within the alternative clustering scheme as it was shown in [1, 3, 4, 7]. Our first approach also leverages that concept. This second approach inherits this idea but within the context of blockmodelling. Thus, quality is assured by the least squares error, whereas dissimilarity is addressed by the intuition of differences between image matrices. Recall that image matrix in blockmodelling shows the relationships between positions -- clusters-, that is, an image matrix shows the network structure as a sort of summary. Then, a different image matrix would correspond to a different network structure. For example, if our given clustering has a community structure represented by its image matrix, it would make sense to "negate" that structure through an objective function that maximises the difference between the image matrices. Therefore, the term representing the dissimilarity between the given and the alternative image matrices is included into the base objective function (9) as follows min‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 2 − 𝜷‖𝑴(𝟎) − 𝑴‖ 𝟐 𝑭 subject to ∑ 𝐶𝑖𝑙 𝑘 𝑙=1 = 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛 (17) 𝐶 ≥ 0, 𝑀 ≥ 0 where 𝑀(0) ∈ ℝ+ is a trade-off parameter between the quality term ‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 term ‖𝑀(0) − 𝑀‖ 𝑘 𝑥 𝑘 corresponds to the image matrix of the given clustering. Again, 𝛽 2 and the dissimilarity . 2 𝐹 After the inclusion of the new term, the partial derivative (5) shifts to 𝜕𝐹 𝜕𝑴 = 2(𝐶𝑇𝐶𝑀𝐶𝑇𝐶) − 2(𝐶𝑇𝐴𝐶) − 𝜇2 + 𝟐𝜷(𝑴(𝟎) − 𝑴) (18) The partial derivative with respect to 𝐶 does not change (See equation (11)). As a consequence, the multiplicative update rules for matrices 𝐶 and 𝑀, for our second approach are 25 𝐶𝑖𝑗 ← 𝐶𝑖𝑗 − 𝐺𝑖𝑗 + 1 ∇𝑖𝑗 + 𝐺𝑖𝑗 + 𝐻𝑖𝑗 ∇𝑖𝑗 where 𝐺𝑖𝑗 = ∑ 𝑏 𝐶𝑖𝑏 + ∇𝑖𝑏 ; 𝐻𝑖𝑗 = ∑ 𝐶𝑖𝑏 𝑏 − ∇𝑖𝑏 + ∇𝑖𝑏 ∇+= (𝐶𝑀𝑇𝐶𝑇𝐶𝑀 + 𝐶𝑀𝐶𝑇𝐶𝑀𝑇); ∇−= 𝐴𝑇𝐶𝑀 + 𝐴𝐶𝑀𝑇 𝑀𝑖𝑗 ← 𝑀𝑖𝑗 ( 𝐶𝑇𝐴𝐶 + 𝜷𝑴 𝐶𝑇𝐶𝑀𝐶𝑇𝐶 + 𝜷𝑴(𝟎)) 𝑖𝑗 (19) (20) 3.4.1. Generalised form This second approach can be generalised to find an alternative blockmodel which is different from a set of given blockmodels. This set of reference clusterings might be constructed incrementally by using even any other approach. Hence, the generalised form of the objective function (17) is as follows 𝕭 min‖𝐴 − 𝐶𝑀𝐶𝑇‖𝐹 2 − ∑ 𝜷𝒑‖𝑴(𝒑) − 𝑴‖ 𝟐 𝑭 𝒑=𝟎 subject to ∑ 𝐶𝑖𝑙 𝑘 𝑙=1 = 1; ∀𝑖, 1 ≤ 𝑖 ≤ 𝑛 𝐶 ≥ 0, 𝑀 ≥ 0 where 𝔅 corresponds to the number of given blockmodels -- image matrices. The multiplicative update rule for matrix 𝑀 is 𝑀𝑖𝑗 ← 𝑀𝑖𝑗 ( 𝜷𝒑 𝜷𝒑 𝕭 𝐶𝑇𝐴𝐶 + 𝑴 ∑ 𝒑=𝟎 𝕭 𝒑=𝟎 𝑴(𝒑) 𝐶𝑇𝐶𝑀𝐶𝑇𝐶 + ∑ ) 𝑖𝑗 The multiplicative update rule for matrix 𝐶 remains the same as (19). 26 (21) (22) 3.5. Evaluation Now, how can we evaluate the effectiveness of our approaches? Since the objective function of both approaches comprise a trade-off between quality and dissimilarity, the discovered alternative blockmodel must be quantitatively evaluated from these two perspectives. With respect to quality, external evaluation might be hard to be carried out because the gold- standard is unlikely to be known, especially when we are trying to discover a novel blockmodel representation. On the other hand, current internal evaluation measures are not well-suited to blockmodelling as a fitting model of the data. However, in [30] the concept of MDL is adapted to the blockmodelling problem. It regards that a blockmodel is a suitable model if its encoding cost is low. The total encoding cost of a blockmodel is determined by the aggregate of the costs of its positions and its blocks, and it is called Individual Snapshot Encoding in [30]. Then, the total encoding cost of a blockmodel 𝔅 is 𝐶𝑖𝑛𝑑(𝔅) = 𝐶(𝑛) + 𝐶(𝒞) + 𝐶(𝒢𝒞) where 𝐶(𝑛) is the cost of sending the number of vertices 𝑛 -- it is necessary for reconstruction reasons19-, 𝐶(𝒞) is the cost of encoding the positions, and 𝐶(𝒢𝒞) is the cost of encoding the blocks. We refer to [30] for details on computation of the partial costs. In the case of dissimilarity, as stated by [37], there are plenty of metrics that might be used when comparing two clusterings. However, all of them fail to consider particular structural characteristics of blockmodels. For instance, when comparing two clusterings by computing the Normalised Mutual Information20 -- NMI-, this metric might consider them as similar when actually, the density of the blocks between certain positions is quite different. Therefore, [37] proposes some structure-aware distance measures from which we are using the one called Kullback-Leibler Reconstruction Measure. It is based on the Kullback-Leibler divergence between matrices. Therefore, this measure is asymmetric and it can be regarded as using the edge distributions in the second blockmodel to encode the edge distributions in the first. The edge reconstruction KL distance is defined as 𝑑𝑅𝐾𝐿(𝔅(0), 𝔅(1)) = ∑ ∑ 𝐴 (0) ∗ log ( 𝑖,𝑗 𝑖 𝑗 (0) 𝐴 𝑖,𝑗 (1)) − 𝐴 𝑖,𝑗 (0) + 𝐴 𝐴 𝑖,𝑗 (1) 𝑖,𝑗 where 𝐴 is the adjacency matrix approximation, that is, 𝐴 = 𝐶𝑀𝐶𝑇. 19 MDL, as an information theory concept, regards that the data is being compressed to be sent through a communication channel and reconstructed at the destination. 20 NMI is a measure of mutual dependence between two random variables. 27 As our approaches are based on NMF, they are initialisation-sensitive methods, thus many runs are needed to find out a tendency in the clustering process. We support our evaluation process by using a tool called Enhanced Visual Analysis for Cluster Tendency -- iVAT-, which presents those many alternative blockmodels -- one for each run- in a graphical form. iVAT was proposed by [38] and is used to estimate the number of possible clusters prior to the clustering process as such by using the pairwise dissimilarity matrix of objects to be clustered. This tool reorders the rows and columns of this dissimilarity matrix in such a way that the least dissimilar -- most similar- objects appear as a set of dark blocks along the diagonal of this matrix. As a variation of this form of using iVAT, we run 𝑛 possible blockmodel solutions by using any of our approaches and instead of creating a dissimilarity matrix of objects; we create a dissimilarity matrix of blockmodels. This meta-clustering dissimilarity matrix is reordered by iVAT and shows potential alternative solutions to be exploited along its diagonal. Figure 3-3 shows an example. Figure 3-3: iVAT graphic which shows some alternative blockmodels In this dissimilarity matrix, each column and row corresponds to a blockmodel solution obtained from any of our two approaches. The blockmodels can be compared by using any "distance" metric. Therefore, our whole evaluation process consists of computing two quantitative metrics for the quality and dissimilarity requirements. Low 𝑪𝒊𝒏𝒅 and high 𝒅𝑹𝑲𝑳 values are sought. Finally, iVAT is used as support in order to verify if the chosen alternative blockmodel is likely to be obtained. It is worth to mention that we are not regarding that the chosen solution needs to be statistically significant within this "sampling" process of 100 runs. At the end, which really matters, is to find a dissimilar and good quality solution even if it its occurrence is small. 28 Chapter 4 Experiments In this section, we show experiments carried out on real and synthetic sets of relational data. These experiments are focused on reinforcing the contributions stated in section 1.2. First of all, we show the importance of the proposed problem, "Discovering an alternative blockmodel solution in a graph", on two real datasets: Zachary's karate club [39] and Books on American politics [19]. Zachary's karate club dataset is the compilation of the relations between members of a karate club in an American university where there was an internal conflict. The instructor and the president of the club had a confrontation which caused the division of the members into 2 groups -- 2 communities. This dataset consists of 34 members -- nodes- whose relations -- edges- are undirected and unweighted. On the other hand, Books on American politics is a dataset of books bought on-line in Amazon.com. In this real network, books are nodes and an edge between two books appears if these two books were purchased by the same buyer. There are 105 books which span the American political alignments, i.e. liberal, conservative or centrist. Secondly, we compare the performance of our two approaches, (1) Inclusion of cannot-link constraints (See section 3.3), and (2) Dissimilarity between image matrices (See section 3.4); on a synthetic dataset which has 50 nodes and whose edges are undirected and weighted. Thirdly, through the application of our second approach on the same synthetic dataset, we give some insights into the difficulties of this approach and end up with some interesting conclusions. Finally, all the experiments were run on an Intel Core i7 2.00GHz PC with 8GB of memory and running Windows 7. 4.1. The novel Alternative Blockmodelling problem Zachary's karate club has been adopted as a benchmark in community finding field since it offers a neat community network structure. It comprises two well defined communities which align with either the instructor or the president of the club. Figure 4-1 shows this real network where communities are depicted with different colours. On the other hand, Figure 4-2 shows the blockmodel representation of the network. Again, this representation corresponds to the actual division of the network. Note that the dense blocks are aligned through the diagonal of the matrix. 29 Therefore, by using any of our two approaches, the goal would be to discover an alternative blockmodel representation of Zachary's karate club regarding the actual blockmodel representation in Figure 4-2 as the reference clustering. For convenience, we are using the second approach on this section. Figure 4-1: Zachary's karate club. This network shows two well defined communities. Recall that a community is a cluster of nodes where they are densely connected, but less connected with nodes of other communities. Figure 4-2: Zachary's karate club blockmodel representation of the actual division. (A) This blockmodel representation of Zachary's karate club shows the actual division of the network into two well defined communities. Note that the two dense blocks are aligned through the diagonal of the matrix. These two dense blocks not only represent the communities within the network but also the lack of relation of these clusters with other clusters. the At experimental this blockmodel is regarded as the given blockmodel 𝔅(0). Image matrix corresponding to this blockmodel representation. beginning the of stage, ( 0.4643 2.1947𝑒 − 24 2.1931𝑒 − 24 0.4508 ) (B) 30 5101520253051015202530𝔅(0) (A)(B) Hence, the initial image matrix 𝑀(0) 𝑖𝑠 ( 2.1931𝑒 − 24 0.4508 0.4643 2.1947𝑒 − 24 ). Approach 2 balances the effect of the dissimilarity term on the whole objective function by using a trade-off parameter 𝜷. Therefore, the algorithm is run with different values for this parameter. Figure 4-3 shows alternative blockmodel representations of the Zachary's karate club network with respect to the given image matrix 𝑀(0) for different values of the 𝜷 parameter. Figure 4-3: Alternative Blockmodels for Zachary's karate club dataset. 31 5101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 2020.4108Cind(𝔅(1)) = 570.9592(A) β = 15101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 1808.67Cind(𝔅(1)) = 610.11905101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 2006.6508Cind(𝔅(1)) = 633.7090(B) β = 55101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 1808.67Cind(𝔅(1)) = 668.11905101520253051015202530dRKL(𝔅(0), 𝔅(1)) = 2006.6508Cind(𝔅(1)) = 633.7090(C) β = 10 Alternative blockmodels for different values of β parameter after running our second approach 100 times. An iVAT plot helps assess the cluster tendency. 𝑑𝑅𝐾𝐿(𝔅(0), 𝔅(1)) corresponds to the Edge Reconstruction Kullback-Leibler Distance between the given blockmodel 𝔅(0) and the one discovered 𝔅(1) for the corresponding β parameter. 𝐶𝑖𝑛𝑑(𝔅(1)) corresponds to the Individual Snapshot Encoding of 𝔅(1). Both measurements are shown next to each alternative blockmodel. (A) β = 1. iVAT plot shows consistency across 100 runs. Just one alternative blockmodel can be discovered whose 𝑑𝑅𝐾𝐿(𝔅(0), 𝔅(1)) is the highest and 𝐶𝑖𝑛𝑑(𝔅(1)) is the lowest. (B) β = 5. iVAT plot shows that while β increases, a second blockmodel tends to occur more frequently. (C) β = 10. The alternative blockmodels are very similar to the ones with β = 5. It seems the cluster tendency will not change. In Figure 4-3, iVAT helps assess the cluster tendency within the 100 runs for each β value. The Edge Reconstruction Kullback Leibler distance 𝑑𝑅𝐾𝐿 (See section 3.5) between the given blockmodel 𝔅(0) and the one discovered for the corresponding 𝛽 parameter, that is 𝔅(1), is shown next to each alternative blockmodel solution. Besides to the dissimilarity measurement, the quality measurement Individual Encoding Cost is also presented. For 𝛽 = 1 just one alternative blockmodel is discovered. It happens that this is the chosen alternative blockmodel since it has the highest 𝑑𝑅𝐾𝐿 value and the lowest 𝐶𝑖𝑛𝑑. Now, let's find out if this alternative blockmodel representation makes sense. First of all, the chosen representation resembles a core-periphery network structure where the nodes of one position -- core- are linked with many nodes of the same and/or other positions. Figure 4-4 shows the network division corresponding to the chosen alternative blockmodel. Core nodes are depicted with red colour whereas periphery with blue. Figure 4-4: Chosen alternative network division for Zachary's karate club. Blue nodes correspond to the core position whereas red nodes to the periphery. Figure 4-5 shows how our second approach was able to find an alternative blockmodel solution which corresponds to a different network structure. 32 𝑀(0) = ( 0.4643 2.1947𝑒 − 24 2.1931𝑒 − 24 0.4508 ) 𝑀(1) = ( 7.4898𝑒 − 86 0.6521 0.6521 1.2794𝑒 − 51 ) Figure 4-5: Core-periphery alternative blockmodel solution for Zachary's karate club. The image matrix M(1) of the core-periphery structure is totally different from M(0) since the algorithm maximised the dissimilarity between image matrices (See section 3.4.) We can even regard the alternative blockmodel shown at the right part in Figure 4-5 as the initial blockmodel 𝕭(𝟎) and try to discover the original blockmodel presented in Figure 4-2 as its alternative solution. 33 51015202530510152025305101520253051015202530Community StructureCore-Periphery Structure Figure 4-6: Original karate club's blockmodel discovered as alternative. iVAT and blockmodels for different 𝛽 parameter values. Note the much higher value for 𝛽 with respect to the value needed when the discovering process was in the other way (Compare with Figure 4-3.) 34 Figure 4-6 shows the process of discovering an alternative blockmodel when the given blockmodel 𝔅(0) is the alternative solution found previously. It is interesting to see the value 𝛽 parameter took to discover the original blockmodel. This 𝛽 value is much higher than the 𝛽 value needed in the other way. One possible explanation is that our approach actually tends to find a solution which is different to the actual division of this particular dataset. Then, the dissimilarity parameter does not need to be big (𝛽 = 1), whereas if the approach is forced to find a very different solution to the one it is used to, it demands much more effort (𝛽 = 300). On the other hand, the behaviour of the dissimilarity measure 𝑑𝑅𝐾𝐿 confirms the effect of the trade-off parameter on the whole objective function. The bigger the trade-off parameter is set -- which means more effect of the dissimilarity term-, the bigger the value of the measurement is. However, there is a kind of plateau that spans from small to big values of 𝛽 where 𝑑𝑅𝐾𝐿 is roughly equal to 100. It can be thought that the objective function reached a local optimum from which it could jump off somehow when the trade-off parameter increased. Now, let's have a look at another real dataset which refers to Books on American politics. The nodes within this dataset can be clustered according to their political alignment, i.e. liberal, conservative or centrist. In fact, in the original dataset every book came classified as one of those tendencies. Figure 4-7 shows the actual division accordingly. Figure 4-7: Actual division of books on American politics dataset. In this figure, liberal books are depicted with green, centrist with blue and conservative with red. Any resemblance to reality is pure coincidental. Therefore, the initial blockmodel 𝔅(0) with its corresponding image matrix 𝑀(0) are shown in Figure 4-8. 35 Figure 4-8: Blockmodel representation of the actual division of books on American politics. (A) A blockmodel representation of the community structure within the dataset. Image matrix 𝑀(0) used as input in our second approach. (B) 𝑀(0) = ( 0.2759 3.21𝑒 − 63 2.20𝑒 − 27 3.59𝑒 − 63 1.80𝑒 − 28 0.3581 0 0 ) 0.4514 Our second approach is run over the image matrix 𝑀(0) of Figure 4-8 (B). Figure 4-9 shows alternative blockmodels for different values of 𝛽 parameter. In this figure, we have dropped iVAT plots due to space reasons. However, in some cases, we have chosen more than one alternative solution for an individual parameter value since their occurrence within the 100 runs is similar -- this would have been more obvious by observing iVAT plots. 36 𝔅(0)(A)(B) Figure 4-9: Alternative blockmodels for Books on American politics dataset. iVAT plots have been dropped, yet, in some cases, more than one alternative blockmodel is shown for each 𝛽 parameter. At the bottom of each blockmodel, 𝑑𝑅𝐾𝐿 and 𝐶𝑖𝑛𝑑 are also presented. The chosen blockmodel is the one resulting when 𝛽 = 20. From the alternative blockmodels in Figure 4-9, we have chosen the one with better quality (𝛽 = 20) which shows an interesting core-periphery structure of two tiers (See Figure 4-10.) Figure 4-10: Chosen alternative network division for Books on American politics. In this figure, the cores of the liberal and conservative ideologies are depicted with green and blue respectively, whereas the periphery nodes are shown in red. Again, a core-periphery structure is discovered given a community configuration as input. In both datasets, the algorithm is prone to discover dense positions with a small number of nodes. In other words, these positions contain the nodes with the highest degree within the network which leads to the core-periphery network structures. 37 Furthermore, it is also interesting to see that some alternative blockmodel solutions present less number of positions with respect to the reference blockmodel. In Figure 4-9, 𝛽 = 5, 𝛽 = 10 and 𝛽 = 50 show blockmodels with two positions. In these cases, the image matrix keeps its original dimensions, i.e. 3 x 3, yet the position membership matrix presents a column vector which has the smallest values among the columns for every row. 4.2. Approaches to solve this problem In the previous section, in order to present the problem, we have showed experiments by using exclusively our second approach. Therefore, in this section, we are going to focus on making comparisons between both approaches by applying them on a synthetic dataset. This synthetic dataset was constructed by mixing two pre-defined clusterings. Each clustering has three positions, yet their network structure is different. The first clustering has a well- defined community structure, whereas the second is core-periphery. Figure 4-11 shows at the left the original weighted adjacency matrix. It has 50 nodes and the edge occurrence is sampled from a binomial distribution and the weights were from a lognormal distribution. At the right side, the figure shows the constructed clusterings which are sought through the application of our both approaches. Nevertheless, it does not mean that the optimisation process will not be able to find other alternatives. In fact, other plausible solutions were discovered by our approaches as it will be shown below. Figure 4-11: Original Adjacency Matrix which was created from mixing two blockmodel structures. 38 The adjacency matrix has 50 nodes and the weights of the edges were sampled from a lognormal distribution with mean = 5 and standard deviation = 0.5. An edge between two nodes corresponds to a successful occurrence within a binomial distribution of 𝑪𝒓 ∗ 𝑪𝒄 elements and probability equal to a pre-defined density for the block (block resulting from the intersection of the positions 𝑪𝒓 and 𝑪𝒄). Our first set of experiments within this section regards the community structure blockmodel as the given information. Thus, our goal is to eventually find the core-periphery structure as an alternative blockmodel. Both approaches depend on a user parameter 𝛽 which controls either the effect of the cannot- link constraints matrix or the effect of the dissimilarity between image matrices on the whole objective function. This effect is illustrated from four different perspectives. It is important to mention that the magnitude of the 𝜷 parameter is different for each approach. Hence, it is not correct to compare the approaches based on it. However, we have experimentally defined the ranges of this parameter for each approach so that plausible alternative blockmodels were found within them. For each 𝛽 value we have run each approach 100 times. The most occurring alternative blockmodel is chosen as representative for that 𝜷 value. The four perspectives from which this chosen alternative blockmodel is evaluated are: a) Quality: Individual Snapshot Encoding Cost 𝐶𝑖𝑛𝑑 is calculated for the chosen alternative blockmodel. b) Dissimilarity: Kullback-Leibler Reconstruction Measure 𝑑𝑅𝐾𝐿 with respect to the given blockmodel. c) Similarity to a target: Recall that our goal is to eventually find the core-periphery or community structure as an alternative blockmodel with respect to a given community or core-periphery structure, respectively. Although we have discussed about the inaccuracy of measures like NMI when evaluating similarity between blockmodels, we use it since the familiarity of researchers with this metric. d) Occurrence: The number of times out of 100 runs the chosen alternative blockmodel appeared. Figure 4-12 shows that our second approach has alternative blockmodels with encoding costs less than 1700, whereas the minimum cost in our first approach is not less than 1850 as the first measure cannot be taken into account since it was with 𝛽 = 0. Furthermore, the first approach has measures close to 1950 which does not happen with approach 2. It is also interesting to see that "best" alternative solution for the second approach which, despite of keeping a community structure, corresponds to a plausible solution as one of the communities in the alternative blockmodel brings together two communities of the given one. In other words, although we could not find the target alternative blockmodel -- core-periphery-, we were able to find a good quality alternative blockmodel. 39 Figure 4-12: Quality measurements with different 𝜷 values for both approaches. The scenario is different for dissimilarity. Now, approach 1 shows a sort of plateau of 0.65, whereas for approach 2 there are even measures of dissimilarity equal to 0. Our second approach also shows several measures less than 0.4. Thus, lack of better quality alternative blockmodels in approach 1 is compensated by more dissimilar solutions in this particular situation (See Figure 4-13.) 40 APPROACH 1APPROACH 2 Figure 4-13: Dissimilarity measurements with different 𝜷 values for both approaches. The third perspective is the similarity with respect to the target blockmodel. Since we ran the approaches regarding that the given clustering is the one with the community structure, our target becomes the core-periphery. We show how close/far we are from this goal by NMI. 41 APPROACH 1APPROACH 2 Figure 4-14: Similarity measures with respect to the core-periphery blockmodel structure with different 𝜷 values for both approaches. From this perspective, our first approach shows a much better performance. Approach 2 roughly reaches 0.4 of similarity with respect to the core-periphery structure while approach 1 could discover it several times. Nonetheless, the alternative blockmodel found by our second approach (𝑵𝑴𝑰~𝟎. 𝟒,) perhaps presents a better core-periphery structure than the target (See Figure 4-14.) The fourth perspective tries to show how likely an alternative solution could be for each approach with different values of 𝛽. There are two noticeable facts shown in Figure 4-15: (a) the average number of occurrences in our first approach is much lower than in our second approach; and (b) there is a positive linear association between this number and 𝛽 in approach 2 which has not been clearly observed in the other perspectives. Then, it is necessary to have enough evidence to reject the null hypothesis of no effect of this parameter within both approaches. 42 APPROACH 1APPROACH 2 Figure 4-15: Number of occurrences of the most common alternative blockmodel with different 𝜷 values for both approaches. 4.2.1. Effect of 𝜷 parameter on both approaches In order to conclude with respect to the influence that 𝛽 has on both approaches, we performed analysis of variance -- ANOVA- of the linear model of the variables. The metrics for the mentioned perspectives -- quality, dissimilarity, similarity w.r.t. the target and number of occurrences- are regarded as dependent variables, whereas 𝛽 corresponds to the explanatory variable. In this study we have taken the 100 observations already made in the previous 43 APPROACH 1APPROACH 2 section for each approach. We have also adopted the widely used threshold for P-value < 0.05 to consider a statistic as significant -- statistically significant21. Approach 𝐶𝑖𝑛𝑑 w.r.t. given 𝑑𝑅𝐾𝐿 w.r.t. given blockmodel blockmodel 𝑁𝑀𝐼 w.r.t. target blockmodel No. occurrences most common alternative blockmodel P-value Instance-level constraints Dissimilarity between matrices image 0.5333 0.3832 0.7216 0.05988 . 3.64e-05 *** 0.0008532 *** 0.0003873 *** 2.2e-16 *** Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Table 3: P-value from ANOVA of the linear models of the variables 𝜷 (explanatory) vs. metrics (response) From Table 3, we can conclude that there is strong evidence to reject the null hypothesis of no effect of the trade-off parameter only for our second approach. Our first approach is not sensitive to 𝜷. This conclusion implies that our metrics, in the first approach, are correlated with a confounding variable which is the number of constraints. Therefore, the next section explains the level of influence of this variable on the performance of approach 1. 4.3. Considerations about instance-level constraints The experiments carried out in the previous section for approach 1 used a "special" cannot-link constraints matrix. What we mean with special is that this matrix contains the perfect set of pairs of constraints. In this set, every constraint was constructed taking into account not only the given blockmodel but also the target. For example, if nodes i and j belong to the same position in the given blockmodel but not in the target, a constraint is constructed; otherwise, not. This procedure has three properties: a) Every constraint is correct. It tries to break a link between two nodes in the given blockmodel if and only if there is not a link between them in the target. Sadly, the likelihood of constructing an incorrect constraint is very high since we do not know the target beforehand. b) The clustering process is feasible. Although the feasibility problem for cannot-link constraints is NP-complete [40], knowing the target allows constructing a set of 21 P-value is the probability of observing a value of a statistic -- in this case: F statistic- as or more extreme than the one actually observed, assuming that the null hypothesis is true. Recall that the null hypothesis corresponds to the case of no effect of the trade-off parameter over the metrics. 44 constraints which makes the clustering process feasible. In other words, there exists a partition of the network which satisfies the whole set of cannot-link constraints which is evidently the target. c) The number of constraints is appropriate. We show below how important the role of the number of constraints is in guiding the clustering process. However, the target blockmodel is unknown beforehand, or at least we cannot count on knowing the whole structure of a target solution. Nonetheless, some information besides to the given clustering might be unveiled. Therefore, instead of using the whole perfect set of constraints, we experiment with a gradually changed percentage of them. In this way we are keeping properties (a) and (b) which are quite important as we will show below. Now, let's see what the behaviour of approach 1 is when only a portion of correct cannot-link constraints is provided. The following experiments also include the trade-off 𝛽 parameter in order to see if both variables interact with each other. Thus, the experiments consist of the observations of the four metrics for each of the 180 combinations of the percentage of correct constraints and 𝛽 parameter -- 10 values of the percentage and 18 values of 𝛽. Multiple-regression models were fit to these observations and ANOVA was performed on them to discover whether the interaction of the factors is statistically significant. % correct constraints 𝛽 parameter Interaction of both factors 𝐶𝑖𝑛𝑑 w.r.t. given 𝑑𝑅𝐾𝐿 w.r.t. given blockmodel blockmodel 𝑁𝑀𝐼 w.r.t. target blockmodel No. occurrences most common alternative blockmodel 8.569e-08 *** <2e-16 *** < 2e-16 *** <2e-16 *** 0.2469 0.2675 0.34124 0.2178 0.5282 0.7416 0.03861 * 0.3916 Signif. codes: 0 '***' 0.001 '**' 0.01 '*' 0.05 '.' 0.1 ' ' 1 Table 4: P-value from ANOVA of the multiple-regression models of the variables 𝜷 and percentage of correct constraints (explanatory) vs. metrics (response) From Table 4, we can conclude that we do not have enough evidence to reject the null hypothesis of no interaction between the factor variables to explain the variation of the quality, dissimilarity and number of occurrences of the most common blockmodel. As concluded in the previous section, the main effect of 𝜷 parameter over the variation of the metrics is not statistically significant. Finally, the percentage of correct constraints do influence on the dependent variables. The greater the number of correct constraints, the greater the possibility of finding a good alternative blockmodel. 45 Therefore, the existence of correct side information about any alternative blockmodel would improve the performance of our first approach dramatically. It is obvious we cannot count on the whole target, yet any information would be quite useful. 46 Chapter 5 Discussion and Conclusions This chapter summarises the most important findings in this work and also analyses the usage of instance-level constraints with negative connotation. From Chapter 2 we can conclude that the relevant work within the field of alternative clustering only considers non-relational data. When the dataset represents a network, only community structures have been sought. There are not attempts to summarise the structure of a network through alternative blockmodels based on given information, that is, initial blockmodels. Therefore, our two approaches are a novel contribution within both graph clustering and blockmodelling fields. Our approaches presented in Chapter 3 are based on two important techniques: (a) SNMTF, and (b) Iterative Lagrangian Solution [12]. SNMTF has been proved to be an effective clustering tool within undirected graphs and it also fits nicely with the blockmodelling problem. In turn, the Iterative Lagrangian Solution is a convenient normalisation technique which follows the stochastic nature of the position membership matrix and avoids the uncertainty caused when the factor matrices -- position membership and image matrices- have different magnitudes. The inclusion of cannot-link constraints to guide the clustering process has been shown to be a powerful tool but very sensitive to the number and quality of constraints (See Chapter 4.) We have enough evidence to conclude that the number of constraints has a statistically significant effect on the values of the evaluation metrics. Furthermore, when experiments regarding "incorrect" constraints were carried out, the evaluation metrics were not satisfactory22. Incorrect constraints were constructed taking into account no target information, that is, they only considered the given blockmodel. The quality of the constraints is dubious because there is no guarantee that at least one feasible division of the network exists that holds all the constraints. For instance, if the cannot-link constraints 𝑐1(𝑎, 𝑏), 𝑐2(𝑏, 𝑐) and 𝑐3(𝑎, 𝑐) were created as 𝑎, 𝑏 𝑎𝑛𝑑 𝑐 belong to the same position in the given blockmodel, there is no feasible alternative blockmodel with three positions that holds these constraints. What would it have happened if we would know that 𝑎 𝑎𝑛𝑑 𝑐 belong to the same position in the target alternative blockmodel beforehand? The answer is that 𝑐3 would not have been created and the clustering process would be feasible. Therefore, side information of the target alternative blockmodel is quite valuable for our first approach. Experiments in Chapter 4 also showed that only our second approach is sensitive to the trade- off parameter 𝛽. Moreover, there is no interaction between factors: trade-off parameter and number of constraints. 22 These experiments are not included in Chapter 4 because their results did not show any pattern. 47 On the other hand, our second approach does not have to deal with the complexity of construction and identification of correct constraints. It is a single-parameter approach which is able to find a good quality alternative blockmodel. However, it does not seem to be as powerful as our first approach as it was shown in Chapter 4. Both approaches were able to find dissimilar and good quality alternative blockmodels with a common characteristic: they are prone to find "small" positions. In other words, they tend to discover positions with nodes that have lots of connections, i.e. central nodes. It means that core-periphery structures are very likely to be found. This trait is inherited from the Iterative Lagrangian technique as it was discovered while we were in the experimental stage. We also found empirically that the inclusion of must-link constraints made the clustering process harder. Identification of "correct" must-link constraints and their number had the same difficulties as with cannot-link constraints. Moreover, when they were included, randomness of the alternative solutions increased. Future work is needed for identification and construction of instance-level constraints as they are an effective tool in guiding the clustering process. Unfeasibility due to over-constraining and complexity in the construction are the main disadvantages when dealing with cannot-link constraints. 48 References Bae, E. and J. Bailey. Coala: A novel approach for the extraction of an alternate clustering of high quality and high dissimilarity. in Data Mining, 2006. ICDM'06. Sixth International Conference on. 2006. IEEE. Cui, Y., X.Z. Fern, and J.G. Dy. Non-redundant multi-view clustering via orthogonalization. in Data Mining, 2007. ICDM 2007. Seventh IEEE International Conference on. 2007. IEEE. Dang, X.H. and J. Bailey. Generation of Alternative Clusterings Using the CAMI Approach. in SDM. 2010. SIAM. Dang, X.-H. and J. Bailey. A hierarchical information theoretic technique for the discovery of non linear alternative clusterings. in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. 2010. ACM. Davidson, I. and Z. Qi. Finding alternative clusterings using constraints. in Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on. 2008. IEEE. Gondek, D. and T. Hofmann. Conditional information bottleneck clustering. in 3rd ieee international conference on data mining, workshop on clustering large data sets. 2003. Citeseer. Vinh, N.X. and J. Epps. minCEntropy: a novel information theoretic approach for the generation of alternative clusterings. in Data Mining (ICDM), 2010 IEEE 10th International Conference on. 2010. IEEE. Wasserman, S., Social network analysis: Methods and applications. Vol. 8. 1994: Cambridge university press. Ding, C., et al. Orthogonal nonnegative matrix t-factorizations for clustering. in Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. 2006. ACM. Lee, D.D. and H.S. Seung, Learning the parts of objects by non-negative matrix factorization. Nature, 1999. 401(6755): p. 788-791. Lee, D.D. and H.S. Seung. Algorithms for non-negative matrix factorization. in Advances in neural information processing systems. 2001. Zhu, Z., Z. Yang, and E. Oja, Multiplicative updates for learning with stochastic matrices, in Image Analysis. 2013, Springer. p. 143-152. Blondel, V.D., et al., Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008. 2008(10): p. P10008. Duch, J. and A. Arenas, Community detection in complex networks using extremal optimization. Physical review E, 2005. 72(2): p. 027104. Fortunato, S., Community detection in graphs. Physics Reports, 2010. 486(3): p. 75- 174. Fortunato, S. and M. Barthelemy, Resolution limit in community detection. Proceedings of the National Academy of Sciences, 2007. 104(1): p. 36-41. Lancichinetti, A. and S. Fortunato, Community detection algorithms: a comparative analysis. Physical review E, 2009. 80(5): p. 056117. Newman, M., Community detection and graph partitioning. EPL (Europhysics Letters), 2013. 103(2): p. 28003. Newman, M.E., Modularity and community structure in networks. Proceedings of the National Academy of Sciences, 2006. 103(23): p. 8577-8582. Newman, M.E. and M. Girvan, Finding and evaluating community structure in networks. Physical review E, 2004. 69(2): p. 026113. 49 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. Orman, G.K., V. Labatut, and H. Cherifi, Qualitative comparison of community detection algorithms, in Digital Information and Communication Technology and Its Applications. 2011, Springer. p. 265-279. Rosvall, M. and C.T. Bergstrom, Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, 2008. 105(4): p. 1118-1123. Xie, J., S. Kelley, and B.K. Szymanski, Overlapping community detection in networks: The state-of-the-art and comparative study. ACM Computing Surveys (CSUR), 2013. 45(4): p. 43. Ding, C.H., X. He, and H.D. Simon. On the Equivalence of Nonnegative Matrix Factorization and Spectral Clustering. in SDM. 2005. SIAM. 25. Wang, F., T. Li, and C. Zhang. Semi-Supervised Clustering via Matrix Factorization. in 26. 27. 28. SDM. 2008. SIAM. Rosvall, M. and C.T. Bergstrom, An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 2007. 104(18): p. 7327-7331. Newman, M., Communities, modules and large-scale structure in networks. Nature Physics, 2012. 8(1): p. 25-31. Chan, J., et al. Discovering latent blockmodels in sparse and noisy graphs using non- negative matrix factorisation. in Proceedings of the 22nd ACM international conference on Conference on information & knowledge management. 2013. ACM. 29. Wang, F., et al., Community discovery using nonnegative matrix factorization. Data 30. 31. 32. 33. 34. 35. 36. 37. Mining and Knowledge Discovery, 2011. 22(3): p. 493-521. Chan, J., et al. SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs. in Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. 2012. ACM. Hoyer, P.O., Non-negative matrix factorization with sparseness constraints. The Journal of Machine Learning Research, 2004. 5: p. 1457-1469. Li, S.Z., et al. Learning spatially localized, parts-based representation. in Computer Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society Conference on. 2001. IEEE. Long, B., Z. Zhang, and S.Y. Philip, A general framework for relation graph clustering. Knowledge and information systems, 2010. 24(3): p. 393-413. Brusco, M., Analysis of two-mode network data using nonnegative matrix factorization. Social Networks, 2011. 33(3): p. 201-210. Ding, C., T. Li, and W. Peng, On the equivalence between non-negative matrix factorization and probabilistic latent semantic indexing. Computational Statistics & Data Analysis, 2008. 52(8): p. 3913-3927. Yang, Z. and E. Oja, Linear and nonlinear projective nonnegative matrix factorization. Neural Networks, IEEE Transactions on, 2010. 21(5): p. 734-749. Chan, J., et al., Structure-Aware Distance Measures for Comparing Clusterings in Graphs, in Advances in Knowledge Discovery and Data Mining. 2014, Springer. p. 362- 373. 38. Wang, L., et al., iVAT and aVAT: enhanced visual analysis for cluster tendency assessment, in Advances in Knowledge Discovery and Data Mining. 2010, Springer. p. 16-27. Zachary, W.W., An information flow model for conflict and fission in small groups. Journal of anthropological research, 1977: p. 452-473. Davidson, I. and S. Ravi, The complexity of non-hierarchical clustering with instance and cluster level constraints. Data mining and knowledge discovery, 2007. 14(1): p. 25-61. 50 39. 40.
1203.1378
1
1203
2012-03-06T01:52:30
Epidemic Intelligence for the Crowd, by the Crowd (Full Version)
[ "cs.SI", "cs.CY", "physics.soc-ph" ]
Tracking Twitter for public health has shown great potential. However, most recent work has been focused on correlating Twitter messages to influenza rates, a disease that exhibits a marked seasonal pattern. In the presence of sudden outbreaks, how can social media streams be used to strengthen surveillance capacity? In May 2011, Germany reported an outbreak of Enterohemorrhagic Escherichia coli (EHEC). It was one of the largest described outbreaks of EHEC/HUS worldwide and the largest in Germany. In this work, we study the crowd's behavior in Twitter during the outbreak. In particular, we report how tracking Twitter helped to detect key user messages that triggered signal detection alarms before MedISys and other well established early warning systems. We also introduce a personalized learning to rank approach that exploits the relationships discovered by: (i) latent semantic topics computed using Latent Dirichlet Allocation (LDA), and (ii) observing the social tagging behavior in Twitter, to rank tweets for epidemic intelligence. Our results provide the grounds for new public health research based on social media.
cs.SI
cs
Epidemic Intelligence for the Crowd, by the Crowd∗ [Full Version] Ernesto Diaz-Aviles1, Avar´e Stewart1, Edward Velasco2, Kerstin Denecke1, and Wolfgang Nejdl1 1L3S Research Center / University of Hannover. Hannover, Germany. {diaz, stewart, denecke, nejdl}@L3S.de 2Robert Koch Institute. Berlin, Germany. [email protected] 2 1 0 2 r a M 6 ] I S . s c [ 1 v 8 7 3 1 . 3 0 2 1 : v i X r a Abstract Tracking Twitter for public health has shown great po- tential. However, most recent work has been focused on correlating Twitter messages to influenza rates, a disease that exhibits a marked seasonal pattern. In the presence of sudden outbreaks, how can social media streams be used to strengthen surveillance capacity? In May 2011, Germany reported an outbreak of Enterohe- morrhagic Escherichia coli (EHEC). It was one of the largest described outbreaks of EHEC/HUS worldwide and the largest in Germany. In this work, we study the crowd's behavior in Twitter during the outbreak. In par- ticular, we report how tracking Twitter helped to detect key user messages that triggered signal detection alarms before MedISys and other well established early warn- ing systems. We also introduce a personalized learning to rank approach that exploits the relationships discov- ered by: (i) latent semantic topics computed using La- tent Dirichlet Allocation (LDA), and (ii) observing the social tagging behavior in Twitter, to rank tweets for epidemic intelligence. Our results provide the grounds for new public health research based on social media. 1 Epidemic Intelligence Based on Twitter In May 2011, an outbreak of enterohaemorrhagic Es- cherichia coli (EHEC) occurred in northern Germany. It was one of the largest described outbreaks of EHEC/HUS world- wide and the largest in Germany (Frank et al. 2011). Day 1: May 19, 2011, the Robert Koch Institute (RKI), Germany's Federal Public Health Authority, was invited by the Health and Consumer Protection Agency in Hamburg to assist in the investigation of three cases of Hemolytic-uremic syndrome (HUS), a life-threatening illness caused by EHEC. Day 2: May 20, alarmed by the type of persons affected and the rapid spread of EHEC, an investigation was initiated by RKI, involving all levels of public-health and food-safety authorities to identify the cause of the outbreak, and to pre- vent further cases of disease. On day 5: May 23, RKI asked all health departments to expedite procedures, by immedi- ately forwarding all case reports of suspected or confirmed EHEC/HUS, to the Federal Public Health Authority, relying *A short version of this work has been accepted for publication at the International AAAI Conference on Weblogs and Social Media (ICWSM 2012). directly on the diagnoses of notifying clinicians (Frank et al. 2011; RKI ). Based on this five-day timeline of EHEC/HUS 2011 out- break in Germany, one can see that public health officials are faced with new challenges for outbreak alert and re- sponse. This is due to the continuous emergence of infec- tious diseases and their contributing factors such as demo- graphic change, or globalization. Early reaction is necessary, but often communication and information flow through tra- ditional channels is slow. Can additional sources of infor- mation, such as social media streams, provide complements to the traditional epidemic intelligence mechanisms? Epidemic Intelligence (EI) encompasses activities related to early warning functions, signal assessments and outbreak investigation. Only the early detection of disease activity, followed by a rapid response, can reduce the impact of epidemics. Recently, modern disease surveillance systems have started to also monitor social media streams, with the objective of improving their timeliness to detect disease outbreaks, and producing warnings against potential pub- lic health threats (e.g., (Corley et al. 2010)). The real-time nature of Twitter makes it even more attractive for public health surveillance. Recent works have shown the potential of using Twitter for public health. These works have either focused on: the text classification and filtering of tweets (Sofean et al. 2012; Sriram et al. 2010); or finding predictors for diseases that exhibit a seasonal pattern (i.e., influenza-like illnesses) by correlating selected keywords with official influenza statis- tics and rates (Culotta 2010; Lampos and Cristianini 2010; Signorini, Segre, and Polgreen 2011). Still others have fo- cused on mining Twitter content for topic (Paul and Dredze 2011a; 2011b) or sentiment analysis (Chew and Eysenbach 2009). Furthermore, these existing approaches have all fo- cused on countries where the tweet density is known to be high (e.g., the UK, or U.S.). In this paper, we seek to address the issues that can help deliver a public health surveillance system based on Twitter, by taking into account two important stages in epidemic in- telligence: Early Outbreak Detection and Outbreak Analysis and Control, and take up the following questions: 1. Early Outbreak Detection: Is it possible, by only using Twitter, to find early cases of an outbreak, before well es- tablished systems? 2. Outbreak Analysis and Control: Is it possible to use Twit- ter to understand the potential causes of contamination and spread? and How can we provide support for pub- lic health official to analyze and assess the risk based on the available social media information? In contrast, to the aforementioned studies, ours focuses on a sudden outbreak of a disease that does not involve any seasonal pattern. Moreover, our work shows the potential of Twitter in countries where the tweet density is significantly lower, such as Germany. The contributions of this paper are summarized as follows: • We provide an example of the application of standard surveillance algorithms on Twitter data collected in real- time during a major outbreak of EHEC/HUS in Germany, and provide insights showing the potential of Twitter for early warning. • For outbreak analysis and control, many studies have been made for systems that return documents in response to a query, little effort has been devoted to exploiting learning to rank in a personalized setting, specially in the domain of epidemic intelligence. This paper presents an innova- tive personalized ranking approach that offers decision makers the most relevant and attractive tweets for risk assessment, by exploiting latent topics and social hash- tagging behavior in Twitter. The rest of the paper is organized as follows: In Section 2, we show how an early warning based on Twitter is possible, we present the data collection used in our experiments and analysis, and the standard biosurveillance methods applied. In Section 3, we introduce a personalized learning to rank approach, based on Twitter, to support the task of analysis and control in the presence of a sudden outbreak. Related works are discussed in Section 4. Finally, in Section 5, we summarize our findings, point to future directions, and con- clude the paper. 2 Twitter for Early Warning The continuous emergence of infectious diseases and their contributing factors impose new challenges to public health officials. Early reaction is necessary, but often communi- cation and information flow through traditional channels is slow. Additional sources of information, such as social me- dia streams, provide complements to the traditional report- ing mechanisms. For example, if we observe Figure 1 , we can see two plots, one of them corresponds to the relative frequency of EHEC cases as reported by RKI (RKI ), and the other to the relative frequency of mentions of the keyword "EHEC" in the tweets collected during the months of May and June 2011. We can appreciate the high correlation of the curves, which corresponds to a Pearson correlation coefficient of 0.864. We can also observe the inertia of the crowd that con- tinued tweeting about the outbreak, even though the number of cases were already declining (e.g., June 5 to 11). Twitter has shown potential as a source of information for public health event monitoring (e.g., (Paul and Dredze Table 1: Data collected from Twitter related to the HUS/EHEC outbreak in Germany during May and June, 2011. Description Number of tweets collected related to medical conditions during May and June, 2011 Tweets the EHEC/HUS outbreak out of the ones collected Distinct users that produced the tweets re- lated to the outbreak extracted related to Amount 7,710,231 456,226 54,381 2011b; Sofean et al. 2012)), but could it be possible to gener- ate an early warning signal before well established systems by only tracking Twitter? In this section, we have a closer look to the time period of the EHEC/HUS outbreak in Germany, and address this question. 2.1 Data Collection We incrementally collected tweets using Twitter's API, cur- rently we monitor over 500 diseases and symptoms, which include "EHEC". One of the challenges we face collecting data from Twitter, besides the API restrictions, is the level of noise with respect to medical domain content. Straightfor- ward techniques relying on regular expressions, even though they exhibit high recall, are difficult to maintain and prone to high false positive rates. For example, consider the follow- ing two tweets collected by a combination of regular expres- sions, and a dictionary of diseases that includes the medical conditions EHEC and fever: 1. RKI warns against north German vegetables: Experts looking feverishly EHEC source http://bit.ly/itGpJx 2. I've definitely Bieber-fever. There's no doubt. but who hasn't got bieber fever? @justinbieber is soo damn rawwwr Tweet number one is of obvious importance for epidemic intelligence, but number two is not. Instead of simple keyword matching to filter out irrelevant tweets, our data collection strategy includes text classifica- tion methods and a multi-level filtering based on supervised learning, following the approach of Stewart et al. (Stewart, Smith, and Nejdl 2011). Table 1 summarizes the data collected related to the out- break that was used in our analysis. 2.2 Detection Methods The surveillance algorithms we used are well documented in the disease aberration literature e.g. (Khan 2007; Hutwagner et al. 2003; Basseville and Nikiforov 1993). The objective of these algorithms is to detect aberration patterns in time series data when the volume of an observation variable ex- ceeds an expected threshold value. In our case, for example, the observation variable corresponds to mentions of medical condition "EHEC" withing the tweets. Figure 1: Relative frequency of cases reported to RKI and the number of tweets mentioning the name of the disease: EHEC. The Pearson correlation coefficient is 0.864. Monitoring Twitter allowed us to generate the first signal on Friday, May 20th, 2011, using standard biosurveillance methods, before well established early warning systems (triangle on the time axis). Table 2: Detection method parameters and alarm dates Detection Method C1 The five biosurveillance algorithms we used for early de- tection are: the Early Aberration Reporting System (EARS) (1) C1, (2) C2, and (3) C3 algorithms, (4) F-statistic, and (5) Exponential Weighted Moving Average (EWMA). Please refer to (Khan 2007) for a detailed introduction. We signal an alarm if the test statistic reported by the de- tection methods exceeds a threshold value, which is deter- mined experimentally. The larger the amount by which the threshold is exceeded, the greater the severity of the alarm. Table 2 summarizes the alarm dates and detection meth- ods parametrization, which follows the guidelines of N. Col- lier (Collier 2010). Using any of the detection methods (Table 2), a daily count less than five tweets was enough to signal an alert on May 20th, 2011. The Early Warning and Response Sys- tem (EWRS) 1 of the European Union received a first com- munication by the German authorities on Sunday May 22. MedISys 2 detected the first media report in the German newspaper Die Welt 3 on Saturday May 21 (Linge et al. 2011) and ProMED-mail 4 and all other major early alert- ing systems (e.g., ARGUS, Biocaster, GPHIN, HealthMap, PULS) covered the event on Monday May 23. Why was this early detection possible with respect to well established early warning systems? We tracked only Twitter as source of information, in contrast to MedISys for exam- ple, that tracks hundreds of news sources on the Internet. We consider Twitter's diversity was the key element that helped 1EWRS: ewrs.ecdc.europa.eu 2MedISys: medusa.jrc.it/medisys 3Die Welt: welt.de 4ProMED-mail: promedmail.org Parametrization (Khan 2007; Collier 2010) Training window = 15 days; buffer = 5 days; upper control limit = µ + 3σ Training window = 15 days; buffer = 5 days; upper control limit = µ + 3σ; alarm thresh- old=0.2 Training window = 15 days; buffer = 5 days; upper control limit = µ + 3σ; alarm thresh- old=0.3 Training window =15 days; buffer = 5 days; alarm thresh- old=0.6 Training window =15 days; buffer = 5 days; alarm thresh- old=4, ω = 0.24 C2 C3 F-statistic EWMA Alarm Dates May 20 to May 28 May 20 to May 28 May 20 to May 24 May 20 to June 30 May 20 to May 30 in the earlier detection of the event. Twitter is a diverse stream of multiple sources. In Twit- ter converges the contribution from the crowd - millions of individual users obscure and renown; big and small media outlets; global and local newspapers, etc. Our work and that of MedISys focus on an analysis at a national level, but there are cases where support for the local perspective is impor- tant, for example local and smaller news papers reaching a broader audience through Twitter. DateKeyword ehecRKI Cases EHEC/STEC Apr 27, 20112700.00060132Apr 28, 20112800Apr 29, 20112900.00120265Apr 30, 20113000.00060132May 1, 2011100.00060132May 2, 2011200.00060132May 3, 2011300.00060132May 4, 2011400.00060132May 5, 2011500.00090198May 6, 2011600.00030066May 7, 2011700.00030066May 8, 2011800.00060132May 9, 2011900.00030066May 10, 20111000.00030066May 11, 20111100.00150331May 12, 20111200.00090198May 13, 20111300.00180397May 14, 20111400.00150331May 15, 20111500.00030066May 16, 20111600.00360794May 17, 20111700.00210463May 18, 20111800.00360794May 19, 20111900.00270595May 20, 2011200.000060.00330728May 21, 2011210.000684260.00180397May 22, 2011220.002628990.00300661May 23, 2011230.019435310.04389657May 24, 2011240.051283280.0405893May 25, 2011250.040179110.04389657May 26, 2011260.088401240.04269393May 27, 2011270.054332430.03998797May 28, 2011280.033300520.04149128May 29, 2011290.028246620.04119062May 30, 2011300.045281030.04690319May 31, 2011310.04654150.04149128Jun 1, 201110.039326790.0460012Jun 2, 201120.040911380.038184Jun 3, 201130.042495980.0444979Jun 4, 201140.044080570.03788334Jun 5, 201150.045665170.04179194Jun 6, 201160.059698450.02675887Jun 7, 201170.049362560.02615755Jun 8, 201180.049950780.02705953Jun 9, 201190.038978660.0249549Jun 10, 2011100.047513870.02014432Jun 11, 2011110.017730670.02585689Jun 12, 2011120.013144940.03006615Jun 13, 2011130.012892850.01413109Jun 14, 2011140.015761930.01683704Jun 15, 2011150.005642120.01022249Jun 16, 2011160.005438040.01202646Jun 17, 2011170.005245970.01473241Jun 18, 2011180.00504190.01443175Jun 19, 2011190.004837820.0171377Jun 20, 2011200.004633740.01052315Jun 21, 2011210.004441670.00871918Jun 22, 2011220.004237590.00691521Jun 23, 2011230.004033520.0078172Jun 24, 2011240.003793430.00932051Jun 25, 2011250.003385270.00601323Jun 26, 2011260.004009510.00841852Jun 27, 2011270.00372140.00932051Jun 28, 2011280.004069530.01142514Jun 29, 2011290.003073160.01022249Jun 30, 2011300.006506450.0066145500.010.020.030.040.050.060.070.080.090.102728293012345678910111213141516171819202122232425262728293031123456789101112131415161718192021222324252627282930EHEC: Tweets and Cases ReportedRelative FrequencyApril May June Tags from LDA Topics and #-Tags in Week 21, 2011#bacteria #cucumbers #berlin #bremen #diarrhea #EHEC #hamburg #hus #intestinalInfection #nordGermany #tomatoes Twitter : tweets with keyword 'EHEC'RKI : EHEC Cases Reported A closer look to day May 20, reveals that the first alarm was triggered based on five tweets, the actual messages are shown in Figure 2, all of them generated from sources not far from where the first cases of the outbreak were reported. Those users acted as local sensors, producing tweets that spread the news faster than major newspapers. Figure 2: The 5 tweets that triggered the first signal for disease EHEC on May 20, 2011. 3 Twitter for Outbreak Analysis and Control For public health officials, who are participating in the in- vestigation of an outbreak, the millions of documents pro- duced over social media streams represent an overwhelming amount of information for risk assessment. To reduce this overload we explore to what extent rec- ommender systems techniques can help to filter informa- tion items according to the public health users' context and preferences (e.g., disease, symptoms, location). In particu- lar, we focus on a personalized learning to rank approach that ultimately offers the user the most relevant and attrac- tive tweets for risk assessment. In this section, we introduce our approach and report an experimental evaluation on the EHEC/HUS dataset collected from Twitter. 3.1 Background: Learning to Rank for IR Learning to rank for Information Retrieval (L2R) is an ac- tive area of recent research (Qin et al. 2010). L2R is set as a supervised learning task that considers fundamentally two phases: learning and retrieval. In learning (training), a collection of queries and their corresponding retrieved doc- uments are given. Furthermore, the labels (i.e., relevance judgments) of the document with respect to the queries are also available. The relevance judgments, provided by human annotators, can represent ranks (e.g., categories in a total or- der) or binary labels (e.g., relevant or not-relevant). The ob- jective of learning is to construct a ranking model (cid:126)w, e.g., a ranking function, that achieves the best result on test data in the sense of optimization of a performance measure (e.g., error rate, degree of agreement between the two rankings, classification accuracy or mean average precision). In retrieval (test phase), given a query-document pair, the learned ranking function is applied, returning a ranked list of documents in descending order of their relevance Table 3: Learning to Rank: Summary of Notations Notations Q = {q1,··· , qQ} qi ∈ Q D = {d1,··· , dD} dj ∈ D Y = {y1,··· , yY } yij ∈ Y Explanations Set of queries Query Set of documents Document Set of relevance judgments Relevance judgment of query-document pair (qi, dj) ∈ Q × D Feature vector w.r.t. (qi, dj) kth dimension of φ(qi, dj) Training set φ(qi, dj) φk(qi, dj) T = {(qi, dj), φ(qi, dj), yij} 1≤i≤Q 1≤j≤D scores. More formally, suppose that Q = {q1,··· , qQ} is the set of queries, and D = {d1,··· , dD} the set of documents, the training set is created as a set of query- document pairs, (qi, dj) ∈ Q × D, upon which a rele- vance judgment (e.g., a label) indicating the relationship be- tween qi and dj is assigned by an annotator. Suppose that Y = {y1,··· , yY } is the set of labels and yij ∈ Y de- notes the label of query-document pair (qi, dj). A feature vector φ(qi, dj) is created from each query-document pair (qi, dj), i = 1, 2,··· ,Q; j = 1, 2,··· ,D. The training set is denoted as T = {(qi, dj), φ(qi, dj), yij}. The ranking model is a real valued function of features: f (q, d) = (cid:126)w · φ(q, d) (1) where (cid:126)w denotes a weight vector. In ranking, for query qi the model associates a score to each of the documents dj as their degree of relevance with respect to query qi using f (qi, dj), and sort the documents based on their scores. Table 3 gives a summary of notations described above. Pairwise approaches, such as Ranking SVM (Joachims 2002) or Stochastic Pairwise Descent (Sculley 2009), have proved successful in addressing the L2R task. A compre- hensive study on different learning to rank techniques can be found in (Liu 2009). Although much work has been carried out on L2R tech- niques for systems that return documents in response to a query, little effort has been devoted to exploiting L2R in a personalized setting, specially in the domain of epidemic in- telligence. 3.2 Our Approach: Ranking Tweets for Epidemic Intelligence We propose to use the user context as implicit criteria to se- lect tweets of potential relevance, that is, we will rank and derive a short list of tweets based on the user context. The user context Cu is defined as a triple Cu = (t, M Cu, Lu) , (2) where t is a discrete time interval, M Cu the set of medical conditions, and Lu the set of locations of user interest. We define three concepts that will help us to discuss our approach in rest of the section: Algorithm 1 Personalized Tweet Ranking algorithm for Epidemic Intelligence (PTR4EI) Input: User Context Cu = (t, M Cu, Lu), Inverted index T of tweets collected for epidemic intel- ligence before time t Output: Ranking Function fCu for User Context Cu 1: Compute LDA topics (topicsLDA) on T 2: Consider each mc ∈ M Cu as a hash-tag, and extract from T all co-occurring hash-tags: coHashT ags 3: Classify the terms in topicsLDA and the hash-tags in coHashT ags as Medical Condition M Cx, Location Lx or Complementary Context CCx 4: Build a set of queries as follows: Q = {q q ∈ M Cu × P({Lu ∪ M Cx ∪ Lx ∪ CCx})} 5: For each query qi ∈ Q obtain tweets D from the collec- tion T 6: Elicit relevance judgments Y on a subset Dy ⊂ D 7: For each tweet dj ∈ D, obtain the feature vector φ(qi, dj) w.r.t. (qi, dj) ∈ Q × D the user context Cu: fCu (q, d) = (cid:126)w · φ(q, d) 8: Apply learning to rank to obtain a ranking function for 9: return fCu (q, d) Medical Condition is a string that describes a human medical condition, such as a disease, disorder or syndrome. We represent the set of medical conditions as M C. Location is a string that is used to identify a point or an area on the Earth's surface, which can be mapped to a spe- cific pairing of latitude and longitude. The set of locations is denoted as L. Complementary Context is defined as the set of nouns, which are neither Locations nor Medical Conditions. Com- plementary Context may include named entities such as names of persons, organizations, affected organisms, expres- sions of time, quantities, etc. We denote the set of named entities that represents the complementary context as CC, where CC ∩ (L ∪ M C) = ∅. Out Personalized Tweet Ranking for Epidemic Intelli- gence algorithm or PTR4EI is shown in Algorithm 1. The algorithm extends a learning to rank framework (Section 3.1 by considering a personalized setting that exploits user's in- dividual context. More precisely, we consider the context of the user, Cu, and prepare a set of queries, Q, for a target event (e.g., a dis- ease outbreak). We first compute LDA (Blei, Ng, and Jordan 2003) on an indexed collection T of tweets for epidemic in- telligence, where not all tweets are necessarily interesting for the target event. We also extract the hash-tags that co-occur with the user context by considering the medical conditions and locations in Cu as hash-tags themselves, and find which other hash- tags co-occur with them within a tweet, and how often they co-occur, which will help us to select the most representative Table 4: Four LDA topics (columns) computed weekly during the main period of the outbreak: from May 23 to June 19, 2011. We classify terms within each topic as Medical Condition (MC), Location (L), or Complementary Context (CC). EHEC (MC) cucumbers (CC) Spain (L) tomatoes (CC) salad (CC) EHEC (MC) dead (MC) Germany (L) people (-) live (-) Week 21 fever (MC) pain (MC) headache (MC) sniff (MC) pain (MC) EHEC (MC) casualty (-) women (CC) intestinal germ (MC) panic (MC) Week 22 EHEC (MC) intestinal germ (MC) source (-) search (-) Hamburg (L) EHEC (MC) cucumbers (CC) pathogen (MC) Spain (L) farmers (CC) Week 23 EHEC (MC) pathogen (MC) Northern Germany (L) diarrhea (MC) dead (MC) EHEC (MC) cucumbers (CC) salad (CC) pain (MC) women (CC) EHEC (MC) sprout (CC) source (-) suspicion (-) hus (MC) pain (MC) bellyache (MC) cough (MC) throat (CC) sniff (MC) EHEC (MC) cucumber (CC) eu (CC) crisis management (-) farmers (CC) EHEC (MC) germ (MC) sprout (CC) health (MC) all-clear (CC) headache (MC) pain (MC) fever (MC) people (-) cough (MC) headache (MC) fever (MC) slept (-) sniff (MC) head (CC) Week 24 EHEC (MC) cucumbers (CC) sprout (CC) pathogen (MC) salad (CC) stomach ache (MC) sniff (MC) pain (MC) regions (-) examined (-) hash-tags for the target event. The set Q is constructed by expanding the original terms in Cu with the ones in the LDA topics and co-occurring hash-tags, which are previously classified as medical con- dition, location or complementary context. We build the set D of tweets by querying index T using q ∈ Q as query terms. Next, we elicit judgments from ex- perts on a subset of the tweets retrieved, in order to construct Dy ⊂ D. We then obtain for each tweet dj ∈ D its features vector φ(qi, dj) with respect to the pair (qi, dj) ∈ Q × D. Finally and with these elements, we apply a learning to rank algorithm to obtain the ranking function for the given user context. In the rest of the section, we evaluate our approach con- sidering as event of interest the EHEC/HUS outbreak in Ger- many, 2011. Experiments and Evaluation To support users in the assessment and analysis during the EHEC/HUS outbreak, we set the user context (Eq. 2) as Cu = (t, M Cu, Lu) = ([2011-05-23; 2011-06-19],{"EHEC"},{"Lower Saxony"}), in this way, we are taking into account the main period of the outbreak 5, the disease of interest, and the German state with more cases reported. Following Algorithm 1, we computed LDA and extracted the co-occurring hash-tags using the indexed collection T described in Section 2.1. Table 4 shows four LDA topics for each week of the time period of interest, and Table 5 presents the hash-tags co-occurring with #EHEC. We asked three experts: one from the Robert Koch Insti- tute and the other two from the Lower Saxony State Health 5Please note, that even though the main period of the outbreak is considered for the evaluation, nothing prevents us to build the model during the ongoing outbreak, and recompute it periodically (e.g., weekly). Table 5: Hash-tags co-occurring with #EHEC during May 23 and June 19, 2011, the main period of the outbreak. The hash-tags are classified as entities of type Medical Condition, Location, or Complementary Context, hash-tags out of these categories are discarded. Medical Condition Location Complementary Context bacteria diarrhea ehec victim hus intestinal infection bacteria diarrhea ehec pathogen hus intestinal infection bacteria diarrhea ehec pathogen hus Week 21 bremen cuxhaven hamburg munster northern germany Week 22 berlin germany hamburg lubeck spain bavaria berlin germany hamburg Week 23 intestinal infection lower saxony Week 24 lower saxony bacteria died health hus cdu edeka fdp merkel rki bild fdp n24 rki rtl ehec freei fdp merkel n24 rki cucumber salad cucumbers ehec vegetable tomatoes vegetables cucumbers obst salad terror tomatoes cucumbers salad sojasprout sprout donate blood ehec free sojasprout Department (NLGA) 6 to provide their individual judgment on a subset Dy of 240 tweets, evaluating for each tweet, if it was relevant or not to support their analysis of the outbreak. Any disagreement in the assigned relevance scores were re- solved by majority voting. We selected these tweets from the index T as follows: 30 were obtained using as query the term "EHEC", i.e., M Cu, together with the medical conditions identified using LDA, and 30 using the medical conditions from the hash-tags. We used a similar procedure combining query "EHEC" with the locations and complementary context extracted from LDA and hash-tag co-occurrence, obtaining 30 tweets at every step, for a total of 120 tweets. For the rest 60, we used the query term "EHEC" alone, then we ordered the result set chronologically based on the tweets' publication date, and selected the most recent ones. We prepared five binary features for each tweet as fol- lows: Feature Value = True FM C FL F#-tag FCC If a medical condition is present in the tweet If a location is present in the tweet If a hash-tag is present in the tweet If a complementary context present in the tweet If a URL is present in the tweet term is FU RL For learning the ranking function, we used Stochas- tic Pairwise Descent (SPD) algorithm (Sculley 2009), which solves the same optimization problem as Ranking 6NLGA: nlga.niedersachsen.de SVM (Joachims 2002), but using stochastic gradient de- scent, whose characteristics make it more appealing to scale to larger datasets (e.g., (Bottou 2010)). We compared our approach, that expand the user context with latent topics and social generated hash-tags, against two ranking methods: • RankMC: It learns a ranking function using only medi- cal conditions as feature, i.e., FM C. Please note, that this baseline also considers related medical conditions to the ones in M Cu, which makes it stronger than non-learning approaches, such as BM25 or TF-IDF scores, that use only the M Cu elements as query terms. • RankMCL: It is similar to RankMC, but besides the med- ical conditions, it uses a local context to perform the rank- ing (i.e., features: FM C and FL). We expect this method to perform better than RankMC, since it does not only take into account the spatial information from the user context, but also additional locations in the collection. We conducted 10-fold cross validation experiments. For each fold, we used 80% of the tweets for training and the remaining 20% for testing. The test set is used to evaluate the ranking methods. The reported performance is the average over the ten folds. Evaluation Measures For evaluation, we used three eval- uation measures widely used in information retrieval, namely precision at position n (P @n), mean average pre- cision (MAP), and normalized discount cumulative gain (NDCG). Their definitions are as follows. Precision at Position n (P @n) (Baeza-Yates and Ribeiro-Neto 2011) measures the relevance of the top n doc- uments in the ranking list with respect to a given query: P @n = # of relevant docs in top n results n (3) Mean Average Precision (MAP) The average precision (AP) (Baeza-Yates and Ribeiro-Neto 2011) of a given query is calculated as Eq. (4), and corresponds to the average of P @n values for all relevant documents: (cid:80)N n=1 (P @n ∗ rel(n)) AP = # of relevant docs for this query (4) where N is the number of retrieved documents, and rel(n) is a binary function that evaluates to 1 if the nth doc- ument is relevant, and 0 otherwise. Finally, MAP (Baeza- Yates and Ribeiro-Neto 2011) is obtained averaging the AP values over the set of queries. Normalized Discount Cumulative Gain (NDCG) For a single query, the NDCG (Jarvelin and Kekalainen 2002) value of its ranking list at position n is computed by Eq. (5): N DCG@n = Zn 2r(j) − 1 log(1 + j) (5) n(cid:88) j=1 where r(j) is the rating of the the j-th document in the ranking list, and the normalization constant Zn is chosen so that the perfect list gets NDCG score of 1. (Chew and Eysenbach 2009). They showed that the con- cise and timely nature of tweets can provide health officials with the a means to become aware, and respond to concerns raised by the public. Culotta applied text classification to filter out tweets that are not reporting about influenza-like illnesses. Further, they modeled influenza rates by regression models and compared to U.S. Center of Disease Control statistics (Culotta 2010). Lampos and Cristianini also presented a monitoring tool for social media that is based on the textual analysis of micro-blog content (Lampos and Cristianini 2010), (Lam- pos, Bie, and Cristianini 2010). Their study focused on influenza-like illnesses in the UK and showed a correlation with data from the Health Protection Agency. Another study of Twitter content concentrated on influenza-like illnesses in the U.S. (Signorini, Segre, and Polgreen 2011). Paul and Dredze (Paul and Dredze 2011a; 2011b) introduced a new aspect topic model for Twitter that associates symptoms, treatments and general words with diseases. Their focus is on general public health, not necessarily infectious diseases or disease outbreaks. In contrast to these systems, we seek to not only detect and monitor potential public health threats, but also provide support for public health officials to asses the potential risk associated with the volume of information that is available within Twitter streams. Moreover, our proposed approach shows the potential of using Twitter for monitoring non- seasonal outbreaks in and geo-spacially sparse tweet loca- tions. Our work is similar to that of (Linge et al. 2011), were media reports on the 2011 EHEC outbreak in Germany are tracked. Although in their work no early warning was possi- ble, they identified key aspects of developing outbreak sto- ries. In contrast to this work, our approach exploits social media data and we show that a system can help to get early warnings on public health threats. Although some works exist that address the task of rank- ing tweets, little effort has been devoted to explore person- alized ranking of tweets in the domain of epidemic intel- ligence. For example Duan et al. rank individual generic tweets according to their relevance to a given query (Duan et al. 2010). The features used include content relevance features, Twitter specific features and account authority fea- tures. In contrast, our is a personalized learning to rank ap- proach for epidemic intelligence, that exploits an expanded user context by means of latent topics and on social hash- tagging behavior. 5 Conclusion and Future Directions To show the potential of Twitter for early warning, we fo- cused on the recent EHEC/HUS outbreak in Germany, and monitor the social stream. We applied several biosurveil- lance methods on a set of tweets collected in real time dur- ing the time of the event using Twitter API. All the detection methods triggered an alarm on May 20, a day ahead of well established early warning systems, such as MedISys. After the detection of the outbreak, authorities investi- gating the cause and the impact in the population were in- terested in the analysis of micro-blog data related to the Figure 3: MAP and NDCG Results Method Table 6: Ranking Performance in terms of P@{1, 3, 5, 10} P@1 P@10 90 % 73.34 % 64 % 69 % 90 % 83.33 % 88 % 85 % 100 % 90 % 94 % 96 % RankMC (baseline) RankMCL (baseline) PTR4EI P@5 P@3 For the training dataset, we define two ratings {1, 0} cor- responding to "relevant to the outbreak" and "not-relevant to the outbreak" in order to compute NDCG scores. Results The ranking performance in terms of precision is presented in Table 6, MAP and NDCG results are shown in Figure 3. As we can appreciate PTR4EI outper- forms both baselines. Local information helps RankMCL to beat RankMC, for example MAP improves from 71.96% (RankMC) up to 81.82% (RankMCL). PTR4EI, besides lo- cal features, exploits complementary context information and particular Twitter features, such as the presence of hash- tags or URLs in the tweets, this information allows it to improve its ranking performance even further, reaching a MAP of 91.80%. A similar behavior is observed for preci- sion and NDCG, where PTR4EI is statistically significantly better than RankMC and RankMCL. 4 Related Work In order to detect public health events, supervised (Stew- art, Smith, and Nejdl 2011), unsupervised (Fisichella et al. 2011) and rule-based approaches have been used to extract public health events from social media and news. For ex- ample, PULS (Steinberger et al. 2008) identify the disease, time, location and cases of a news-reported event. It is in- tegrated into MedISys, which automatically collects news articles concerning public health in various languages, and aggregates the extracted facts according to pre-defined cate- gories, in a multi-lingual manner. Other systems have sought to use the web and social me- dia as a predictor to monitor and gauge the seasonal patterns of influenza. These systems correlate the queries used in search behavior with the infection rates of influenza-like ill- nesses statistics (Polgreen et al. 2008; Ginsberg et al. 2009). Monitoring analysis has also been carried out on Twitter. The work of Chew et al. focused on the use of the terms "H1N1" and "swine flu" during the H1N1 2009 outbreak ROUNDP @ 1P @ 2P @ 3P @ 4P @ 5P @ 6P @ 7P @ 8P @ 9P @ 10MAPallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesAVERAGEmcmcmcmcmcmcmcmcmcmcAVERAGEmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locAVERAGE01.00001.00001.00001.00001.00001.00001.00001.00001.00000.90000.907111.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.980521.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.900831.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.907441.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.989551.00000.50000.66670.75000.80000.83330.85710.87500.88890.90000.841161.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.944571.00001.00000.66670.75000.80000.83330.85710.87500.88890.90000.906581.00001.00000.66670.75000.80000.83330.85710.87500.88890.90000.820691.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.98151.00000.95000.90000.92500.94000.95000.95710.96250.96670.96000.918001.00001.00001.00000.75000.60000.50000.42860.50000.44440.50000.647111.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.874021.00000.50000.66670.50000.60000.66670.71430.75000.77780.80000.747031.00001.00000.66670.50000.60000.50000.57140.62500.66670.60000.656041.00000.50000.66670.50000.40000.50000.57140.62500.66670.70000.671951.00001.00000.66670.75000.60000.50000.42860.50000.55560.50000.576261.00001.00001.00001.00000.80000.83330.85710.87500.88890.90000.822670.00000.00000.00000.25000.40000.50000.57140.50000.55560.50000.677281.00000.50000.66670.75000.60000.66670.71430.62500.66670.60000.702491.00001.00001.00000.75000.80000.83330.85710.87500.88890.80000.82180.90000.75000.73340.67500.64000.65000.67140.68750.71110.69000.719601.00000.50000.33330.50000.60000.66670.71430.75000.66670.70000.714911.00001.00001.00001.00001.00001.00001.00000.87500.88890.90000.905621.00001.00001.00001.00001.00001.00000.85710.87500.77780.80000.829431.00001.00001.00001.00000.80000.66670.71430.75000.66670.70000.772141.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.857051.00000.50000.33330.50000.60000.66670.71430.75000.77780.80000.701861.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.896771.00001.00001.00001.00001.00001.00001.00001.00000.88890.90000.835680.00000.50000.66670.75000.80000.83330.85710.75000.77780.80000.770491.00001.00001.00001.00001.00000.83330.85710.87500.88890.90000.89830.90000.85000.83330.87500.88000.86670.87140.86250.83340.85000.8182ROUNDNDCG @ 1NDCG @ 2NDCG @ 3NDCG @ 4NDCG @ 5NDCG @ 6NDCG @ 7NDCG @ 8NDCG @ 9NDCG @ 10AVERAGE NDCGallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesallFeaturesAVERAGEmcmcmcmcmcmcmcmcmcmcAVERAGEmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locmc_locAVERAGE01.00001.00001.00001.00001.00001.00001.00001.00001.00000.94270.944211.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.989021.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.941031.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.947041.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.993751.00000.50000.61990.68060.71920.74670.76770.78440.79810.80970.824561.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.968071.00001.00000.76020.79850.82290.84020.85340.86400.87260.87990.904881.00001.00000.76020.79850.82290.84020.85340.86400.87260.87990.851391.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.99061.00000.95000.91400.92780.93650.94270.94750.95120.95430.95120.935401.00001.00001.00000.84030.73870.66630.61120.63910.59840.62140.700111.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.918221.00000.50000.61990.52090.57880.62010.65150.67660.69720.71450.728231.00001.00000.76020.63880.68250.61560.64740.67280.69360.65390.696841.00000.50000.61990.52090.45790.51100.55150.58370.61020.63260.665451.00001.00000.76020.79850.70190.63320.58080.61090.63570.59930.668661.00001.00001.00001.00000.87910.89090.90000.90710.91310.91800.878970.00000.00000.00000.15970.26130.33370.38880.36090.40160.37860.526281.00000.50000.61990.68060.59830.63770.66760.61970.64390.60700.691591.00001.00001.00000.84030.85960.87340.88380.89220.89910.84760.87140.90000.75000.73800.70000.67580.67820.68830.69630.70930.69730.734501.00000.50000.38010.47910.54210.58690.62110.64840.60710.62960.685011.00001.00001.00001.00001.00001.00001.00000.92810.93270.93660.935221.00001.00001.00001.00001.00001.00000.91730.92320.86440.87220.888031.00001.00001.00001.00000.87910.79290.81010.82370.77130.78440.835541.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.915951.00000.50000.38010.47910.54210.58690.62110.64840.67070.68960.700661.00001.00001.00001.00001.00001.00001.00001.00001.00001.00000.937671.00001.00001.00001.00001.00001.00001.00001.00000.93630.94000.890780.00000.50000.61990.68060.71920.74670.76770.71250.73080.74620.749691.00001.00001.00001.00001.00000.90200.91010.91660.92190.92640.93400.90000.85000.83800.86390.86830.86150.86470.86010.84350.85250.8472RankMC (baseline)RankMCL (baseline)PTR4EIMAPNDCG@1NDCG@3NDCG@5NDCG@100.71960.90000.73800.67580.69730.81820.90000.83800.86830.85250.91801.00000.91400.93650.9512MethodP @ 1P @ 3P @ 5P @ 10RankMC (baseline)RankMCL (baseline)PTR4EI0.90000.73340.64000.69000.90000.83330.88000.85001.00000.90000.94000.960000.200.400.600.801.00MAPNDCG@1NDCG@3NDCG@5NDCG@10Ranking Performance : MAP and NDCG@{1, 3, 5, 10}RankMC (baseline)RankMCL (baseline)PTR4EI event. Thousands of tweets were produced every day, which made this task overwhelming for the experts. We proposed in this work a Personalized Tweet Ranking algorithm for Epidemic Intelligence (PTR4EI) that provides users a per- sonalized short list of tweets that meets the context of their investigation. PTR4EI exploits features that go beyond the medical condition and location (i.e., user context), but in- cludes complementary context information, extracted using LDA and the social hash-tagging behavior in Twitter, plus additional Twitter specific features. Our experimental evalu- ation showed the superior ranking performance of PTR4EI. We are currently working closely with German and global public health institutions to help them integrate the monitor- ing of social media to their existing surveillance systems. As future work, we plan to scale up our experiments, and to apply techniques of online ranking in order to update the model more efficiently as the outbreak develops. We have shown the potential of Twitter to trigger early warnings in the case of sudden outbreaks and how personal- ized ranking for epidemic intelligence can be achieved. We believe our work can serve as a building block for an open early warning system based on Twitter, and hope that this paper provides some insights into the future of epidemic in- telligence based on social media streams. References 1993. Detection of Abrupt Baeza-Yates, R., and Ribeiro-Neto, B. 2011. Modern Information Retrieval. Addison Wesley, 2nd edition. Basseville, M., and Nikiforov, I. changes: Theory and Application. Prentice Hall. Blei, D. M.; Ng, A. Y.; and Jordan, M. I. 2003. Latent dirichlet allocation. J. Mach. Learn. Res. 3:993–1022. Bottou, L. 2010. Large-scale machine learning with stochastic gradient descent. In COMPSTAT'2010. Chew, C., and Eysenbach, G. 2009. Pandemics in the age of twitter: Content analysis of tweets during the 2009 h1n1 outbreak. PLoS ONE 5(11):e14118. Collier, N. 2010. What's unusual in online disease outbreak news? Journal of Biomedical Semantics 1(1):2. Corley, C. D.; Cook, D. J.; Mikler, A. R.; and Singh, K. P. 2010. Text and structural data mining of influenza mentions in web and social media. Int J Environ Res Public Health 7(2):596–615. Culotta, A. 2010. Towards detecting influenza epidemics by ana- lyzing twitter messages. In First Workshop on Social Media Ana- lytics. Duan, Y.; Jiang, L.; Qin, T.; Zhou, M.; and Shum, H.-Y. 2010. An empirical study on learning to rank of tweets. In Coling 2010. Fisichella, M.; Stewart, A.; Cuzzocrea, A.; and Denecke, K. 2011. Detecting health events on the social web to enable epidemic intel- ligence. In SPIRE'11. Frank, C.; Werber, D.; Cramer, J. P.; Askar, M.; Faber, M.; Heiden, M. a. d.; Bernard, H.; Fruth, A.; Prager, R.; Spode, A.; Wadl, M.; Zoufaly, A.; Jordan, S.; Stark, K.; and Krause, G. 2011. Epidemic Profile of Shiga-Toxin-Producing Escherichia coli O104:H4 Out- break in Germany - Preliminary Report. New England Journal of Medicine. Ginsberg, J.; Mohebbi, M. H.; Patel, R. S.; Brammer, L.; Smolin- ski, M. S.; and Brilliant, L. 2009. Detecting influenza epidemics using search engine query data. Nature. Hutwagner, L.; Thompson, W.; Seeman, G. M.; and Treadwell, T. 2003. The bioterrorism preparedness and response early aberration reporting system (ears). Journal of urban health bulletin of the New York Academy of Medicine 80(2 Suppl 1):i89–i96. Jarvelin, K., and Kekalainen, J. 2002. Cumulated gain-based eval- uation of ir techniques. ACM Trans. Inf. Syst. 20(4):422–446. Joachims, T. 2002. Optimizing search engines using clickthrough data. In KDD '02, KDD '02. Khan, S. A. 2007. Handbook of biosurveillance, m.m. wagner, a.w. moore, r.m. aryel (eds.). elsevier inc. isbn-13: 978-0-12-369378-5. Journal of Biomedical Informatics. Lampos, V., and Cristianini, N. 2010. Tracking the flu pandemic by monitoring the social web. In IAPR 2nd Workshop on Cognitive Information Processing (CIP 2010). Lampos, V.; Bie, T. D.; and Cristianini, N. 2010. Flu detector tracking epidemics on twitter. In ECML PKDD 2010. Linge, J.; Mantero, J.; Fuart, F.; Belyaeva, J.; Atkinson, M.; and Van Der Goot, E. 2011. Tracking media reports on the shiga toxin- producing escherichia coli o104:h4 outbreak in germany. In ICST Conference on eHealth, 2011. Liu, T.-Y. 2009. Learning to rank for information retrieval. Found. Trends Inf. Retr. 3:225–331. Paul, M. J., and Dredze, M. 2011a. A model for mining public health topics from twitter. Technical report, Johns Hopkins Uni- versity. Paul, M. J., and Dredze, M. 2011b. You are what you tweet: Ana- lyzing twitter for public health. In ICWSM'11. Polgreen, P. M.; Chen, Y.; Pennock, D. M.; Nelson, F. D.; and We- instein, R. 2008. Using internet searches for influenza surveillance. Clinical Infectious Diseases 47(11):1443–48. Qin, T.; Liu, T.-Y.; Xu, J.; and Li, H. 2010. Letor: A benchmark collection for research on learning to rank for information retrieval. Information Retrieval 13:346–374. 10.1007/s10791-009-9123-y. Technical report. Sculley, D. 2009. Large Scale Learning to Rank. In NIPS 2009 Workshop on Advances in Ranking. Signorini, A.; Segre, A. M.; and Polgreen, P. M. 2011. The use of twitter to track levels of disease activity and public concern in the u.s. during the influenza a h1n1 pandemic. PLoS ONE. Sofean, M.; Stewart, A.; Denecke, K.; and Smith, M. 2012. Med- ical case-driven classification of microblogs: Characteristics and annotation. In ACM IHI 2012. Sriram, B.; Fuhry, D.; Demir, E.; Ferhatosmanoglu, H.; and Demir- bas, M. 2010. Short text classification in twitter to improve infor- mation filtering. In ACM SIGIR'10. Steinberger, R.; Fuart, F.; Goot, E. V. D.; and Best, C. 2008. Text mining from the web for medical intelligence. Mining massive data sets for security Advances in data mining search social networks and text mining and their applications to security 19. Stewart, A.; Smith, M.; and Nejdl, W. 2011. A transfer approach to detecting disease reporting events in blog social media. In ACM HT '11.
1612.08207
1
1612
2016-12-24T17:32:48
Ideology Detection for Twitter Users with Heterogeneous Types of Links
[ "cs.SI" ]
The problem of ideology detection is to study the latent (political) placement for people, which is traditionally studied on politicians according to their voting behaviors. Recently, more and more studies begin to address the ideology detection problem for ordinary users based on their online behaviors that can be captured by social media, e.g., Twitter. As far as we are concerned, however, the vast majority of the existing methods on ideology detection on social media have oversimplified the problem as a binary classification problem (i.e., liberal vs. conservative). Moreover, though social links can play a critical role in deciding one's ideology, most of the existing work ignores the heterogeneous types of links in social media. In this paper we propose to detect \emph{numerical} ideology positions for Twitter users, according to their \emph{follow}, \emph{mention}, and \emph{retweet} links to a selected set of politicians. A unified probabilistic model is proposed that can (1) explain the reasons why links are built among people in terms of their ideology, (2) integrate heterogeneous types of links together in determining people's ideology, and (3) automatically learn the quality of each type of links in deciding one's ideology. Experiments have demonstrated the advantages of our model in terms of both ranking and political leaning classification accuracy. It is shown that (1) using multiple types of links is better than using any single type of links alone to determine one's ideology, and (2) our model is even more superior than baselines when dealing with people that are sparsely linked in one type of links. We also show that the detected ideology for Twitter users aligns with our intuition quite well.
cs.SI
cs
Ideology Detection for Twitter Users with Heterogeneous Types of Links Yupeng Gu Ting Chen Yizhou Sun University of California, Los Angeles, CA {ypgu,tingchen,yzsun}@cs.ucla.edu ABSTRACT The problem of ideology detection is to study the latent (po- litical) placement for people, which is traditionally studied on politicians according to their voting behaviors. Recently, more and more studies begin to address the ideology detec- tion problem for ordinary users based on their online behav- iors that can be captured by social media, e.g., Twitter. As far as we are concerned, however, the vast majority of the ex- isting methods on ideology detection on social media have oversimplified the problem as a binary classification prob- lem (i.e., liberal vs. conservative). Moreover, though social links can play a critical role in deciding one's ideology, most of the existing work ignores the heterogeneous types of links in social media. In this paper we propose to detect numer- ical ideology positions for Twitter users, according to their follow, mention, and retweet links to a selected set of politi- cians. A unified probabilistic model is proposed that can (1) explain the reasons why links are built among people in terms of their ideology, (2) integrate heterogeneous types of links together in determining people's ideology, and (3) automatically learn the quality of each type of links in de- ciding one's ideology. Experiments have demonstrated the advantages of our model in terms of both ranking and politi- cal leaning classification accuracy. It is shown that (1) using multiple types of links is better than using any single type of links alone to determine one's ideology, and (2) our model is even more superior than baselines when dealing with people that are sparsely linked in one type of links. We also show that the detected ideology for Twitter users aligns with our intuition quite well. Keywords Ideology detection, heterogeneous network, social network analysis 1. INTRODUCTION Ideology detection, i.e., ideal point estimation, dates back to early 1980s, where political scientists first cast light on 6 1 0 2 c e D 4 2 ] I S . s c [ 1 v 7 0 2 8 0 . 2 1 6 1 : v i X r a ACM ISBN 978-1-4503-2138-9. DOI: 10.1145/1235 Bingyu Wang Northeastern University, Boston, MA [email protected] ways of revealing politicians' political affiliation using their roll call voting data [22]. Ideal points can be regarded as em- beddings of political figures into a latent Euclidean space, and the positions are good representations of their political ideologies. Decades later, the estimation of ideal points has attracted interest from the computer science domain. Re- searchers begin to use more complicated, statistical models to conduct the estimation on roll call data [7, 8, 12]. Recently, more and more studies pay attention to ideol- ogy detection for users on social media, which captures rich information for ordinary citizens in addition to political fig- ures. For example, based on text information, topic models and sentiment analysis approaches are utilized to classify users based on their opinions on different topics [21, 10], and sometimes text features are directly fed into standard classification models such as support vector machines and boosted decision trees to classify users' political affiliations [6, 25, 20]. Based on users' public profile information, such as marriage status, age and income, classifiers are trained to get users' ideology category [1]. Based on link information, various network-based methods are proposed to infer user's ideology [9, 27, 26, 29, 2]. However, there are two major limitations of the existing literature. First, most of these approaches oversimplify the ideology detection problem as a binary classification prob- lem, i.e., classify people as liberal or conservative, ignoring the fact that people's ideology lies in a very broad spectrum. For example, from our estimations in Fig. 1 we can see that Anderson Cooper (@andersoncooper) is almost in the mid- dle and only a little bit to the left, while Rachel Maddow (@maddow) is much more liberal. Second, despite the suc- cessful utilization of link information in determining one's ideology, most of the works ignore the heterogeneous link types in social media, which leads to significant information loss. As shown in Fig. 1, by looking only at the follow links, there is no way to differentiate the ideology between Rachel Maddow (@maddow) and Megyn Kelly (@megynkelly); how- ever from their retweet links, it is quite clear the two have very different ideology. Take Glenn Greenwald (@ggreen- wald) as another example: he has equal number of links to Barack Obama (@BarackObama) and Rand Paul (@Rand- Paul) in our network. Only by knowing retweet is a more im- portant link type than follow, we are able to predict Green- wald's ideology as liberal. It requires a model that can inte- grate various link types (i.e., relations) and assign them with different weights to provide a better overall ideology estima- tion. Admittedly, we may pre-define weights on different link types so as to obtain an integrated weighted graph, but it either requires strong domain knowledge on defining the link weights, or takes huge amount of time to do multi- ple rounds of training and select the set of weights with the best held-out performance, which makes it infeasible for real world networks. Figure 1: An illustration of ideology detection prob- lem in Twitter network. In this paper, we propose a unified probabilistic model, ML-IPM (Multi-Link Ideal Point Estimation Model), to de- tect numerical ideology positions for a subset of Twitter users, according to their follow, mention, and retweet links. Our approach has several advantages. First, it utilizes so- cial choice theory to explain the reasons why links are built among people in terms of their ideology. Second, it is able to combine heterogeneous types of links in determining people's ideology, with different weights for each link type. Third, the strength of each link type can be automatically learned ac- cording to the observed network. Experiments demonstrate the advantages of our model in terms of both ranking and political leaning prediction accuracy. It is shown that (1) using multiple types of links is better than using any single type of links alone to determine one's ideology, and (2) our model is even better than baselines when dealing with people that are sparsely linked in one type of links. We also show that the detected ideology for Twitter users aligns with our intuition quite well. The main contributions of our work are summarized as below: • We propose to detect numerical ideology for Twitter users using link information only. In particular, het- erogeneous types of links including follow, mention, and retweet are considered. • We propose a unified probabilistic model, ML-IPM, to solve the problem, which can (1) explain why links are built according to social choice theory and (2) consider different types of links by modeling their strength in determining one's ideology. • A scalable learning algorithm is provided to learn both the ideology of users and the strength of each link type. Experimental results on a Twitter subnetwork demon- strate the advantages of our model over the state-of- the-art approaches. 2. PRELIMINARIES AND PROBLEM DEF- INITION In this section, we introduce some preliminaries and define our problem. 2.1 Ideal Point / Ideology Ideal point (also known as political ideology) is a political term which indicates the political leaning of politicians and provides quantitative measures of congressmen across time [22, 23, 24]. It is a real-valued vector which refers to the po- sition on the political spectrum, a real line or a high dimen- sional space that symbolizes political dimensions. In U.S. people usually refer "left" as democracy or liberality, and "right" as conservatism. Therefore, in one dimensional case, a person whose ideal point is negative (left of the origin) is treated as liberal. The more negative a person's ideal point is, the more liberal he/she is considered to be. Ideology is believed to be an important measure of political behaviors, and ideology estimation is essential in many political science applications. 2.2 Problem Definition Before the definition of our problem, we first look at some vivid cases in order to motivate our work. Suppose P1 and P2 are two political parties in the following examples. Case 1. User U is a fan of politics and she is extremely interested in political news. Because politicians in P1 tweet more frequently and U wants to keep track of the latest news and policies, she decides to follow most of the politicians of party P1 but a small fraction of politicians in P2. However, most of her retweets come from people in P2, as she is more happy about their words and opinions. Given the follow and retweet links from U to these politicians, can we predict which party does she agree with more? More specifically, can we provide U's relative position among all the users that appeared in the network? Case 2. User V hates P1, and he will argue with politi- cians of P1 by mentioning them on Twitter to show his dis- pleasure. Sometimes he also mentions politicians in P2 to support their policies. As expected, V follows most politi- cians in P2, but few politicians in P1. In this scenario, can we predict that the position of V lies close to the positions of people in P2 on the political spectrum, based on the follow and mention links issued by him? In this work, we focus on the problem of ideology detection for Twitter users. Formally, given a heterogeneous Twitter subnetwork with R types of links (R = 3 in our case), our goal is to (1) learn the multidimensional ideology for all users presented in the network and (2) determine the strength of each type of links in the process of ideology detection, which can best explain the observed network. Although defined on Twitter network, our approach is very general to other social networks. 3. APPROACH In this section, we introduce our solution to the proposed problem. We start from ideology model under a single link type, then introduce how to extend the model when mul- tiple types of links exist, and finally introduce the learning algorithm. 3.1 Ideology Estimation Model via Single Link Type As in traditional ideal point models, each user has a po- sition in a K-dimensional space, which represents his/her ideology. For a politics-related network, ideology can help explain the reason for link generation, which is a reflection followmentionretweet@maddow@andersoncooper@megynkelly@BarackObama@RandPaulInput: a subset of Twitter networkIdeology@ggreenwaldOutput: Ideology & relation weights of people's online behaviors. Take follow link as an exam- ple: the proximity of two users' positions in the latent ideol- ogy space indicates a high probability that they have many politician friends (followees) in common, and vice versa. Be- cause Twitter users are free to follow anyone they like, we assume that each possible follow link from ui to vj is the outcome of ui's choice of following vj or not. Each choice corresponds to a utility function which measures a user's preference over the two choices. Rational users are expected to make the decision that maximizes their utility. Intuitively, the utility function should consider the distance between the positions of two users in the latent ideology space, since peo- ple are more likely to follow others whose political opinions are close to themselves. We discuss why a link is formed from both the link-sender and link-receiver's points of view: The role of link-sender. From a link-sender's (say user ui) point of view, one has to make a choice on whether to follow user vj or not, which depends on the two utility functions defined on the two options. She will choose the option that maximizes her utility function, which is related to her ideology position pi ∈ RK . The role of link-receiver. From a link-receiver's (say user vj) point of view, each of them is associated with two placements, corresponding to the two options of whether she will receive a link from a link sender or not. We use ψj ∈ RK and ζj ∈ RK to denote the positions of the two placements, which can be observed by other users. We now define the utility functions for a user ui's choice of (1) "following" a target user vj (Ui(ψj)) and (2) not "fol- lowing" a target user j (Ui(ζj)), by extending the model in [5] to the scenario of social networks: Ui(ψj ) = ui(ψj ) + ηij , if ui follows vj Ui(ζj ) = ui(ζj ) + νij , if ui does not follow vj (1) where ui(ψj) = −pi − ψj2, ui(ζj) = −pi − ζj2, and ηij, νij are random noises drawn from the standard Gumbel distribution, which is commonly used in discrete choice the- ory [3]. In other words, the two utility functions are defined as the negative of squared distance function between user ui's ideology position and the positions of the two possible placements of user vj, plus a random noise. According to the utility functions, user ui will follow vj if Ui(ψj) > Ui(ζj). Using the same manipulation in [5], the probability that user ui decides to follow user vj is given by p(ui → vj ) = P (Ui(ψj ) > Ui(ζj )) = σ(pi · qj + bj ) (2) 1 where qj = 2(ψj − ζj), bj = ζj2 − ψj2 and σ(x) = 1+e−x is the sigmoid function. qj can be interpreted as the image of user vj viewed by others, and bj can be regarded as a bias term for vj. Usually we can only estimate qj and bj instead of ψj and ζj, and it is adequate since we are interested in the ideology pi and the probability of a link can be calculated based on qj and bj. After the probability of a directed link between two users is determined, we are able to write down the log-likelihood of observing a network G as l(G) = log I[i→j] ij σ (cid:16) (cid:89) (cid:88) (i,j) = log σij + (i,j):i→j (i,j):i(cid:57)j (1 − σij )1−I[i→j] (cid:88) log(1 − σij ) (3) (cid:17) where I[·] is the indicator function, i → j means there is a link from ui to vj, and i (cid:57) j means there are no links from ui to vj. Here σij is short for σ(pi · qj + bj) in Eq. 2. Obviously not every pair of people has a link in between. In fact, links in social networks are rather sparse. Therefore we will not go through every possible pair of links in the like- lihood above. Instead, we select all the existing links and sample the same number of non-existing links. We denote the set of existing links as S+ and the sampled set of non- existing links as S−. In addition, in the case where multiple links may exist between users (e.g., a user can mention an- other user several times), our model can be generalized by simply treating multiple links as multiple occurrences of a single edge. Suppose e+ ij is the number of links from ui to − ij is the number of sampled non-existing links from vj and e − ui to vj (typically e ij = 1), then the log-likelihood above becomes ij · log σij + e+ e− ij · log(1 − σij ) (4) (cid:88) l(G) = (i,j)∈S+ (cid:88) (i,j)∈S− 3.2 Ideology Estimation Model via Multiple Link Types We now address the challenge of utilizing multiple types of links for ideology detection. In a heterogeneous network, nodes can be connected via different types of relations. On Twitter, people can follow, mention or retweet others. It naturally forms three different types of links, and different link types certainly have different interpretations. In order to utilize the knowledge in the heterogeneous net- work across all kinds of relations, our ultimate model is a weighted combination of models using all types of links. Ac- cording to our previous assumption, a link-sender ui will have the same intrinsic ideal points pi across all link types. However we posit that the roles of link-receivers are differ- ent for different relations, as the images of users will change when observed by different types of behaviors. For example, ui can easily decide to follow vj but hesitates to retweet from vj. Therefore we use the same pi for user ui for all types of links, and modify ψj, ζj to ψ(r) j which are specific to the relation r. As a result, qj and bj will be changed to q(r) as well. In consideration of the heterogeneity j in different types of links, we also add a relation weight wr which represents the relative importance of the links in the corresponding relation type r. Besides, we will use the av- erage log likelihood of each link in each type of relation in order to balance the scale of different link types. j } and B = {b(r) j }, we define Denoting P = {pi}, Q = {q(r) and b(r) , ζ(r) j j our objective as l(GP , Q, B) (cid:80) (i,j)∈S (r) + wr · R(cid:88) r=1 = e+ r,ij log σr,ij + (cid:80) (cid:80) r,ij + (cid:80) (i,j)∈S e+ (r)− (i,j)∈S (r) + (i,j)∈S (r)− − r,ij e − r,ij log (1 − σr,ij ) e (5) where e+ r,ij is the number of existing links from ui to vj − r,ij is the number of sampled non-existing via relation r, e links from ui to vj via relation r and σr,ij = σ(pi · q(r) j + b(r) j ) for short. We will use these notations in the remain- ing of this section. The constraint we put on wr is wr > r=1 wr = 1, which forces the geomet- 0, r = 1,··· , R and(cid:81)R ric mean1 of w1,··· , wR to be 1. In the remaining of the pa- per we will use the R-dimensional vector w = (w1,··· , wR) to denote the vector of network weights. For succinctness, − r,ij, i.e., we will use Nr to denote (cid:80) r,ij + (cid:80) e+ e (i,j)∈S (r) + (i,j)∈S (r)− the total number of links in relation r. Identification. Because the probability in Eq. 2 involves the product of two sets of parameters, there would be an identifiability issue where the objective will be exactly the same if we multiply every pi by a non-zero constant c and divide every q(r) by the same constant. In other words we need to control the scale of model parameters P and Q. In our work we add an l2 regularization term on P and Q. We also add the same regularization on B to avoid overfitting. Therefore Eq. (5) becomes j l(GP , Q, B) (cid:80) r,ij log σr,ij + (cid:80) e+ − r,ij log (1 − σr,ij ) e (r)− (i,j)∈S R(cid:88) r=1 = − µ 2 (cid:16)(cid:80) wr · (i,j)∈S (r) + F + R(cid:88) (cid:0)P 2 (cid:17)1/2 r=1 Q(r)2 F + Nr b(r)2 2 (cid:1) R(cid:88) r=1 Here ·F denotes the Frobenius norm of a matrix: AF = and µ > 0 is a parameter that controls the m,n A2 mn (6) effect of regularization terms. 3.3 Optimization We propose a two-step algorithm to optimize the model parameters. The first step is updating w fixing all other parameters. The second step is updating P , Q, B given w. The two steps will run iteratively until convergence. Update w. Fortunately we are able to find a closed form solution for network weights {wr}R r=1. Maximizing the ob- jective function (Eq. 6) w.r.t wr is equivalent to minimizing J(w) = where (cid:80) (i,j)∈S (r) + Lr = − R(cid:88) r=1 wr · Lr R(cid:88) r,ij log σr,ij + (cid:80) s.t. r=1 e+ (i,j)∈S (r)− Nr log wr = 0 (7) e− r,ij log (1 − σr,ij ) > 0 (8) is a constant with respect to wr, which can be considered as the loss function associated with relation r. We can find the optimal value of wr by setting the derivative of Lagrangian w.r.t. wr to zero, which leads to (9) (10) and wr = ((cid:81)R r=1 Lr)1/R , ∀r = 1, · · · , R Lr The value of wr in each round can be interpreted as the geometric mean of the loss for all link types divided by the loss for link type r. Intuitively, in order to minimize the ob- jective function, we should assign small weights to relations with big loss (Lr), namely smaller average log likelihood. In 1The w1,··· , wR is given by ((cid:81)R several positive variables geometric mean of r=1 wr)1/R. (cid:17)1/R (cid:16) R(cid:89) r=1 λ = Lr other words, we will assign a big weight to a relation that is consistent with the current model (i.e., with a big average log likelihood function), which agrees with our intuition. Update P , Q, B. Given w, all other parameters are up- dated using gradient ascent algorithm. ity of updating w is O(K ·(cid:80)R requires O(K ·(cid:80)R Time complexity. In each iteration the time complex- r=1 Nr), and updating P , Q, B r=1 Nr)operations as well, where K is the dimension of the ideology vector. Therefore the time com- plexity of our model is linear to the number of edges in the network in particular. Hence, our proposed algorithm is ef- ficient and can be scaled to large networks. 4. EXPERIMENTS In this section we will show the experimental results based on a subset of Twitter network. We will first introduce how to construct the subnetwork. Then we will compare our method with several baselines, in terms of both ranking ac- curacy and political leaning classification. Finally, we con- duct extensive case studies to show the estimated ideology is meaningful and agrees with our intuition very well. 4.1 Data Preparation In order to prepare our dataset, we start from politicians and track the users that are connected to them. We first collect the list of all the members of the 113th U.S. congress (2013-2015). We manually search their names on Twitter and match a name to an account if the account is verified and we have enough confidence to show he/she is the corre- sponding congressman/congresswoman. This step will pro- vide us a list of 487 politicians. We then use Twitter's streaming API and REST API to collect their followees and followers. In consideration of ef- ficiency, we collect at most 5,000 followers and followees for every congressman. On one hand, in order to select politics- related users, we set a threshold t = 20 where we only keep users who follow at least t congressmen or are followed by at least t congressmen. These accounts are likely to be en- thusiastic about political issues. On the other hand, we also include around 10,000 random users who follow 3∼5 politi- cians to include more peripheral (less politics-related) Twit- ter users. Our approach will be evaluated on this Twitter subnetwork with these users as vertices. There are various reasons apart from ideology why peo- ple interact with each other on Twitter, such as they know each other in real life. Therefore, preparing the set of link- receivers is crucial in that the decision to follow them or not should reveal other users' political interests. In order to al- leviate the effect of random factors in our model, we restrict the set of link-receivers to be U.S. congress members; in other words, the social links between two ordinary citizens will not be taken into consideration. This strategy allows us to minimize other social factors behind link generation in our model, and it will make our model more accurate. Here is how we construct the social network for different relations: for follow link type, we will add an edge from ui to vj to the network if a user ui follows a politician vj. For mention and retweet link types, we collect part2 of recent tweets for all the users. If ui posts a tweet which men- tions/retweets from a politician vj, we add an edge from 2At most 3,200 tweets for each user are available due to API limits. ui to vj to the mention/retweet network. If a user does not mention (retweet from) any politician, he/she will be an isolated node and we will simply remove the user from the corresponding network. Note that in contrast to the follow links, a user can mention or retweet another user for multi- ple times. In this case we simply assume multiple edges exist between them, as discussed in Section 3.1. More details of our dataset can be found in Table 1. Relation Number of links Total number of users follow 1,764,956 46,477 mention 2,395,813 34,775 retweet 718,124 30,990 Table 1: Statistics for Twitter Dataset 4.2 Performance Evaluation 4.2.1 Baseline Methods We compare our Multiple Link Types Ideal Point Estima- tion Model (ML-IPM) with the following baseline methods: • The simplest baseline where the ideology of a user is the average score of her outgoing neighbors. Each Re- publican is assigned an ideology score of 1, and each Democrat is assigned a score of -1. We denote this baseline method as AVER. • The Bayesian Ideal Point Estimation Model (B-IPM) [2] to be introduced in Section 5. Although the author does not mention their generalization to relations other than follow, we adopt the model for other types of links for comparison. • Our Single Link Type Ideal Point Estimation Model (SL-IPM) where only one type of link is present in the social network, as introduced in Section 3.1. • A special case of our model ML-IPM where the weights for different types of links are fixed (ML-IPM-fixed). In this case the weights for different link types are uni- formly distributed, namely w1 = w2 = ··· = wR = 1. The research problem in [27] is also similar to our task (with single link type), however their approach is not scal- able to the size of our dataset (the time complexity is O(n2) for each iteration, where n is the number of users). There- fore we will not consider their method for comparison. 4.2.2 Evaluation Measures In our experiments, we will evaluate the ranking and clas- sification accuracy to demonstrate the effectiveness of our ideal point estimation model. Ranking. In order to evaluate the effect of continuous ideology, we design the ranking evaluation based on 100 manually labeled users, with integer labels from 1 (most liberal) to 5 (most conservative). Here we evaluate the pair- wise accuracy between Twitter users, where a pair of users is considered correct if the order of their 1-dimensional ide- ologies aligns with the order of manual labels (for example, a pair of users (ua, ub) where ua is labeled as "1" and has an ideology of −0.9, and ub is labeled as "4" and has an ideology of 0.2). We use five different sets of random initialization for the model parameters, and report the mean and standard deviation on a total of 3,857 pairs of users. Classification. In the classification task, we will clas- sify users as liberal or conservative based on the ideology we have inferred from the dataset. To obtain the ground truth of some users in our dataset, we crawl congress peo- ple's party affiliation from the Internet (which is open to public). In addition, we collect the political bias for 100 pop- ular newspaper accounts3, and we also take advantage of the labeled users in our previous task. These multi-dimensional ideal points are used to train a logistic regression classifier. The classification performance is measured by the Area Un- der ROC Curve (AUC), and is averaged over 10 different runs by sampling different training data. For all the experi- ments, we use five different sets of random initialization for the model parameters. Method Ranking Accuracy Classification AUC AVER (follow ) AVER (mention) AVER (retweet) B-IPM (follow ) B-IPM (mention) B-IPM (retweet) SL-IPM (follow ) SL-IPM (mention) SL-IPM (retweet) ML-IPM-fixed ML-IPM 0.427 0.446 0.474 0.443 ± 0.102 0.433 ± 0.183 0.501 ± 0.127 0.626 ± 0.011 0.623 ± 0.027 0.637 ± 0.005 0.655 ± 0.008 0.663 ± 0.007 0.523 0.558 0.587 0.868 ± 0.021 0.558 ± 0.064 0.561 ± 0.066 0.953 ± 0.015 0.951 ± 0.018 0.958 ± 0.005 0.930 ± 0.035 0.986 ± 0.013 Table 2: Experimental Results Discussion. We report the ranking accuracy and classifi- cation AUC in Table 2, where the relation in the bracket rep- resents the type of link used in the corresponding method. From the above table we can see our advantage over the baseline methods in terms of user ranking and classification accuracy. The comparison on a single link type between our approach (rows 7-9) and existing work (rows 1-3,4-6) illus- trates our considerable improvement for both tasks. Nev- ertheless, information from a single network may not be adequate in determining one's ideology: people may follow well-known political figures for reasons other than political proximity, and it is not rare that a user keeps criticizing oth- ers by mentioning them, or retweets ironically. Therefore, integrating heterogeneous types of links becomes necessary, and the results are always better if we automatically update the weight for each link type (rows 10-11). In addition, our method is not sensitive to initialization as the standard de- viation is small (row 11). In sum, our learned ideology has a higher quality when we combine heterogeneous types of links together, with learned weights of all link types. 4.2.3 Cold-start Problem Cold start problem is known as the issue in a system where the inference for users without sufficient information will suffer. Our unified approach is also able to tackle the cold- start problem by integrating knowledge from other types of links: users that are sparsely linked by one type of link may be active in other networks. Thus we are able to have a significantly better understanding of the users by utilizing all types of links. 3Source: usatop100.html http://www.mondotimes.com/newspapers/usa/ To prepare the candidate users, we select all users whose number of outgoing links is less than or equal to a given threshold in the training dataset, and we use classification AUC (as in previous subsection) and link prediction as eval- uation measures. In the link prediction task, we observe some social links in the network and predict a set of unob- served links of the same type. In the experiments, we also use five different initializations and 90% of the links (both existing and non-existing) are chosen uniformly at random as training. For the baseline method AVER, we simply de- fine the probability of a link using a modified version of Eq. 2 without bias. In Fig. 2 we compare our unified ML-IPM model (in solid red line) with (1) our model where weights are fixed (in regular dashed green line); (2) SL-IPM (in dot- ted blue line); (3) B-IPM (in dash-dotted black line); and (4) AVER (in bold dashed magenta line). We can see our unified approach is the best among all baseline methods, especially when the users are extremely sparsely linked. 4.2.4 Parameter Study Here we study how ideology dimension K affects our model. The effect of K is shown in Table 3. Our method is not sen- sitive to the choice of K, and the best K should be around 5. For above approaches and experiments, we use K = 5 as the dimension of ideology, if not mentioned otherwise. Dimension K 1 3 5 7 Classification AUC 0.979 0.981 0.986 0.977 Table 3: Effect of ideology dimension 4.3 Case Studies We will analyze the relation weights w = {wr} and visu- alize Twitter users' ideology in this subsection. It is interesting to study the relative weights w for dif- ferent types of links. Intuitively, a larger wr implies the relation r is more important in our task. The automatically learned weights are shown in Table 4. We can observe the weight for retweet is the highest among all types of links, while the weight for follow is the lowest. This is reasonable as following someone on social network is common and does not stand for a very close relationship. For the other two relations, a retweet is likely to show the endorsement of the author of the original tweet; on the other hand, people are free to mention anybody and this behavior might indicate ei- ther pleasant or hostility. Therefore mention behaviors may not indicate a strong homophily as retweet does. In sum, a larger weight represents the significance of the corresponding source of information, and for the specific task of detecting Twitter users' ideology based on their social links, retweet is the most crucial relation among all kinds of relations. Relation r Weight wr follow mention 0.866 1.035 retweet 1.117 Table 4: Weights of different link types To further demonstrate the meaning of our learned weights, we randomly add 1,000,000 links between pairs of Twitter user and politician to our dataset. We denote this type of link as "random" and apply our model to the heterogeneous network with four relations (follow, mention, retweet and random). As a result, the weights of four types of links become 1.02, 1.23, 1.33, 0.59, respectively. The random re- lation has the least importance score, and the trend of other three relations agrees with our previous result. This result shows our model is robust against noise and the learned weights reflect the importance of relations quite well. (a) Ideology distribution for core users (b) Ideology distribution for peripheral users Figure 4: Ideology Distribution In the remaining of this section we will visualize the latent ideology position of Twitter users. For visualization pur- poses we use K = 1 in all figures below. Fig. 4 shows the distribution of ideology for all Twitter users in our dataset. We can observe three peaks around x = −0.5, x = 0 and x = 0.5 in Fig. 4(a), which represent the three clusters of liberal, neutral and conservative users respectively. Most of the users with less political interests (Fig. 4(b)) will stay in the middle and form only one cluster. The statistics are rea- sonable because the distribution of peripheral users is more similar to the public, who are distributed more uniformly along the political spectrum. It is noteworthy that Twitter users are a biased sample of the public: they may be younger and more active on the Internet. Therefore skewness in our detected ideology may exist. Twitter users may also indicate their locations on their personal profiles. We collect all users in our dataset who claim themselves to live in one of the 50 states in the U.S. (or Washington, D.C.), and calculate the average ideology for each area. Then we are able to map the average score to a color between red and blue. As a result, 9,362 users are identified and 29 states are labeled as red (conservative), as shown in Fig. 5. Note that our colored map may differ from political polls or election results, given the population of Twitter users and the sample variance in the dataset. In Fig. 6, we also visualize the ideology for some popular media, magazine, newspaper accounts and a few political figures including president Barack Obama, Hillary Clinton and Donald Trump, the two presidential candidates in 20164 and so on. The length of each line (x-axis) represents the value of our detected ideology. The text on the y-axis de- notes their Twitter screen name, and the color represents the political leaning provided by Mondo Times5: red rep- 4The ideology for Hillary Clinton and Donald Trump is es- timated based on their most recent tweets and friends. 5http://www.mondotimes.com/, a worldwide news media mention network retweet network Figure 2: Classification AUC for sparsely linked users in different types of networks. mention network retweet network Figure 3: Link prediction AUC for sparsely linked users in different types of networks. It is also worth analyzing the obvious exceptions in the re- sults. Opposite to the label provided by Mondo Times, Wall Street Journal (WSJ) is considered as a media source leaning to the left in our study. When we investigate the social links of WSJ in our dataset, we find its links to politicians from two parties are balanced. Besides, our estimation refers to only the behaviors of their Twitter account (i.e. whom they follow/mention/retweet) instead of the editorial contents of the journal itself. This mainly explains the reason why our algorithm does not label it as a conservative account. Inter- estingly, WSJ is shown to be one of the most liberal online media outlets in some other studies [11, 27, 17]. 5. RELATED WORK 5.1 Ideology Detection in Roll Call Voting Data Ideal point models attempt to estimate the position of each lawmaker in the latent political space. Legislative vot- ing is one of the sources for quantitative estimation of law- makers' ideal points. Poole and Rosenthal [22] were among the first few researchers in political science domain to pro- vide a thorough and rigorous approach for ideology estima- tion. Afterwards, political scientists have proposed numer- ous methods to infer political ideology from roll call voting records [23, 13, 24, 16, 15, 5]. Researchers study the pub- lic voting record of lawmakers and model the probability of each vote, which is usually described as the interaction of the lawmaker's ideal point and the position of the bill. Along this line of research, computer science researchers extend the ideal point model to a variety of aspects, including applying Figure 5: Average ideology for Twitter users in each state. Darker red means more conservative, while darker blue means more liberal. resents a conservative account; blue stands for a liberal ac- count; and black represents an account with no bias. From this vivid example we can see the position of those accounts on a unidimensional spectrum, and we are able to compare them with politicians. Again, there may be slight difference between the detected ideology and the actual political lean- ing, as the ideology is detected according to the behavior of these Twitter accounts instead of the editorial content. directory. 23456789Threshold (degree in the training dataset)0.30.40.50.60.70.80.91.0Classification AUCML-IPMML-IPM-fixedSL-IPM (mention)B-IPM (mention)AVER (mention)23456789Threshold (degree in the training dataset)0.30.40.50.60.70.80.91.0Classification AUCML-IPMML-IPM-fixedSL-IPM (retweet)B-IPM (retweet)AVER (retweet)01234567Threshold (degree in the training dataset)0.450.500.550.600.650.700.750.800.85Link Prediction AUCML-IPMML-IPM-fixedSL-IPM (mention)B-IPM (mention)AVER (mention)01234567Threshold (degree in the training dataset)0.450.500.550.600.650.700.750.800.85Link Prediction AUCML-IPMML-IPM-fixedSL-IPM (retweet)B-IPM (retweet)AVER (retweet) measure of ideology is often desired for real world applica- tions and our goal in the paper is to detect real-valued ideal points for users in social networks, those classification and clustering methods cannot be directly applied in our task. With respect to the work on estimating continuous polit- ical ideology, researchers have been mining the rich infor- mation in network structures to obtain an accurate ideology score for users on social networks. Typically, inference of a user's ideal point is made by exploring her neighbors and her relationship with labeled users (such as politicians whose party affiliation is clearly known to the public). Therefore, a simple yet intuitive approach would be calculating the ratio of the number of Democrats and Republicans that a user follows on the social network [9]. Wong et al. [27, 26] as- sume liberal people tend to tweet more about liberal events and the same for conservative users. Given the political leaning of social events by labeling associated tweets, they are able to infer the ideology of users who have engaged. Barber´a [2] proposes a probabilistic model to describe the likelihood of the social network, in which the probability to observe a link between two users is defined as a func- tion of their ideal points. Although most of the existing methods have utilized the homophily phenomenon [18, 28] in network generation and made appropriate assumptions of the network structure, they neglect the fact that most so- cial networks contain multiple types of interactions between people. Those methods fail to define how close two nodes are when different link types are present. Although experts can pre-define weights for different link types, it is almost impossible to exhaustively list all possible combinations of link weights given the scale of real world data. Moreover, ex- periments show that the performance of existing approaches will suffer when a user is sparsely linked to others. Our ap- proach, on the other hand, is able to automatically learn the weights for different types of links according to the network structure and determine how important each link type is in an ideology detection task. The cold start problem is also overcome by transferring information learned from one type of link to other link types. 6. CONCLUSION AND FUTURE WORK In this paper we present a novel approach for ideology detection on Twitter using heterogeneous types of links. In- stead of predicting binary party affiliations to users, our work focuses on detecting the continuous ideal points for Twitter users, which is more comprehensive. In addition, we improve over traditional ideology estimation models by inte- grating information from heterogeneous link types in social networks. Specifically, our model is able to automatically update the importance scores of various relations on Twit- ter, and these weights are incorporated in the unified frame- work to achieve an outstanding performance. Moreover, our algorithm has an even better performance for sparsely linked users in separate networks. Finally, we evaluate our model on a subnetwork of Twitter, and the results show our advan- tage over the baseline methods. Extensive case studies also demonstrate our model's alignment with human intuitions. One limitation of this work is that we only take links into consideration when deciding one's ideology. In the future, we plan to integrate other content information, such as text, into the current framework, to better understand people's ideology. Figure 6: One dimensional users. Red: conservative; Blue: bias. Color labels are provided by Mondo Times. ideology for selected liberal; Black: no natural language processing and topic modeling techniques on bills [7, 8, 12, 14, 19]. 5.2 Ideology Detection in Social Networks Apart from voting data, recently some approaches have been using information from social networks to analyze user's political leaning. These approaches can be further grouped into two categories according to the task they are dealing with: classification/clustering and continuous ideology es- timation. Classification and clustering tasks predict which political party a user belongs to (or congregate users into several clusters), and can be handled from various aspects. When users interact with each other via messages, especially when they have discussions or arguments, methods from nat- ural language processing can be applied to analyze the topics and people's sentiment. Pla and Hurtado [21] analyze users' tweets on Twitter, extract features such as hashtags and punctuations, and determine the polarity of a tweet, and a user's political leaning is simply a weighted average of her tweets. Boutet et al. [4] analyze the characteristics of three main parties in UK election, and predict which party a user supports by the amount of Twitter messages referring to po- litical accounts. Based on debate records on various political topics, Gottipati et al. [10] adopt a matrix factorization ap- proach to discover users' attitudes towards different political issues, and use k-means on the user feature vector to con- gregate users into several clusters. Some researchers extract text features such as hashtags and latent semantic analysis of a conversion and feed them into a standard classifier in order to classify users [25, 6, 20]. Users' public profile in- formation (such as marriage status, age et al.) can also be utilized as inputs of classification models [1]. However, apart from classification tasks, it is also important to make infer- ence about the continuous ideal points, which can be applied to rank ordering and demonstrate the relative difference be- tween people in the same political party. Since a continuous 1.00.50.00.51.0Ideology@RepSamFarr@repdonnaedwards@PeterWelch@HillaryClinton@latimes@YahooNews@washingtonpost@MSNBC@BarackObama@CBSNews@ProPublica@WSJ@cspan@Newsweek@npr@ABC@politico@HuffingtonPost@USATODAY@ForeignPolicy@Forbes@CNN@CNBC@time@usnews@realDonaldTrump@FoxNews@WashTimes@RandPaul@Newsmax_Media@RepTrentFranks@SteveScalise 7. REFERENCES [1] F. Al Zamal, W. Liu, and D. Ruths. Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors. ICWSM, 270, 2012. [2] P. Barber´a. Birds of the same feather tweet together: Bayesian ideal point estimation using twitter data. Political Analysis, 23(1):76–91, 2015. [3] M. E. Ben-Akiva and S. R. Lerman. Discrete choice analysis: theory and application to travel demand, volume 9. MIT press, 1985. [4] A. Boutet, H. Kim, E. Yoneki, et al. What's in your tweets? i know who you supported in the uk 2010 general election. In ICWSM, 2012. [5] J. Clinton, S. Jackman, and D. Rivers. The statistical analysis of roll call data. American Political Science Review, 98(02):355–370, 2004. [6] M. D. Conover, B. Gon¸calves, J. Ratkiewicz, A. Flammini, and F. Menczer. Predicting the political alignment of twitter users. In Privacy, Security, Risk and Trust and 2011 IEEE Third Int. Conf. on Social Computing, pages 192–199. IEEE, 2011. [18] M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual review of sociology, pages 415–444, 2001. [19] V.-A. Nguyen, J. Boyd-Graber, P. Resnik, and K. Miler. Tea party in the house: A hierarchical ideal point topic model and its application to republican legislators in the 112th congress. In Proc. of ACL, 2015. [20] M. Pennacchiotti and A.-M. Popescu. A machine learning approach to twitter user classification. ICWSM, 11:281–288, 2011. [21] F. Pla and L. Hurtado. Political tendency identification in twitter using sentiment analysis techniques. In Proceedings of COLING, pages 183–192, 2014. [22] K. T. Poole and H. Rosenthal. A spatial model for legislative roll call analysis. American Journal of Political Science, pages 357–384, 1985. [23] K. T. Poole and H. Rosenthal. Patterns of congressional voting. American Journal of Political Science, 35(1):pp. 228–278, 1991. [7] S. Gerrish and D. M. Blei. Predicting legislative roll [24] K. T. Poole and H. Rosenthal. Congress: A calls from text. In Proc. of the 28th Int. Conf. on Machine Learning (ICML'11), pages 489–496, 2011. [8] S. Gerrish and D. M. Blei. How they vote: Issue-adjusted models of legislative behavior. In Advances in Neural Information Processing Systems (NIPS'12), pages 2762–2770, 2012. [9] J. Golbeck and D. Hansen. Computing political preference among twitter followers. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1105–1108. ACM, 2011. Political-Economic History of Roll Call Voting. Oxford University Press, 1997. [25] D. Rao, D. Yarowsky, A. Shreevats, and M. Gupta. Classifying latent user attributes in twitter. In Proc. of the 2nd Int. workshop on Search and mining user-generated contents, pages 37–44. ACM, 2010. [26] F. Wong, C. W. Tan, S. Sen, and M. Chiang. Media, pundits and the us presidential election: Quantifying political leanings from tweets. In Proc. of the Int. Conf. on Weblogs and Social Media, 2013. [10] S. Gottipati, M. Qiu, L. Yang, F. Zhu, and J. Jiang. [27] F. M. F. Wong, C. W. Tan, S. Sen, and M. Chiang. Quantifying political leaning from tweets and retweets. In ICWSM, 2013. [28] S. Wu, J. M. Hofman, W. A. Mason, and D. J. Watts. Who says what to whom on twitter. In Proc. of the 20th Int. Conf. on World wide web, pages 705–714. ACM, 2011. [29] D. X. Zhou, P. Resnick, and Q. Mei. Classifying the political leaning of news articles and users from user votes. In ICWSM, 2011. Predicting user's political party using ideological stances. In Social Informatics, pages 177–191. Springer, 2013. [11] T. Groseclose and J. Milyo. A measure of media bias. The Quarterly Journal of Economics, pages 1191–1237, 2005. [12] Y. Gu, Y. Sun, N. Jiang, B. Wang, and T. Chen. Topic-factorized ideal point estimation model for legislative voting network. In Proceedings of the 20th Int. Conf. on Knowledge discovery and data mining (KDD'14), pages 183–192, 2014. [13] J. J. Heckman and J. M. Snyder Jr. Linear probability models of the demand for attributes with an empirical application to estimating the preferences of legislators. Technical report, National Bureau of Economic Research, 1996. [14] M. Iyyer, P. Enns, J. Boyd-Graber, and P. Resnik. Political ideology detection using recursive neural networks. In Association for Computational Linguistics, 2014. [15] S. Jackman. Multidimensional analysis of roll call data via bayesian simulation: identification, estimation, inference, and model checking. Political Analysis, 9(3):227–241, 2001. [16] J. Londregan. Estimating legislators' preferred points. Political Analysis, 8(1):35–56, 1999. [17] J. R. Lott Jr and K. A. Hassett. Is newspaper coverage of economic events politically biased? Public Choice, 160(1-2):65–108, 2014.
1104.4418
2
1104
2011-10-27T16:31:49
Internal links and pairs as a new tool for the analysis of bipartite complex networks
[ "cs.SI", "physics.soc-ph" ]
Many real-world complex networks are best modeled as bipartite (or 2-mode) graphs, where nodes are divided into two sets with links connecting one side to the other. However, there is currently a lack of methods to analyze properly such graphs as most existing measures and methods are suited to classical graphs. A usual but limited approach consists in deriving 1-mode graphs (called projections) from the underlying bipartite structure, though it causes important loss of information and data storage issues. We introduce here internal links and pairs as a new notion useful for such analysis: it gives insights on the information lost by projecting the bipartite graph. We illustrate the relevance of theses concepts on several real-world instances illustrating how it enables to discriminate behaviors among various cases when we compare them to a benchmark of random networks. Then, we show that we can draw benefit from this concept for both modeling complex networks and storing them in a compact format.
cs.SI
cs
Internal links and pairs as a new tool for the analysis of bipartite complex networks Oussama Allali, Lionel Tabourier, Cl´emence Magnien and Matthieu Latapy LIP6, Universit´e Pierre et Marie Curie, 4 Place Jussieu, F-75252 Paris, France [email protected] Abstract Many real-world complex networks are best modeled as bipartite (or 2-mode) graphs, where nodes are divided into two sets with links connecting one side to the other. However, there is cur- rently a lack of methods to analyze properly such graphs as most existing measures and methods are suited to classical graphs. A usual but limited approach consists in deriving 1-mode graphs (called projections) from the underlying bipartite structure, though it causes important loss of information and data storage issues. We introduce here internal links and pairs as a new notion useful for such analysis: it gives insights on the information lost by projecting the bipartite graph. We illustrate the relevance of theses concepts on several real-world instances illustrating how it enables to discrim- inate behaviors among various cases when we compare them to a benchmark of random networks. Then, we show that we can draw benefit from this concept for both modeling complex networks and storing them in a compact format. 1 Introduction Many real-world networks have a natural bipartite (or 2-mode) structure and so are best modeled by bipartite graphs: two kinds of nodes coexist and links are between nodes of different kinds only. Typical examples include biological networks in which proteins are involved in biochemical reactions, occur- rence of words in sentences of a book, authoring of scientific papers, file-provider graphs where each file is connected to the individuals providing it, and many social networks where people are members of groups like directory boards. See [Newman et al. 2001, Latapy et al. 2008] for more examples. The classical approach for studying such graphs is to turn them into classical (non-bipartite) graphs using the notion of projection: considering only one of the two types of nodes and linking any two nodes if they share a neighbor in the bipartite graph. This leads for instance to cooccurrence graphs, where two words are linked if they appear in a same sentence, coauthoring graphs, where two researchers are linked if they are authors of a same paper, interest graphs where individuals are linked together if they provide a same file, etc. This approach however has severe drawbacks [Latapy et al. 2008]. In particular, it leads to huge pro- jected graphs, and much information is lost in the projection. There is therefore much interest in methods that would make it possible to study bipartite graphs directly, without resorting to projection. Despite previous efforts to develop such methods [Lind et al. 2005, Latapy et al. 2008, Zweig et al. 2011], much remains to be done in this direction. We propose in this paper a new notion, namely internal links and pairs, useful for the analysis of real-world bipartite graphs. We introduce it in Section 2, then present some datasets in Section 3 that we use as typical real-world cases which we analyze in Section 4 with regard to our new notion. We explore a more algorithmic perspective in Section 5. 1 2 Internal pairs and links Let us consider a bipartite graph G = (⊥, ⊤,E), with E ⊆ ⊥ × ⊤. We call nodes in ⊥ (resp. ⊤) the bottom (resp. top) nodes. We denote by N(u) = {v ∈ (⊥ ∪ ⊤), (u,v) ∈ E} the neighborhood of any node u. We extend this notation to any set S of nodes as follows: N(S) = ∪v∈SN(v). The ⊥-projection of G is the graph G⊥ = (⊥,E⊥) in which (u,v) ∈ E⊥ if u and v have at least one neighbor in common (in G): N(u) ∩ N(v) 6= /0. We will denote by N⊥(u) the neighborhood of a node u in G⊥: N⊥(u) = {v ∈ ⊥, (u,v) ∈ E⊥} = N(N(u)). The ⊤-projection G⊤ is defined dually. For any pair of nodes (u,v) /∈ E, we denote by G + (u,v) the graph G′ = (⊥, ⊤,E ∪ {(u,v)}) obtained by adding the new link (u,v) to G. For any link (u,v) ∈ E, we denote by G − (u,v) the graph G′ = (⊥, ⊤,E \ {(u,v)}) obtained by removing link (u,v) from G. Definition 1 (internal pairs) A pair of nodes (u,v) with (u,v) /∈ E is a ⊥-internal pair of G if the ⊥- projection of G′ = G + (u,v) is identical to the one of G. We define ⊤-internal pairs dually. i j k l i j k l C A B C G D E A C B D G′ = G + (B,l) E A D E B G′ ⊥ = G⊥ Figure 1: Example of ⊥-internal pair. Left to right: a bipartite graph G, the bipartite graph G′ obtained by adding link (B,l) to G, and the ⊥-projection of these two graphs. As G′ ⊥ = G⊥, (B,l) is a ⊥-internal pair of G. Definition 2 (internal links) A link (u,v) ∈ E is a ⊥-internal link of G if the ⊥-projection of G′ = G − (u,v) is identical to the one of G. We define ⊤-internal links dually. i j k i j k C A B C G D E A C B D G′ = G − (B, j) E A D E B G′ ⊥ = G⊥ Figure 2: Example of ⊥-internal link. Left to right: a bipartite graph G, the bipartite graph G′ obtained by removing link (B, j) from G, and the ⊥-projection of these two graphs. As G′ ⊥ = G⊥, (B, j) is a ⊥-internal link of G. In other words, (u,v) is a ⊥-internal pair of G if adding the new link (u,v) to G does not change its ⊥-projection; it is a ⊥-internal link if removing link (u,v) from G does not change its ⊥-projection. See Figure 1 and 2 for examples. The notion of internal link is related to the redundancy of a node [Latapy et al. 2008], defined for any node v as the fraction of pairs in N(v) that are still linked together in the projection of the graph G′ obtained from G by removing v and all its links (all these pairs are linked in G⊥). There is however no direct equivalence between the two notions. The redundancy is a node-oriented property: it gives a value for each node, while the notion of internal links and pairs is link-oriented. As illustrated on Figure 3, nodes exhibiting the same fraction of internal links may have different redundancies, and conversely 2 two nodes having the same redundancy may correspond to different internal connectivity patterns. It is possible to classify the links of each node as ⊥ and ⊤-internal or not; this induces a notion of ⊥-internal degree of a node (resp. ⊤-internal degree), which is its number of internal links (see next section). i j k l m n o A B C D E F Figure 3: Redundancy versus internal links. In this graph, B and D have the same fraction of ⊥-internal links ( 2 3 ) while having different redundancies (resp. 1 3 and 2 15). We now give a characterization of internal links, which does not explicitly rely on the projection anymore and provides another point of view on this notion. Lemma 1 A link (u,v) of G is ⊥-internal if and only if N(v) \ {u} ⊆ N(N(u) \ {v}). Proof: Let us consider a link (u,v) ∈ E and let G′ = G − (u,v) be the bipartite graph obtained by removing the link (u,v) from G. Then, by definition, E⊥ = E ′ ⊥ ∪ {(u,x), x ∈ N(v) \ {u}}. Suppose that (u,v) is a ⊥-internal link, i.e. E⊥ = E ′ ⊥. Then all links (u,x) in the expression above already belong to E ′ ⊥. Therefore, for each x ∈ N(v) \ {u}, ∃ y 6= v ∈ ⊤ such that y ∈ N(u) ∩ N(x). By symmetry, x ∈ N(y) and y ∈ N(u) \ {v} therefore, x ∈ N(N(u) \ {v}) and so N(v) \ {u} ⊆ N(N(u) \ {v}). Suppose now that N(v) \ {u} ⊆ N(N(u) \ {v}). Then for each node x ∈ N(v) \ {u}, ∃ y ∈ N(u) \ {v} ⊥ and the link such that x ∈ N(y). Thus, by definition of the projection, (u,x) ∈ E ′ (u,v) is ⊥-internal. ⊥. Therefore E⊥ = E ′ (cid:3) 3 Datasets Our aim is to evaluate the importance of internal pairs and links in large real-world graphs, rather than obtain specific conclusions in a particular context. That is why we study various instances of real-world bipartite graphs, expecting to observe different behaviors. We present in this section the datasets we will use and summarize their general features (number of nodes and links). The graphs under consideration are social ones connecting people (⊥-nodes) through events, groups or similar interests (⊤-nodes). • Imdb-movies [Barab´asi et al. 1999] is obtained from the Internet Movie Database (www.imdb.com): it features actors connected to the movies they played in. ⊥ = 127,823 actors, ⊤ = 383,640 movies, E = 1,470,418. • Delicious-tags [Gorlitz et al. 2008] consists of Delicious (www.delicious.com) users connected ⊥ = 532,924 users, ⊤ = 2,474,234 tags, to the tags they use for indexing their bookmarks. E = 37,421,585. • Flickr-tags [Prieur et al. 2008] consists of Flickr (www.flickr.com) users connected to the tags they use for indexing their photos. ⊥ = 319,675 users, ⊤ = 1,607,879 tags, E = 13,336,993. • Flickr-comments: same as above, except that Flickr users are linked to the photos they comment. ⊥ = 760,261 users, ⊤ = 12,678,244 photos, E = 41,904,158. • Flickr-favorites: same as above, except that users are linked to the photos they pick up as favorites. ⊥ = 321,312 users, ⊤ = 6,450,934 photos, E = 17,871,828. 3 • Flickr-groups: same as above, except that users are linked to the groups they belong. ⊥ = 72,875 users, ⊤ = 381,076 groups, E = 5,662,295. • P2P-files [Aidouni et al. 2009] is obtained from peer-to-peer file exchange eDonkey: users are linked to the files they provide. ⊥ = 122,599 peers, ⊤ = 1,920,353 files, E = 4,502,704. • PRL-papers has been extracted from the Web of Science database (www.isiwebofknowledge.com), collecting papers and authors of Physical Review Letters from 2004 to 2007. ⊥ = 15,413 authors, ⊤ = 41,633 papers, E = 249,474. 4 Analysis of real-world cases In this section, we use the notions of internal links and pairs introduced in Section 2 to describe the real-world cases presented in Section 3. Let us insist on the fact that our aim is not to provide accurate information on these specific cases, but to illustrate how internal links and pairs may be used to analyze real-world data. We first show that there are many internal links in typical data, then study the number of internal links of each node and the correlation of this number with the node's degree. Since the links attached to ⊤-nodes (resp. ⊥-nodes) of degree 1 are all ⊥-internal (resp. ⊤-internal), and since there may be a large fraction of nodes with degree 1 in real-world graphs, we only study in the sequel links attached to nodes with degree at least 2. 4.1 Amount of internal links and pairs In order to capture how redundant is the bipartite structure, we compute the number of ⊤- and ⊥-internal pairs and links. The fraction of internal links, denoted fEI and presented in Table 1 seems in general not negligible. A quantitative analysis of these values however requires the definition of a benchmark. That is why we compare the measures to the corresponding amounts on random bipartite graphs with the same sizes and degree distributions, which is a typical random model to evaluate the deviation from an expected behavior -- see for example [Newman et al. 2001, Newman et al. 2003]. The measures related to this model will be referred to with the symbol *. We denote by PI(⊥) (resp. PI(⊤)) the set of ⊥-internal pairs (resp. ⊤-internal pairs) and by EI(⊥) (resp. EI(⊤)) the set of ⊥-internal links (resp. ⊤-internal links). We normalize the number of internal pairs and links measured on real graphs to the values obtained with the model described above. The corresponding results are also presented in Table 1. Imdb-movies Delicious-tags Flickr-tags Flickr-comments Flickr-groups Flickr-favorites P2P-files PRL-papers fEI (⊥) PI (⊥) P∗ I (⊥) 0.031 0.441 0.972 0.112 0.920 0.117 0.398 0.258 0.491 0.228 0.574 0.172 0.082 0.337 0.718 0.033 EI(⊥) E ∗ I (⊥) 47.0 1.47 1.51 4.22 2.21 2.02 8.53 7.17 fEI (⊤) PI (⊤) P∗ I (⊤) 0.026 0.491 1.823 0.104 1.040 0.048 0.002 0.151 0.249 0.015 0.704 0.002 0.092 0.136 0.487 0.001 EI(⊤) E ∗ I (⊤) 147 5.31 2.50 22.0 2.86 12.4 1430 11.2 Table 1: Fraction of internal links ( fEI ), number of internal pairs (PI) and internal links (EI) of real- world graphs normalized to the values on random bipartite graphs with the same size and same degree distributions. 4 We first notice that the behaviors in regards to the amount of internal links are very heterogeneous. Still some general trends can be underlined: in the random case, ⊥- and ⊤-internal links are underesti- mated. So, the probability of having nodes sharing the same neighborhood is higher in real graphs than in random ones. We may indeed expect, for instance, that people participating to the same paper have a higher probability to be coauthors of another one than a random pair of authors. Meanwhile the numbers of internal pairs are generally overestimated in random networks. To under- stand this effect, let us consider the extreme case where two ⊥-nodes in a graph have either exactly the same neighborhood, or no common neighbors. Then all links are ⊥-internal, and the graph does not con- tain any internal pair. This example suggests that the number of internal pairs is probably anti-correlated to the number of internal links. In general, there is a correlation between the fact that the number of internal links is underestimated in random graphs and the fact that the number of internal pairs is overestimated, but this correlation does not hold in all cases. Moreover, there is no direct link between these observations and the sizes or average degrees of the considered graphs. Finally, we observe a specific behavior for the two graphs which correspond to tagging databases, i.e. Delicious-tags and Flickr-tags. For these graphs we observe the lowest gaps between the real and random cases for ⊥-internal links and the amounts of ⊥-internal pairs are very close in the real and random cases. Conversely, they are the only graphs for which the amount of ⊤-internal pairs is underestimated in random graphs. Since we can observe a wide range of behaviors both for ⊤- and ⊥- internal links and pairs, we will restrict our analysis in the following to ⊥- internal links and pairs for the sake of brevity. We will see that this allows enlightening observations. 4.2 Distribution of internal links among nodes The notion of internal links partitions the links of each node into two sets: the internal ones and the others. We now study how the fraction of internal links is distributed among nodes. On Figure 4, we plot the complementary cumulative distribution of the fraction of internal links per node for the datasets under study. We also plot the complementary cumulative distribution for random graphs. Imdb-movies: Delicious-tags: Flickr-tags: Flickr-comments: 100 10-1 10-2 10-3 10-4 10-5 10-6 10-3 random real 10-2 10-1 100 10-1 10-2 10-3 10-4 10-5 10-3 random real 10-2 10-1 100 100 10-1 10-2 10-3 10-4 10-5 10-6 10-3 random real 10-2 10-1 100 100 10-1 10-2 10-3 10-4 10-5 10-6 10-3 random real 10-2 10-1 100 Flickr-groups: Flickr-favorites: P2P-files: PRL-papers: 100 10-1 10-2 10-3 10-4 10-5 10-3 random real 10-2 10-1 100 100 10-1 10-2 10-3 10-4 10-5 10-6 10-3 random real 10-2 10-1 100 100 10-1 10-2 10-3 10-4 10-5 10-3 random real 10-2 10-1 100 100 10-1 10-2 10-3 10-4 10-5 10-2 random real 10-1 100 Figure 4: Complementary cumulative distribution of the fraction of internal links per node. One of the most noticeable differences between both curves lies in the probability of having a node 5 whose links are all internal (x = 1): this fraction is indeed much higher in real than in random graphs. We also observe that real graphs exhibit fewer nodes with very low (or null) fractions of internal links (though the fraction of nodes with no internal link is high in both cases). In this respect too, the datasets behave differently: for Imdb-movies the probability of having a 10−2 fraction of internal links is more than one order of magnitude larger in the random than in the real graph, while Flickr-tags curves are close to be superimposed at low fractions. Notice that this is not directly related to the fact that the number of internal links is underestimated or not in random graphs: for Delicious-tags the ratio between the number of ⊥-internal links in the real and in the random case is smaller than for Flickr-tags, but the difference between the distributions of the fraction of internal links per node are larger for Delicious-tags than for Flickr-tags. Finally, the very low fractions that we observe are associated to nodes with high degree: to have a 10−4 fraction of internal links, a node has to have a degree of at least 104. Therefore, we study in the following the correlation between the degree of a node and its number of internal links. 4.3 Correlation of internal links with node degrees As stated before, the number of (⊥-)internal links of a node is called its (⊥-)internal degree, its total number of links being its degree. We investigate in this section the relationship between both quantities, plotting on Figure 5 the average degree of a node in regards its (⊥-)internal degree for the real datasets and the randomized ones. Imdb-movies: Delicious-tags: Flickr-tags: Flickr-comments: 103 102 101 100 100 106 105 104 103 102 101 102 100 100 random real slope=0.48 101 random real slope=0.75 slope=0.74 101 102 103 104 105 105 104 103 102 101 100 100 101 105 104 103 102 101 104 100 100 random real slope=0.70 slope=0.73 103 102 random real slope=0.86 slope=0.66 101 102 103 104 105 Flickr-groups: Flickr-favorites: P2P-files: PRL-papers: 105 104 103 102 101 100 100 random real slope=0.69 slope=0.64 101 102 103 104 105 105 104 103 102 101 100 100 random real slope=0.75 slope=0.67 101 102 103 104 105 105 104 103 102 101 100 100 101 random real slope=0.63 103 102 104 103 102 101 104 100 100 101 random real slope=0.93 slope=0.78 102 103 Figure 5: Average degree as a function of the internal degree (for users projection). We observe that both real and random curves in several cases can be approximated by a sub-linear law on several decades. However, this model is unsatisfactory on P2P-files database, and questionable on cases where the values are too rare or too scattered: most noticeably Imdb-movies and Flickr-groups. The dispersion observed at large degrees is a consequence of the heterogeneous degree distribution, the number of nodes with high degree being low. If the fact that a given link is internal or not was independent from the node's degree, these curves would be linear. As random graphs have a sublinear behavior, that means that nodes with large degrees have on average a higher fraction of internal links. This effect can be explained qualitatively: increasing the degree of a node u - everything being otherwise unchanged - implies increasing the probability that one of his neighbors v is such that N(v) \ {u} ⊆ N(N(u) \ {v}). 6 On the other hand, the slope for real graphs is in most cases larger than for the random ones - again tagging datasets exhibit a different behavior. So there is an additional effect leading high degree nodes to have not as high an internal degree as expected by considering only the degree distributions. This is consistent with previous observations: the real case provides more internal links and fewer nodes with a low (but not null) fraction of such links, which must be high degree nodes. This stems from the fact that if nodes u and v are neighbors, the probability that N(v) \ {u} ⊆ N(N(u) \ {v}) is all the more important if v has a small degree and u a large one. Therefore we expect that degree-correlated graphs yield larger slopes than degree-anticorrelated ones. Yet, a more quantitative understanding of these phenomena calls for a study of the degree correlations in real-world graphs. 5 Removing internal links When modeling complex networks using bipartite graphs [Newman et al. 2001, Guillaume et al. 2004], the presence of internal links may be a problem as they are poorly captured by models. To this re- gard, removing internal links before generating a random bipartite graph may lead to better models. Moreover, internal links are precisely these links in a bipartite graph which may be removed without changing the projection. As the bipartite graph may be seen as a compact encoding of its projection [Latapy et al. 2008], one then obtains an even more compressed encoding. Considering the example of the P2P-files dataset, it demands 30 MB if stored as a usual 2-mode table of lists, while the corresponding ⊥-projection (i.e. users) demands 213 MB and the ⊤-projection: 4.6 GB if stored as table of edges. However, removing internal links is not trivial, as removing one specific link (u,v) may change the nature of other links: while they were internal in the initial graph, they may not be internal anymore after the removal of (u,v). See Figure 6 for an example. Therefore, in order to obtain a bipartite graph with no internal link but still the same projection (and so a minimal graph to this regard), it is not possible in general to delete all initial internal links since this would alter dramatically the structure of the projection. The set of internal links must therefore be updated after each removal. Going further, there may exist removal strategies which maximize the number of removals, whereas other may minimize it. i j k l i j k l A B C D A B C D G G′ = G − (A,i) C B A D G′ ⊥ = G⊥ Figure 6: Influence of the deletion process on internal links. {(A,i), (B, j), (C,k), (D,l)} are ⊥-internal links of G, yet deleting (A,i) leads to G′ where {(B, j), (C,k), (D,l)} are no longer ⊥-internal links, as they are the only links in G′ ensuring that A is connected to respectively B, C and D in G⊥. To explore these questions, let us consider a random removal process, where each step consists in choosing an internal link at random and removing it, and we iterate such steps until no internal link remains. Figure 7 presents the number of remaining internal links as a function of the number of internal link removed for typical cases. We also plot the upper bound EI − x (where x denotes the number of link removals), which represents the hypothetical case where all links initially internal remain internal during the whole process. This random deletion process leads to a pruned bipartite graph, containing the information of the 1- mode graph. Going back to the example of the P2P dataset, the obtained 2-mode storage graph demands 12 MB for the related ⊥-projection and 22 MB for the ⊤ one, thus enabling a compression to 0.40 (resp. 0.73) when compared to the standard 30 MB bipartite representation of the graph -- which is itself a 7 Imdb-movies: P2P-files: ⊥-internal links: ⊤-internal links: ⊥-internal links: ⊤-internal links: 5.104 4.104 3.104 2.104 104 4.104 3.104 2.104 104 6.105 4.105 2.105 0 0 104 2.104 3.104 4.104 5.104 0 0 104 2.104 3.104 4.104 0 0 2.105 4.105 6.105 16.105 14.105 12.105 10.105 8.105 6.105 4.105 2.105 0 0 4.105 8.105 12.105 16.105 Figure 7: Number of internal links remaining as a function of the number of deletions. Red thick line: random deletion process, blue thin line: theoretical upper bound. compact encoding of the projections. To go further, one may seek strategies that remove as many internal links as possible, for instance using a greedy algorithm selecting at each step the internal link leading to the lowest decrease of the number of remaining internal links. This is however out of the scope of this paper. 6 Conclusion We introduced the notion of internal links and pairs in bipartite graphs, and proposed it as an important notion for analyzing real-world 2-mode complex networks. Using a wide set of real-world examples, we observed that internal links are very frequent in practice, and that associated statistics are fruitful mea- sures to point out similarities and differences among real-world networks. This makes them a relevant tool for analysis of bipartite graphs, which is an important research topic. Moreover, removing internal links may be used to compact bipartite encodings of graphs and to improve their modeling. We provided a first step towards the use and understanding of internal links and pairs. Further investigations could bring us more precise information about the role of internal links, in particular regarding the dynamics. We suspect for instance that internal pairs may become internal links with high probability in future evolution of the graph. One may also study these links (and pairs) which are both ⊥- and ⊤-internal, as they may have a special importance in a graph. Acknowledgements This work is supported in part by the French ANR MAPE project. References [Aidouni et al. 2009] F. Aidouni, M. Latapy and C. Magnien: Ten weeks in the life of an eDonkey server. Proceedings of the Sixth International Workshop on Hot Topics in Peer-to-Peer Sys- tems (2009). [Barab´asi et al. 1999] A.L. Barab´asi and R. Albert: Emergence of scaling in random networks. Science, 286 (1999), p 509. [Gorlitz et al. 2008] O. Gorlitz, S. Sizov and S. Staab: PINTS: Peer-to-Peer Infrastructure for Tagging Systems. Proceedings of the Seventh International Workshop on Peer-to-Peer Systems (2008). 8 [Guillaume et al. 2004] J.L. Guillaume and M. Latapy: Bipartite structure of all complex networks. In- formation Processing Letters, 90 (2004), pp 215 -- 221. [Latapy et al. 2008] M. Latapy, C. Magnien and N. Del Vecchio: Basic notions for the analysis of large two-mode networks. Social Networks, 30 (2008), pp 31 -- 48. [Lind et al. 2005] P.G. Lind, M.C. Gonzalez and H.J. Herrmann: Cycles and clustering in bipartite net- works. Physical Review E, 72 (2005). [Newman et al. 2003] M.E.J. Newman and J. Park: Why social networks are different from other types of networks. Physical Review E, 68 (2003). [Newman et al. 2001] M.E.J. Newman, S.H. Strogatz and D.J. Watts: Random graphs with arbitrary degree distributions and their applications. Physical Review E, 64 (2001). [Prieur et al. 2008] C. Prieur, D. Cardon, J.S. Beuscart, N. Pissard and P. Pons: The stength of weak cooperation: a case study on Flickr. Computing Research Repository (2008). [Zweig et al. 2011] K. Zweig and M. Kaufmann: A systematic approach to the one-mode projection of bipartite graphs. Social Network Analysis and Mining (2011), pp 1 -- 32. 9
1709.05584
3
1709
2018-04-10T15:26:32
Representation Learning on Graphs: Methods and Applications
[ "cs.SI", "cs.LG" ]
Machine learning on graphs is an important and ubiquitous task with applications ranging from drug design to friendship recommendation in social networks. The primary challenge in this domain is finding a way to represent, or encode, graph structure so that it can be easily exploited by machine learning models. Traditionally, machine learning approaches relied on user-defined heuristics to extract features encoding structural information about a graph (e.g., degree statistics or kernel functions). However, recent years have seen a surge in approaches that automatically learn to encode graph structure into low-dimensional embeddings, using techniques based on deep learning and nonlinear dimensionality reduction. Here we provide a conceptual review of key advancements in this area of representation learning on graphs, including matrix factorization-based methods, random-walk based algorithms, and graph neural networks. We review methods to embed individual nodes as well as approaches to embed entire (sub)graphs. In doing so, we develop a unified framework to describe these recent approaches, and we highlight a number of important applications and directions for future work.
cs.SI
cs
Representation Learning on Graphs: Methods and Applications William L. Hamilton [email protected] Rex Ying [email protected] Jure Leskovec [email protected] Department of Computer Science Stanford University Stanford, CA, 94305 Abstract Machine learning on graphs is an important and ubiquitous task with applications ranging from drug design to friendship recommendation in social networks. The primary challenge in this domain is finding a way to represent, or encode, graph structure so that it can be easily exploited by machine learning models. Traditionally, machine learning approaches relied on user-defined heuristics to extract features encoding structural information about a graph (e.g., degree statistics or kernel functions). However, recent years have seen a surge in approaches that automatically learn to encode graph structure into low-dimensional embeddings, using techniques based on deep learning and nonlinear dimensionality reduction. Here we provide a conceptual review of key advancements in this area of representation learning on graphs, including matrix factorization-based methods, random-walk based algorithms, and graph neural networks. We review methods to embed individual nodes as well as approaches to embed entire (sub)graphs. In doing so, we develop a unified framework to describe these recent approaches, and we highlight a number of important applications and directions for future work. 1 Introduction Graphs are a ubiquitous data structure, employed extensively within computer science and related fields. Social networks, molecular graph structures, biological protein-protein networks, recommender systems-all of these domains and many more can be readily modeled as graphs, which capture interactions (i.e., edges) between individual units (i.e., nodes). As a consequence of their ubiquity, graphs are the backbone of countless systems, allowing relational knowledge about interacting entities to be efficiently stored and accessed [2]. However, graphs are not only useful as structured knowledge repositories: they also play a key role in modern machine learning. Many machine learning applications seek to make predictions or discover new patterns using graph-structured data as feature information. For example, one might wish to classify the role of a protein in a biological interaction graph, predict the role of a person in a collaboration network, recommend new friends to a user in a social network, or predict new therapeutic applications of existing drug molecules, whose structure can be represented as a graph. Copyright 2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 1 Figure 1: Two different views of a character-character interaction graph derived from the Les Mis´erables novel, where two nodes are connected if the corresponding characters interact. The coloring in the left figure emphasizes differences in the nodes' global positions in the graph: nodes have the same color if they belong to the same community, at a global level. In contrast, the coloring in the right figure denotes structural equivalence between nodes, or the fact that two nodes play similar roles in their local neighborhoods (e.g., "bridging nodes" are colored blue). The colorings for both figures were generated using different settings of the node2vec node embedding method [28], described in Section 2. Reprinted from [28] with permission.1 The central problem in machine learning on graphs is finding a way to incorporate information about graph- structure into a machine learning model. For example, in the case of link prediction in a social network, one might want to encode pairwise properties between nodes, such as relationship strength or the number of common friends. Or in the case of node classification, one might want to include information about the global position of a node in the graph or the structure of the node's local graph neighborhood (Figure 1). The challenge- from a machine learning perspective-is that there is no straightforward way to encode this high-dimensional, non-Euclidean information about graph structure into a feature vector. To extract structural information from graphs, traditional machine approaches often rely on summary graph statistics (e.g., degrees or clustering coefficients) [6], kernel functions [58], or carefully engineered features to measure local neighborhood structures [40]. However, these approaches are limited because these hand- engineered features are inflexible-i.e., they cannot adapt during the learning process-and designing these features can be a time-consuming and expensive process. More recently, there has been a surge of approaches that seek to learn representations that encode structural information about the graph. The idea behind these representation learning approaches is to learn a mapping that embeds nodes, or entire (sub)graphs, as points in a low-dimensional vector space Rd. The goal is to optimize this mapping so that geometric relationships in the embedding space reflect the structure of the original graph. After optimizing the embedding space, the learned embeddings can be used as feature inputs for downstream machine learning tasks. The key distinction between representation learning approaches and previous work is how they treat the problem of representing graph structure. Previous work treated this problem as a pre-processing step, using hand-engineered statistics to extract structural information. In contrast, representation learning approaches treat this problem as machine learning task itself, using a data-driven approach to learn embeddings that encode graph structure. Here we provide an overview of recent advancements in representation learning on graphs, reviewing tech- niques for representing both nodes and entire subgraphs. Our survey attempts to merge together multiple, dis- 1For this and all subsequent reprinted figures, the original authors retain their copyrights, and permission was obtained from the corresponding author. 2 Community structureStructural equivalence / roles Figure 2: A, Graph structure of the Zachary Karate Club social network, where nodes are connected if the corresponding individuals are friends. The nodes are colored according to the different communities that exist in the network. B, Two- dimensional visualization of node embeddings generated from this graph using the DeepWalk method (Section 2.2.2) [47]. The distances between nodes in the embedding space reflect similarity in the original graph, and the node embeddings are spatially clustered according to the different color-coded communities. Reprinted with permission from [47, 49]. parate lines of research that have drawn significant attention across different subfields and venues in recent years-e.g., node embedding methods, which are a popular object of study in the data mining community, and graph convolutional networks, which have drawn considerable attention in major machine learning venues. In doing so, we develop a unified conceptual framework for describing the various approaches and emphasize major conceptual distinctions. We focus our review on recent approaches that have garnered significant attention in the machine learning and data mining communities, especially methods that are scalable to massive graphs (e.g., millions of nodes) and inspired by advancements in deep learning. Of course, there are other lines of closely related and relevant work, which we do not review in detail here-including latent space models of social networks [33], embedding methods for statistical relational learning [43], manifold learning algorithms [38], and geometric deep learning [7]-all of which involve representation learning with graph-structured data. We refer the reader to [33], [43], [38], and [7] for comprehensive overviews of these areas. 1.1 Notation and essential assumptions We will assume that the primary input to our representation learning algorithm is an undirected graph G = (V,E) with associated binary adjacency matrix A.2 We also assume that the methods can make use of a real-valued matrix of node attributes X ∈ Rm×V (e.g., representing text or metadata associated with nodes). The goal is to use the information contained in A and X to map each node, or a subgraph, to a vector z ∈ Rd, where d << V. Most of the methods we review will optimize this mapping in an unsupervised manner, making use of only information in A and X, without knowledge of a particular downstream machine learning task. However, we will also discuss some approaches for supervised representation learning, where the models make use of classification or regression labels in order to optimize the embeddings. These classification labels may be associated with individual nodes or entire subgraphs and are the prediction targets for downstream machine learning tasks (e.g., they might label protein roles, or the therapeutic properties of a molecule, based on its graph representation). 2Most of the methods we review are easily generalized to work with weighted or directed graphs, and we will explicitly describe how to generalize certain methods to the multi-modal setting (i.e., differing node and edge types). 3 AB Figure 3: Overview of the encoder-decoder approach. First the encoder maps the node, vi, to a low-dimensional vector embedding, zi, based on the node's position in the graph, its local neighborhood structure, and/or its attributes. Next, the decoder extracts user-specified information from the low-dimensional embedding; this might be information about vi's local graph neighborhood (e.g., the identity of its neighbors) or a classification label associated with vi (e.g., a community label). By jointly optimizing the encoder and decoder, the system learns to compress information about graph structure into the low-dimensional embedding space. 2 Embedding nodes We begin with a discussion of methods for node embedding, where the goal is to encode nodes as low-dimensional vectors that summarize their graph position and the structure of their local graph neighborhood. These low- dimensional embeddings can be viewed as encoding, or projecting, nodes into a latent space, where geometric relations in this latent space correspond to interactions (e.g., edges) in the original graph [33]. Figure 2 visualizes an example embedding of the famous Zachary Karate Club social network [47], where two dimensional node embeddings capture the community structure implicit in the social network. 2.1 Overview of approaches: An encoder-decoder perspective Recent years have seen a surge of research on node embeddings, leading to a complicated diversity of notations, motivations, and conceptual models. Thus, before discussing the various techniques, we first develop a uni- fied encoder-decoder framework, which explicitly structures this methodological diversity and puts the various methods on equal notational and conceptual footing. In this framework, we organize the various methods around two key mapping functions: an encoder, which maps each node to a low-dimensional vector, or embedding, and a decoder, which decodes structural information about the graph from the learned embeddings (Figure 3). The intuition behind the encoder-decoder idea is the following: if we can learn to decode high-dimensional graph information-such as the global positions of nodes in the graph or the structure of local graph neighborhoods-from encoded low-dimensional embeddings, then, in principle, these embeddings should contain all information necessary for downstream machine learning tasks. Formally, the encoder is a function, (1) that maps nodes to vector embeddings zi ∈ Rd (where zi corresponds to the embedding for node vi ∈ V). The decoder is a function that accepts a set of node embeddings and decodes user-specified graph statistics from these embeddings. For example, the decoder might predict the existence of edges between nodes, given their embeddings [1, 36], or it might predict the community that a node belongs to in the graph [29, 35] (Figure 3). In principle, many decoders are possible; however, the vast majority of works use a basic pairwise decoder, ENC : V → Rd, DEC : Rd × Rd → R+, 4 (2) that maps pairs of node embeddings to a real-valued node similarity measure, which quantifies the similarity of the two nodes in the original graph. When we apply the pairwise decoder to a pair of embeddings (zi,zj) we get a reconstruction of the similarity between vi and vj in the original graph, and the goal is optimize the encoder and decoder mappings to minimize the error, or loss, in this reconstruction so that: DEC(ENC(vi), ENC(vj)) = DEC(zi, zj) ≈ sG(vi, vj), (3) where sG is a user-defined, graph-based similarity measure between nodes, defined over the graph G. In other words, we want to optimize our encoder-decoder model so that we can decode pairwise node similarities in the original graph sG(vi, vj) from the low-dimensional node embeddings zi and zj. For example, one might set sG(vi, vj) (cid:44) Ai,j and define nodes to have a similarity of 1 if they are adjacent and 0 otherwise [1], or one might define sG according to the probability of vi and vj co-occurring on a fixed-length random walk over the graph G [28, 47]. In practice, most approaches realize the reconstruction objective (Equation 3) by minimizing an empirical loss L over a set of training node pairs D: (cid:96) (DEC(zi, zj), sG(vi, vj)) , (4) (cid:88) L = (vi,vj )∈D where (cid:96) : R × R → R is a user-specified loss function, which measures the discrepancy between the decoded (i.e., estimated) similarity values DEC(zi, zj) and the true values sG(vi, vj). Once we have optimized the encoder-decoder system, we can use the trained encoder to generate embeddings for nodes, which can then be used as a feature inputs for downstream machine learning tasks. For example, one could feed the learned embeddings to a logistic regression classifier to predict the community that a node belongs to [47], or one could use distances between the embeddings to recommend friendship links in a social network [3, 28] (Section 2.7 discusses further applications). Adopting this encoder-decoder view, we organize our discussion of the various node embedding methods along the following four methodological components: 1. A pairwise similarity function sG : V × V → R+, defined over the graph G. This function measures the similarity between nodes in G. 2. An encoder function, ENC, that generates the node embeddings. This function contains a number of trainable parameters that are optimized during the training phase. 3. A decoder function, DEC, which reconstructs pairwise similarity values from the generated embeddings. This function usually contains no trainable parameters. 4. A loss function, (cid:96), which determines how the quality of the pairwise reconstructions is evaluated in order to train the model, i.e., how DEC(zi, zj) is compared to the true sG(vi, vj) values. As we will show, the primary methodological distinctions between the various node embedding approaches are in how they define these four components. 2.1.1 Notes on optimization and implementation details All of the methods we review involve optimizing the parameters of the encoder algorithm, ΘENC, by minimizing a loss analogous to Equation (4).3 In most cases, stochastic gradient descent is used for optimization, though some algorithms do permit closed-form solutions via matrix decomposition (e.g., [9]). However, note that we will not focus on optimization algorithms here and instead will emphasize high-level differences that exist across different embedding methods, independent of the specifics of the optimization approach. 3Occasionally, different methods will add additional auxiliary objectives or regularizers beyond the standard encoder-decoder objec- tive, but we will often omit these details for brevity. A few methods also optimize parameters in the decoder, ΘDEC. 5 Table 1: A summary of some well-known shallow embedding embedding algorithms. Note that the decoders and similarity functions for the random-walk based methods are asymmetric, with the similarity function pG(vjvi) corresponding to the probability of visiting vj on a fixed-length random walk starting from vi. Type Method Matrix factorization Random walk Laplacian Eigenmaps [4] Graph Factorization [1] GraRep [9] HOPE [45] DeepWalk [47] node2vec [28] Decoder (cid:107)zi − zj(cid:107)2 2 z(cid:62) i zj z(cid:62) i zj z(cid:62) i zj (cid:80) ez(cid:62) i zj k∈V ez(cid:62) (cid:80) ez(cid:62) i zj k∈V ez(cid:62) i i zk zk Similarity measure Loss function ((cid:96)) Ai,j, A2 general general Ai,j i,j, ..., Ak i,j DEC(zi, zj) · sG(vi, vj) (cid:107)DEC(zi, zj) − sG(vi, vj)(cid:107)2 (cid:107)DEC(zi, zj) − sG(vi, vj)(cid:107)2 (cid:107)DEC(zi, zj) − sG(vi, vj)(cid:107)2 −sG(vi, vj) log(DEC(zi, zj)) pG(vjvi) (biased) −sG(vi, vj) log(DEC(zi, zj)) pG(vjvi) 2 2 2 2.2 Shallow embedding approaches The majority of node embedding algorithms rely on what we call shallow embedding. For these shallow em- bedding approaches, the encoder function-which maps nodes to vector embeddings-is simply an "embedding lookup": ENC(vi) = Zvi, (5) where Z ∈ Rd×V is a matrix containing the embedding vectors for all nodes and vi ∈ IV is a one-hot indi- cator vector indicating the column of Z corresponding to node vi. The set of trainable parameters for shallow embedding methods is simply ΘENC = {Z}, i.e., the embedding matrix Z is optimized directly. These approaches are largely inspired by classic matrix factorization techniques for dimensionality reduc- tion [4] and multi-dimensional scaling [37]. Indeed, many of these approaches were originally motivated as factorization algorithms, and we reinterpret them within the encoder-decoder framework here. Table 1 summa- rizes some well-known shallow embedding methods within the encoder-decoder framework. Table 1 highlights how these methods can be succinctly described according to (i) their decoder function, (ii) their graph-based similarity measure, and (iii) their loss function. The following two sections describe these methods in more de- tail, distinguishing between matrix factorization-based approaches (Section 2.2.1) and more recent approaches based on random walks (Section 2.2.2). 2.2.1 Factorization-based approaches Early methods for learning representations for nodes largely focused on matrix-factorization approaches, which are directly inspired by classic techniques for dimensionality reduction [4, 37]. Laplacian eigenmaps. One of the earliest, and most well-known instances, is the Laplacian eigenmaps (LE) technique [4], which we can view within the encoder-decoder framework as a shallow embedding approach in which the decoder is defined as and where the loss function weights pairs of nodes according to their similarity in the graph: Inner-product methods. Following on the Laplacian eigenmaps technique, there are a large number of recent embedding methodologies based on a pairwise, inner-product decoder: DEC(zi, zj) = (cid:107)zi − zj(cid:107)2 (cid:88) 2 L = (vi,vj )∈D DEC(zi, zj) · sG(vi, vj). (cid:62) i zj, DEC(zi, zj) = z 6 (6) (7) Figure 4: The random-walk based methods sample a large number of fixed-length random walks starting from each node, vi. The embedding vectors are then optimized so that the dot-product, or angle, between two embeddings, zi and zj, is (roughly) proportional to the probability of visiting vj on a fixed-length random walk starting from vi. where the strength of the relationship between two nodes is proportional to the dot product of their embeddings. The Graph Factorization (GF) algorithm4 [1], GraRep [9], and HOPE [45] all fall firmly within this class. In particular, all three of these methods use an inner-product decoder, a mean-squared-error (MSE) loss, (cid:88) (vi,vj )∈D (cid:107)DEC(zi, zj) − sG(vi, vj)(cid:107)2 2, L = (8) and they differ primarily in the node similarity measure used, i.e. how they define sG(vi, vj). The Graph Factorization algorithm defines node similarity directly based on the adjacency matrix (i.e., sG(vi, vj) (cid:44) Ai,j) [1]; GraRep considers various powers of the adjacency matrix (e.g., sG(vi, vj) (cid:44) A2 i,j) in order to capture higher-order node similarity [9]; and the HOPE algorithm supports general similarity measures (e.g., based on Jaccard neighborhood overlaps) [45]. These various different similarity functions trade-off between modeling "first-order similarity", where sG directly measures connections between nodes (i.e., sG(vi, vj) (cid:44) Ai,j [1]) and modeling "higher-order similarity", where sG corresponds to more general notions of neighborhood overlap (e.g., sG(vi, vj) = A2 i,j [9]). We refer to these methods in this section as matrix-factorization approaches because, averaging over all nodes, they optimize loss functions (roughly) of the form: (9) where S is a matrix containing pairwise similarity measures (i.e., Si,j (cid:44) sG(vi, vj)) and Z is the matrix of node embeddings. Intuitively, the goal of these methods is simply to learn embeddings for each node such that the inner product between the learned embedding vectors approximates some deterministic measure of node similarity. L ≈ (cid:107)Z Z − S(cid:107)2 2, (cid:62) 2.2.2 Random walk approaches Many recent successful methods that also belong to the class of shallow embedding approaches learn the node embeddings based on random walk statistics. Their key innovation is optimizing the node embeddings so that nodes have similar embeddings if they tend to co-occur on short random walks over the graph (Figure 4). Thus, instead of using a deterministic measure of node similarity, like the methods of Section 2.2.1, these random walk methods employ a flexible, stochastic measure of node similarity, which has led to superior performance in a number of settings [27]. 4Of course, Ahmed et al. [1] were not the first researchers to propose factorizing an adjacency matrix, but they were the first to present a scalable O(E) algorithm for the purpose of generating node embeddings. 7 1. Run random walks to obtain co-occurrence statistics.2. Optimize embeddings based on co-occurrence statistics.✓zizj/pG(vjvi)pG(vjvi)vivj DEC(zi, zj) (cid:44) (cid:80) ez(cid:62) i zj vk∈V ez(cid:62) ≈ pG,T (vjvi), i zk (cid:88) (vi,vj )∈D − log(DEC(zi, zj)), L = (10) (11) Figure 5: A, Illustration of how node2vec biases the random walk using the p and q parameters. Assuming that the walk just transitioned from vs to v∗, the edge labels, α, are proportional to the probability of the walk taking that edge at next time-step. B, Difference between random-walks that are based on breadth-first search (BFS) and depth-first search (DFS). BFS-like random walks are mainly limited to exploring a node's immediate (i.e., one-hop) neighborhood and are generally more effective for capturing structural roles. DFS-like walks explore further away from the node and are more effective for capturing community structures. Adapted from [28]. DeepWalk and node2vec. Like the matrix factorization approaches described above, DeepWalk and node2vec rely on shallow embedding and use a decoder based on the inner product. However, instead of trying to decode a deterministic node similarity measure, these approaches optimize embeddings to encode the statistics of random walks. The basic idea behind these approaches is to learn embeddings so that (roughly): where pG,T (vjvi) is the probability of visiting vj on a length-T random walk starting at vi, with T usually defined to be in the range T ∈ {2, ..., 10}. Note that unlike the similarity measures in Section 2.2.1, pG,T (vjvi) is both stochastic and asymmetric. More formally, these approaches attempt to minimize the following cross-entropy loss: where the training set D is generated by sampling random walks starting from each node (i.e., where N pairs for each node vi are sampled from the distribution (vi, vj) ∼ pG,T (vjvj)). However, naively evaluating the loss in Equation (11) is prohibitively expensive-in particular, O(DV)-since evaluating the denominator of Equation (10) has time complexity O(V). Thus, DeepWalk and node2vec use different optimizations and approximations to compute the loss in Equation (11). DeepWalk employs a "hierarchical softmax" technique to compute the normalizing factor, using a binary-tree structure to accelerate the computation [47]. In contrast, node2vec approximates Equation (11) using "negative sampling": instead of normalizing over the full vertex set, node2vec approximates the normalizing factor using a set of random "negative samples" [28]. Beyond these algorithmic differences, the key distinction between node2vec and DeepWalk is that node2vec allows for a flexible definition of random walks, whereas DeepWalk uses simple unbiased random walks over the graph. In particular, node2vec introduces two random walk hyperparameters, p and q, that bias the random walk (Figure 5.A). The hyperparameter p controls the likelihood of the walk immediately revisiting a node, while q controls the likelihood of the walk revisiting a node's one-hop neighborhood. By introducing these hyperparameters, node2vec is able to smoothly interpolate between walks that are more akin to breadth-first or depth-first search (Figure 5.B). Grover et al. found that tuning these parameters allowed the model to trade 8 ABv⇤v1v2v3v4v5v6v7v8v9v1v2v3vsv⇤ off between learning embeddings that emphasize community structures or embeddings that emphasize local structural roles [28] (see also Figure 1). Large-scale information network embeddings (LINE). Another highly successful shallow embedding ap- proach, which is not based random walks but is contemporaneous and often compared with DeepWalk and node2vec, is the LINE method [54]. LINE combines two encoder-decoder objectives that optimize "first-order" and "second-order" node similarity, respectively. The first-order objective uses a decoder based on the sigmoid function, 1 1 + e−z(cid:62) i zj DEC(zi, zj) = , (12) and an adjacency-based similarity measure (i.e., sG(vi, vj) = Ai,j). The second-order encoder-decoder ob- jective is similar but considers two-hop adjacency neighborhoods and uses an encoder identical to Equation (10). Both the first-order and second-order objectives are optimized using loss functions derived from the KL- divergence metric [54]. Thus, LINE is conceptually related to node2vec and DeepWalk in that it uses a prob- abilistic decoder and loss, but it explicitly factorizes first- and second-order similarities, instead of combining them in fixed-length random walks. HARP: Extending random-walk embeddings via graph pre-processing. Recently, Chen et al. [13] in- troduced a "meta-strategy", called HARP, for improving various random-walk approaches via a graph pre- processing step. In this approach, a graph coarsening procedure is used to collapse related nodes in G together into "supernodes", and then DeepWalk, node2vec, or LINE is run on this coarsened graph. After embedding the coarsened version of G, the learned embedding of each supernode is used as an initial value for the random walk embeddings of the supernode's constituent nodes (in another round of optimization on a "finer-grained" version of the graph). This general process can be repeated in a hierarchical manner at varying levels of coarseness, and has been shown to consistently improve performance of DeepWalk, node2vec, and LINE [13]. Additional variants of the random-walk idea. There have also been a number of further extensions of the random walk idea. For example, Perozzi et al. [48] extend the DeepWalk algorithm to learn embeddings using random walks that "skip" or "hop" over multiple nodes at each step, resulting in a similarity measure similar to GraRep [9], while Chamberlan et al. [11] modify the inner-product decoder of node2vec to use a hyperbolic, rather than Euclidean, distance measure. 2.3 Generalized encoder-decoder architectures So far all of the node embedding methods we have reviewed have been shallow embedding methods, where the encoder is a simply an embedding lookup (Equation 5). However, these shallow embedding approaches train unique embedding vectors for each node independently, which leads to a number of drawbacks: 1. No parameters are shared between nodes in the encoder (i.e., the encoder is simply an embedding lookup based on arbitrary node ids). This can be statistically inefficient, since parameter sharing can act as a powerful form of regularization, and it is also computationally inefficient, since it means that the number of parameters in shallow embedding methods necessarily grows as O(V). 2. Shallow embedding also fails to leverage node attributes during encoding. In many large graphs nodes have attribute information (e.g., user profiles on a social network) that is often highly informative with respect to the node's position and role in the graph. 3. Shallow embedding methods are inherently transductive [29], i.e., they can only generate embeddings for nodes that were present during the training phase, and they cannot generate embeddings for previously unseen nodes unless additional rounds of optimization are performed to optimize the embeddings for these nodes. This is highly problematic for evolving graphs, massive graphs that cannot be fully stored in memory, or domains that require generalizing to new graphs after training. 9 Figure 6: To generate an embedding for a node, vi, the neighborhood autoencoder approaches first extract a high- dimensional neighborhood vector si ∈ RV, which summarizes vi's similarity to all other nodes in the graph. The si vector is then fed through a deep autoencoder to reduce its dimensionality, producing the low-dimensional zi embedding. Recently, a number of approaches have been proposed to address some, or all, of these issues. These approaches still fall firmly within the encoder-decoder framework outlined in Section 2.1, but they differ from the shal- low embedding methods of Section 2.2 in that they use a more complex encoders, often based on deep neural networks and which depend more generally on the structure and attributes of the graph. 2.3.1 Neighborhood autoencoder methods Deep Neural Graph Representations (DNGR) [10] and Structural Deep Network Embeddings (SDNE) [59] address the first problem outlined above: unlike the shallow embedding methods, they directly incorporate graph structure into the encoder algorithm using deep neural networks. The basic idea behind these approaches is that they use autoencoders-a well known approach for deep learning [31]-in order to compress information about a node's local neighborhood (Figure 6). DNGR and SDNE also differ from the previously reviewed approaches in that they use a unary decoder instead of a pairwise one. In these approaches, each node, vi, is associated with a neighborhood vector, si ∈ RV, which corresponds to vi's row in the matrix S (recall that S contains pairwise node similarities, i.e., Si,j = sG(vi, vj)). The si vector contains vi's similarity with all other nodes in the graph and functions as a high-dimensional vector representation of vi's neighborhood. The autoencoder objective for DNGR and SDNE is to embed nodes using the si vectors such that the si vectors can then be reconstructed from these embeddings: In other words, the loss for these methods takes the following form: DEC(ENC(si)) = DEC(zi) ≈ si. (cid:88) vi∈V (cid:107)DEC(zi) − si(cid:107)2 2. L = (13) (14) As with the pairwise decoder, we have that the dimension of the zi embeddings is much smaller than V (the dimension of the si vectors), so the goal is to compress the node's neighborhood information into a low- dimensional vector. For both SDNE and DNGR, the encoder and decoder functions consist of multiple stacked neural network layers: each layer of the encoder reduces the dimensionality of its input, and each layer of the decoder increases the dimensionality of its input (Figure 6; see [31] for an overview of deep autoencoders). 10 ……sizisivi2.Compresssitolow-dimensionalembedding,zi(usingdeepautoencoder)(si2RVcontainsvi'sproximitytoallothernodes)1.Extracthigh-dimensionalneighborhoodvector Figure 7: Overview of encoding in the neighborhood aggregation methods. To generate an embedding for node A, the model aggregates messages from A's local graph neighbors (i.e., B, C, and D), and in turn, the messages coming from these neighbors are based on information aggregated from their respective neighborhoods, and so on. A "depth-2" version of this idea is shown (i.e., information is aggregated from a two-hop neighborhood around node A), but in principle these methods can be of an arbitrary depth. At the final "depth" or "layer" the initial messages are based on the input node attributes. SDNE and DNGR differ in the similarity functions they use to construct the neighborhood vectors si and also in the exact details of how the autoencoder is optimized. DNGR defines si according to the pointwise mutual information of two nodes co-occurring on random walks, similar to DeepWalk and node2vec. SDNE simply sets si (cid:44) Ai, i.e., equal to vi's adjacency vector. SDNE also combines the autoencoder objective (Equation 13) with the Laplacian eigenmaps objective (Equation 6) [59]. Note that the encoder in Equation (13) depends on the input si vector, which contains information about vi's local graph neighborhood. This dependency allows SDNE and DNGR to incorporate structural information about a node's local neighborhood directly into the encoder as a form of regularization, which is not possible for the shallow embedding approaches (since their encoder depends only on the node id). However, despite this improvement, the autoencoder approaches still suffer from some serious limitations. Most prominently, the input dimension to the autoencoder is fixed at V, which can be extremely costly and even intractable for graphs with millions of nodes. In addition, the structure and size of the autoencoder is fixed, so SDNE and DNGR are strictly transductive and cannot cope with evolving graphs, nor can they generalize across graphs. 2.3.2 Neighborhood aggregation and convolutional encoders A number of recent node embedding approaches aim to solve the main limitations of the shallow embedding and autoencoder methods by designing encoders that rely on a node's local neighborhood, but not necessarily the entire graph. The intuition behind these approaches is that they generate embeddings for a node by aggregating information from its local neighborhood (Figure 7). Unlike the previously discussed methods, these neighborhood aggregation algorithms rely on node features or attributes (denoted xi ∈ Rm) to generate embeddings. For example, a social network might have text data (e.g., profile information), or a protein-protein interaction network might have molecular markers associated with each node. The neighborhood aggregation methods leverage this attribute information to inform their embeddings. In cases where attribute data is not given, these methods can use simple graph statistics as attributes (e.g., node degrees) [29], or assign each node a one-hot indicator vector as an attribute [36, 53]. These methods are often called convolutional because they represent a node as a function of its surrounding neighborhood, in a manner similar to the receptive field of a center-surround convolutional kernel in computer vision [35].5 In the encoding phase, the neighborhood aggregation methods build up the representation for a node in an iterative, or recursive, fashion (see Algorithm 1 for pseudocode). First, the node embeddings are initialized 5These methods also have theoretical connections to approximate spectral kernels on graphs [18]; see [35] for a further discussion. 11 INPUT GRAPHTARGET NODEBDEFCAAAACFBEADBCaggregate Algorithm 1: Neighborhood-aggregation encoder algorithm. Adapted from [29]. Input : Graph G(V,E); input features {xv,∀v ∈ V}; depth K; weight matrices {Wk,∀k ∈ [1, K]}; non-linearity σ; differentiable aggregator functions {AGGREGATEk,∀k ∈ [1, K]}; neighborhood function N : v → 2V Output: Vector representations zv for all v ∈ V 1 h0 v ← xv,∀v ∈ V ; 2 for k = 1...K do (cid:16) for v ∈ V do 3 4 hkN (v) ← AGGREGATEk({hk−1 Wk · COMBINE(hk−1 hk v ← σ 5 u v (cid:17) ,∀u ∈ N (v)}); , hkN (v)) end hk v ← NORMALIZE(hk v),∀v ∈ V 6 7 8 end 9 zv ← hK v ,∀v ∈ V to be equal to the input node attributes. Then at each iteration of the encoder algorithm, nodes aggregate the embeddings of their neighbors, using an aggregation function that operates over sets of vectors. After this ag- gregation, every node is assigned a new embedding, equal to its aggregated neighborhood vector combined with its previous embedding from the last iteration. Finally, this combined embedding is fed through a dense neural network layer and the process repeats. As the process iterates, the node embeddings contain information aggre- gated from further and further reaches of the graph. However, the dimensionality of the embeddings remains constrained as the process iterates, so the encoder is forced to compress all the neighborhood information into a low dimensional vector. After K iterations the process terminates and the final embedding vectors are output as the node representations. There are a number of recent approaches that follow the basic procedure outlined in Algorithm 1, includ- ing graph convolutional networks (GCN) [35, 36, 53, 56], column networks [50], and the GraphSAGE algo- rithm [29]. The trainable parameters in Algorithm 1-a set of aggregation functions and a set weight matrices {Wk,∀k ∈ [1, K]}-specify how to aggregate information from a node's local neighborhood and, unlike the shallow embedding approaches (Section 2.2), these parameters are shared across nodes. The same aggregation function and weight matrices are used to generate embeddings for all nodes, and only the input node attributes and neighborhood structure change depending on which node is being embedded. This parameter sharing in- creases efficiency (i.e., the parameter dimensions are independent of the size of the graph), provides regular- ization, and allows this approach to be used to generate embeddings for nodes that were not observed during training [29]. GraphSAGE, column networks, and the various GCN approaches all follow Algorithm 1 but differ primarily in how the aggregation (line 4) and vector combination (line 5) are performed. GraphSAGE uses concatenation in line 5 and permits general aggregation functions; the authors experiment with using the element-wise mean, a max-pooling neural network and LSTMs [32] as aggregators, and they found the the more complex aggregators, especially the max-pooling neural network, gave significant gains. GCNs and column networks use a weighted sum in line 5 and a (weighted) element-wise mean in line 4. Column networks also add an additional "interpolation" term before line 7, setting (15) and hk−1N (v). This interpolation term where α is an interpolation weight computed as a non-linear function of hk−1 allows the model to retain local information as the process iterates (i.e., as k increases and the model integrates , v hk(cid:48) v = αhk v + (1 − α)hk−1 v 12 information from further reaches of the graph). In principle, the GraphSAGE, column network, and GCN encoders can be combined with any of the previ- ously discussed decoders and loss functions, and the entire system can be optimized using SGD. For example, Hamilton et al. [29] use an identical decoder and loss as node2vec, while Kipf et al. [36] use a decoder and loss function similar to the Graph Factorization approach. Neighborhood aggregation encoders following Algorithm 1 have been found to provide consistent gains compared to their shallow embedding counterparts on both node classification [29, 35] and link prediction [56, 36, 53] benchmarks. At a high level, these approaches solve the four main limitations of shallow embeddings, noted at the beginning of Section 2.3: they incorporate graph structure into the encoder; they leverage node attributes; their parameter dimension can be made sub-linear in V; and they can generate embeddings for nodes that were not present during training. Incorporating task-specific supervision 2.4 The basic encoder-decoder framework described thus far is by default unsupervised, i.e., the model is optimized, or trained, over set of node pairs to reconstruct pairwise similarity values sG(vi, vj), which depend only on the graph G. However, many node embedding algorithms-especially the neighborhood aggregation approaches presented in Section 2.3.2-can also incorporate task-specific supervision [29, 35, 53, 60]. In particular, it is common for methods incorporate supervision from node classification tasks in order to learn the embeddings.6 For simplicity, we discuss the case where nodes have an associated binary classification label, but the approach we describe is easily extended to more complex classification settings. Assume that we have a binary classification label, yi ∈ Z, associated with each node. To learn to map nodes to their labels, we can feed our embedding vectors, zi, through a logistic, or sigmoid, function yi = σ(z(cid:62) i θ), where θ is a trainable parameter vector. We can then compute the cross-entropy loss between these predicted class probabilities and the true labels: (cid:88) vi∈V L = yi log(σ(ENC(vi) (cid:62)θ)) + (1 − yi) log(1 − σ(ENC(vi) (cid:62)θ)). (16) The gradient computed according to Equation (16) can then be backpropagated through the encoder to optimize its parameters. This task-specific supervision can completely replace the reconstruction loss computed using the decoder (i.e., Equation 3) [29, 35], or it can be included along with the decoder loss [60]. 2.5 Extensions to multi-modal graphs While we have focused on simple, undirected graphs, many real-world graphs have complex multi-modal, or multi-layer, structures (e.g., heterogeneous node and edge types), and a number of works have introduced strate- gies to cope with this heterogeneity. 2.5.1 Dealing with different node and edge types Many graphs contain different types of nodes and edges. For example, recommender system graphs consist of two distinct layers-users and content-while many biological networks have a variety of layers, with distinct interactions between them (e.g., diseases, genes, and drugs). A general strategy for dealing with this issue is to (i) use different encoders for nodes of different types [12] and (ii) extend pairwise decoders with type-specific parameters [43, 53]. For example, in graphs with varying 6The unsupervised pairwise decoder is already naturally aligned with the link prediction task. 13 Figure 8: A, Example of a 4-layer graph, where the same nodes occur in multiple different layers. This multi-layer structure can be exploited to regularize learning at the different layers by requiring that the embeddings for the same node in different layers are similar to each other. B, Multi-layer graphs can exhibit hierarchical structure, where non-root layers in the hierarchy contain the union of the edges present in their child layers-e.g., a biological interaction graph derived from the entire human brain contains the union of the interactions in the frontal and temporal lobes. This structure can be exploited by learning embeddings at various levels of the hierarchy, and only applying the regularization between layers that are in a parent-child relationship. C-E, Example application of multi-layer graph embedding to protein-protein interaction graphs derived from different brain tissues; C shows the hierarchy between the different tissue regions, while D and E visualize the protein embeddings generated at the brainstem and whole-brain layers. The embeddings were generated using the multi-layer OhmNet method and projected to two dimensions using t-SNE. Adapted from [61]. edge types, the standard inner-product edge decoder (i.e., z(cid:62) i zj ≈ Ai,j) can be replaced with a bilinear form [12, 43, 53]: (cid:62) (17) Aτ z, DECτ (zi, zj) = z where τ indexes a particular edge type and Aτ is a learned parameter specific to edges of type τ. The matrix, Aτ , in Equation (17) can be regularized in various ways (e.g., constrained to be diagonal) [53], which can be especially useful when there are a large number of edge types, as in the case for embedding knowledge graphs. Indeed, the literature on knowledge-graph completion-where the goal is predict missing relations in knowledge graphs-contains many related techniques for decoding a large number of edge types (i.e., relations) [43].7 Recently, Dong et al. [19] also proposed a strategy for sampling random walks from heterogeneous graphs, where the random walks are restricted to only transition between particular types of nodes. This approach allows many of the methods in Section 2.2.2 to be applied on heterogeneous graphs and is complementary to the idea of including type-specific encoders and decoders. 14 ABCDE 2.5.2 Tying node embeddings across layers In some cases graphs have multiple "layers" that contain copies of the same nodes (Figure 8.A). For example, in protein-protein interaction networks derived from different tissues (e.g., brain or liver tissue), some proteins occur across multiple tissues. In these cases it can be beneficial to share information across layers, so that a node's embedding in one layer can be informed by its embedding in other layers. Zitnik et al. [61] offer one solution to this problem, called OhmNet, that combines node2vec with a regularization penalty that ties the embeddings across layers. In particular, assuming that we have a node vi, which belongs to two distinct layers G1 and G2, we can augment the standard embedding loss on this node as follows: (cid:48) L(vi) G2 G1 = L(vi) + λ(cid:107)z i − z i (cid:107) G1 i and z G2 i denote vi's embeddings in the two different layers, respectively. (18) where L denotes the usual embedding loss for that node (e.g., from Equation 8 or 11), λ denotes the regulariza- tion strength, and z Zitnik et al. further extend this idea by exploiting hierarchies between graph layers (Figure 8.B). For exam- ple, in protein-protein interaction graphs derived from various tissues, some layers correspond to interactions throughout large regions (e.g., interactions that occur in any brain tissue) while other interaction graphs are more fine-grained (e.g., only interactions that occur in the frontal lobe). To exploit this structure, embeddings can be learned at the various levels of the hierarchy, and the regularization in Equation (18) can recursively applied between layers that have a parent-child relationship in the hierarchy. 2.6 Embedding structural roles So far, all the approaches we have reviewed optimize node embeddings so that nearby nodes in the graph have similar embeddings. However, in many tasks it is more important to learn representations that correspond to the structural roles of the nodes, independent of their global graph positions (e.g., in communication or transportation networks) [30]. The node2vec approach introduced in Section 2.2.2 offers one solution to this problem, as Grover et al. found that biasing the random walks allows their model to better capture structural roles (Figure 5). However, more recently, Ribeiro et al. [51] and Donnat et al. [20] have developed node embedding approaches that are specifically designed to capture structural roles. Ribeiro et al. propose struc2vec, which involves generating a a series of weighted auxiliary graphs G (cid:48) k, k = (cid:48) {1, 2, ...} from the original graph G, where the auxiliary graph G k captures structural similarities between nodes' k-hop neighborhoods. In particular, letting Rk(vi) denote the ordered sequence of degrees of the nodes that are exactly k-hops away from vi, the edge-weights, wk(vi, vj), in auxiliary graph G(cid:48) k are recursively defined as wk(vi, vj) = wk−1(vi, vj) + d(Rk(vi), Rk(vj)), (19) where w0(vi, vj) = 0 and d(Rk(vi), Rk(vj)) measures the "distance" between the ordered degree sequences Rk(vi) and Rk(vj) (e.g., computed via dynamic time warping [51]). After computing these weighted auxillary graphs, struc2vec runs biased random walks over them and uses these walks as input to the node2vec optimiza- tion algorithm. Donnat et al. take a very different approach to capturing structural roles, called GraphWave, which relies on spectral graph wavelets and heat kernels [20]. In brief, we let L denote the graph Laplacian-i.e., L = D − A where D contains node degrees on the diagonal and A is the adjacency matrix-and we let U and λi, i = 1...V denote the eigenvector matrix and eigenvalues of L, respectively. Finally, we assume that we have a heat kernel, g(λ) = e−sλ, with pre-defined scale s. Using U and g(λ), GraphWave computes a vector, ψvi, corresponding to the structural role of node, vi ∈ V, as (cid:62) (20) ψvi = UGU vi 7We do not review this literature in detail here, and refer the reader to Nickel et al. [43] for a recent review. 15 Figure 9: A, Synthetic barbell graph used as a test dataset for detecting structural roles, where nodes are colored according to their structural roles. In this case, the structural roles (i.e., colors) are computed by examining the degrees of each node's immediate neighbors, and their 2-hop neighbors, and so on (up to V-hop neighborhoods). B-D, Visualization of the output of three role-detection algorithms on the barbell graph, where the model outputs are projected using principal components analysis. RolX (B) [30] is a baseline approach based upon hand-designed features, while struc2vec (C) and GraphWave (D) use different representation learning approaches. Note that all methods correctly differentiate the ends of the barbells from the rest of the graph, but only GraphWave is able to correctly differentiate all the various roles. Note also that there are fewer visible nodes in part D compared to A because GraphWave maps identically colored (i.e., structurally equivalent) nodes to the exact same position in the embedding space. Reprinted from [20]. where G = diag([g(λ1), ..., g(λV)]) and vi is a one-hot indicator vector corresponding to vi's row/column in the Laplacian.8 Donnat et al. show that these ψvi vectors implicitly relate to topological quantities, such as vi's degree and the number of k-cycles vi is involved in. They find that-with a proper choice of scale, s-WaveGraph is able to effectively capture structural information about a nodes role in a graph (Figure 9). 2.7 Applications of node embeddings The most common use cases for node embeddings are for visualization, clustering, node classification, and link prediction, and each of these use cases is relevant to a number of application domains, ranging from computa- tional social science to computational biology. Visualization and pattern discovery. The problem of visualizing graphs in a 2D interface has a long history, with applications throughout data mining, the social sciences, and biology [17]. Node embeddings offer a pow- erful new paradigm for graph visualization: because nodes are mapped to real-valued vectors, researchers can easily leverage existing, generic techniques for visualization high-dimensional datasets [57, 55]. For example, node embeddings can be combined with well-known techniques such as t-SNE [57] or principal components analysis (PCA) in order to generate 2D visualizations of graphs [47, 54], which can be useful for discovering communities and other hidden structures (Figures 2 and 8). Clustering and community detection. In a similar vein as visualization, node embeddings are a powerful tool for clustering related nodes, a task that has countless applications from computational biology (e.g., discovering related drugs) to marketing (e.g., discovering related products) [23]. Again, because each node is associated with real-valued vector embedding, it is possible to apply any generic clustering algorithm to the set of learned node embeddings (e.g., k-means or DB-scan [22]). This offers an open-ended and powerful alternative to traditional community detection techniques, and it also opens up new methodological opportunities, since node embeddings can capture the functional or structural roles played by different nodes, rather than just community structure. Node classification and semi-supervised learning. Node classification is perhaps the most common bench- mark task used for evaluating node embeddings. In most cases, the node classification task is a form of semi- supervised learning, where labels are only available for a small proportion of nodes, with the goal being to label the full graph based only on this small initial seed set. Common applications of semi-supervised node classification include classifying proteins according to their biological function [28] and classifying documents, 8Note that Equation (20) can be efficiently approximated via Chebyshev polynomials [20]. 16 ABCDRolXStruc2vecGraphWave videos, web pages, or individuals into different categories/communities [28, 35, 47, 54]. Recently, Hamilton et al. [29] introduced the task of inductive node classification, where the goal is to classify nodes that were not seen during training, e.g. classifying new documents in evolving information graphs or generalizing to unseen protein-protein interaction networks. Link prediction. Node embeddings are also extremely useful as features for link prediction, where the goal is to predict missing edges, or edges that are likely to form in the future [3]. Link prediction is at the core of recommender systems and common applications of node embeddings reflect this deep connection, including predicting missing friendship links in social networks [54] and affinities between users and movies [56]. Link prediction also has important applications in computational biology. Many biological interaction graphs (e.g., between proteins and other proteins, or drugs and diseases) are incomplete, since they rely on data obtained from costly lab experiments. Predicting links in these noisy graphs is an important method for automatically expanding biological datasets and for recommending new directions for wet-lab experimentation [41]. More generally, link prediction is closely related to statistical relational learning [24], where a common task is to predict missing relations between entities in a knowledge graph [43]. 3 Embedding subgraphs We now turn to the task of representation learning on (sub)graphs, where the goal is to encode a set of nodes and edges into a low-dimensional vector embedding. More formally, the goal is to learn a continuous vector representation, zS ∈ Rd, of an induced subgraph G[S] of the full graph G, where S ⊆ V. Note that these methods can embed both subgraphs (S ⊂ V) as well as entire graphs (S = V). The embedding, zS, can then be used to make predictions about the entire subgraph; for example, one might embed graphs corresponding to different molecules to predict their therapeutic properties [21]. Representation learning on subgraphs is closely related to the design of graph kernels, which define a dis- tance measure between subgraphs [58]. That said, we omit a detailed discussion of graph kernels, which is a large and rich research area of its own, and refer the reader to [58] for a detailed discussion. The methods we review differ from the traditional graph kernel literature primarily in that we seek to learn useful representations from data, rather than pre-specifying feature representations through a kernel function. Many of the methods in this section build upon the techniques used to embed individual nodes, introduced in Section 2. However, unlike the node embedding setting, most subgraph embedding approaches are fully- supervised, being used for subgraph classification, where the goal is to predict a label associated with a par- ticular subgraph. Thus, in this section we will focus on the various different approaches for generating the zS embeddings, with the assumption that these embeddings are being fed through a cross-entropy loss function, analogous to Equation (16). 3.1 Sets of node embeddings and convolutional approaches There are several subgraph embedding techniques that can be viewed as direct extensions of the convolutional node embedding algorithms (described in Section 2.3.2). The basic intuition behind these approaches is that they equate subgraphs with sets of node embeddings. They use the convolutional neighborhood aggregation idea (i.e., Algorithm 1) to generate embeddings for nodes and then use additional modules to aggregate sets of node embeddings corresponding to subgraphs. The primary distinction between the different approaches in this section is how they aggregate the set of node embeddings corresponding to a subgraph. 17 3.1.1 Sum-based approaches For example, "convolutional molecular fingerprints" introduced by Duvenaud et al. [21] represent subgraphs in molecular graph representations by summing all the individual node embeddings in the subgraph: zS = zi, (21) (cid:88) vi∈S where the embeddings, {zi,∀vi ∈ S}, are generated using a variant of Algorithm 1. Dai et al. [16] employ an analogous sum-based approach but note that it has conceptual connections to mean- field inference: if the nodes in the graph are viewed as latent variables in a graphical model, then Algorithm 1 can be viewed as a form of mean-field inference where the message-passing operations have been replaced with differentiable neural network alternatives. Motivated by this connection, Dai et al. [16] also propose a modified encoder based on Loopy Belief Propagation [42]. Using the placeholders and notation from Algorithm 1, the basic idea behind this alternative is to construct intermediate embeddings, ηi,j, corresponding to edges, (i, j) ∈ E: ηk i,j = σ(WkE · COMBINE(xi, AGGREGATE(ηk−1 l,i These edge embeddings are then aggregated to form the node embeddings: ,∀vl ∈ N (vi) \ vj})). (22) zi = σ(WkV · COMBINE(xi, AGGREGATE({ηK i,l,∀vl ∈ N (vi)})). (23) Once the embeddings are computed, Dai et al. [16], use a simple element-wise sum to combine the node em- beddings for a subgraph, as in Equation (21). 3.1.2 Graph-coarsening approaches Defferrard et al. [18] and Bruna et al. [8] also employ convolutional approaches, but instead of summing the node embeddings for the whole graph, they stack convolutional and "graph coarsening" layers (similar to the HARP approach in Section 2.2.2). In the graph coarsening layers, nodes are clustered together (using any graph clustering approach), and the clustered node embeddings are combined using element-wise max-pooling. After clustering, the new coarser graph is again fed through a convolutional encoder and the process repeats. Unlike the convolutional approaches discussed in 2.3.2, Defferrard et al. [18] and Bruna et al. [8] also place considerable emphasis on designing convolutional encoders based upon the graph Fourier transform [15]. However, because the graph Fourier transform requires identifying and manipulating the eigenvectors of the graph Laplacian, naive versions of these approaches are necessarily O(V3). State-of-the-art approximations to these spectral approaches (e.g. , using Chebyshev polynomials) are conceptually similar to Algorithm 1, with some minor variations, and we refer the reader to Bronstein et al. [7] for a thorough discussion of these techniques. 3.1.3 Further variations Other variants of the convolutional idea are proposed by Neipert et al. [44] and Kearnes et al. [34]. Both advocate alternative methods for aggregating sets of node embeddings corresponding to subgraphs: Kearnes et al. aggregate sets of nodes using "fuzzy" histograms instead of a sum, and they also employ edge embedding layers similar to [16]. Neipart et al. define an ordering on the nodes-e.g. using a problem specific ordering or by employing an off-the-shelf vertex coloring algorithm-and using this ordering, they concatenate the embeddings for all nodes and feed this concatenated vector through a standard convolutional neural network architecture. 18 3.2 Graph neural networks In addition to the convolution-inspired embedding approaches discussed above, there is a related-and chrono- logically prior-line of work on "graph neural networks" (GNNs) [52]. Conceptually, the GNN idea is closely related to Algorithm 1. However, instead of aggregating information from neighbors, the intuition behind GNNs is that graphs can be viewed as specifying scaffolding for a "message passing" algorithm between nodes. In the original GNN framework [52] every node vi is initialized with a random embedding h0 i , and at each iteration of the GNN algorithm nodes accumulate inputs from their neighbors according to h(hj, xi, xj), (24) (cid:88) hk i = vj∈N (vi) where h is an arbitrary differentiable function of the form h : Rd×Rm×Rm → Rd. Equation (24) is repeatedly applied in a recursive fashion until the embeddings converge, and special care must be taken to ensure that h is a contraction map. Once the embeddings have converged after K iterations, the final output embeddings are computed as zvi = g(hK i ), where g is an arbitrary differentiable function of the form g : Rd → Rd. Scarselli et al. [52] discuss various parameterizations of h and g based on multi-layer perceptrons (MLPs), though they are limited by the need to iterate the message passing to convergence and by the restriction that f must be a contraction map. Li et al. [39] extend and modify the GNN framework to use Gated Recurrent Units and back propagation through time [14], which removes the need to run Equation (24) to convergence. Adapting the GNN framework to use modern recurrent units also allows Li et al. to leverage node attributes for initialization and to use the output of intermediate embeddings of subgraphs. In particular, Li et al.'s Gated Graph Neural Networks initialize the h0 i = xi) and have update equations of the form i vectors using node attributes (i.e., h0 where W ∈ Rd×d is a trainable weight matrix and GRU denotes the Gated Recurrent Unit introduced by Cho et al. [14]. Finally, Gilmer et al. [25] discuss another abstraction of GNNs, considering models of the form hk−1 i , (cid:88) vj∈N (vi)  , Whk−1 j hk i = GRU hk−1 i , (cid:88) vj∈N (vi) hk i = U q(hk−1 i , hk−1 j )  , (25) (26) where q : Rd × Rd → Rd(cid:48) is a differentiable function that computes the incoming "messages" from neighbors and U : Rd×Rd(cid:48) → Rd is a differentiable "update" function. This framework-termed Message Passing Neural Networks (MPNNs)-generalizes Li et al.'s Gated Graph Neural Networks as well as a number of the earlier mentioned convolutional approaches. Gilmer et al. discuss a number of variants and extensions of MPNNs (e.g., incorporating edge features) from the perspective of predicting the properties of molecules based on their graph structure. All of these graph neural network approaches can in principle be used for node-level embedding tasks, though they are more often used for subgraph-level embeddings. To compute subgraph embeddings, any of the aggregation procedures described in Section 3.1 could be employed, but Scarselli et al. [52] also suggest that the aggregation can be done by introducing a "dummy" super-node that is connected to all nodes in the target subgraph. 19 3.3 Applications of subgraph embeddings The primary use case for subgraph embeddings is for subgraph classification, which has important applications in a number of areas. The most prominent application domain is for classifying the properties of graphs cor- responding to different molecules [16, 21, 44, 34]. Subgraph embeddings can be used to classify or predict various properties of molecular graphs, including predicting the efficacy of potential solar cell materials [16], or predicting the therapeutic effect of candidate drugs [34]. More generally, subgraph embeddings have been used to classify images (after converting the image to a graph representation) [8], to predict whether a computer program satisfies certain formal properties [39], and to perform logical reasoning tasks [39]. 4 Conclusion and future directions Representation learning approaches for machine learning on graphs offer a power alternative to traditional fea- ture engineering. In recent years, these approaches have consistently pushed the state of the art on tasks such as node classification and link prediction. However, much work remains to be done, both in improving the per- formance of these methods, and-perhaps more importantly-in developing consistent theoretical frameworks that future innovations can build upon. 4.1 Challenges to future progress In this review, we attempted to unify a number of previous works, but the field as a whole still lacks a consistent theoretical framework-or set of frameworks-that precisely delineate the goals of representation learning on graphs. At the moment, the implicit goal of most works is to generate representations that perform well on a particular set of classification or link prediction benchmarks (and perhaps also generate qualitatively pleasing visualizations). However, the unchecked proliferation of disparate benchmarks and conceptual models presents a real risk to future progress, and this problem is only exacerbated by the popularity of node and graph embedding techniques across distinct, and somewhat disconnected, subfields within the machine learning and data mining communities. Moving forward as a field will require new theoretical work that more precisely describes the kinds of graph structures that we expect the learned representations to encode, how we expect the models to encode this information, and what constraints (if any) should be imposed upon on these learned latent spaces. More developed theoretical foundations would not only benefit researchers in the field-e.g., by informing consistent and meaningful benchmark tasks-these foundations would also allow application domain-experts to more effectively choose and differentiate between the various approaches. Current methods are often evaluated on a variety of distinct benchmarks that emphasize various different graph properties (e.g., community structures, relationship strengths between nodes, or structural roles). However, many real-world applications are more focused, and it is not necessary to have representations that are generically useful for a wide variety of tasks. As a field, we need to make it clear what method should be used when, and prescribing such use-cases requires a more precise theoretical understanding of what exactly our learned representations are encoding. 4.2 Important open problems In addition to the general challenges outlined above, there are a number of concrete open problems that remain to be addressed within the area of representation learning on graphs. Scalability. While most of the works we reviewed are highly scalable in theory (i.e., O(E) training time), there is still significant work to be done in scaling node and graph embedding approaches to truly massive datasets (e.g., billions of nodes and edges). For example, most methods rely on training and storing a unique embedding for each individual node. Moreover, most evaluation setups assume that the attributes, embeddings, and edge lists of all nodes used for both training and testing can fit in main memory-an assumption that is at odds with 20 the reality of most application domains, where graphs are massive, evolving, and often stored in a distributed fashion. Developing representation learning frameworks that are truly scalable to realistic production settings is necessary to prevent widening the disconnect between the academic research community and the application consumers of these approaches. Decoding higher-order motifs. While much work in recent years has been dedicated to refining and improving the encoder algorithm used to generate node embeddings, most methods still rely on basic pairwise decoders, which predict pairwise relations between nodes and ignore higher-order graph structures involving more than two nodes. It is well-known that higher-order structural motifs are essential to the structure and function of complex networks [5], and developing decoding algorithms that are capable of decoding complex motifs is an important direction for future work. Modeling dynamic, temporal graphs. Many application domains involve highly dynamic graphs where timing information is critical-e.g., instant messaging networks or financial transaction graphs. However, we lack embedding approaches that can cope with the unique challenges presented by temporal graphs, such as the task of incorporating timing information about edges. Temporal graphs are becoming an increasingly important object of study [46], and extending graph embedding techniques to operate over them will open up a wide range of exciting application domains. Reasoning about large sets of candidate subgraphs. A major technical limitation of current subgraph em- bedding approaches is that they require the target subgraphs to be pre-specified before the learning process. However, many applications seek to discover subgraphs with certain properties, and these applications require models that can reason over the combinatorially large space of possible candidate subgraphs. For example, one might want to discover central subgraphs in a gene regulatory network, or uncover nefarious sub-communities in a social network. We need improved subgraph embedding approaches that can efficiently reason over large sets of candidate subgraphs, as such improvements are critical to expand the usefulness of subgraph embeddings beyond the task of basic subgraph classification. Improving interpretability. Representation learning is attractive because it relieves much of the burden of hand designing features, but it also comes at a well-known cost of interpretability. We know that embedding- based approaches give state-of-the-art performance, but the fundamental limitations-and possible underlying biases-of these algorithms are relatively unknown. In order to move forward, care must be taken to develop new techniques to improve the interpretability of the learned representations, beyond visualization and benchmark evaluation. Given the complexities and representational capacities of these approaches, researchers must be ever vigilant to ensure that their methods are truly learning to represent relevant graph information, and not just exploiting statistical tendencies of benchmarks. Acknowledgments The authors thank Marinka Zitnik, Zoubin Ghahramani, Richard Turner, Stephen Bach, and Manan Ajay Shah for their helpful discussions and comments on early drafts. This research has been supported in part by NSF IIS- 1149837, DARPA SIMPLEX, Stanford Data Science Initiative, and Chan Zuckerberg Biohub. W.L.H. was also supported by the SAP Stanford Graduate Fellowship and an NSERC PGS-D grant. The views and conclusions expressed in this material are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the above funding agencies, corporations, or the U.S. and Canadian governments. References [1] A. Ahmed, N. Shervashidze, S. Narayanamurthy, V. Josifovski, and A.J. Smola. Distributed large-scale natural graph factorization. In WWW, 2013. 21 [2] R. Angles and C. Gutierrez. Survey of graph database models. ACM Computing Surveys, 40(1):1, 2008. [3] L. Backstrom and J. Leskovec. Supervised random walks: predicting and recommending links in social networks. In WSDM, 2011. [4] M. Belkin and P. Niyogi. Laplacian eigenmaps and spectral techniques for embedding and clustering. In NIPS, 2002. Science, [5] A.R. Benson, D.F. Gleich, and J. Leskovec. Higher-order organization of complex networks. 353(6295):163–166, 2016. [6] S. Bhagat, G. Cormode, and S. Muthukrishnan. Node classification in social networks. In Social Network Data Analytics, pages 115–148. 2011. [7] M. M. Bronstein, J. Bruna, Y. LeCun, A. Szlam, and P. Vandergheynst. Geometric deep learning: Going beyond euclidean data. IEEE Signal Processing Magazine, 34(4):18–42, 2017. [8] J. Bruna, W. Zaremba, and Y. Szlam, A.and LeCun. Spectral networks and locally connected networks on graphs. In ICLR, 2014. [9] S. Cao, W. Lu, and Q. Xu. Grarep: Learning graph representations with global structural information. In KDD, 2015. [10] S. Cao, W. Lu, and Q. Xu. Deep neural networks for learning graph representations. In AAAI, 2016. [11] B.P. Chamberlain, J. Clough, and M.P. Deisenroth. Neural embeddings of graphs in hyperbolic space. arXiv preprint arXiv:1705.10359, 2017. [12] S. Chang, W. Han, J. Tang, G. Qi, C.C. Aggarwal, and T.S. Huang. Heterogeneous network embedding via deep architectures. In KDD, 2015. [13] H. Chen, B. Perozzi, Y. Hu, and S. Skiena. Harp: Hierarchical representation learning for networks. arXiv preprint arXiv:1706.07845, 2017. [14] K. Cho, B. Van Merrienboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, and Y. Bengio. Learning phrase representations using rnn encoder-decoder for statistical machine translation. In EMNLP, 2014. [15] Fan RK Chung. Spectral Graph Theory. Number 92. American Mathematical Soc., 1997. [16] H. Dai, B. Dai, and L. Song. Discriminative embeddings of latent variable models for structured data. In ICML, 2016. [17] M.C.F. De Oliveira and H. Levkowitz. From visual data exploration to visual data mining: a survey. IEEE Transac- tions on Visualization and Computer Graphics, 9(3):378–394, 2003. [18] M. Defferrard and P. Bresson, X.and Vandergheynst. Convolutional neural networks on graphs with fast localized spectral filtering. In NIPS, 2016. [19] Y. Dong, N.V. Chawla, and A. Swami. metapath2vec: Scalable representation learning for heterogeneous networks. In KDD, 2017. [20] C. Donnat, M. Zitnik, D. Hallac, and J. Leskovec. Learning structural node embeddings via diffusion wavelets. arXiv preprint arXiv:1710.10321, 2017. [21] D. Duvenaud, D. Maclaurin, J. Iparraguirre, R. Bombarell, T. Hirzel, A. Aspuru-Guzik, and R.P. Adams. Convolu- tional networks on graphs for learning molecular fingerprints. In NIPS, 2015. [22] M. Ester, H. Kriegel, J. Sander, X. Xu, et al. A density-based algorithm for discovering clusters in large spatial databases with noise. In KDD, 1996. [23] S. Fortunato. Community detection in graphs. Physics Reports, 486(3):75–174, 2010. [24] L. Getoor and B. Taskar. Introduction to Statistical Relational Learning. MIT press, 2007. [25] J. Gilmer, S.S. Schoenholz, P.F. Riley, O. Vinyals, G.E. Dahl. Neural Message Passing for Quantum Chemistry. In ICML, 2017. [26] M. Gori, G. Monfardini, and F. Scarselli. A new model for learning in graph domains. In IEEE International Joint Conference on Neural Networks, 2005. 22 [27] P. Goyal and E. Ferrara. Graph embedding techniques, applications, and performance: A survey. arXiv preprint arXiv:1605.09096, 2017. [28] A. Grover and J. Leskovec. node2vec: Scalable feature learning for networks. In KDD, 2016. [29] W.L. Hamilton, R. Ying, and J. Leskovec. Inductive representation learning on large graphs. arXiv preprint, arXiv:1603.04467, 2017. [30] K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong, S. Basu, L. Akoglu, D. Koutra, C. Faloutsos, and L. Li. Rolx: structural role extraction & mining in large graphs. In KDD, 2012. [31] G. Hinton and R. Salakhutdinov. Reducing the dimensionality of data with neural networks. Science, 313(5786):504– 507, 2006. [32] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780, 1997. [33] P. Hoff, A.E. Raftery, and M.S. Handcock. Latent space approaches to social network analysis. JASA, 97(460):1090– 1098, 2002. [34] S. Kearnes, K. McCloskey, M. Berndl, V. Pande, and P. Riley. Molecular graph convolutions: moving beyond fingerprints. Journal of Computer-Aided Molecular Design, 30(8):595–608, 2016. [35] T.N. Kipf and M. Welling. Semi-supervised classification with graph convolutional networks. In ICLR, 2016. [36] T.N. Kipf and M. Welling. Variational graph auto-encoders. In NIPS Workshop on Bayesian Deep Learning, 2016. [37] J.B. Kruskal. Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika, 29(1):1–27, 1964. [38] J.A. Lee and M. Verleysen. Nonlinear dimensionality reduction. Springer Science & Business Media, 2007. [39] Y. Li, D. Tarlow, M. Brockschmidt, and R. Zemel. Gated graph sequence neural networks. In ICLR, 2015. [40] D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. Journal of the Association for Information Science and Technology, 58(7):1019–1031, 2007. [41] Q. Lu and L. Getoor. Link-based classification. In ICML, volume 3, pages 496–503, 2003. [42] K. Murphy, Y. Weiss, and M. Jordan. Loopy belief propagation for approximate inference: An empirical study. In UAI, 1999. [43] M. Nickel, K. Murphy, V. Tresp, and E. Gabrilovich. A review of relational machine learning for knowledge graphs. Proceedings of the IEEE, 104(1):11–33, 2016. [44] M. Niepert, M. Ahmed, and K. Kutzkov. Learning convolutional neural networks for graphs. In ICML, 2016. [45] M. Ou, P. Cui, J. Pei, Z. Zhang, and W. Zhu. Asymmetric transitivity preserving graph embedding. In KDD, 2016. [46] A. Paranjape, A. R. Benson, and J. Leskovec. Motifs in temporal networks. In WSDM, 2017. [47] B. Perozzi, R. Al-Rfou, and S. Skiena. Deepwalk: Online learning of social representations. In KDD, 2014. [48] B. Perozzi, V. Kulkarni, and S. Skiena. Walklets: Multiscale graph embeddings for interpretable network classifica- tion. arXiv preprint arXiv:1605.02115, 2016. [49] Bryan Perozzi. Local Modeling of Attributed Graphs: Algorithms and Applications. PhD thesis, Stony Brook University, 2016. [50] T. Pham, T. Tran, D.Q. Phung, and S. Venkatesh. Column networks for collective classification. In AAAI, 2017. [51] L.F.R. Ribeiro, P.H.P. Saverese, and D.R. Figueiredo. struc2vec: Learning node representations from structural identity. In KDD, 2017. [52] F. Scarselli, M. Gori, A.C. Tsoi, M. Hagenbuchner, and G. Monfardini. The graph neural network model. IEEE Transactions on Neural Networks, 20(1):61–80, 2009. [53] M. Schlichtkrull, T.N. Kipf, P. Bloem, R. van den Berg, I. Titov, and M. Welling. Modeling relational data with graph convolutional networks. arXiv preprint arXiv:1703.06103, 2017. 23 [54] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei. Line: Large-scale information network embedding. In WWW, 2015. [55] J. Tenenbaum, V. De Silva, and J. Langford. A global geometric framework for nonlinear dimensionality reduction. Science, 290(5500):2319–2323, 2000. [56] R. van den Berg, T.N. Kipf, and M. Welling. Graph convolutional matrix completion. arXiv:1706.02263, 2017. arXiv preprint [57] L. van der Maaten and G. Hinton. Visualizing data using t-sne. JMLR, 9:2579–2605, 2008. [58] S.V.N. Vishwanathan, N.N. Schraudolph, R. Kondor, and K.M. Borgwardt. Graph kernels. JMLR, 11:1201–1242, 2010. [59] D. Wang, P. Cui, and W. Zhu. Structural deep network embedding. In KDD, 2016. [60] Z. Yang, W. Cohen, and R. Salakhutdinov. Revisiting semi-supervised learning with graph embeddings. In ICML, 2016. [61] M. Zitnik and J. Leskovec. Predicting multicellular function through multi-layer tissue networks. Bioinformatics, 2017. 24
1104.4296
1
1104
2011-04-21T15:46:11
Collaboration in computer science: a network science approach. Part II
[ "cs.SI", "cs.DL", "physics.soc-ph" ]
We represent collaboration of authors in computer science papers in terms of both affiliation and collaboration networks and observe how these networks evolved over time since 1960. We investigate the temporal evolution of bibliometric properties, like size of the discipline, productivity of scholars, and collaboration level in papers, as well as of large-scale network properties, like reachability and average separation distance among scientists, distribution of the number of scholar collaborators, network clustering and network assortativity by number of collaborators.
cs.SI
cs
Collaboration in computer science: a network science approach. Part II Massimo Franceschet Department of Mathematics and Computer Science, University of Udine Via delle Scienze 206 -- 33100 Udine, Italy [email protected] Abstract We represent collaboration of authors in computer science papers in terms of both affiliation and collaboration networks and observe how these networks evolved over time since 1960. We investigate the temporal evolution of bibliometric properties, like size of the discipline, productivity of scholars, and collaboration level in papers, as well as of large-scale network properties, like reachability and average separation distance among scientists, distribution of the number of scholar collaborators, network clustering and network assortativity by number of collaborators. Key words: Bibliometrics; Research collaboration; Affiliation networks; Collaboration networks; Network science 1. Introduction The process of scholarly publication of research achievements leaves behind itself a trail of footprints that can be weaved into densely intertwined bibliographic networks. Examples of such networks that have been extensively studied are citation networks, which are webs of bibliographic references among academic papers or journals, and collaboration networks, where scholars are connected if they co-authored a paper together. The field of network science -- the holistic analysis of complex systems through the study of the structure of networks that wire their components -- is an optimal solution for the study of these (and many other) networks (Newman, 2010). We take advantage of the network science paraphernalia and make a longitudinal (time- resolved) study of properties that emerge from co-authorship in conference and journal pub- lications in computer science. We represent co-authorship in terms of two differently grained networks. The first representation is an author-paper affiliation network, that is a bipartite graph with two series of nodes representing authors and papers, and links running from au- thors to papers they authored. With the support of this network we investigate bibliometric properties like the number of published papers, the number of active scholars, the average number and the distribution of papers per author, and the average number and the distri- bution of authors per paper. We study how these properties changed over time in the last 50 years of computer science. Preprint submitted to arXiv.org January 24, 2020 The second representation of co-authorship that we take advantage of is a coarser network, known in the literature as collaboration network, which is obtained from the earlier mentioned affiliation network by an operation of projection on the set of author nodes. A collaboration network is a social network in which the actors are the scholars and the ties represent the collaborations in papers among scholars. In most cases, two authors that have written a paper together do know each other quite well, at least from a scientific perspective, and hence they are tied by a social relationship. This calls for the investigation of typical large- scale properties of social networks, like reachability and average separation distance among scholars, distribution of the number of scholar collaborators, network clustering and network assortativity by number of collaborators. Again, these properties are analysed in a temporal perspective, observing how they varied since the 1960s. Putting together the affiliation and the collaboration network analyses, we get a dynamic picture of how bibliometric and collaboration patterns evolved in the last half-century of computer science. This is the second part of our investigation of collaboration in computer science using a network science approach. The first part of the study is atemporal: we investigate biblio- metric and collaboration properties of the cumulative affiliation and collaboration networks considering all papers published in computer science since 1936 (Franceschet, 2011). While the first investigation provides a static picture of the collaboration in computer science, the present analysis gives a dynamic perspective on how collaboration in computer science evolved over time. 2. Related literature Academic collaboration has been extensively studied in bibliometrics, the branch of in- formation and library science that quantitatively investigates the process of publication of research achievements; see Franceschet and Costantini (2010) and references therein. Col- laboration intensity varies across disciplines: it is fundamental in the sciences, moderate in the social sciences, and mostly negligible in the arts and humanities. Collaborative works are generally valued higher by peer experts and they receive more citations from other papers. Collaboration has been also investigated in the context of network science. The notion of academic collaboration network first appeared in a brief note by mathematician Goffman (1969). Newman was the first to experimentally study large-scale collaboration networks with the aid of modern network analysis toolkit. He analysed the structural properties of collaboration networks for biomedicine, physics (Newman, 2001b,c), and mathematics (Newman, 2004), as well as the temporal evolution of collaboration networks in physics and biomedicine (Newman, 2001a). Barab´asi et al. (2002) studied the evolution in time of collab- oration networks in neuroscience and mathematics. The temporal dynamics of mathematics collaboration networks is also investigated by Grossman (2002). Moody (2004) studied the structure and the temporal evolution of a social science collaboration network. As for studies concerning computer science collaboration networks, Huang et al. (2008) considered publications from 1980 to 2005 extracted from the CiteSeer digital library. The authors studied properties at both the network level and the community level and how they evolve in time. Bird et al. (2009) focused on the structure and dynamics of collaboration in research communities within computer science. They isolated 14 computing areas, selected the top tier conferences for each area, and extracted publication data for the chosen confer- ences from DBLP 2008. They used network analysis metrics to find differences in the research 2 styles of the areas and how these areas interrelate in terms of author overlap and migration. Menezes et al. (2009) made a geographical analysis of collaboration patterns using network analysis. They considered publications from 1954 to 2007 for members of 30 research in- stitutions (8 from Brazil, 16 from North America, and 6 from Europe) and focused on the differences in collaboration habits among these geographical areas. Our investigation differs from the mentioned previous studies on computer science for the following reasons: • we use the most complete dataset and build the largest affiliation and collaboration networks ever investigated for computer science; • with the support of the affiliation network representation of collaboration, we study the temporal evolution of bibliometric properties for computer science, like size of the discipline in terms of papers and scholars, author productivity, and collaboration level on papers; • with the aid of the collaboration network we study the evolution of meaningful large- scale network properties; in particular the size of biconnected components and the concentration of collaboration using the Gini coefficient have never been examined before for computer science. 3. Methodology Data were collected from The DBLP Computer Science Bibliography (DBLP, for short) (Ley, 2011). The DBLP literature reference database was developed within the last 15 years by Dr. Michael Ley at Trier University, Germany. DBLP is internationally respected by informatics researchers for the accuracy of its data. As of today, DBLP contains more than 1.6 million entries covering computer and information science. Each publication record in DBLP has a key that uniquely identifies the publication and a property that represents the publication type, such as journal article, conference article, book, book chapter, and thesis. Moreover, it contains a semi-structured list of bibliographic attributes describing the publication, like authors, title, and year of publication. This list veries according to the publication type (Ley, 2009). In particular the publication year attribute was fundamental to make the present time-resolved study. DBLP is particularly careful with respect to the quality of its data, and is especially sensi- ble to the name problem, which includes the cases of a scholar with several names (synonyms) and of several scholars with the same name (homonyms) (Reuther et al., 2006). DBLP uses full names and avoids initials as much as possible. This reduces, but does not eliminate, the name problem. Furthermore, it uses effective heuristics on the collaboration graph to identify possible cases of synonyms or homonyms. For instance, if two lexicographically similar names are assigned to authors that have a distance of two in the collaboration graph, that is, these authors never directly collaborated in a paper but they have a common collaborator, then these names are identified as possible synonyms and they are further manually investigated. Furthermore, if the list of co-authors of an author splits in two or more clusters of highly interconnected authors, but with no collaborations among authors of different clusters, then we might have a case of homonym, and an additional manual check is performed. 3 DBLP can be used free of charge. Data can be accessed using a Web interface or through automatic HTTP requests, and the entire dataset can be downloaded in XML format to run experiments on top of it. We downloaded the XML version of DBLP bibliographic dataset in early 2010 (637.9 MB) and filtered all publications from 1936 to 2008 inclusive.1 On top of this database we built the following networks: • Author-paper affiliation network. This is a bipartite graph with two types of nodes: authors and papers. There is an edge from an author to a paper if the author has writ- ten the paper. See an example in Figure 1. Affiliation networks are the most complete representations for the study of collaboration (Newman, 2010); unfortunately, this bi- partite representation for collaboration has received few attention in the literature. For each year Y from 1960 to 2008, we study the yearly author-paper affiliation network AN (Y ), which contains bibliographic data for all papers published in year Y . We ex- cluded years before 1960 since the number of database records for these early years of computer science is not significant.2 • collaboration network. A collaboration network is an undirected graph obtained from the projection of the author-paper affiliation network on the author set of nodes. Nodes of the collaboration network represent authors and there is an edge between two authors if they have collaborated in at least one paper. An example is given in Figure 1. Clearly, the collaboration network is a coarser representation with respect to the affiliation network; for instance, if three authors are mutually linked in the collaboration network, then it is not clear, from the analysis of the collaboration network alone, whether they have collaborated in a single paper or in three different ones. Nevertheless, the collaboration network is highly informative since many collaboration patterns can be captured by analysing this form of representation. Furthermore, the collaboration network is the main (mostly unique) representation of collaboration that has been studied in the network science literature. For each year Y from 1960 to 2008, we study the cumulative collaboration network CN (Y ), which contains collaboration data for all papers published until year Y . We saved the collaboration networks in GraphML format (an XML syntax for graphs). We loaded them in the R environment for statistical computing (R Development Core Team, 2008) and analysed the structure of the networks using the R package igraph developed by G´abor Cs´ardi and Tam´as Nepusz. On the other hand, we never materialized the (much larger) affiliation networks. Instead, we used XQuery, the standard XML query language, and BaseX (DBIS Research Group, 2011), a light-speed native XML database, to extract the relevant properties from the XML version of the DBLP database. 1We excluded year 2009 since for it the bibliography has not reached the same level of completeness as for previous years. 2For instance, DBLP contains 259 records for year 1959, 23 records for year 1949, and 12 records for year 1936. 4 P Q R A C B D A B C D Figure 1: A toy example of an author-paper affiliation network (left graph). Authors (circle nodes) match the papers (square nodes) that they wrote. We also show the corresponding collaboration network (right graph). In this case, two authors are connected if they wrote at least one paper together. 4. Affiliation network properties In this section we investigate properties of the author-paper affiliation network of com- puter science. We recall that the computer science author-paper affiliation network is a bipartite graph with two node types representing authors and papers; edges match authors with papers they wrote. For each year from 1960 to 2008, we study the yearly affiliation net- work build from all papers published in that year. In particular, with the aid of the affiliation network, we investigate the temporal evolution of the following bibliometric properties for computer science: number of published papers, number of active authors, average number of papers per author, and average number of authors per paper. Figure 2 depicts the size of the computer science discipline in terms of number of papers that are published for each year since 1960. With respect to the author-paper affiliation network, this is the number of nodes of type paper in the network. The computer science field is steadily expanding in terms of number of published papers. However, the proportion of conference and journal papers changed over years. Until 1983, the volume of journal papers dominates that of conference papers. However, since 1984 conferences are the most popular publication venue in computer science, and in the recent years computer science published almost two conference papers every one journal paper (Franceschet, 2010). What are the reasons of the growth of the computer science field? We investigated, for each year, the number of active authors, which are authors that published at least one paper in the year, and the author productivity, defined as the average number of papers published by an active author in the year. With respect to the author-paper affiliation network, the number of active authors is the number of nodes of type author in the network, and the author productivity is the average degree of nodes of type author. Indeed, the degree of a node of type author on the author-paper bipartite network is precisely the number of papers published by the author. Figure 3 shows the temporal evolution of both variables (number of active authors and their productivity). Both variables are growing over time, although the author productivity shows some oscillations during the 1960s. Hence, the expansion over time of computer science in terms of number of papers is justified by an increase in the number of active authors and by a rise of the author productivity. Substantially, the discipline grows since there are more active scholars and these scholars write more papers. 5 conference journal 0 0 0 8 0 0 0 4 0 1960 1970 1980 1990 s r e p a p f o r e b m u N 0 0 0 0 8 0 0 0 0 6 0 0 0 0 4 0 0 0 0 2 0 1960 1970 1980 1990 2000 2008 Year Figure 2: The size of the computer science discipline in terms of number of conference papers (solid line) and number of journal papers (dashed line) that are published for each year. The inset refers to the shorter period from 1960 to 1990. Finally, we observed, for each year, the average collaboration level in papers, defined as the average number of authors per paper published in the year. With respect to the author- paper affiliation network, the average collaboration level is the average degree of nodes of type paper. Indeed, the degree of a paper node is the number of authors that signed the paper. Figure 4 shows that collaboration in papers increased over time. The average paper in 2008 has 2.95 authors, while the average one in 1960 had 1.30 authors.3 5. Collaboration network properties In this section we study large-scale properties of the collaboration network of computer science. Recall that the computer science collaboration network is a graph with nodes rep- resenting the computer science scholars and edges representing the collaborations between scholars in research papers. For each year from 1960 to 2008, we study the cumulative collabo- ration network build from all papers published until that year. Specifically, we investigate the temporal evolution of the following properties of the computer science collaboration network: connectivity of the network, average separation distance among scholars, distribution of the 3Recent bibliometric studies have shown that computer science papers jointly written by two authors are generally of better quality (as judged by peer experts) that single-author papers, and the number of citations received from other papers grows with the number of authors of the paper (Franceschet and Costantini, 2010). 6 y t i v i t c u d o r P 8 . 1 4 . 1 0 . 1 0 0 0 0 0 2 0 0 0 0 5 1 0 0 0 0 0 1 0 0 0 0 5 0 s r o h t u a f o r e b m u N 1960 1980 2000 1960 1970 1980 1990 2000 2008 Year Figure 3: The size of the computer science discipline in terms of number of active authors for each year. The inset shows the author productivity in terms of the average number of papers published by an author. number of scholar collaborators, network clustering and network assortativity by number of collaborators. It is reasonable to assume that scientific information flows through paths of the collab- oration networks; we expect, indeed, that two authors that collaborated in some paper are willing to exchange scientific information with a higher probability than two scholars that never met. A reasonable question is: is there a collaboration path between any two scholars of the network? If not, what is the largest component of the graph that has the desirable property that any two scholars of the component are connected by at least one path? A connected component of an undirected graph is a maximal subset of nodes such that any node in the set is reachable from any other node in the set by traversing a path of intermediate nodes. A connected component of a collaboration graph is hence a maximal set of authors that are mutually reachable through chains of collaborators. A large connected component in the collaboration graph, of the order of the number of scholars, is a desirable property for a discipline that signals its maturity: theories and experimental results can reach, via collaboration chains, the great majority of the scholars working in the field, and thus scholars are scientifically well-informed and can incrementally build new theories and discover new results on top of established knowledge. Of course, collaboration represents only one way to spread scientific information; the processes of journal publishing and conference attendance make also notable contributions in this direction. A useful generalization of the concept of connected component in the k-connected compo- nent (or simply k-component). A k-component is a maximal set of vertices such that each is reachable from each of the others by at least k node-independent paths. Two paths are said 7 0 . 3 5 . 2 0 . 2 5 . 1 r e p a p r e p s r o h t u A 1960 1970 1980 1990 2000 2008 Year Figure 4: The average collaboration level in papers for each year. node-independent if they do not share any intermediate node. For the common case k = 2, k-components are called bicomponents. An interesting property of k-components is that they remain connected (in the usual sense) as soon as less than k nodes (and the incident edges) are removed. For instance, a bicomponent is still connected if we remove one of its nodes. For this reason, the idea of k-component is associated with the idea of network robustness. Hence, a bicomponent in a collaboration graph is more robust than an ordinary connected component, since the removal on any scholar with all their collaborators does not destroy the possibility of going from any scholar to any other one via a collaboration path. Figure 5 plots the temporal evolution of the share of the largest connected component and of the largest biconnected component of the collaboration network. The fraction of the collaboration network that is taken by the largest connected component grows steadily since 1970. This fraction is below half of the network until 1990, and it covers a share of 80% in 2004. The figure for the last year, 2008, is 85%. Notice that the slope of the curve decreases in the last few years, that is the increase of the share of the largest connected component in a given year with respect to the previous year is less noticeable in the recent years. This pattern can be interpreted as a convergence of the collaboration network toward a steady state, where the largest part of the network, although not the entire graph, is connected by paths of collaborations. The line for the largest biconnected component follows a trend similar to the curve for the largest connected component. Not surprisingly, the bicomponent line is below the connected component curve, since any bicomponent is embedded into a connected component. The share of the largest biconnected component continuously grows from the 1970s and reaches half of the collaboration network in 2003, and 61% of the whole graph in 2008. 8 s t n e n o p m o c t s e g r a l f o e r a h S 8 . 0 6 . 0 4 . 0 2 . 0 0 . 0 1960 1970 1980 1990 2000 2008 Year Figure 5: The temporal evolution of the share of the largest connected component (solid line) and of the largest biconnected component (dashed line) of the collaboration network. The fact that two scholars are connected on a collaboration graph means that there exists at least one path of collaborators between them. However, how long is this path, on average? There exists a substantial difference if the average path connecting two scholars has length, say, six edges, or one hundred links. If we assume that information flows on the network along collaboration ties, then the length of the average path is fundamental to understand how fast the information spreads on the network. We may assume that information preferentially flows along geodesics, which are shortest paths in terms of number of edges on a graph. The geodesic distance, also known as degree of separation, between two nodes is defined as the number of edges of any geodesic connecting the nodes. The average geodesic distance is the mean geodesic distance among all pairs of connected nodes of a graph. The largest geodesic distance in the graph is called the diameter of the graph. It tells us how far are two connected nodes in the worst case. Figure 6 shows the temporal evolution of the average degree of separation between schol- ars (main plot) and of the maximum degree of separation (inset plot) in the collaboration network. We can neatly distinguish two phases. The first phase goes from 1960 to 1983. It is characterised by the alternation of periods in which the geodesic distance expands followed by shorter periods in which it shrinks, drawing a curve with a series of ridges. We will see next in this section that the collaboration density among computer scientists, measured as the mean number of collaborators per scholar, continuously increases since 1960. In this initial phase from 1960 to 1983, the collaboration graph is split up in many relatively small connected components, one of them, the largest, collect an increasing share of nodes, from 8% in 1960 to 36% in 1983. As the collaboration density increases, it may happen that some of these 9 n o i t a r a p e s f o e e r g e D 9 8 7 6 5 4 3 2 r e t e m a D i 5 2 5 1 5 1960 1980 2000 1960 1970 1980 1990 2000 2008 Year Figure 6: The temporal evolution of the average degree of separation between scholars (main plot) and of the maximum degree of separation (inset plot) in the collaboration network. components glue together to form bigger components, with the effect of raising the average geodesic distance between nodes. These expansion periods are followed by shorter periods in which the collaboration density increases but no significant merging of components occurs, and hence the average geodesic distance between nodes remains stable or more frequently it declines. Since the expansion periods are longer than the contraction ones, in this initial phase the overall average geodesic distance increases, with a maximum of 8.73 reached in year 1977. Also, in this phase, the largest geodesic distance (the diameter) increases, reaching its peak of 28 in year 1983. The first phase from 1960 to 1983 is followed by a second phase, from 1983 to 2008, in which the average geodesic distance almost continuously decreases, drawing a valley that gently slopes, as opposed to the sharp ridges of the previous phase. Moreover, the diameter oscillates in a short range (from 23 to 28). In this second phase, there exists a large connected component that contains an important share of the network; this share contains the majority of the nodes starting from 1991. The pairs of nodes in this giant component dominate the computation of the average geodesic distance. Since the collaboration density inside this component becomes higher and higher, the collaboration distances get lower and lower. In 2008, the average degree of separation between computer science scholars in 6.41, a figure that matches well the legendary six degrees of separation found by the experimental psychol- ogist Stanley Milgram in the 1960s with his today highly celebrated small-world experiment (Milgram, 1967). We conjecture that the computer science collaboration network is slowly converging toward a steady state, where the majority of pairs of scholars are connected by short paths (of six or less edges). 10 e e r g e d x a M 0 0 6 0 0 3 0 e e r g e d e d o n e g a r e v A 6 5 4 3 2 1960 1980 2000 1960 1970 1980 1990 2000 2008 Year Figure 7: The temporal evolution of the average number of collaborators of a scholar (main plot) and of the maximum number of collaborators of a scholar (inset plot). In the following we investigate how the density and the distribution of the collaboration among computer scientists evolved in time. A measure of the density of collaboration is the average number of collaborators per scholar. This is the average degree of a node in the collaboration graph. Figure 7 depicts the temporal evolution of the average number of collaborators of a scholar (main plot) and of the maximum number of collaborators of a scholar (inset plot). The mean number of collaborators is stable in the 1960s, with an average of 1.9 co-authors per scholar. From 1970 it steadily increases: the average computer scientist has 2.2 collaborators in the 1970s, 2.9 collaborators in the 1980s, 4 collaborators in the 1990s, and 5.7 collaborators in the 2000s. The mean number of collaborators in the last year 2008 is 6.6, more than three times the number of collaborators a computer scientists had in the 1970s. The maximum number of collaborators of a scholar, although a less significative figure, is also increasing with time, reaching the impressive maximum amount of 595 collaborators for a single scholar in 2008.4 We have just noticed that the number of collaborations increased over time. However, did the distribution of collaborations among scientists change over time? Concentration measures how the character (in our context, the collaborations) is equally distributed among the statistical units (the scholars). The two extreme situations are equidistribution, in which each statistical unit receives the same amount of character (each scholar has the same number 4As a comparison, the most prolific and the most collaborative among mathematicians, Paul Erdos, wrote more than 1400 papers cooperating with more than 500 co-authors (Grossman, 1997). 11 n o i t a r o b a l l o c f o n o i t a r t n e c n o C 5 5 . 0 0 5 . 0 5 4 . 0 0 4 . 0 5 3 . 0 1960 1970 1980 1990 2000 2008 Year Figure 8: The temporal evolution of the collaboration concentration measured with the Gini concentration coefficient. of collaborators) and maximum concentration, in which the total amount of the character is attributed to a single statistical unit (there exists a super-star collaborator that co-authored with all other scholars, and each other scholar collaborated only with this collaboration super-star). Since a collaboration is represented with an edge in the collaboration graph, the concentration of collaborations among computer scientists corresponds to the concentration of edges among nodes in the collaboration graph. A numerical indicator of concentration is the Gini concentration coefficient, which ranges between 0 and 1 with 0 representing equidistribution and 1 representing maximum con- centration. Figure 8 shows how this coefficient varied with time in the computer science collaboration network. From 1970 the concentration of collaboration among our peers moved away from the equidistribution toward a more concentrated scenario. The Gini collaboration coefficient for the last surveyed year is 0.56. In this year, the most collaborative 1% of the scholars harvest 13% of the collaborations, the 5% of them collect one-third (33%) of the collaborations, and the 10% of them attract almost half (46%) of the collaborations. Most of the collaborations are achieved by few vital scholars, with the majority of scholars collecting the minority of the collaborations. Hence the distribution of collaborations over scholars is highly skewed, as expected, and the distribution skewness has increased over time. Finally, we focus on the topological structure of the computer science collaboration net- work. To this end we use two apparently unrelated measures: the transitivity coefficient and the assortativity coefficient. The transitivity coefficient, also known as clustering coefficient, measures the average probability that a collaborator of my collaborator is also my collabo- rator, and it can be computed as the ratio of the number of loops of length three and the 12 number of paths of length two in the collaboration graph. The coefficient ranges from 0 to 1; a value of 1 implies perfect transitivity, i.e., a network whose components are all cliques.5 A value of 0 implies no closed path of length two, which happens for various topologies, such as a tree or a square lattice. Assortative mixing by degree is the tendency of nodes to connect to other nodes with a similar degree. In our context, we have assortative mixing by degree if scholars collaborate preferentially with other scholars with similar number of collaborators. We have disassorta- tive mixing by degree if collaborative scholars co-author with hermits and vice versa. We have no mixing at all if none of these patterns is clearly visible. A quantitative measure of the magnitude of mixing by degree is the assortativity coefficient, which is the Pearson correlation coefficient applied to the degree sequences of nodes connected by an edge. The coefficient ranges between -1 and 1, where negative values indicate disassortative mixing, positive values indicate assortative mixing, and values close to 0 indicate no mixing. Figure 9 illustrates the transitivity coefficient (main plot) and of the assortativity co- efficient (inset plot) of the collaboration network. Substantially, the transitivity coefficient is decreasing in time, ranging from a value of 0.76 in 1960 to a value of 0.24 in 2008.6 In 1960 it holds that 3 times over 4 two scholars sharing a common collaborator are themselves co-authors. After 50 years of computer science, the same phenomenon happens only 1 time over 4. As to assortativity, in the early years, the collaboration network is strongly assortative by degree, with an assortativity coefficient of 0.73. The collaboration network remains assorta- tive by degree in the following years, but the strength of assortativity decreases, and reaches its minimum in 2008 with an assortativity coefficient of 0.17.7 Interestingly, the assortativity coefficient and the transitivity coefficient follow very similar trends and seem to be highly correlated. Indeed, the Pearson correlation coefficient between the two variables is 0.98, which means almost perfect positive correlation.8 The synchronous behaviour of the transitivity and of the assortativity coefficients reveals an interesting change in the topology of the collaboration network over time. In the early times of computer science, the collaboration network had a clear core-periphery structure, with a core of interconnected high-degree nodes surrounded by a less dense periphery of nodes with lower degree. In particular, the periphery of the network is composed of small clusters of nodes, which are internally highly connected, but disconnected from the other small groups and from the core of the network. See Figure 10, depicting the collaboration network as it was in 1964, for an example. This kind of network has both a high clustering coefficient and a high assortativity coefficient. Indeed, the core of the network is highly clustered, and so are also the peripheral small clusters, and hence the clustering coefficient is high. Moreover, the central high-degree 5A clique is a graph in which each pair of nodes is connected by an edge. 6Notice, however, that the transitivity coefficient of 0.24 for the 2008 collaboration network is still a rather high probability, especially when compared with non-social networks or with random networks. As a com- parison, the transitivity coefficient for a network with the same degree distribution of the 2008 collaboration network but otherwise random is 0.00014. 7The assortativity coefficient of 0.17 is still a large one if compared with non-social networks, which typically show null or negative assortativity coefficients. 8To the knowledge of the writer, this is the first time that such strong association between transitivity and degree assortativity is observed in the evolution of real networks. 13 y t i v i t a t r o s s A 5 . 0 2 . 0 1960 1980 2000 i t n e c i f f e o c y t i v i t i s n a r T 7 . 0 6 . 0 5 . 0 4 . 0 3 . 0 1960 1970 1980 1990 2000 2008 Year Figure 9: The temporal evolution of the transitivity coefficient (main plot) and of the assortativity coefficient (inset plot) of the collaboration network. nodes of the core are interconnected, and the peripheral low-degree nodes match with other similar nodes, making the network highly assortative by degree. The computer science collaboration network progressively lost this peculiar core-periphery structure over time, or at least this structure is not so clear in the years of modern computer science. The modern structure of the collaboration network is dominated by the largest con- nected component of the network, which covers the majority of the nodes. The disconnected periphery is still composed of small clusters of nodes, but, unlike in the early years, this part of the graph contains an insignificant share of nodes. The nodes in the largest component are not as highly linked as were the nodes in the core component of early networks. Moreover, highly collaborative scholars in the modern collaboration network are more willing to collab- orate with those with few collaborators (as in the typical relationship supervisor-student). Figure 11 shows the largest component for the 1980 collaboration network. Notice that, to a certain degree, the core-periphery structure is still noticeable, although it is less clear than in the core component of Figure 10. 6. Conclusions We have analysed how collaboration in computer science evolved in the last half-century using a network science approach. Computer science is expanding since 1960 both in terms of number of published papers and number of active authors. Moreover, computer scientists became more productive and collaborative. Productivity and collaboration are mutually re- inforcing, since more collaborative authors generally write more papers and more productive 14 Figure 10: The computer science collaboration networks in 1964. scholars typically attract more collaborations. Collaboration changed not only in intensity, but also in concentration: the gap between the richest and the poorest scholars, in terms of collaborations, is increasing. The temporal evolution of the collaboration network is ap- proaching a steady state, where most of the scholars belong to a giant connected component and are separated by few collaboration links. Finally, the collaboration network moved from a clear core-perithery topology to a more balanced one, with lower transitivity and lower homophily by number of collaborators. In particular, the lower transitivity with respect to the early times of computer science might indicate a higher propensity for collaborations among different research institutes, among different countries, and among different sub-fields of computer science. Triads involving such heterogeneous collaborations, indeed, are less likely to be closed in a collaboration triangle. Recent bibliometric studies have shown that papers involving collaborations over different institutes, countries, or research fields generally enjoy a higher visibility and attract more citations than papers with homogeneous authors, making these types of collaborations more appealing (Franceschet and Costantini, 2010). References Barab´asi, A. L., Jeong, H., N´eda, Z., Ravasz, E., Schubert, A., Vicsek, T., 2002. Evolution of the social network of scientific collaborations. Physica A: Statistical Mechanics and its Applications 311 (3-4), 590 -- 614. Bird, C., Barr, E. T., Nash, A., Devanbu, P. T., Filkov, V., Su, Z., 2009. Structure and dynamics of research collaboration in computer science. In: SIAM International Conference on Data Mining. pp. 826 -- 837. 15 Figure 11: The computer science collaboration networks in 1980 (only the largest component is shown). DBIS Research Group, 2011. Basex -- Processing and visualizing XML with a native XML database. Available at http://www.inf.uni-konstanz.de/dbis/basex/. Franceschet, M., 2010. The role of conference publications in CS. Communications of the ACM 53 (2), 129 -- 132. Franceschet, M., 2011. Collaboration in computer science: a network science approach. Part I. Retrieved April 21, 2011, from http://arxiv.org/abs/1010.4747. Franceschet, M., Costantini, A., 2010. The effect of scholar collaboration on impact and quality of academic papers. Journal of Informetrics 4 (4), 540 -- 553. Goffman, C., 1969. And what is your Erdos number? The American Mathematical Monthly 76 (7), 791. Grossman, J. W., 1997. Paul Erdos: The master of collaboration. In: The mathematics of Paul Erdos. Springer-Verlag, pp. 467 -- 476. Grossman, J. W., 2002. The evolution of the mathematical research collaboration graph. Congressus Numerantium 158, 201 -- 212. Huang, J., Zhuang, Z., Li, J., Giles, C. L., 2008. Collaboration over time: characterizing and modeling network evolution. In: International Conference on Web Search and Web Data Mining. pp. 107 -- 116. 16 Ley, M., 2009. DBLP - some lessons learned. Proceedings of the VLDB Endowment 2 (2), 1493 -- 1500. Ley, M., 2011. The DBLP Computer Science Bibliography. Available at http://www.informatik.uni-trier.de/~ley/db/. Menezes, G. V., Ziviani, N., Laender, A. H. F., Almeida, V. A. F., 2009. A geographical analysis of knowledge production in computer science. In: International Conference on World Wide Web. pp. 1041 -- 1050. Milgram, S., 1967. The small world problem. Physiology Today 2, 60 -- 67. Moody, J., 2004. The structure of a social science collaboration network: Disciplinary cohe- sion from 1963 to 1999. American Sociological Review 69 (2), 213 -- 238. Newman, M. E. J., 2001a. Clustering and preferential attachment in growing networks. Phys- ical Review E 64 (2), 025102. Newman, M. E. J., 2001b. Scientific collaboration networks: I. Network construction and fundamental results. Physical Review E 64 (1), 016131. Newman, M. E. J., 2001c. Scientific collaboration networks: II. Shortest paths, weighted networks, and centrality. Physical Review E 64 (1), 016132. Newman, M. E. J., 2004. Coauthorship networks and patterns of scientific collaboration. Proceedings of the National Academy of Sciences of the United States of America 101, 5200 -- 5205. Newman, M. E. J., 2010. Networks: An introduction. Oxford University Press. R Development Core Team, 2008. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, ISBN 3-900051-07-0. URL http://www.R-project.org Reuther, P., Walter, B., Ley, M., Weber, A., Klink, S., 2006. Managing the quality of person names in DBLP. In: European Conference on Digital Libraries. pp. 508 -- 511. 17
1805.08030
1
1805
2018-05-21T13:01:56
Polarization Rank: A Study on European News Consumption on Facebook
[ "cs.SI" ]
The advent of WWW changed the way we can produce and access information. Recent studies showed that users tend to select information that is consistent with their system of beliefs, forming polarized groups of like-minded people around shared narratives where dissenting information is ignored. In this environment, users cooperate to frame and reinforce their shared narrative making any attempt at debunking inefficient. Such a configuration occurs even in the consumption of news online, and considering that 63% of users access news directly form social media, one hypothesis is that more polarization allows for further spreading of misinformation. Along this path, we focus on the polarization of users around news outlets on Facebook in different European countries (Italy, France, Spain and Germany). First, we compare the pages' posting behavior and the users' interacting patterns across countries and observe different posting, liking and commenting rates. Second, we explore the tendency of users to interact with different pages (i.e., selective exposure) and the emergence of polarized communities generated around specific pages. Then, we introduce a new metric -- i.e., polarization rank -- to measure polarization of communities for each country. We find that Italy is the most polarized country, followed by France, Germany and lastly Spain. Finally, we present a variation of the Bounded Confidence Model to simulate the emergence of these communities by considering the users' engagement and trust on the news. Our findings suggest that trust in information broadcaster plays a pivotal role against polarization of users online.
cs.SI
cs
Polarization Rank: A Study on European News Consumption on Facebook Ana Luc´ıa Schmidt Dept. of Environmental Sciences, Informatics and Statistics Ca' Foscari University of Venice, Venice, Italy Fabiana Zollo Dept. of Environmental Sciences, Informatics and Statistics & Center for the Humanities and Social Change Ca' Foscari University of Venice, Venice, Italy Antonio Scala ISC-CNR, Rome, Italy Walter Quattrociocchi Dept. of Environmental Sciences, Informatics and Statistics Ca' Foscari University of Venice, Venice, Italy Abstract The advent of WWW changed the way we can produce and access information. Recent studies showed that users tend to select information that is consistent with their system of beliefs, forming polarized groups of like-minded people around shared narratives where dissenting information is ignored. In this envi- ronment, users cooperate to frame and reinforce their shared narrative making any attempt at debunking inefficient. Such a configuration occurs even in the consumption of news online, and considering that 63% of users access news di- rectly form social media, one hypothesis is that more polarization allows for further spreading of misinformation. Along this path, we focus on the polariza- tion of users around news outlets on Facebook in different European countries (Italy, France, Spain and Germany). First, we compare the pages' posting be- havior and the users' interacting patterns across countries and observe different Email address: [email protected] (Ana Luc´ıa Schmidt) Preprint submitted to Elsevier May 22, 2018 posting, liking and commenting rates. Second, we explore the tendency of users to interact with different pages (i.e., selective exposure) and the emergence of polarized communities generated around specific pages. Then, we introduce a new metric – i.e., polarization rank – to measure polarization of communities for each country. We find that Italy is the most polarized country, followed by France, Germany and lastly Spain. Finally, we present a variation of the Bounded Confidence Model to simulate the emergence of these communities by considering the users' engagement and trust on the news. Our findings suggest that trust in information broadcaster plays a pivotal role against polarization of users online. Keywords: Facebook, News Consumption, Misinformation, Polarization, Social Media 1. Introduction The advent of social media changed the way we get informed and shape our opinion. In 2016, post-truth was selected by the Oxford Dictionaries as the word of the year. The definition reads "relating to or denoting circumstances in which objective facts are less influential in shaping public opinion than appeals to emotion and personal belief", that is, we select information and interpretations adhering to our system of beliefs (confirmation bias). This phenomenon is not new, our cognitive abilities have always been lim- ited, and social media and the consequent disintermediated access to an unprece- dented amount of information solely exacerbated the process. Recent studies on massive datasets (376 million users) [1] showed that major disintermediated ac- cess to information is creating segregation of users into communities where they share a specific worldview and ignore dissenting information. Confirmation bias dominates news consumption and informational cascades foster the emergence of polarized groups around shared narratives [2, 3, 4, 5, 6]. Important results (that served to inform the Global risk report of the World Economic Forum in 2016 and 2017) pointed out the pivotal role of confirmation 2 bias –i.e., the attitude of acquiring information coherently with the individ- ual system of belief– in viral processes as well as in the collective framing of narratives. In particular, one of these works [6], showing the inefficacy of de- bunking, convinced the Washington Post to close its weekly column dedicated to debunking false rumors [7]. The process of acceptance of a claim (whether documented or not) may be altered by normative social influence or by the coherence with the individual system of beliefs as well-documented in the literature on cognitive and social psychology of communication [8, 9]. At the extreme of the spectrum, conspiracy theorists tend to explain significant social or political aspects as plots conceived by powerful individuals or organizations, and with the so-called urban legends they share an important characteristic: the object of the narratives are in- evitably threatening the established social order or well-being and are always an indicator of what communities and social groups deeply fear [10]. These phenomena are evidently of great interest and can be considered as a sort of "thermometer" of social mood. Since these kinds of arguments can sometimes involve the rejection of science, alternative explanations are invoked to replace the scientific evidence. For instance, people who reject the link between HIV and AIDS generally believe that AIDS was created by the U.S. Government to control the African American population. In this paper we focus on the interplay between users and news outlet on Facebook by comparing four European countries: France, Germany, Italy and Spain. First, we compare the pages' posting behavior and the users' interacting patterns across countries and observe different posting, liking and commenting rates. Second, we explore the tendency of users to interact with a variety of pages (i.e., selective exposure) and the polarized communities of pages that emerge from the users' consumption habits. Then, we introduce a new method to calculate the percentage of polarized users when more than two communities are involved and thus rank the four countries accordingly. We find that Italy is the most polarized country, followed by France, Germany and lastly Spain. Finally, we present a variation of the Bounded Confidence Model [11] to simulate 3 the emergence of these communities by considering the users' engagement and trust on the news. 2. Materials and Methods 2.1. Ethics Statement The data collection process was carried out using the Facebook Graph API [12], which is publicly available. The pages from which we downloaded data are public Facebook entities and can be accessed by anyone. Users' content con- tributing to such pages is public unless users' privacy settings specify otherwise, and in that case their activity is not available to us. 2.2. Data Collection We generated a list of top news sources, in their official language, of France, Germany, Italy and Spain. The list for each country was compiled considering the Reuters Digital News Reports [13][14][15]. We then obtained the official Facebook page of each news outlet and proceeded to download all the posts made from 1st January 2015 to 31st December 2016, as well as all likes and comments that have been made on those posts. The exact breakdown of the data can be seen in Tab. 1, while the complete set of downloaded pages is reported in Tab. 8 in the Supporting Information. 2.3. Preliminaries and Definitions In this section we provide a brief description of the main concepts and tools used in the analysis. 2.3.1. Projection of Bipartite Graphs A bipartite graph is a triple G = (A, B, E) where A = {ai i = 1 . . . nA} and B = {bj j = 1 . . . nB} are two disjoint sets of vertices, and E ⊆ A × B is the set of edges, i.e. edges that exist only between vertices of sets A and B. The bipartite graph G is described by the rectangular matrix M where Mij = 1, if an edge exits between ai and bj, and Mij = 0 otherwise. 4 France Germany Italy Spain Pages Posts Likes Likers 65 49 54 57 1, 008, 018 749, 805 1, 554, 817 1, 372, 805 419, 371, 366 183, 599, 003 409, 243, 176 333, 698, 985 21, 647, 888 14, 367, 445 14, 012, 658 32, 812, 007 Comments 47, 225, 675 31, 881, 407 51, 515, 121 34, 336, 356 Commenters 5, 755, 268 5, 338, 195 4, 086, 351 6, 494, 725 Users 22, 560, 889 15, 564, 360 14, 587, 622 34, 383, 820 Population 66M 81M 62M 46M Table 1: Dataset Breakdown. Population according to the Reuters Digital News Report (2017) [15]. Likers is the number of people that gave at least one like. Commenters is the number of people that gave at least one comment. Users is the number of people that gave at least a like or comment. We consider bipartite networks in which the two disjointed set of nodes are users and Facebook pages. That is Gκ = (Pκ, U, E) where Pκ is the set of Facebook pages of country κ and U is the set of users active on pages belonging to Pκ. Edges represent interactions among users and pages, that is, either likes or comments. As an example, a like given to a post on page p constitutes a link between the user u and the page p so Mp,u = 1. We can then build the co-occurrence matrices C Pκ = M M T and C U = M T M that quantify, respectively, the number of common neighbors between two vertices of Pκ or U . Only two graphs per country will be relevant for the analyses, Gκ L and Gκ C. These are the result from the projection C Pκ of two bipartite graphs: one con- sidering the users' liking activity (Gκ (Gκ C). L) and another considering the comments 2.3.2. Community Detection Algorithms Community detection algorithms serve to identify groups of nodes in a net- work. In this work we apply three different community detection algorithms. 5 1. FastGreedy (FG). It takes an agglomerative bottom-up approach: initially each vertex belongs to a separate community and, at each iteration, the communities are merged in a way that yields the largest increase in the current value of modularity [16]. The algorithm stops when it is no longer possible to further increase the modularity. Due to its speed and its lack of parameters in need of tuning, this algorithm will be the main reference to compare against the partitions resulting from the application of other community detection algorithms. 2. Multilevel (ML). It uses a multi-level optimization procedure for the modu- larity score [17]. It takes a bottom-up approach where each vertex initially belongs to a separate community and in each step, unlike FastGreedy, ver- tices are reassigned in order to achieve the highest modularity. 3. Spinglass (SG). It interprets the problem of community detection as one of finding the ground state of an infinite range spin-glass. In this algorithm, the community structure of the network would be the spin configuration that minimizes the energy of the spin glass, with the spin states being the community indices [18][19]. To compare the various community partitions and the similarity between different clustering methods, we use the Rand index [20], where a comparison between two partitions yields a value between 0 and 1, such that 0 indicates that there is no agreement on any vertex between the two partitions, whereas 1 indicates that the partitions are exactly the same. 3. Results and Discussion 3.1. Attention Patterns As a first step we characterize how different countries consume news on Facebook. We focus particularly on the allowed users' actions through the entire period of the data collection: likes, shares and comments. Naturally, each action has a prescribed meaning. A like represents a positive feedback to a post; a share expresses the user's desire to increase the visibility of a given 6 piece of information; and a comment is the way in which online collective debates take form. Therefore, comments may contain negative or positive feedback with respect to a post. In Fig. 1 we show the distribution of the number of likes, comments and shares received by the posts belonging to each country. As seen from the plots, all the distributions are heavy-tailed, that is, they are best fitted by power laws (as shown in Tab. 2) and possess similar scaling parameters with some notable differences when looking at the number of comments and likes (Tab. 3). Action Poisson FR comment DE comment IT ES FR DE IT ES FR DE IT ES comment comment like like like like share share share share −81, 474, 887 −53, 857, 610 −92, 959, 791 −64, 633, 469 −716, 163, 037 −336, 233, 651 −732, 132, 678 −625, 371, 478 −302, 119, 999 −100, 787, 846 −399, 573, 409 −456, 628, 686 Log-Normal Exponential PowerLaw −10, 467 −4, 094, 569 −124, 780 −3, 208, 655 −5, 353, 204 −9, 815 −28, 449 −4, 192, 227 −9, 793 −6, 463, 931 −243, 938 −4, 429, 366 −9, 034, 577 −12, 514 −34, 532 −7, 905, 112 −68, 981 −5, 029, 592 −2, 972, 740 −37, 466 −24, 265 −6, 760, 982 −5, 852, 126 −128, 667 −5, 042, 908 −3, 692, 816 −7, 158, 219 −5, 896, 527 −7, 135, 298 −4, 906, 736 −10, 276, 500 −8, 978, 996 −6, 102, 954 −3, 809, 317 −8, 902, 324 −7, 960, 407 Table 2: Maximum-Likelihood fit of the actions received by the posts of each country. FR: France, DE: Germany, IT: Italy, ES: Spain. Comments Xmin α Likes Shares Xmin α Xmin α FR 1, 929 3.44 23, 338 3.09 2, 498 2.63 DE 315 2.63 1, 132 2.25 1, 084 2.45 IT 1, 736 3.63 15, 519 3.71 5, 753 2.79 ES 733 3.10 8, 491 2.89 1, 508 2.47 Table 3: Powerlaw fit of the actions received by the posts of each country. 7 Figure 1: Complementary Cumulative Distribution Function of the comments, likes and shares received by the posts of each country. We continue our analysis by examining how users from each country interact with the pages. In Fig. 2, we show the distribution of the number of likes and comments given by the users according to each country. Once again, all the distributions are heavy-tailed, as seen in Tab. 4, with some notable differences in their scaling parameters when considering the commenting activity of the users of the different countries (Tab. 5). Figure 2: Complementary Cumulative Distribution Function of the users' likes and comments of each country. 8 Action Poisson FR comment DE comment IT ES FR DE IT ES comment comment like like like like −96, 157, 561 −57, 870, 795 −114, 865, 937 −62, 141, 913 −1, 042, 576, 644 −377, 979, 910 −985, 441, 955 −720, 112, 905 Log-Normal Exponential −17, 869, 083 −13, 916, 586 −14, 878, 272 −11, 951, 470 −10, 972, 733 −14, 442, 076 −17, 309, 835 −13, 638, 119 −85, 808, 958 −63, 945, 214 −50, 972, 666 −40, 766, 648 −45, 609, 241 −61, 296, 249 −108, 917, 647 −83, 156, 334 PowerLaw −2, 433 −1, 268, 430 −81, 786 −11, 920, 701 −643, 618 −13, 788 −26, 385 −48, 326 Table 4: Maximum-Likelihood fit of the users' different actions by country. FR: France, DE: Germany, IT: Italy, ES: Spain. Comments Xmin α Likes Xmin α FR 2, 378 4.07 648 2.45 DE IT ES 18 2.17 3, 156 3.02 529 2.70 5, 473 3.26 1 1.90 1, 876 3.24 Table 5: Power law fit of users' attention patterns. 3.2. Selective Exposure The overall number of likes given by each user is a good proxy for their level of engagement with the Facebook news pages. The lifetime of a user, meaning the period of time where the user started and stopped interacting with our set of pages, can be approximated by the time difference between the time- stamp of their latest and earliest liked post. These measures could provide important insights about news consumption patterns, specifically, the variety of news sources consumed over time. We say that a user has consumed a page in a given time window, if the user has at least one positive interaction with that page in that period, that is, the user liked a post made by that page. We do not consider comments as a valid interaction for regular consumption because they have very diverse 9 meanings and, dissimilar from the likes, they do not unambiguously represent positive feedback. Thus, we can measure the collection of pages consumed in a weekly, monthly and quarterly basis while taking into account the activity (total number of likes) and lifetime time difference of their first and last liked post) of the users of each country. Fig. 3 shows the number of news sources a user interacts with considering their lifetime and for increasing levels of engagement for each country. For a comparative analysis, we standardized between 0 and 1 the number of pages present in each country, as well as the lifetime and engagement over the entire user set. The results were calculated considering the quarterly (right), monthly (middle) and weekly (left) rates. Figure 3: Selective Exposure. Maximum number of unique news sources that users with increasing levels of standardized lifetime (top) or standardized activity (bottom) interact with weekly, monthly and quarterly for each country. The user's lifetime corresponds to the normalized time difference between the time-stamp of their latest and earliest liked post. The user's activity corresponds to the number of likes given in their lifetime. Note that, for all countries, users usually interact with a small number of news outlets and that higher levels of activity and longer lifetime correspond to a smaller variety of news sources being consumed. We can also observe clear differences between the countries. When considering the users' lifetime, France has clearly a more varied news consumption diet than the rest; and when considering the users' activity users in Germany consume consistently the less 10 diverse set of news sources. We can conclude that there is a natural tendency of the users to confine their activity to a limited set of pages, news consumption on Facebook is indeed dominated by selective exposure [1] and users from different countries display different rates for the decreasing variety of news outlets they consume. 3.3. Emerging Communities User tendency to interact with few news sources might elicit page clus- ters. To test this hypothesis, we first characterize the emergent community structure of pages according to the users' activity for each country κ with κ = {F R, DE, IT, ES}. We project the users' page likes to derive the weighted graph Gκ C) in which nodes are pages and two pages are connected if a user likes (or comments on) both of them. The weight of a link on a projected L (and Gκ graph is determined by the number of users the two pages have in common. L L G GF R GDE GIT GES GF R GDE GIT GES C C L L C C κ - Country Type ML SG France Germany Italy Spain Likes Likes Likes Likes 0.795 0.796 0.771 0.838 0.982 0.851 0.923 0.981 France Comments 0.918 0.969 Germany Comments 0.836 0.925 Italy Spain Comments 0.871 0.903 Comments 0.828 0.817 Table 6: Algorithm comparison. Comparison between the FastGreedy (FG) communities against the MultiLevel (ML) and SpinGlass (SG) communities for both likes and comments projections for every country. We then apply the FastGreedy community detection algorithm to see if there are well-defined communities for each case. To validate the community parti- tioning, we then compare the membership of other community detection algo- 11 rithms using the Rand method [20] and find high level of similarity for all four countries (see Tab. 6). We also compared the communities of Gκ C against each other using different community detection algorithms and find, overall, low levels of sim- L and Gκ ilarity (see Tab. 7). This indicates that, for all four countries, the set pages users generally approve of (like), differ from the set of pages where they debate (comment). Comparing L -GF R GF R GDE L -GDE L -GIT GIT L -GES GES C C C C κ - Country FG ML SG France 0.514 0.522 0.545 Germany 0.528 0.537 0.518 Italy Spain 0.562 0.560 0.619 0.555 0.554 0.625 Table 7: Likes and comments projections comparison. Comparison of the communities detected in Gκ (SG). C of each country with FastGreedy (FG), MultiLevel (ML) and SpinGlass L and Gκ 3.4. User Polarization By examining the activity of users across the various clusters and measuring how they span across news outlets, we find that most users remain confined within specific groups of pages. To understand the relationship between page groupings and user behavior, we measure the polarization of users with respect to the communities found for each country κ where κ = {F R, DE, IT, ES}. For a user with K likes with (cid:80) i ki = K such that each ki belongs to the ith community (i = 1 . . . N , where N equals the number of communities). The probability φi that the user belongs to the i-th community will then be φi = ki/K. We can define the localization order parameter L as: (cid:33)2 φ2 i (cid:32)(cid:88) (cid:88) i i 12 L [φ] = φ4 i (1) Thus, in the case in which the user only has likes in one community, L = 1. If a user, on the other hand, interacts equally with all the communities (φi = 1/N ) then L = N ; hence, L counts the communities. Since we are considering many users, each with their likes ki and their frequency φi, we can plot the probability distribution and the complementary cumulative distribution function of Lκ along the user set of each country κ. This would allow for a fair comparison of the polarization of the users between countries. Figure 4: Probability Density Function of L for each country. The dotted vertical line indicates the median value. For each country, Fig. 5 shows the Complementary Cumulative Distribu- tion Function of the localization L, and Fig. 4 shows the Probability Density Function. Both figures consider only users with at least 10 likes. As we can see in Fig. 4, the densities are well behaved, that is, present a single 13 Figure 5: Complementary Cumulative Distribution Function of L for each country. peak around 1. By looking at the CCDF of each country, we can rank the four countries from the one with least polarized users to the one with the most: Spain (median = 1.01653), Germany (median : 1.00274), France (median : 1.00222) and Italy (median : 1.00001). 3.5. The Model. In this section we provide a simple model of users' preferential attachment to specific sources that considers the users' trust on the media as a parameter and reproduces the observed community structure. The entities of our model are pages p ∈ P and users u ∈ U . Each page p is characterized by a set of opinions (an editorial line) modelled as a real number cp that ranges [0, 1]. We assume that the cp values are uniformly distributed. Each user u has an initial opinion that is modelled as a real number θu, which ranges between [0, 1] and it is uniformly distributed. Each users u also has a measure of trust in the media modelled by the real number τu, which ranges between [0, 1]. User's trust will follow a truncated normal distribution. We suppose cp and θu to be homogeneous such that the quantity cp − θu is the distance between the opinion of user u and the editorial line of page p. We mimic confirmation bias by assuming that if user u interacts with a page p and 14 the opinion distance cp − θu is less than a given tolerance parameter ∆, the preference of user u will converge toward the editorial line of page p according to the modified BCM [11] equation: u = (1 − τu) · θu + τu · cp θ(cid:48) (2) To mimic user activity we give each user u an activity coefficient au that represents the number of pages a user can visit. Thus, the final opinion of a user will average the editorial lines of the pages the user likes. If Ω is the set of Ω pages that matches the preferences of user u, then the average opinion will be: θu = (1 − τu) θu + τu Ω−1(cid:88) = Ω−1(cid:88) p∈Ω cp p∈Ω cp To mimic the long tail distribution of our data we set the activity distribution to be power law distributed p(a) ∼ a−γ with exponent γ = 3. We use numerical simulation to study our model. A user randomly selects a subset of P with which to interact. The user likes a page only when cp−θu < ∆. When this occurs, the feedback mechanism reinforces the user's page preference using the trust parameter τu to control the extent of the feedback. Thus the final opinion of a user will be the average of the editorial lines of the pages the user likes. When a user's opinion converges, we build in the bipartite graph Gsim = (I, P, Esim) where the set of edges Esim are the couplings (u, p) with which user u likes page p. Hence, Gsim represents users interacting with their favorite pages, and from Gsim we can build the projected graph Gp sim that links the pages according their common users. Figure 6 shows an analysis of Gp sim as a function of the mean values used for the truncated normal distribution that models the trust τ , with different 15 Figure 6: Analysis of the synthetic pages-to-pages graph Gp sim. It shows the number of communities as a function of the mean user trust. standard deviations and tolerance. Each point of the simulation is averaged over 100 iterations. We can see that increasing the tolerance ∆ leads to a reduction of the num- 16 ber of communities, that is, agreement is reached faster and polarization takes place. Very low and very high values of user trust also display similar behavior. Absolute trust or no trust in the media leads to fast polarization, either the user will trust what they read fully and change their opinion accordingly, or they won't. The simulation displays an interesting behavior at τ = 0.1 where the number of communities formed by the users' consumption habits seem to peak. This indicates that some skepticism might actually factor against polarization. Users' who distrust the news they interact with, even when their opinions were similar, are more reluctant to further change their own beliefs. Perhaps a solution for the issue of false and misleading narratives could be found by fostering critical readers. 4. Discussion In this paper we use quantitative analysis to understand and compare the news consumption patterns of four European countries: France, Germany, Italy and Spain. We show that while there are similarities in the consumption be- haviours between the four countries, the posting and consumption behavior is not universal. The results also show that all users, regardless of country, display selective exposure, that is, the more active a user is on Facebook the less variety of news sources they tend to consume. This behavior is seen in all four countries, with different rates of selective exposure for each case. News consumption on Facebook is dominated by selective exposure. Additionally, we studied the cluster of news pages that emerge from the user's activity, and found that users, regardless of their nationality, are polar- ized. We then measure the polarization of the users of each country, and ranked them accordingly, finding that Italy presents the most polarized users, followed by France, Germany and finally Spain. Further studies might gain insights into the reasons behind the slight variations in consumption habits. 17 Finally, we introduce a variation on the Bonded Confidence Model [11] that mimics the users' behavior of selective exposure taking into account user trust. The simulation seems to indicate that users' who have some distrust of the news they interact with, even when the narrative presented conforms to their beliefs, are more reluctant to further change their own beliefs. Thus, a tentative solution to mitigate user polarization might be found by fostering critical readers. References References [1] A. L. Schmidt, F. Zollo, M. Del Vicario, A. Bessi, A. Scala, G. Caldarelli, H. E. Stanley, W. Quattrociocchi, Anatomy of news consumption on face- book, Proceedings of the National Academy of Sciences (2017) 201617052. [2] W. Quattrociocchi, A. Scala, C. R. Sunstein, Echo chambers on facebook, Available at SSRN. [3] M. Del Vicario, A. Bessi, F. Zollo, F. Petroni, A. Scala, G. Caldarelli, H. E. Stanley, W. Quattrociocchi, The spreading of misinformation online, Proceedings of the National Academy of Sciences 113 (3) (2016) 554–559. [4] M. Del Vicario, F. Zollo, G. Caldarelli, A. Scala, W. Quattrociocchi, Map- ping social dynamics on facebook: The brexit debate, Social Networks 50 (2017) 6–16. [5] W. Quattrociocchi, Inside the echo chamber, Scientific American 316 (4) (2017) 60–63. [6] F. Zollo, A. Bessi, M. Del Vicario, A. Scala, G. Caldarelli, L. Shekhtman, S. Havlin, W. Quattrociocchi, Debunking in a world of tribes, PloS one 12 (7) (2017) e0181821. [7] C. Dewey, What was fake on the internet this week: Why this is the final column, The Washington Post. URL https://www.washingtonpost.com 18 [8] A. Nowak, J. Szamrej, B. Latan´e, From private attitude to public opinion: A dynamic theory of social impact., Psychological Review 97 (3) (1990) 362. [9] S. Moscovici, The coming era of representations, in: Cognitive analysis of social behavior, Springer, 1982, pp. 115–150. [10] B. Franks, A. Bangerter, M. Bauer, Conspiracy theories as quasi-religious mentality: an integrated account from cognitive science, social representa- tions theory, and frame theory, Frontiers in psychology 4 (2013) 424. [11] G. Deffuant, D. Neau, F. Amblard, G. Weisbuch, Mixing beliefs among interacting agents, Advances in Complex Systems 3 (01n04) (2000) 87–98. [12] Facebook, Using the graph api, Website, last checked: 20.12.2017 (8 2013). URL https://developers.facebook.com/docs/graph-api/ using-graph-api/ [13] N. Newman, D. A. Levy, R. K. Nielsen, Reuters institute digital news report 2015, Reuters Institute for the Study of Journalism. [14] N. Newman, D. Levy, R. K. Nielsen, Reuters institute digital news report 2016, Reuters Institute for the Study of Journalism. [15] N. Newman, R. Fletcher, A. Kalogeropoulos, D. A. Levy, R. K. Nielsen, Reuters institute digital news report 2017, Reuters Institute for the Study of Journalism. [16] A. Clauset, M. E. Newman, C. Moore, Finding community structure in very large networks, Physical review E 70 (6) (2004) 066111. [17] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfolding of communities in large networks, Journal of statistical mechanics: theory and experiment 2008 (10) (2008) P10008. [18] M. E. Newman, M. Girvan, Finding and evaluating community structure in networks, Physical review E 69 (2) (2004) 026113. 19 [19] J. Reichardt, S. Bornholdt, Statistical mechanics of community detection, Physical Review E 74 (1) (2006) 016110. [20] W. M. Rand, Objective criteria for the evaluation of clustering methods, Journal of the American Statistical association 66 (336) (1971) 846–850. 20 Supporting Information In this section we provide the list of all the downloaded pages. Table 8 contains the 225 news pages that form the dataset. Pages are identified by their name, website and Facebook ID, followed by the country code of their corresponding country. The countries are indicated with their ISO Alpha-2 international code (FR: France, DE: Germany, IT: Italy, ES: Spain). Table 8: List of pages of each country in the dataset. Name and Website Facebook ID Community 1 2 3 4 5 6 7 8 9 ARD - ard.de 48219766388 Augsburger Allgemeine Zeitung - 121104385783 augsburger-allgemeine.de Badische Zeitung - badische-zeitung.de 177670301122 Berliner Morgenpost - morgenpost.de 46239931235 Berliner Zeitung - berliner-zeitung.de 137267732953826 Bild - bild.de B.Z. - bz-berlin.de Das Erste - daserste.de Der Spiegel - spiegel.de 25604775729 57187632436 176772398231 38246844868 10 Der Tagesspiegel - tagesspiegel.de 59381221492 11 Der Westen - derwesten.de 243001859426137 12 Die Tageszeitung - taz.de 171844246207985 13 Die Welt - welt.de 14 Die Zeit - zeit.de 15 Express - express.de 16 Focus - focus.de 97515118114 37816894428 172718036608 37124189409 21 DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE 17 Frankfurter Allgemeine Zeitung - faz.net 346392590975 18 Frankfurter Rundschau - fr.de 134100583282150 19 Freie Presse - freiepresse.de 20 Freitag - freitag.de 375109771472 313744767921 21 GMX - gmx.net 187741777922914 22 Hamburger Abendblatt - abendblatt.de 121580125458 23 Hamburger Morgenpost - mopo.de 196072707519 24 Handelsblatt - handelsblatt.com 104709558232 25 Hannoversche Allgemeine Zeitung - haz.de 198530121257 26 Huffington Post DE - huffingtonpost.de 366193510165011 27 Junge Freiheit - jungefreiheit.de 13479664941 28 Kolner Stadt-Anzeiger - ksta.de 141063022950 29 Leipziger Volkszeitung - lvz.de 114360055263804 30 Mitteldeutsche Zeitung - mz-web.de 141558262607 31 n-tv online - n-tv.de 126049165307 32 Ostsee-Zeitung - ostsee-zeitung.de 374927701107 33 ProSieben Newstime - prosieben.de/tv/newstime 64694257920 34 Rheinische Post - rp-online.de 50327854366 35 RTL aktuell - rtluell.de 119845424729050 36 SAT1 Nachrichten - sat1.de/news 171663852895480 37 Schleswig-Holsteinischer Zeitungsverlag - shz.de 248528847673 38 Stern - stern.de 78766664651 39 Stuttgarter Nachrichten - stuttgarter-nachrichten.de 144537361776 40 Stuttgarter Zeitung - stuttgarter-zeitung.de 129349103260 22 DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE DE 41 Suddeutsche Zeitung - sueddeutsche.de 215982125159841 42 tagesschau - tagesschau.de 43 t-online - t-online.de 44 WAZ - waz.de 45 WEB.DE - web.de 46 Wirtschafts Woche - wiwo.de 193081554406 24897707939 117194401183 56488242934 93810620818 47 Yahoo News DE - de.nachrichten.yahoo.com 166721106679241 48 ZDF - zdf.de 49 ZDF heute - heute.de 50 20 MINUTOS - 20minutos.es 51 ABC - abc.es 52 Antena 3 - antena3.com 53 Cadena Ser - cadenaser.com 54 Canarias 7 - canarias7.es 55 Cinco D´ıas - cincodias.elpais.com 56 COPE - cope.es 154149027994068 112784955679 38352573027 7377874895 55353596297 15658775846 85160277321 36280712574 15829535820 57 Cuatro news - cuatro.com/noticias 96876562265 58 Diario de C´adiz - diariodecadiz.es 128335533904779 59 Diario de Ibiza - diariodeibiza.es 255177630236 60 Diario de Mallorca - diariodemallorca.es 155352736257 61 Diario de Navarra - diariodenavarra.es 103384039711468 62 El Comercio - elcomercio.es 64673887657 63 El Confidencial - elconfidencial.com 63830851925 64 El Confidencial Digital - elconfidencialdigital.com 202726949863885 23 DE DE DE DE DE DE DE DE DE ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES 65 El Correo - elcorreo.com 280982578099 66 El Correo Gallego - elcorreogallego.es 152802838075123 67 El D´ıa - eldia.es 68 ElDiario.es - eldiario.es 165210860204301 417471918268686 69 El Diario Montan´es - eldiariomontanes.es 109434489075314 70 El Diario Vasco - diariovasco.com 71 El Economista - eleconomista.es 91085818678 56760767000 72 El Espanol - elespanol.com 693292367452833 73 El Mundo - elmundo.es 10407631866 74 El Norte de Castilla - elnortedecastilla.es 98474974005 75 El Pa´ıs - elpais.com 76 El Peri´odico - elperiodico.com 77 Expansi´on - expansion.com 8585811569 93177351543 93983931918 78 Faro de Vigo - farodevigo.es 123746764304270 79 Heraldo de Arag´on - heraldo.es 130012437016272 80 Hoy - hoy.es 81 Ideal - ideal.es 85593393832 64258697112 82 Informaci´on - diarioinformacion.com 410523955526 83 La Gaceta de Salamanca - lagacetadesalamanca.es 319669591452311 84 La Nueva Espana - lne.es 51837272861 85 La Opini´on de M´alaga - laopiniondemalaga.es 80999977105 86 La Opini´on de Murcia - laopiniondemurcia.es 106647502704110 87 La Opini´on de Tenerife - laopinion.es 112238345503995 88 La Provincia - laprovincia.es 124641092828 24 ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES 89 La Raz´on - larazon.es 113080018770027 90 La Sexta - lasexta.com 91 Las Provincias - lasprovincias.es 39172614918 20810574989 92 La Vanguardia - lavanguardia.com 156552584408339 93 La Verdad - laverdad.es 120857625399 94 La Voz de Asturias - lavozdeasturias.es 101351926940208 95 La Voz De Galicia - lavozdegalicia.es 350393845757 96 Levante-EMV - levante-emv.com 106329485190 97 Libertad Digital - libertaddigital.com 141423087721 98 MSN Espana - msn.com/es-es 99 Onda Cero - ondacero.es 100 P´ublico - publico.es 101 QUE! - que.es 102 RTVE - rtve.es 103 Sur - diariosur.es 104 Telecinco - telecinco.es 35966491049 99040469027 75084861845 97090259641 133623265400 52107727250 50353113909 105 ´Ultima Hora - ultimahora.es 114680095225282 106 Yahoo News ES - es.noticias.yahoo.com 284428852938 107 20 Minutes - 20minutes.fr 51555073310 108 Agence France-Presse - afp.com/fr 114100038626559 109 BFMTV - bfmtv.com 43896752783 110 Canal+ - canalplus.fr 144056732332683 111 Challenges - challenges.fr 79566127213 112 Charente Libre - charentelibre.fr 144375072241306 25 ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES ES FR FR FR FR FR FR 113 Charlie Hebdo - charliehebdo.fr 106626879360459 114 CNES Matin - cnewsmatin.fr 181111805243991 115 CNEWS - cnews.fr 76952916976 116 Corse Matin - corsematin.com 107249929306302 117 Courrier international - courrierinternational.com 142114104887 118 Dernieres Nouvelles d'Alsace - dna.fr 19004867327 119 FranceInfo - francetvinfo.fr 135112586936434 120 France Soir - francesoir.fr 53638966652 121 France T´el´evisions - francetelevisions.fr 179086202130933 122 Huffington Post FR - huffingtonpost.fr 284129444969978 123 La Croix - la-croix.com 108828257010 124 La D´epeche du Midi - ladepeche.fr 271219815470 125 L'Alsace - Le Pays - lalsace.fr 181480351879611 126 La Montagne - lamontagne.fr 146949065315655 127 La Nouvelle R´epublique du Centre Ouest - 87693933163 lanouvellerepublique.fr 128 La Provence - laprovence.com 129 La R´epublique des Pyrenn´ees - larepubliquedespyrenees.fr 119213845538 148446219817 130 La R´epublique du Centre - larep.fr 211082695569481 131 La Tribune - latribune.fr 18950434380 132 La Voix du Nord - lavoixdunord.fr 76635774021 133 Le Bien Public - bienpublic.com 106094599409 134 Le Courrier Picard - courrier-picard.fr 58080584133 135 Le Dauphin´e Lib´er´e - ledauphine.com 122601757780987 26 FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR 136 Le Figaro - lefigaro.fr 61261101338 137 Le Journal du Dimanche - lejdd.fr 246577183385 138 Le Monde - lemonde.fr 14892757589 139 Le Monde Diplomatique - monde-diplomatique.fr 34398236687 140 Le Nouvel Observateur - tempsreel.nouvelobs.com 198508090036 141 Le Parisien - leparisien.fr 142 Le Point - lepoint.fr 36550584062 49173930702 143 Le Populaire du Centre - lepopulaire.fr 240500052515 144 Le Progr`es - leprogres.fr 104985642868265 145 Le R´epublicain Lorrain - republicain-lorrain.fr 142638581774 146 Les ´Echos - lesechos.fr 123440511000645 147 L'Est R´epublicain - estrepublicain.fr 190366851765 148 Le T´el´egramme - letelegramme.fr 97539957978 149 L'Express - lexpress.fr 150 L'Humanit´e - humanite.fr 151 Lib´eration - liberation.fr 9359316996 254585183694 147126052393 152 L'Ind´ependant - lindependant.fr 52697519148 153 L'internaute - linternaute.com 156569814356922 154 L'Opinion - lopinion.fr 155 L'Union - lunion.fr 156 Marianne - marianne.net 157 Mediapart - mediapart.fr 445890365491209 100163350071823 369717525444 116070051527 158 Metro France - lci.fr 411124728976705 159 Midi Libre - midilibre.fr 183518182558 27 FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR FR 160 MSN France - msn.com/g00/fr-fr 136932803018290 161 Nice-Matin - nicematin.com 162 Nord-Littoral - nordlittoral.fr 163 Ouest France - ouest-france.fr 164 Paris Match - parismatch.com 388223307574 344969675415 270122530294 117714667328 165 Paris Normandie - paris-normandie.fr 195238257180091 166 R´evolution Permanente - revolutionpermanente.fr 732277203520737 167 Sud Oest - sudouest.fr 58305334711 168 T´el´erama - telerama.fr 109520835773096 169 TF1 news - tf1.fr/news 170 Var Matin - varmatin.com 34610502574 365009223614 171 Yahoo News FR - fr.news.yahoo.com 138207559575213 172 Alto Adige - altoadige.gelocal.it 447795960541 173 Ansa - ansa.it 158259371219 174 Avvenire - avvenire.it 128533807252295 175 Corriere Adriatico - corriereadriatico.it 431943793507773 176 Corriere della Sera - corriere.it 284515247529 177 Corriere del Mezzogiorno - 84805991975 corrieredelmezzogiorno.corriere.it 178 Gazzetta di Modena - gazzettadimodena.gelocal.it 131613613524326 179 Gazzetta di Reggio - gazzettadireggio.gelocal.it 102328739818445 180 Giornale di Brescia - giornaledibrescia.it 352193836938 181 Giornale di Sicilia - gds.it 211307618890745 182 Huffington Post IT - huffingtonpost.it 276376685795308 FR FR FR FR FR FR FR FR FR FR FR FR IT IT IT IT IT IT IT IT IT IT IT 28 183 Il Blog di Beppe Grillo - beppegrillo.it 56369076544 184 Il Centro - ilcentro.gelocal.it 261504285205 185 Il Fatto Quotidiano - ilfattoquotidiano.it 132707500076838 186 Il Foglio - ilfoglio.it 187 Il Gazzettino - ilgazzettino.it 188 Il Giornale - ilgiornale.it 61703722992 154142713068 323950777458 189 Il Giornale di Vicenza - ilgiornaledivicenza.it 154836331469 190 Il Manifesto - ilmanifesto.info 61480282984 191 Il Mattino - ilmattino.it 210639995470 192 Il Mattino di Padova - mattinopadova.gelocal.it 189556995002 193 Il Messaggero - ilmessaggero.it 124918220854917 194 Il Messaggero Veneto - messaggeroveneto.gelocal.it 195905383236 195 Il Piccolo - ilpiccolo.gelocal.it 341809745380 196 Il Resto del Carlino - ilrestodelcarlino.it 200174860861 197 Il Secolo XIX - ilsecoloxix.it 198 Il Sole 24 Ore - ilsole24ore.com 199 Il Tirreno - iltirreno.gelocal.it 200 LA7 - la7.it 36493277214 38812693516 75980429042 252449503661 201 L'Adige - ladige.it 134572506600855 202 La Gazzetta del Mezzogiorno - 184749620911 lagazzettadelmezzogiorno.it 203 La Gazzetta di Mantova - gazzettadimantova.gelocal.it 62769612287 204 La Gazzetta di Parma - gazzettadiparma.it 309928567597 205 La Nazione - lanazione.it 87812020989 29 IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT 206 La Nuova di Venezia e Mestre - nuovavenezia.gelocal.it 338049475695 207 La Nuova Sardegna - lanuovasardegna.gelocal.it 226626114877 208 La Provincia Pavese - laprovinciapavese.gelocal.it 57687391957 209 L'Arena - larena.it 108431819182401 210 La Repubblica - repubblica.it 211 La Stampa - lastampa.it 179618821150 63873785957 212 La Tribuna di Treviso - tribunatreviso.gelocal.it 243933437208 213 L'Eco di Bergamo - ecodibergamo.it 197197145813 214 L'Espresso - espresso.repubblica.it 259865949240 215 Libero Quotidiano - liberoquotidiano.it 188776981163133 216 L'Unione Sarda - unionesarda.it 231465552656 217 L'Unit`a - unita.tv 218 MSN Italia - msn.com/it-it 292449724097 232690009759 219 Nuovo Quotidiano di Puglia - quotidianodipuglia.it 119992291359480 220 RAI News - rainews.it 124992707516031 221 Rai.TV - raiplay.it 88988179171 222 Sky TG24 - tg24.sky.it 215275341879427 223 TgCom24 - tgcom24.mediaset.it 40337124609 224 Trentino - trentinocorrierealpi.gelocal.it 82383189226 225 Yahoo News IT - it.notizie.yahoo.com 81262596234 IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT IT 30
1504.03275
2
1504
2015-07-29T16:46:24
Wiggins: Detecting Valuable Information in Dynamic Networks Using Limited Resources
[ "cs.SI" ]
Detecting new information and events in a dynamic network by probing individual nodes has many practical applications: discovering new webpages, analyzing influence properties in network, and detecting failure propagation in electronic circuits or infections in public drinkable water systems. In practice, it is infeasible for anyone but the owner of the network (if existent) to monitor all nodes at all times. In this work we study the constrained setting when the observer can only probe a small set of nodes at each time step to check whether new pieces of information (items) have reached those nodes. We formally define the problem through an infinite time generating process that places new items in subsets of nodes according to an unknown probability distribution. Items have an exponentially decaying novelty, modeling their decreasing value. The observer uses a probing schedule (i.e., a probability distribution over the set of nodes) to choose, at each time step, a small set of nodes to check for new items. The goal is to compute a schedule that minimizes the average novelty of undetected items. We present an algorithm, WIGGINS, to compute the optimal schedule through convex optimization, and then show how it can be adapted when the parameters of the problem must be learned or change over time. We also present a scalable variant of WIGGINS for the MapReduce framework. The results of our experimental evaluation on real social networks demonstrate the practicality of our approach.
cs.SI
cs
Wiggins: Detecting Valuable Information in Dynamic Networks Using Limited Resources Ahmad Mahmoody∗, Matteo Riondato, Eli Upfal Department of Computer Science – Brown University {ahmad,matteo,eli}@cs.brown.edu 5 1 0 2 l u J 9 2 ] I S . s c [ 2 v 5 7 2 3 0 . 4 0 5 1 : v i X r a “Have you found it, Wiggins?” July 30, 2015 Abstract [Sherlock Holmes in A Study in Scarlet] Detecting new information and events in a dynamic network by probing individual nodes has many practical applications: discovering new webpages, analyzing influence properties in network, and detect- ing failure propagation in electronic circuits or infections in public drinkable water systems. In practice, it is infeasible for anyone but the owner of the network (if existent) to monitor all nodes at all times. In this work we study the constrained setting when the observer can only probe a small set of nodes at each time step to check whether new pieces of information (items) have reached those nodes. We formally define the problem through an infinite time generating process that places new items in subsets of nodes according to an unknown probability distribution. Items have an exponentially decaying novelty, modeling their decreasing value. The observer uses a probing schedule (i.e., a probability distribution over the set of nodes) to choose, at each time step, a small set of nodes to check for new items. The goal is to compute a schedule that minimizes the average novelty of undetected items. We present an algorithm, wiggins, to compute the optimal schedule through convex optimization, and then show how it can be adapted when the parameters of the problem must be learned or change over time. We also present a scalable variant of wiggins for the MapReduce framework. The results of our experimental evaluation on real social networks demonstrate the practicality of our approach. 1 Introduction Many applications require the detection of events in a network as soon as they happen or shortly thereafter, as the value of the information obtained by detecting the events decays rapidly as time passes. For example, an emerging trend in algorithmic stock trading is the use of automatic search through the Web and social networks for pieces of information that can be used in trading decisions before they appear in the more popular news sites [10, 14, 23, 26]. Similarly, intelligence, business and politics analysts are scanning online sources for new information or rumors. While new items are often reblogged, retweeted, and posted on a number of sites, it is sufficient to find an item once, as fast as possible, before it loses its relevance or freshness. There is no benefit in seeing multiple copies of the same news item or rumor. This is also the case when monitoring for intrusions, infections, or defects in, respectively, a computer network, a public water system, or a large electronic circuit. Monitoring for new events or information is a fundamental search and detection problem in a distributed data setting, not limited to social networks or graph analysis. In this setting, the data is distributed among a large number of nodes, and new items appear in individual nodes (for example, as the products of processing ∗Contact author 1 the data available locally at the node), and may propagate (being copied) to neighboring nodes on a physical or a virtual network. The goal is to detect at least one copy of each new item as soon as possible. The search application can access any node in the system, but it can only probe (i.e., check for new items on) a few nodes at a time. To minimize the time to find new items, the search application needs to optimize the schedule of probing nodes, taking into account (i) the distribution of copies of items among the nodes (to choose which nodes to probe), and (ii) the decay of the items’ novelty (or relevance/freshness) over time (to focus the search on most relevant items). The main challenge is how to devise a good probing schedule in the absence of prior knowledge about the generation and distribution of items in the network. Contributions In this work we study the novel problem of computing an optimal node probing schedule for detecting new items in a network under resource scarceness, i.e., when only a few nodes can be probed at a time. Our contributions to the study of this problem are the following: • We formalize a generic process that describes the creation and distribution of information in a network, and define the computational task of learning this process by probing the nodes in the network according to a schedule. The process and task are parametrized by the resource limitations of the observer and the decay rate of the novelty of items. We introduce a cost measure to compare different schedules: the cost of a schedule is the limit of the average expected novelty of uncaught items at each time step. On the basis of these concepts, we formally define the Optimal Probing Schedule Problem, which requires to find the schedule with minimum cost. • We conduct a theoretical study of the cost of a schedule, showing that it can be computed explicitly and that it is a convex function over the space of schedules. We then introduce wiggins,1 an algorithm to compute the optimal schedule by solving a constrained convex optimization problem through the use of an iterative method based on Lagrange multipliers. • We discuss variants of wiggins for the realistic situation where the parameters of the process needs to be learned or can change over time. We show how to compute a schedule which is (probabilistically) guaranteed to have a cost very close to the optimal by only observing the generating process for a limited amount of time. We also present a MapReduce adaptation of wiggins to handle very large networks. • Finally, we conduct an extensive experimental evaluation of wiggins and its variants, comparing the performances of the schedules it computes with natural baselines, and showing how it performs extremely well in practice on real social networks when using well-established models for generating new items (e.g., the independence cascade model [17]). To the best of our knowledge, the problem we study is novel and we are the first to devise an algorithm to compute an optimal schedule, both when the generating process parameters are known and when they need to be learned. Paper Organization. In Sect. 2 we give introductory definitions, and formally introduce the settings and the problem. We discuss related works in Sect. 3. In Sect. 4 we describe our algorithm wiggins and its variants. The results of our experimental evaluation are presented in Sect. 5. We conclude by outlining directions for future work in Sect. 6. 2 Problem Definition In this section we formally introduce the problem and define our goal. Let G = (V, E) be a graph with V = n nodes. W.l.o.g. we let V = [n]. Let F ⊆ 2V be a collection of subsets of V , i.e., a collection of sets of nodes. Let π be a function from F to [0, 1] (not necessarily a probability distribution). We model the generation and diffusion of information in the network by defining a generating process Γ = (F, π). Γ is a infinite discrete-time process which, at each time step t, generates a 1In the Sherlock Holmes novel A study in scarlet by A. Conan Doyle, Wiggins is the leader of the “Baker Street Irregulars”, a band of street urchins employed by Holmes as intelligence agents. 2 collection of sets It ⊆ F such that each set S ∈ F is included in It with probability π(S), independently of t and of other sets generated at time t and at time t0 < t. For any t and any S ∈ It, the ordered pair (t, S) represents an item - a piece of information that was generated at time t and reached instantaneously the nodes in S. We choose to model the diffusion process as instantaneous because this abstraction accurately models the view of an outside resource-limited observer that does not have the resources to monitor simultaneously all the nodes in the network at the fine time granularity needed to observe the different stages of the diffusion process. Probing and schedule. The observer can only monitor the network by probing nodes. Formally, by probing a node v ∈ V at time t, we mean obtaining the set I(t, v) of items (t0, S) such that t0 ≤ t and v ∈ S:2 I(t, v) := {(t0, S) : t0 ≤ t, S ∈ It0, v ∈ S} . Let Ut be the union of the sets It0 generated by Γ at any time t0 ≤ t, and so I(t, v) ⊆ Ut. We model the resource limitedness of the observer through a constant, user-specified, parameter c ∈ N, representing the maximum number of nodes that can be probed at any time, where probing a node v returns the value I(t, v). The observer chooses the c nodes to probe by following a schedule. In this work we focus on memoryless schedules, i.e., the choice of nodes to probe at time t is independent from the choice of nodes probed at any time t0 < t. More precisely, a probing c-schedule p is a probability distribution on V . At each time t, the observer chooses a set Pt of c nodes to probe, such that Pt is obtained through random sampling of V without replacement according to p, independently from Pt0 from t0 < t. Caught items, uncaught items, and novelty. We say that an item (t0, S) is caught at time t ≥ t0 iff 1. a node v ∈ S is probed at time t; and 2. no node in S was probed in the interval [t0, t − 1]. Let Ct be the set of items caught by the observer at any time t0 ≤ t. We have Ct ⊆ Ut. Let Nt = Ut \ Ct be the set of uncaught items at time t, i.e., items that were generated at any time t0 ≤ t and have not been caught yet at time t. For any item (t0, S) ∈ Nt, we define the θ-novelty of (t0, S) at time t as fθ(t, t0, S) := θt−t0 , where θ ∈ (0, 1) is a user-specified parameter modeling how fast the value of an item decreases with time if uncaught. Intuitively, pieces of information (e.g., rumors) have high value if caught almost as soon as they have appeared in the network, but their value decreases fast (i.e., exponentially) as more time passes before being caught, to the point of having no value in the limit. Load of the system and cost of a schedule. The set Nt of uncaught items at time t imposes a θ-load, Lθ(t), on the graph at time t, defined as the sum of the θ-novelty at time t of the items in Nt: Lθ(t) := X (t0,S)∈Nt fθ(t, t0, S) . The quantity Lθ(t) is a random variable, depending both on Γ and on the probing schedule p, and as such it has an expectation E[Lθ(t)] w.r.t. all the randomness in the system. The θ-cost of a schedule p is defined as the limit, for t → ∞, of the average expected load of the system: costθ(p) := lim t→∞ = lim t→∞ 1 t 1 t X X t0≤t t0≤t E[Lθ(t)]  X E (t00,S)∈Nt0  . fθ(t0, t00, S) 2The set S appears in the notation for an item only for clarity of presentation: we are not assuming that when we probe a node and find an item (t, S) we obtain information about S. 3 We now have all the necessary ingredients to formally define the problem of interest in this work. Intuitively, the load at each time indicates the amount of novelty we did not catch at that time, and the cost function measures the average of such loss over time. The limit above always exists (Lemma 1). Problem definition. Let G = (V, E) be a graph and Γ = (F, π) be a generating process on G. Let c ∈ N and θ ∈ (0, 1). The (θ, c)-Optimal Probing Schedule Problem ((θ, c)-OPSP) requires to find the optimal c-schedule p∗, i.e., the schedule with minimum θ-cost over the set Sc of c-schedules: p∗ = arg min p {costθ(p), p ∈ Sc} . Thus, the goal is to design a c-schedule that discovers the maximum number of items weighted by their novelty value (which correspond to those generated most recently). The parameter θ controls how fast the novelty of an item decays, and influences the choices of a schedule. When θ is closed to 0, items are relevant only for a few steps and the schedule must focus on the most recently generated items, catching them as soon as they are generated (or at most shortly thereafter). At the other extreme (θ ≈ 1), an optimal schedule must maximizes the total number of discovered items, as their novelty decays very slowly. Viewing the items as “information” disseminated in the network, an ideal schedule assigns higher probing probability to nodes that act as information hubs, i.e., nodes that receive a large number of items. Thus, an optimal schedule p∗, identifies information hubs among the nodes. This task (finding information hubs) can be seen as the complement of the influence maximization problem [17, 18]. In the influence maximization problem we look for a set of nodes that generate information that reach most nodes. In the information hubs problem, we are interested in a set of nodes that receive the most of information, thus the most informative nodes for an observer. In the following sections, we may drop the specification of the parameters from θ-novelty, θ-cost, θ-load, and c-schedule, and from their respective notation, as the parameters will be clear from the context. 3 Related Work The novel problem we focus on in this work generalizes and complements a number of problems studied in the literature. The “Battle of Water Sensor Network” challenge [29] motivated a number of works on outbreak detection: the goal is to optimally place static or moving sensors in water networks to detect contamination [13, 20, 24]. The optimization can be done w.r.t. a number of objectives, such as maximizing the probability of detection, minimizing the detection time, or minimizing the size of the subnetwork affected by the phenomena [24]. A related work [1] considered sensors that are sent along fixed paths in the network with the goal of gath- ering sufficient information to locate possible contaminations. Early detection of contagious outbreaks by monitoring the neighborhood (friends) of a randomly chosen node (individual) was studied by Christakis and Fowler [7]. Krause et al. [21] present efficient schedules for minimizing energy consumption in battery operated sensors, while other works analyzed distributed solutions with limited communication capacities and costs [11, 19, 22]. In contrast, our work is geared to detection in huge but virtual networks such as the Web or social networks embedded in the Internet, where it is possible to “sense” or probe (almost) any node at approximately the same cost. Still only a restricted number of nodes can be probed at each steps but the optimization of the probing sequence is over a much larger domain, and the goal is to identify the outbreaks (items) regardless of their size and solely by considering their interest value. Our methods complement the work on Emerging Topic Detection where the goal is to identify emergent topics in a social network, assuming full access to the stream of all postings. Providers, such as Twitter or Facebook, have an immediate access to all tweets or postings as they are submitted to their server [4, 25]. Outside observers need an efficient mechanism to monitor changes, such as the methods developed in this work. Web-crawling is another research area that study how to obtain the most recent snapshots of the web. However, it differs from our model in two key points: our model allows items to propagate their copies, and they will be caught if any of their copies is discovered (where snapshots of a webpage belong to that page only), and all the generated items should be discovered (and not just the recent ones) [8, 32]. 4 The goal of News and Feed Aggregation problem is to capture updates in news websites (e.g. by RSS feeds) [3, 15, 28, 30]. Our model differs from that setting in that we consider copies of the same news in different web sites as equivalent and therefore are only interested in discovering one of the copies. 4 The WIGGINS Algorithm In this section we present the algorithm wiggins (and its variants) for solving the Optimal Probing Schedule Problem (θ, c)-OPSP for generating process Γ = (F, π) on a graph G = (V, E). We start by assuming that we have complete knowledge of Γ, i.e., we know F and π. This strong assumption allows us to study the theoretical properties of the cost function and motivates the design of our algorithm, wiggins, to compute an optimal schedule. We then remove the assumption and show how we can extend wiggins to only use a collection of observations from Γ. Then we discuss how to recalibrate our algorithms when the parameters of the process (e.g., π or F) change over time. Finally, we show an algorithm for the MapReduce framework that allows us to scale to large networks. 4.1 Computing the Optimal Schedule We first conduct a theoretical analysis of the cost function costθ. Analysis of the cost function Assume for now that we know Γ, i.e., we have complete knowledge of F and π. Under this assumption, we can exactly compute the θ-cost of a c-schedule. Lemma 1. Let p = (p1, . . . , pn) be a c-schedule. Then cost(p) := lim t→∞ 1 t tX t0=0 E[Lθ(t0)] = X S∈F π(S) 1 − θ(1 − p(S))c , (1) where p(S) =P v∈S pv. Proof. Let t be a time step, and consider the quantity E[Lθ(t)]. By definition we have where Nt is the set of uncaught items at time t. Let now, for any t0 ≤ t, Nt,t0 ⊆ Nt be the set of uncaught items in the form (t0, S). Then we can write  X (t0,S)∈Nt E[Lθ(t)] = E fθ(t, t0, S)  tX X E[Lθ(t)] = E t0=0 (t0,S)∈Nt,t0  , θt−t0  = E (t0,S)∈Nt  X  . θt−t0 Define now, for each S ∈ F, the random variable XS,t0,t which takes the value θt−t0 if (t0, S) ∈ Nt,t0, and 0 otherwise. Using the linearity of expectation, we can write: E[Lθ(t)] = X = X S∈F tX tX t0=0 S∈F t0=0 E[XS, t0, t] θt−t0 Pr(XS,t,t0 = θt−t0) . (2) The r.v. XS,t,t0 takes value θt−t0 if and only if the following two events E1 and E2 both take place: 5 • E1: the set S ∈ F belongs to It0, i.e., is generated by Γ at time t0; • E2: the item (t0, S) is uncaught at time t. This is equivalent to say that no node v ∈ S was probed in the time interval [t0, t]. We have Pr(E1) = π(S), and Pr(E2) = (1 − p(S))c(t−t0) . The events E1 and E2 are independent, as the process of probing the nodes is independent from the process of generating items, therefore, we have Pr(XS,t,t0 = θt−t0) = Pr(E1) Pr(E2) = π(S)(1 − p(S))c(t−t0) . We can plug this quantity in the rightmost term of (2) and write lim t→∞ E[Lθ(t)] = lim t→∞ θt−t0 tX π(S)(1 − p(S))c(t−t0) (θ(1 − p(S))c)t t0=0 π(S) = lim t→∞ = X S∈F t0=0 π(S) 1 − θ(1 − p(S))c , (3) tX X X S∈F S∈F Pt tX t t0=0 1 t where we used the fact that θ(1 − p(S))c < 1. We just showed that the sequence (E[Lθ(t)])t∈N converges as t → ∞. Therefore, its Cesàro mean, i.e., limt→∞ 1 t0=0 E[Lθ(t)], equals to its limit [12, Sect. 5.4] and we have E[Lθ(t)] = lim t→∞ E[Lθ(t)] costθ(p) = lim t→∞ = X S∈F π(S) 1 − θ(1 − p(S))c . We now show that costθ(p), as expressed by the r.h.s. of (1) is a convex function over its domain Sc, the set of all possible c-schedules. We then use this result to show how to compute an optimal schedule. Theorem 1. The cost function costθ(p) is a convex function over Sc. Proof. For any S ∈ F, let fS(p) = 1 − θ(1 − p(S))c . 1 The function costθ(p) is a linear combination of fS(p)’s with positive coefficients. Hence to show that costθ(p) is convex it is sufficient to show that, for any S ∈ F, fS(p) is convex. We start by showing that gS(p) = θ(1 − p(S))c is convex. This is due to the fact that its Hessian matrix is positive semidefinite [2]: Let vS be a n × 1 vector in Rn such that its i-th coordinate is (cid:2)c(c − 1)(1 − p(S))c−2(cid:3)1/2 if i ∈ S, and 0 ∂pi∂pj 0 gS(p) = ∂ i, j ∈ S otherwise (cid:26) θc(c − 1)(1 − p(S))c−2 otherwise. We can write the Hessian matrix of gS as and thus, ∇2gS is positive semidefinite matrix and g is convex. From here, we have that 1 − gS is a concave function. Since fS(p) = x is convex and non-increasing, then fS is a convex function. 1−gS(p) and the function h(x) = 1 1 ∇2gS = VS ∗ V T S , 6 so is fS. If for every v ∈ V , S = {v} belongs to F, then the function gS in the above proof is strictly convex, and We then have the following corollary of Thm. 1. Corollary 1. Any schedule p with locally minimum cost is an optimal schedule (i.e., it has global minimum cost). Furthermore, if for every v ∈ V , {v} belongs to F, the optimal schedule is unique. The algorithm Corollary 1 implies that one can compute an optimal c−schedule p∗ (i.e., solve the (θ, c)- OPSP) by solving the unconstrained minimization of costθ over the set Sc of all c-schedules, or equivalently by solving the following constrained minimization problem on Rn: min p∈Rn costθ(p) nX i=1 pi = 1 pi ≥ 0 ∀i ∈ {1, . . . , n} (4) Since the function costθ is convex and the constraints are linear, the optimal solution can, theoretically, be found efficiently [2]. In practice though, available convex optimization problem solvers can not scale well with the number n of variables, especially when n is in the millions as is the case for modern graphs like online social networks or the Web. Hence we developed wiggins, an iterative method based on Lagrange multipliers [2, Sect. 5.1], which can scale efficiently and can be adapted to the MapReduce framework of computation [9], as we show in Sect. 4.4. While we can not prove that this iterative method always converges, we can prove (Thm. 2) that (i) if at any iteration the algorithm examines an optimal schedule, then it will reach convergence at the next iteration, and (ii) if it converges to a schedule, that schedule is optimal. In Sect. 5 we show our experimental results illustrating the convergence of wiggins in different cases. wiggins takes as inputs the collection F, the function π, and the parameters c and θ, and outputs a schedule p which, if convergence (defined in the following) has been reached, is the optimal schedule. It starts i = 1/n for all 1 ≤ i ≤ n, and iteratively refines it until convergence (or from a uniform schedule p(0), i.e., p(0) until a user-specified maximum number of iterations have been performed). At iteration j ≥ 1, we compute, for each value i, 1 ≤ i ≤ n, the function Wi(p(j−1)) := X S∈F s.t. i∈S θcπ(S)(1 − p(j−1)(S))c−1 (1 − θ(1 − p(j−1)(S))c)2 (5) and then set p(j) i = Pn p(j−1) i Wi(p(j−1)) z=1 p(j−1) z Wz(p(j−1)) . The algorithm then checks whether p(j) = p(j−1). If so, then we reached convergence and we can return p(j) in output, otherwise we perform iteration j + 1. The pseudocode for wiggins is in Algorithm 1. The following theorem shows the correctness of the algorithm in case of convergence. Theorem 2. We have that: 1. if at any iteration j the schedule p(j) is optimal, then wiggins reaches convergence at iteration j + 1; and 2. if wiggins reaches convergence, then the returned schedule p is optimal. Proof. From the method of the Lagrange multipliers [2, Sect. 5.1], we have that, if a schedule p is optimal, then there exists a value λ ∈ R such that p and λ form a solution to the following system of n + 1 equations in n + 1 unknowns: ∇[costθ(p) + λ(p1 + . . . + pn − 1)] = 0, (6) 7 where the gradient on the l.h.s. is taken w.r.t. (the components of) p and to λ (i.e., has n + 1 components). For 1 ≤ i ≤ n, the i-th equation induced by (6) is or, equivalently, X S∈F s.t.i∈S ∂ ∂pi costθ(p) + λ = 0, θcπ(S)(1 − p(S))c−1 (1 − θ(1 − p(S))c)2 = λ . nX pz = 1 . The term on the l.h.s. is exactly Wi(p). The (n + 1)-th equation of the system (6) (i.e., the one involving the partial derivative w.r.t. λ) is Consider now the first claim of the theorem, and assume that we are at iteration j such that j is the minimum iteration index for which the schedule p(j) computed at the end of iteration j is optimal. Then, for any i, 1 ≤ i ≤ n, we have Wi(p(j)) = λ z=1 because p(j) is optimal and hence all identities in the form of (7) must be true. For the same reason, (8) must also hold for p(j). Hence, for any 1 ≤ i ≤ n, we can write the value p(j+1) computed at the end of iteration j + 1 as i p(j+1) i = Pn p(j) i Wi(p(j)) z=1 p(j) z Wz(p(j)) = p(j) i λ 1λ = p(j) i , which means that we reached convergence and wiggins will return p(j+1), which is optimal. we have, for any 1 ≤ i ≤ n, Consider the second claim of the theorem, and let j be the first iteration for which p(j) = p(j−1). Then p(j) i = This implies Pn p(j−1) i Wi(p(j−1)) z=1 p(j−1) nX z Wz(p(j−1)) Wi(p(j−1)) = p(j−1) z Wz(p(j−1)) = p(j−1) i . (7) (8) (9) and the r.h.s. does not depend on i, and so neither does Wi(p(j−1)). Hence we have W1(p(j−1)) = ··· = Wn(p(j−1)) and can rewrite (9) as z=1 nX z=1 Wi(p(j−1)) = p(j−1) z Wi(p(j−1)), which implies that the identity (8) holds for p(j−1). Moreover, if we set λ = W1(p(j−1)) we have that all the identities in the form of (7) hold. Then, p(j−1) and λ form a solution to the system (6), which implies that p(j−1) is optimal and so must be p(j), the returned schedule, as it is equal to p(j−1) because wiggins reached convergence. 8 Algorithm 1: wiggins input : F, π, c, θ, and maximum number T of iterations output: A c-schedule p (with globally minimum θ-cost, in case of convergence) Wi ← 0 pi ← 1/n for i ← 1 to n do end for S ∈ F do 1 for i ← 1 to n do 2 3 end 4 for j ← 1 to T do 5 6 7 8 9 10 11 12 13 14 15 end end pold ← p for i ← 1 to n do piWi pi ← piWiP for i ∈ S do break 16 17 18 19 20 end 21 return p end Wi ← Wi + θcπ(S)(1−p(S))c−1 (1−θ(1−p(S))c)2 i end if pold = p then // test for convergence 4.2 Approximation through Sampling We now remove the assumption, not realistic in practice, of knowing the generating process Γ exactly through F and π. Instead, we observe the process using, for a limited time interval, a schedule that iterates over all nodes (or a schedule that selects each node with uniform probability), until we have observed, for each time step t in a limited time interval [a, b], the set It generated by Γ, and therefore we have access to a collection (10) We refer to I as a sample gathered in the time interval [a, b]. We show that a schedule computed with respect to a sample I taken during an interval of ‘(I) = b − a = O(ε−2 log n) steps has cost which is within a multiplicative factor ε ∈ [0, 1] of the optimal schedule. We then adapt wiggins to optimize with respect to such sample. I = {Ia,Ia+1, . . . ,Ib}. We start by defining the cost of a schedule w.r.t. to a sample I. Definition 1. Suppose p is a c-schedule and I is as in Equation (10), with ‘(I) = b − a. The θ-cost of p w.r.t. to I denoted by costθ(p,I) is defined as For 1 ≤ i ≤ n, define now the functions costθ(p,I) := 1 ‘(I) X Wi(p,I) = 1 ‘(I) S∈I:i∈S 9 X S∈I 1 1 − θ(1 − p(S))c . θc(1 − p(S))c−1 (1 − θ(1 − p(S))c)2 . We can then define a variant of wiggins, which we call wiggins-apx. The differences from wiggins are: 1. the loop on line 8 in Alg. 1 is only over the sets that appear in at least one Ij ∈ I. 2. wiggins-apx uses the values Wi(p,I) (defined above) instead of Wi(p) (line 10 in Alg. 1); If wiggins-apx reaches convergence, it returns a schedule with the minimum cost w.r.t. the sample I. More formally, by following the same steps as in the proof of Thm. 2, we can prove the following result about wiggins-apx. Lemma 2. We have that: at iteration j + 1; and 1. if at any iteration j the schedule p(j) has minimum cost w.r.t. I, then wiggins-apx reaches convergence 2. if wiggins-apx reaches convergence, then the returned schedule p has minimum cost w.r.t. I. Let ‘(I) denote the length of the time interval during which I was collected. For a c-schedule p, costθ(p,I) is an approximation of costθ(p), and intuitively the larger ‘(I), the better the approximation. We now show that, if ‘(I) is large enough, then, with high probability (i.e., with probability at least 1 − 1/nr for some constant r), the schedule p returned by wiggins-apx in case of convergence has a cost costθ(p) that is close to the cost costθ(p∗) of an optimal schedule p∗. Theorem 3. Let r be a positive integer, and let I be a sample gathered during a time interval of length ‘(I) ≥ 3(r ln(n) + ln(4)) ε2(1 − θ) . (11) Let p∗ be an optimal schedule, i.e., a schedule with minimum cost. If wiggins-apx converges, then the returned schedule p is such that costθ(p∗) ≤ costθ(p) ≤ 1 + ε 1 − ε To prove Thm. 3, we need the following technical lemma. costθ(p∗) . Lemma 3. Let p be a c-schedule and I be a sample gathered during a time interval of length ‘(I) ≥ 3(r ln(n) + ln(2)) ε2(1 − θ) , (12) where r is any natural number. Then, for every schedule p we have Pr(costθ(p,I) − costθ(p) ≥ ε · costθ(p)) < 1 nr . Proof. For any S ∈ F, let XS be a random variable which is otherwise. Since p(S) ∈ [0, 1], we have S∈F XS, then 1 ≤ XS ≤ 1 1 − θ costθ(p) = E[X] = X E[XS] ≥ X 1−θ(1−p(S))c with probability π(S), and zero 1 . If we let X =P Let Z =P S∈F π(S). Then we have S∈F S∈F π(S) . (13) Z ≤ X ≤ Z 1 − θ . 10 S be the i-th draw of XS, during the time interval I it was sampled from, and define X i =P S. S∈F X i Let X i We have Let now X i X i . costθ(p) . costθ(p,I) = 1 ‘(I) µ = ‘(I)(1 − θ) Z By using the Chernoff bound for Binomial random variables [27, Corol. 4.6], we have Pr (costθ(p,I) − costθ(p) ≥ εcostθ(p)) ! X i − ‘(I)costθ(p) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)X (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)1 − θ (cid:18) Z − ε2‘(I)(1 − θ)costθ(p) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≥ ε‘(I)costθ(p) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≥ εµ ! (cid:18) (cid:19) − ε2µ (cid:19) (cid:18) 3 − ε2‘(I)(1 − θ) ≤ 2 exp X i ≤ 2 exp i = Pr = Pr ≤ 2 exp X i − µ 3Z 3 (cid:19) , where the last inequality follows from the rightmost inequality in (13). The thesis follows from our choice of ‘(I). We can now prove Thm. 3. of Thm. 3. The leftmost inequality is immediate, so we focus on the one on the right. For our choice of ‘(I) we have, through the union bound, that, with probability at least 1 − 1/nr, at the same time: (1 − ε)costθ(p) ≤ costθ(p,I) (1 − ε)costθ(p∗) ≤ costθ(p∗,I) ≤ (1 + ε)costθ(p), and ≤ (1 + ε)costθ(p∗) (14) Since we assumed that wiggins-apx reached convergence when computing p, then Thm. 3 holds, and p is a schedule with minimum cost w.r.t. I. In particular, it must be costθ(p,I) ≤ costθ(p∗,I) . From this and (14), We then have (1 − ε)costθ(p) ≤ costθ(p,I) ≤ costθ(p∗,I) ≤ (1 + ε)costθ(p∗) and by comparing the leftmost and the rightmost terms we get the thesis. 4.3 Dynamic Settings In this section we discuss how to handle changes in the parameters F and π as the (unknown) generating process Γ evolves over time. The idea is to maintain an estimation π(S) of π(S) for each set S ∈ F that we discover in the probing process, together with the last time t such that an item (t, S) has been generated (and caught at a time t0 > t). If we have not caught an item in the form (t00, S) in an interval significantly longer than 1/π(S), then we assume that the parameters of Γ changed. Hence, we trigger the collection of a new sample and compute a new schedule as described in Sect. 4.2. Note that when we adapt our schedule to the new environment (using the most recent sample) the system converges to its stable setting exponentially (in θ) fast. Suppose L items have been generated since we detected the change in the parameters until we adapt the new schedule. These items, if not caught, loose their novelty exponentially fast, since after t steps their novelty is at most Lθt and decreases exponentially. In our experiments (Sect. 5) we provide different examples that illustrate how the load of the generating process becomes stable after the algorithm adapts itself to the changes of parameters. 11 4.4 Scaling up with MapReduce In this section, we discuss how to adapt wiggins-apx to the MapReduce framework [9]. We denote the resulting algorithm as wiggins-mr. In MapReduce, algorithms work in rounds. At each round, first a function map is executed independently (and therefore potentially massively in parallel) on each element of the input, and a number (or zero) key- value pairs of the form (k, v) are emitted. Then, in the second part of the round, the emitted pairs are partitioned by key and elements with the same key are sent to the same machine (called the reducer for that key), where a function reduce is applied to the whole set of received pairs, to emit the final output. Each iteration of wiggins-apx is spread over two rounds of wiggins-mr. At each round, we assume that the current schedule p is available to all machines (this is done in practice through a distributed cache). In the first round, we compute the values piWi, 1 ≤ i ≤ n, in the second round these values are summed to get the normalization factor, and in the third round the schedule p is updated. The input in the first round are the sets S ∈ I. The function map1(S) outputs, a key-value pair (i, vS) for each i ∈ S, with vS = θc(1 − p(S))c−1 ‘(I)(1 − θ(1 − p(S))c)2 . The reducer for the key i receives the pairs (i, vS) for each S ∈ I such that i ∈ S, and aggregates them to output the pair (i, gi), with X gi = pi vS = piWi . The set of pairs (i, gi), 1 ≤ i ≤ n constitutes the input to the next round. Each input pair is sent to the same reducer,3 which computes the value nX g = gi = nX piWi and uses it to obtain the new values pi = gi/g, for 1 ≤ i ≤ n. The reducer then outputs (i, pi). At this point, the new schedule is distributed to all machines again and a new iteration can start. The same results we had for the quality of the final schedule computed by wiggins-apx in case of convergence carry over to wiggins-mr. i=1 i=1 5 Experimental Results In this section we present the results of our experimental evaluation of wiggins-apx. Goals. First, we show that for a given sample I, wiggins-apx converges quickly to a schedule p∗ that mini- mizes costθ(p,I) (see Thm. 2). In particular, our experiments illustrate that the sequence costθ(p(1),I), costθ(p(2),I), . . . is descending and converges after few iterations. Next, we compare the output schedule of wiggins-apx to four other schedules: (i) uniform schedules, (ii) proportional to out-degrees, (iii) proportional to in-degrees, and (iv) proportional to undirected degrees, i.e., the number of incident edges. Specifically, we compute the costs of these schedules according to a sample I that satisfies the condition in Lemma 3 and compare them. Then, we consider a specific example for which we know the unique optimal schedule, and show that for larger samples wiggins-apx outputs a schedule closer to the optimal. Finally, we demonstrate how our method can adapt itself to the changes in the network parameters. Environment and Datasets. We implemented wiggins-apx in C++. The implementation of wiggins- apx never loads the entire sample to the main memory, which makes it very practical when using large samples. The experiments were run on a Opteron 6282 SE CPU (2.6 GHz) with 12GB of RAM. We tested our method on graphs from the SNAP repository4 (see Table 1 for details). We always consider the graphs to be directed, replacing undirected edges with two directed ones. 3This step can be made more scalable through combiners, an advanced MapReduce feature. 4http://snap.stanford.edu 12 Datasets Enron-Email Brightkite web-Notredame web-Google #nodes #edges 367662 428156 1497134 5105039 36692 58228 325729 875713 (V1K,V500,V100) (9,23,517) (2,7,399) (43,80,1619) (134,180,3546) gen. rate 7.22 4.54 24.49 57.86 Table 1: The datasets, corresponding statistics, and the rate of generating new items at each step. Generating process. The generating process Γ = (F, π) we use in our experiments (except those in Sect. 5.1.1) simulates an Independent-Cascade (IC) model [17]. Since explicitly computing π(S) in this case does not seem possible, we simulate the creation of items according to this model as follows. At each time t, items are generated in two phases: a “creation” phase and a “diffusion” phase. In the creation phase, we simulate the creation of “rumors” at the nodes: we flip a biased coin for each node in the graph, where the bias depends on the out-degree of the node. We assume a partition of the nodes into classes based on their out-degrees, and, we assign the same head probability for the biased coins of nodes in the same class, as shown in Table 2. In Table 1, for each dataset we report the size of the classes and the expected number of flipped coins with outcome head at each time (rightmost column). Let now v be a node whose coin had Class V1K V500 V100 V0 Nodes in class {i ∈ V : deg+(i) ≥ 1000} {i ∈ V : 500 ≤ deg+(i) < 1000} {i ∈ V : 100 ≤ deg+(i) < 500} {i ∈ V : deg+(i) < 100} Bias 0.1 0.05 0.01 0.0 Table 2: Classes and bias for the generating process. outcome head in the most recent flip. In the “diffusion” phase we simulate the spreading of the “rumor” originating at v through network according to the IC model, as follows. For each directed edge e = u → w we fix a probability pe that a rumor that reached u is propagated through this edge to node w (as in IC model), and events for different rumors and different edges are independent. Following the literature [5, 6, 16, 17, 31], we use pu→w = deg−(w). If we denote with S the final set of nodes that the rumor created at v reached during the (simulated) diffusion process (which always terminates), we have that through this process we generated an item (t, S), without the need to explicitly define π(S). 1 5.1 Efficiency and Accuracy In Sect. 4.1 we showed that when a run of wiggins-apx converges (according to a sample I) the computed c-schedule is optimal with respect to the sample I (Lemma 2). In our first experiment, we measure the rate of convergence and the execution time of wiggins-apx. We fix  = 0.1, θ = 0.75, and consider c ∈ {1, 3, 5}. For each dataset, we use a sample I that satisfies (12), and run wiggins-apx for 30 iterations. Denote the schedule computed at round i by pi. As shown in Figure 1, the sequence of cost values of the schedules pi’s, costθ(pi,I), converges extremely fast after few iterations. For each graph, the size of the sample I, the average size of sets in I, and the average time of each iteration is given in Table 3. Note that the running time of each iteration is a function of both sample size and sizes of the sets (informed-sets) inside the sample. Next, we extract the 1-schedules output by wiggins-apx, and compare its cost to four other natural schedules: unif, outdeg, indeg, and totdeg that probe each node, respectively, uniformly, proportional to its out-degree, proportional to its in-degree, and proportional to the number of incident edges. Note that for undirected graphs outdeg, indeg, and totdeg are essentially the same schedule. 13 Figure 1: The cost of intermediate c-schedules at iterations of wiggins-apx according to I. 14 iterations051015202530cost789101112131415ENRON-EMAILc=1c=3c=5iterations051015202530cost45678910BRIGHTKITEc=1c=3c=5iterations051015202530cost9192939495969798WEB-NOTREDAMEc=1c=3c=5iterations051015202530cost195200205210215220225230235WEB-GOOGLEc=1c=3c=5 Datasets Enron-Email Brightkite web-Notredame web-Google I 97309 63652 393348 998038 avg. item size 12941.33 17491.08 183.75 704.74 avg. iter. time (sec) 204.59 144.35 10.24 121.88 Table 3: Sample size, average size of items in the sample, and the running time of each iteration in wiggins-apx (for c = 1). To have a fair comparison among the costs of these schedules and wiggins-apx, we calculate their costs according to 10 independent samples, I1, . . . ,I10 that satisfy (12), and compute the average. The results are shown in Table 4, and show that wiggins-apx outperforms the other four schedules. Dataset Enron-Email Brightkite web-Notredame web-Google wiggins-apx uniform 14.16 9.64 97.78 230.88 7.55 4.85 96.10 213.15 outdeg 9.21 6.14 97.37 230.48 indeg 9.21 6.14 97.43 230.47 totdeg 9.21 6.14 97.40 230.47 Table 4: Comparing the costs of 5 different 1-schedules. 5.1.1 A Test on Convergence to Optimal Schedule Here, we further invetigate the convergence of wiggins-apx, using an example graph and process for which we know the unique optimal schedule. We study how close the wiggins-apx output is to the optimal schedule when (i) we start from different initial schedules, p0, or (ii) we use samples I’s obtained during time intervals of different lengths. Suppose G = (V, E) is the complete graph where V = [n]. Let Γ = (F, π) for F = {S ∈ 2[n] 1 ≤ S ≤ 2}, F. It is easy to see that costθ(p) is a symmetric function, and thus, the uniform schedule is and π(S) = 1 optimal. Moreover, by Corollary 1 the uniform schedule is the only optimal schedule, since {v} ∈ F for every v ∈ V . Furthermore, we let θ = 0.99 to increase the sample complexity (as in Lemma 3) and make it harder to learn the uniform/optimal schedule. In our experiments we run the wiggins-apx algorithm, using (i) different random initial schedules, and (ii) samples I obtained from time intervals of different lengths. For each sample, we run wiggins-apx 10 times with 10 different random initial schedules, and compute the exact cost of each schedule, and its variation distance to the uniform schedule. Our results are plotted in Figure 2, and as shown, by increasing the sample size (using longer time intervals of sampling) the output schedules gets very close to the uniform schedule (the variance gets smaller and smaller). 5.2 Dynamic Settings In this section, we present experimental results that show how our algorithm can adapt itself to the new situation. The experiment is illustrated in Fig. 3. For each graph, we start by following an optimal 1- schedule in the graph. At the beginning of each “gray” time interval, the labels of the nodes are permuted randomly, to impose great disruptions in the system. Following that, at the beginning of each “green” time interval our algorithm starts gathering samples of Γ. Then, wiggins-apx computes the schedule for the new sample, using 50 rounds of iterations, and starts probing. The length of each colored time interval is R = 3(log(n)+log(2)) ,  = 0.5, motivated by Theorem 3. 2(1−θ) Since the cost function is defined asymptotically (and explains the asymptotic behavior of the system in response to a schedule), in Figure 3 we plot the load of the system Lθ(t) over the time (blue), and the 15 Figure 2: The cost of wiggins-apx outputs and their variation distance to the optimal schedule. average load in the normal and perturbed time intervals (red). Based on this experiment, and as shown in Figure 3, after adapting to the new schedule, the effect of the disruption caused by the perturbation disappears immediately. Note that when the difference between the optimal cost and any other schedule is small (like web-Notredame), the jump in the load will be small (e.g., as shown in Figure 1 and Table 4, the cost of the initial schedule for web-Notredame is very close the optimal cost, obtained after 30 iteration). 6 Conclusions We formulate and study the (θ, c)-Optimal Probing Schedule Problem, which requires to find the best probing schedule that allows an observer to find most pieces of information recently generated by a process Γ, by probing a limited number of nodes at each time step. We design and analyze an algorithm, wiggins, that can solve the problem optimally if the parameters of the process Γ are known, and then design a variant that computes a high-quality approximation of the optimum schedule when only a sample of the process is available. We also show that wiggins can be adapted to the MapReduce framework of computation, which allows us to scale up to networks with million of nodes. The results of experimental evaluation on a variety of graphs and generating processes show that wiggins and its variants are very effective in practice. Interesting directions for future work include generalizing the problem to allow for non-memoryless sched- ules and different novelty functions. 7 Acknowledgements This work was supported by NSF grant IIS-1247581 and NIH grant R01-CA180776. 16 length of time interval51020501002005001K2K5K10K20Kcost405060708090length of time interval51020501002005001K2K5K10K20Kvariation distance00.10.20.30.40.50.60.70.80.9 Figure 3: Perturbation, Sampling, and Adapting (For details see Section 5.2). 17 time50010001500200025003000load51015202530Enron-Emailtime50010001500200025003000load2468101214161820Brightkitetime5001000150020002500300035004000load180190200210220230240250260web-Googletime500100015002000250030003500load708090100110120web-Notredame References [1] M. Agumbe Suresh, R. Stoleru, R. Denton, E. Zechman, and B. Shihada. Towards optimal event detection and localization in acyclic flow networks. In Proceedings of the 13th International Con- ference on Distributed Computing and Networking, ICDCN’12, pages 179–196, Berlin, Heidelberg, 2012. Springer-Verlag. ISBN 978-3-642-25958-6. doi: 10.1007/978-3-642-25959-3_13. URL http: //dx.doi.org/10.1007/978-3-642-25959-3_13. [2] S. Boyd and L. Vandenberghe. Convex optimization. Cambridge university press, 2004. [3] L. Bright, A. Gal, and L. Raschid. Adaptive pull-based policies for wide area data delivery. ACM Transactions on Database Systems (TODS), 31(2):631–671, 2006. [4] M. Cataldi, L. Di Caro, and C. Schifanella. Emerging topic detection on Twitter based on temporal and social terms evaluation. In Proceedings of the Tenth International Workshop on Multimedia Data Mining, MDMKDD ’10, pages 4:1–4:10, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0220-3. doi: 10.1145/1814245.1814249. URL http://doi.acm.org/10.1145/1814245.1814249. [5] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’09, pages 199–208, New York, NY, USA, 2009. ACM. ISBN 978-1-60558-495-9. doi: 10.1145/1557019. 1557047. URL http://doi.acm.org/10.1145/1557019.1557047. [6] W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large- scale social networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’10, pages 1029–1038, New York, NY, USA, 2010. ACM. ISBN 978-1- 4503-0055-1. doi: 10.1145/1835804.1835934. URL http://doi.acm.org/10.1145/1835804.1835934. [7] N. A. Christakis and J. H. Fowler. Social network sensors for early detection of contagious outbreaks. PLoS ONE, 5(9):e12948, 2010. [8] A. Dasgupta, A. Ghosh, R. Kumar, C. Olston, S. Pandey, and A. Tomkins. The discoverability of the web. In Proceedings of the 16th international conference on World Wide Web, pages 421–430. ACM, 2007. [9] J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. Communications of the ACM, 51(1):107–113, 2008. [10] A. Delaney. The Growing Role of News in Trading Automation, Oct. 2009. http://www. machinereadablenews.com/images/dl/Machine_Readable_News_and_Algorithmic_Trading.pdf. [11] D. Golovin, M. Faulkner, and A. Krause. Online distributed sensor selection. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN ’10, pages 220–231, New York, NY, USA, 2010. ACM. ISBN 978-1-60558-988-6. doi: 10.1145/1791212.1791239. URL http://doi.acm.org/10.1145/1791212.1791239. [12] G. H. Hardy. Divergent series, volume 334. American Mathematical Soc., 1991. [13] W. Hart and R. Murray. Review of sensor placement strategies for contamination warning systems in drinking water distribution systems. Journal of Water Resources Planning and Management, 136 (6):611–619, 2010. doi: 10.1061/(ASCE)WR.1943-5452.0000081. URL http://ascelibrary.org/doi/ abs/10.1061/%28ASCE%29WR.1943-5452.0000081. [14] B. Hope. How computers trawl a sea of data for stock picks. The Wall Street Journal, Apr. 2015. http: //www.wsj.com/articles/how-computers-trawl-a-sea-of-data-for-stock-picks-1427941801? KEYWORDS=computers+trawl+sea. 18 [15] R. Horincar, B. Amann, and T. Artières. Online refresh strategies for content based feed aggregation. World Wide Web, pages 1–35, 2014. [16] K. Jung, W. Heo, and W. Chen. IRIE: Scalable and robust influence maximization in social networks. arXiv preprint arXiv:1111.4795, 2011. [17] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’03, pages 137–146, New York, NY, USA, 2003. ACM. ISBN 1-58113-737-0. doi: 10. 1145/956750.956769. URL http://doi.acm.org/10.1145/956750.956769. [18] D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in a diffusion model for social networks. In Pro- ceedings of the 32Nd International Conference on Automata, Languages and Programming, ICALP’05, pages 1127–1138, Berlin, Heidelberg, 2005. Springer-Verlag. ISBN 3-540-27580-0, 978-3-540-27580-0. doi: 10.1007/11523468_91. URL http://dx.doi.org/10.1007/11523468_91. [19] A. Krause and C. Guestrin. Submodularity and its applications in optimized information gathering. ACM Trans. Intell. Syst. Technol., 2(4):32:1–32:20, July 2011. ISSN 2157-6904. doi: 10.1145/1989734. 1989736. URL http://doi.acm.org/10.1145/1989734.1989736. [20] A. Krause, J. Leskovec, C. Guestrin, J. VanBriesen, and C. Faloutsos. Efficient sensor placement optimization for securing large water distribution networks. Journal of Water Resources Planning and Management, 134(6):516–526, 2008. doi: 10.1061/(ASCE)0733-9496(2008)134:6(516). URL http: //ascelibrary.org/doi/abs/10.1061/%28ASCE%290733-9496%282008%29134%3A6%28516%29. [21] A. Krause, R. Rajagopal, A. Gupta, and C. Guestrin. Simultaneous placement and scheduling of In Proceedings of the 2009 International Conference on Information Processing in Sensor ISBN sensors. Networks, IPSN ’09, pages 181–192, Washington, DC, USA, 2009. IEEE Computer Society. 978-1-4244-5108-1. URL http://dl.acm.org/citation.cfm?id=1602165.1602183. [22] A. Krause, C. Guestrin, A. Gupta, and J. Kleinberg. Robust sensor placements at informative and ISSN 1550- communication-efficient locations. ACM Trans. Sen. Netw., 7(4):31:1–31:33, Feb. 2011. 4859. doi: 10.1145/1921621.1921625. URL http://doi.acm.org/10.1145/1921621.1921625. [23] N. L. Latar. The robot journalist in the age of social physics: The end of human journalism? In The New World of Transitioned Media, pages 65–80. Springer, 2015. [24] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. M. VanBriesen, and N. S. Glance. Cost-effective outbreak detection in networks. In P. Berkhin, R. Caruana, and X. Wu, editors, KDD, pages 420–429. ACM, 2007. ISBN 978-1-59593-609-7. [25] M. Mathioudakis and N. Koudas. Twittermonitor: Trend detection over the twitter stream. In Proceed- ings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD ’10, pages 1155–1158, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0032-2. doi: 10.1145/1807167.1807306. URL http://doi.acm.org/10.1145/1807167.1807306. [26] W. McKinney. Structured Data Challenges in Finance and Statistics, Nov. 2011. slideshare.net/wesm/structured-data-challenges-in-finance-and-statistics. http://www. [27] M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, 2005. [28] M. Oita and P. Senellart. Deriving dynamics of web pages: A survey. In TWAW (Temporal Workshop on Web Archiving), 2011. 19 [29] A. Ostfeld, J. Uber, E. Salomons, J. Berry, W. Hart, C. Phillips, J. Watson, G. Dorini, P. Jonker- gouw, Z. Kapelan, F. di Pierro, S. Khu, D. Savic, D. Eliades, M. Polycarpou, S. Ghimire, B. Barkdoll, R. Gueli, J. Huang, E. McBean, W. James, A. Krause, J. Leskovec, S. Isovitsch, J. Xu, C. Guestrin, J. VanBriesen, M. Small, P. Fischbeck, A. Preis, M. Propato, O. Piller, G. Trachtman, Z. Wu, and T. Walski. The battle of the water sensor networks (BWSN): A design challenge for engi- neers and algorithms. Journal of Water Resources Planning and Management, 134(6):556–568, 2008. doi: 10.1061/(ASCE)0733-9496(2008)134:6(556). URL http://ascelibrary.org/doi/abs/10.1061/ %28ASCE%290733-9496%282008%29134%3A6%28556%29. [30] K. C. Sia, J. Cho, and H.-K. Cho. Efficient monitoring algorithm for fast news alerts. Knowledge and Data Engineering, IEEE Transactions on, 19(7):950–961, 2007. [31] Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal time complexity meets practical efficiency. arXiv preprint arXiv:1404.0900, 2014. [32] J. L. Wolf, M. S. Squillante, P. Yu, J. Sethuraman, and L. Ozsen. Optimal crawling strategies for web search engines. In Proceedings of the 11th international conference on World Wide Web, pages 136–147. ACM, 2002. 20
1706.10035
1
1706
2017-06-30T06:30:32
Investigating the potential of social network data for transport demand models
[ "cs.SI", "physics.soc-ph" ]
Location-based social network data offers the promise of collecting the data from a large base of users over a longer span of time at negligible cost. While several studies have applied social network data to activity and mobility analysis, a comparison with travel diaries and general statistics has been lacking. In this paper, we analysed geo-referenced Twitter activities from a large number of users in Singapore and neighbouring countries. By combining this data, population statistics and travel diaries and applying clustering techniques, we addressed detection of activity locations, as well as spatial separation and transitions between these locations. Kernel density estimation performs best to detect activity locations due to the scattered nature of the twitter data; more activity locations are detected per user than reported in the travel survey. The descriptive analysis shows that determining home locations is more difficult than detecting work locations for most planning zones. Spatial separations between detected activity locations from Twitter data - as reported in a travel survey and captured by public transport smart card data - are mostly similarly distributed, but also show relevant differences for very short and very long distances. This also holds for the transitions between zones. Whether the differences between Twitter data and other data sources stem from differences in the population sub-sample, clustering methodology, or whether social networks are being used significantly more at specific locations must be determined by further research. Despite these shortcomings, location-based social network data offers a promising data source for insights into activity locations and mobility patterns, especially for regions where travel survey data is not readily available.
cs.SI
cs
Investigating the potential of social network data for transport demand models Michael A.B. van Eggermond,1∗ Haohui Chen,2,3 Alexander Erath,1,4 Manuel Cebrian2 1Future Cities Laboratory, Singapore ETH Centre, Singapore 2Data61, Commonwealth Scientific and Industrial Research Organization, Australia 3Monash University, Australia 4IVT, ETH Zurich, Switzerland ∗To whom correspondence should be addressed; E-mail: [email protected]. June 30, 2017 7 1 0 2 n u J 0 3 ] I S . s c [ 1 v 5 3 0 0 1 . 6 0 7 1 : v i X r a Abstract Location-based social network data offers the promise of collecting the data from a large base of users over a longer span of time at negligible cost. While several studies have applied social network data to activity and mobility analysis, a comparison with travel diaries and general statistics has been lacking. In this paper, we analyzed geo-referenced Twitter activities from a large number of users in Singapore and neighboring countries. By combining this data, population statistics and travel diaries and applying clustering techniques, we addressed detection of activity locations, as well as spatial separation and transitions between these locations. We had large numbers of Twitter users in the data set collected over a period of 8 months; however, due to the scattered nature of the data, only a group comparable to a travel survey turned out to be useful for further analysis. Kernel density estimation performs best to detect activity locations; more activity locations are detected per user than reported in the travel survey. The descriptive analysis shows that determining home locations is more difficult than detecting work locations for most planning zones. Spatial separations between detected activity locations from Twitter data - as reported in a travel survey and captured by public transport smart card data - are mostly similarly distributed, but also show relevant differences for very short and very long distances. This also holds for the transitions between zones. Whether the differences between Twitter data and other data sources stem from differ- ences in the population sub-sample, clustering methodology, or whether social networks are being used significantly more at specific locations must be determined by further research. Despite these shortcomings, location-based social network data offers a promising data source for insights in activity locations and mobility patterns, especially for regions where travel survey data is not readily available. 1 1 Introduction The well-established four-step transport model, as well as state-of-the art agent-based models, have relied on the same data sources over the last several decades. Traditional data sources included, but were not limited to, travel diary surveys, population censuses, business censuses, road networks and transit schedules. Travel diary surveys collect information on individuals and their households; along with trip information, they also cover information on activities and locations visited over the course of one day. Population and business censuses provide insight into (aggregate) population statistics by home and work location. These and other strands of data are then combined to quantify travel demand for a general population used in transport models. Shortcomings of travel diaries include the common under-reporting of short trips; it is also difficult to sample from all potential user groups over a longer time span in study regions due to time and budget limitations. Furthermore, both travel diary surveys and censuses were usually conducted every 5 to 10 years, with access for researchers and the general public sometimes restricted. Social network data offers the chance to observe users over a larger time span for very low costs. Previous research investigated activity and mobility patterns [Hasan et al., 2013] a) and focused on the recognition of mobility patterns in a range of cities [Noulas et al., 2012]. These studies have shown the possibilities of using social network data; however, a comparison with travel diaries or other transport related data sources was lacking. In this paper, we investigate the possibilities of using publicly available social network data for transport planning purposes. More specifically, we try to investigate the possibil- ity of using Twitter data's spatial and temporal information to complement, or replace, travel diaries. We collected data from the social networking and micro-blogging service Twitter for 8 months for Singapore and neighboring countries Malaysia, Indonesia and Thailand. To test the validity of travel patterns derived from this data, we compared it to Singapore's household interview travel survey and one week of public transport smart card data. By merging these data sources and applying several clustering methods, we addressed the following questions: 1. Is it possible to recognize activity locations from social network data and, if so, do the detected activity locations correspond to activity locations reported in other, more traditional transport data sources? 2. Is the spatial separation between detected activity locations comparable to distances between reported activity locations from travel diaries? 3. Is it possible to derive origin destination matrices from social network data and how do these matrices correspond to observed trips? The remainder of this paper is structured as follows. Section 2 continues with a literature review. Section 3 provides an overview of the used data sources, methodology is presented in section 4and results are presented in section 5. Section 6 concludes with the discussion and outlook. 2 2 Background 2.1 Data collection for transport planning and modeling The normal method for obtaining travel behavior data was a one-day travel diary sur- vey, which collected data for a representative day with the representative peak hour [e.g. Ort´uzar and Willumsen, 2011]. In travel diaries, data is gathered about household, per- son and travel behavior characteristics, including household income, residential location, dwelling type, etc. Trip data includes a start time, end time, mode(s) used, number of transfers and trip purpose. Activity duration is derived from the difference between the trip end time and trip start time of subsequent trips. In the case of the classic four-step model [e.g. Ort´uzar and Willumsen, 2011] and, more recently, activity-based models [e.g. Axhausen and Garling, 1992], this data was used for trip generation, activity chain generation, trip distribution, modal choice and traffic assignment models. In addition to these models, information was required about zonal productions and zonal attractions (e.g. number of household, workplaces, leisure locations). While travel diary data often effectively captured travel demand patterns, it is well known that data collection method details (like exact departure time and arrival, route taken and number of activity locations) hindered adequate surveys. To obtain more detailed user data, state-of-the-art travel surveys included, or were supplemented by, GPS data. Subsequently, numerous studies have assessed the accuracy of one-day travel surveys. Wolf [2004] reported that the rate of missing trips ranged from 11% to 81%, when com- paring the results of computer assisted telephone surveys and GPS data in six household surveys in the US. Forrest and Pearson [2005] found that the number of trips observed in GPS data in their 2002 survey was much higher than the number of trips reported by respondents. Home-based non-work and non-home-based trips suffered most from under-reporting. In both these studies, in-vehicle GPS units were used to assess the accuracy of survey response. Stopher et al. [2007] found a lower percentage of missing trips when comparing results of a travel survey conducted by face-to-face interviews and hand-held GPS devices. In their analysis of missing trips, they found that people per- forming many trips under-report them. Other problems occurred with trips conducted after 5pm, non-motorized trips and activities with a duration under 10 minutes. Transport planners and researchers know that one-day travel surveys do not capture the full range of activities by individuals and households, such as social visits, leisure activities and shopping. Since the Uppsala Travel Survey of 1971, a number of multi-day and multi-week travel surveys have been conducted, despite the higher costs, survey fatigue and low response rates typical for longer surveys. Schlich and Axhausen [2003] introduced different methods to measure the similarity of day-to-day travel behavior in a six-week travel survey conducted in Karsruhe and Halle, Germany [Axhausen et al., 2002]. They showed that behavior is neither totally repetitious, nor totally variable. The different methods employed to measure similarity showed that travel is more stable on workdays and that at least two weeks of data was required to measure similarity. An increasing number of cities, regions and countries have adopted public transport smart cards. While the main objective of these systems is to collect revenue, another result is very detailed data of onboard transactions that can be used for numerous ap- plications [Pelletier et al., 2011]. Depending on the type of implementation of the smart 3 card system, a trip start time and/or end time are available to the transport company. Disadvantages of smart card data include the lack of trip purpose and the lack of knowl- edge about exact origin and destination location of a public transport user's trip [Bagchi and White, 2005]. Despite these disadvantages, it is still possible to extract trip distance, trip duration (excluding waiting time) and an individual's approximate time spent at a location [e.g. Chakirov and Erath, 2012]. Several studies have already explored the possibility of using mobile phone Call Detail Records (CDR) to estimate origin destination matrices Calabrese et al. [2011], Wang et al. [2011], Iqbal et al. [2014]. Iqbal et al. [2014] point out that, while it is possible to extract trip patterns from mobile phone data, heterogeneity exists in call rates from different locations, leading to biased results. 2.2 Social network data Social network services build on the real-life social networks of people through online platforms to share ideas, activities and interests; the increasing availability of location- acquisition technology offers the extra possibility for people to add a location dimension to existing social networks in various ways [Zheng, 2011]. Within the field of transport modeling, location-based social network data has been used to classify users' activity patterns [Hasan and Ukkusuri, 2014], detected traffic anomalies [Pan et al., 2013], reconstructed popular traffic routes [Wei et al., 2012], rec- ognized mobility patterns in a range of cities [Noulas et al., 2012] and modeled human location [Lichman and Smyth, 2014]. While an increasing number of studies use geo-tagged social network data, less atten- tion is being paid to the social network data's representation of the general population [Grossenbacher, 2014]. One analysis stated [Haklay, 2012]: In digiplace the wealthy, powerful, educated and mostly male elite is amplified through multiple digital representations. Moreover, the frequent decision of algorithm designers to highlight and emphasise those who submit more media, and the level of 'digital cacophony' that more active contributors create, means that a very small minority - arguably outliers in every analysis of normal distribution of human activities - are super empowered. However, location-based social network data comes with a larger sample size for a longer period without any significant costs [Hasan and Ukkusuri, 2014]. Several disad- vantages limit the use of traditional econometric tools for these data sets [Hasan and Ukkusuri, 2014]: (i) they do not provide detailed descriptions of activities, such as start and end times and activities can be either at static locations or en-route (ii) individuals are recognized only by an identifier without additional information on individual socio- economic characteristics; (iii) the data has missing activities, since the only activities observed are those an individual shares in social media. In addition to this last point, it should also be noted that only users active in social media are included. 3 Data collection & preparation 3.1 Study region The availability of a travel diary survey, public transport smart card data and a broad Twitter user base made Singapore an ideal case study to answer our research questions. 4 Singapore is located in Southeast Asia with a land area of 712 km2, a permanent residen- tial population of 3.77 million and a total population of 5.08 million in 2010, compared to respectively 697 km2, 3.27 million and 4.03 million in 2000. GNI per capita amounts to US$ 54,580, 2013), which makes it one of the wealthiest countries in (Southeast) Asia. 3.2 Social network data The social networking and microblogging service Twitter was launched in 2006. At the end of March 2014, there were 255 million average monthly active users (MAUs), of which 198 million mobile MAUs [Twitter, 2014a]. Together, these users send 500 million tweets per day [Twitter, 2014b]. As opposed to many other social networking sites, Twitter offers the opportunity to download users' profiles and Twitter messages, or tweets, including the geo-location of the tweet; it also includes an indicator whether it was sent from a mobile device, or from a computer in real-time. When downloading data from Twitter, one can specify a geographic area. For this research, we have specified the bounding box 'Singapore', shown in Figure 1. In total, 4,121,433 tweets were collected during the period from September 10, 2013 to February 27, 2014. While a geographic bounding box has been specified, not all tweets are geo- tagged with a longitude and latitude and not all tweets are located in Singapore. Table 1 lists the number of users, tweets, geo-tagged tweets and tweets in Singapore. Additionally, an indicator has been included to see whether a user has tweeted 10 times or more within the time span specified earlier. One sees that only 29% of users Tweet 10 times or more within this period, but that these users contribute over 90% of the tweets. Table 1 highlights these statistics and provides a range of other figures on smart card data, the Singaporean travel diary survey and Twitter data. These figures will be discussed later in this section. 3.3 Smart card data Singapore's public transport card was introduced in April 2002; smart cards can be used island-wide for payment of all modes of public transport, regardless of operator. Though cash payment of single fares at higher rates is still possible, e-payments using smart cards account for 96% of all trips [Prakasam, 2008]. Smart card data records include the boarding station, boarding time, end station and time. In this paper, we employ 7 days of smart card data from trips made between April 6 to April 12, 2014. 3.4 Travel diary survey Trip information is taken from the Household Interview Travel Survey (HITS) 2012. For this survey, over 32,000 persons from over 9,000 households reported their travel behavior on a single workday, corresponding to approximately 1% of households in Singapore. The survey is conducted once every four years and is commissioned by the Singaporean Land Transport Authority (LTA). HITS contains data on three levels of aggregation; the highest level contains household characteristics. In the second highest level, personal characteristics are available, such as age, income, profession and employment type. On the lowest level of aggregation, trip information is available for mode, purpose, cost and time. 5 Table 1: Aggregates from different data sources Data source / Indicator All users 10 tweets or more Percentage 45,715 3,800,904 3,417,418 1,957,952 1,459,466 20,822 14,528 5,857 29.1 92.2 92.3 91.9 92.8 27.0 26.6 63.7 Twitter (from September 10, 2013 until February 27, 2014) Number of users Number of tweets Number of geo-tagged tweets Number of tweets in Singapore Number of tweets outside Singapore Number of users tweeting only in Singapore Number of users tweeting only outside Singapore Number of users tweeting in Singapore and overseas Household interview travel survey 2012 Number of households Number of persons Smart card data (from April 6 to April 12, 2014) Number of card identifiers in smart card data Number of journeys over 7 days Singapore statistics (2012 except where otherwise stated) Total population Total resident population (Singaporeans and Permanent Residents) Singaporeans Permanent resident Total non-resident population (Workpass holders & dependents) Land-area 2013 [km2] Population density 2013 [persons per km2] (Based on total population) Per capita GNI 2013 [US$] 157,043 4,121,433 3,703,425 2,129,930 1,573,495 77,234 54,682 9,189 9,635 35,714 3,475,574 23,994,771 5,312,400 3,818,200 3,285,100 533,100 1,494,200 716.1 7,540 54,580 Figure 1: Specified bounding box and planning zones. Background map: http: //openstreetmap.org. 6 05101520 km 3.5 Other data sources We enriched the previous data sets with attributes from several other data sources, includ- ing the 1,092 transport analysis zones (TAZ's) as used in Singapore's transport demand model, the 55 land-use planning zones and land-use types. Singapore's populations statis- tics [Department of Statistics, 2010] were included, as well as an estimated number of work activities in Singapore by planning zone [Chakirov and Erath, 2012, Ord´onez Med- ina and Erath, 2013]. 4 Methodology 4.1 Identification of clusters To assess the suitability of Twitter data for transport demand analysis, we wanted to recognize stationary activity locations visited by an individual: his or her home loca- tion, work location, education locations and locations where discretionary activities were performed. As such, we did not touch on the fact that activities can also be performed en-route. For instance, it is possible to work while commuting or maintain social contacts. By observing an individual over a longer span of time it would be possible to capture more activity locations than from a one or two day household travel survey. To differentiate between stationary activities and activities performed en-route, we assumed that events (tweets) posted at activity locations tended to be less geographically dispersed; en-route events would be more geographically dispersed. Partitioning geographically close activi- ties into clusters helped identify en-route activities, as their clusters should contain fewer events. 4.2 K-means clustering K-means clustering is one of the most popular clustering methods [Jain, 2010]. Since K-means clustering was proposed in 1955, many studies have applied different variations of the method in a wide range of domains. Finding the optimal number of clusters k is a challenging, but necessary task. Various ways of obtaining the optimal k value were discussed in Jain [2010], essentially trying different values of k and selecting the best value based on predefined criteria, such as the minimum message length [Figueiredo and Jain, 2002], minimum description length [Hansen and Yu, 2001], gap statistics [Tibshirani et al., 2001] and Dirichlet process [Rasmussen and Nagel, 2000]. A more general and easy-to-implement method for validating clustering results was the silhouette method [Rousseeuw, 1987]. The value of a silhouette measured (1) how well an observation was assigned to its cluster and (2) how dissimilar that observation was to its neighboring clusters, thus reflecting the clustering analysis performance. This paper used the value of the silhouette to validate the clustering results of different k values and selected the optimal value. Clusters resulting from k-means clustering can be fairly large if measured by the convex hull of all the events (tweets) included in the cluster. For this research, we asserted that a large cluster cannot necessarily constitute a single activity location. We defined a maximum threshold for the variance of 200 meters. Clusters which exceeded this threshold were recursively broken down into more, smaller clusters by recursive k- means clustering [Arnott and Starner, 2003]. This process is also illustrated in Figure 2. 7 Figure 2: K-means clustering procedure 4.3 Kernel density estimation and clustering Kernel density estimation (KDE) provided us with another way of determining activity locations that individuals frequently visited. It is a non-parametric method for estimating a density function from a random sample of data [Silverman, 1986]. A user-defined pa- rameter called bandwidth h specifies the standard deviation of the Gaussian distribution function constructed around each data point to smooth the KDE result. A small value for h may under-smooth the KDE result; a large value for h can result in over-smoothing. The bandwidth h gives an indication of the area covered by the KDE result; 95% will be located within 400 meters. Two main methods for the selection of bandwidth exist: the fixed bandwidth and the adaptive bandwidth method. Given that each location should be limited in area, a universal fixed bandwidth for the KDE is assumed, which is the same as the k-means clustering's maximum variance, namely h = 200 meters. To obtain clusters from the estimation procedure, contour lines are constructed. All local peaks of the contour line are regarded as clusters and contour levels are assigned to corresponding kernels. The resulting levels are calculated per cluster per individual and provide an indication of the relative importance of a single cluster among an individual's clusters; cluster levels between different individuals cannot be directly compared. KDE, by itself, is not a clustering method. However, as the clusters (peaks) are impacted by neighboring activities, neighboring activities within a certain distance (h) are grouped together. If an activity (tweet) belongs to more than one kernel, it is grouped to the closest one. This situation is very rare in our data set and occurs in less than 0.01% of cases. 8 Figure 3: Temporal classification of Tweets 4.4 Limitations of applied clustering methods Not all recorded tweets can be assigned to a cluster. Individual tweets sent from locations that are visited only rarely, for instance during a restaurant visits, or at a concert, would typically not be assigned to a cluster. Therefore, our approach did not assign these tweets to activity locations, just discarded them. Furthermore, the applied approach did not make use of a tweet's temporal attribute; using this component provided an additional challenge. A possible approach would be to group the tweets in different subsets, as shown in Figure 33. Six tweets are shown; three day-time tweets and three night-time tweets. Using no temporal information, a single cluster will be detected. Clustering subsets of tweets can lead to a higher number of users per cluster: tweets in each other vicinity might yield more than one cluster, as they would be in different subsets. It is challenging to determine whether clusters located in approximately the same location actually belong to the same activity location. 5 Results 5.1 Detecting activity locations Due to social network data's nature, recognition of user's locations differs fundamentally from another frequently used location-based data source used in transport research: GPS data collected through smart phones or dedicated GPS trackers. While the latter data sources provide location and speed information, making it possible to perform not only mode detection, but also to detect start and end times of trips activities, social network data only shows when a user posts geo-tagged information to the social network. In- dividual locations could be obtained from social media by means of location check-ins; this, however, leads to a limited subset of users and location types [Noulas et al., 2012, Hasan and Ukkusuri, 2014]. The challenge with a data stream coming from Twitter is to determine whether a user is at an activity location or en-route. Figure 4 shows the tweets of an active user. The selected user has tweeted 1,405 times over the course of the 8-month observation period. While the data might look similar to GPS data in terms of detected trajectories, these tweets are not necessarily ordered by time. The user's main locations have been identified by both k-means clustering and kernel density estimation (KDE). In k-means clustering, each data point (tweet) needs to be assigned to a cluster. A cluster recognized by k-means clustering has a certain number of tweets belonging to that cluster, which we will refer to as the cluster size. In the figure, clusters of different sizes are depicted, as well as clusters recognized with kernel density estimation. Using KDE, two clusters are recognized; with k-means clustering, more than 100 clusters are 9 (a) Kernel density estimation (KDE ¿ 10%) (b) K-means cluster sizes 3, 4 and larger than 5 Figure 4: This figure depicts 1,405 individual tweets of a randomly selected user and the detected clusters by means of k-means clustering and kernel density estimation. Back- ground map: http://openstreetmap.org. recognized containing two tweets or more. Figure 11 in the appendix provides more detail on the number of tweets required to detect a certain number of clusters. To determine the merits of both the k-means clustering and KDE, both methods are evaluated by the number of clusters recognized per user and each cluster's strength. Currently, the strength of each cluster is evaluated as follows: • For clusters recognized by k-means clustering, the strength is calculated as the number of tweets belonging to each cluster; the size of the cluster. A distinction is made between clusters having 1, 2, 3, 4 and 5 or more tweets. • For clusters recognized by kernel density estimation, strength is calculated as the contribution (the level) of a single cluster to the sum of the levels of each cluster of a single user. Clusters contributing less than 5%, 10% and 20% respectively to the sum of the levels are filtered out. The results of the evaluation are presented in Figure 5; results only include users tweeting in Singapore, or Singapore and overseas, tweeting 10 times or more. An intuitive result is found; if threshold levels for a cluster's strength are set low, the number of clusters found by both methods is high; when setting thresholds' value high, a lower number of clusters is detected. If a minimum cluster size of 4 is set for the k-means clustering, 47% of the users have only 1 cluster and 23% percent have 2 clusters. If a minimum contribution level of 20% is set for KDE, 67% of the users have only 1 cluster; while with a level of 5%, 80% of the users have more than one cluster. From this, the relationship between the chosen threshold and the number of clusters becomes apparent. If the goal is to determine the number of frequently visited locations, thresholds will need to be set. However, if the goal is to determine a user's activity space, one can avoid setting thresholds, thus not deleting user information. 10 0246810 kmKDE > 10%tweets0246810 kmk-means size >= 5k-means size = 4k-means size = 3tweets Figure 5: Number of clusters detected with different cluster methodologies K-means clustering can be considered the standard method for clustering. Visual inspection of our results per user and inspection of histograms indicate that k-means is not well suited to make a distinction between en-route events and activity locations. This follows from the sparse nature of the data and the requirement that each data point belongs to exactly one cluster. We will now proceed with clustering by means of kernel density estimation and a contribution level of 10%. This means that at least 10% of the tweets of a single user should be in a single cluster. This value was chosen, as it seemed to strike a balance between the filtering of en-route activities and stationary activity locations. 5.2 Comparison with travel survey data Number of activity locations When comparing clusters detected from Twitter data with reported activity locations from the travel diary survey, we assume each reported trip indicates a separate activity location. Figure 6 allows for a comparison of one-day travel survey data and Twitter data collected over a period of several months. Survey respon- dents with only a single identified activity location (25%) included retirees, homemakers and domestic workers. Over 50% of the survey respondents report two activity locations. The applied cluster methodologies detect more activity locations than reported in the survey. For activity locations recognized with KDE and a contribution level of 10%, 29% of Twitter users have a single cluster, 28% of the users have two, 23% of the users have three clusters, 13% of the users have four and 5% of the users have five clusters. Figure 7 shows the number of Twitter clusters per planning zone versus the number of respondents in travel survey data with an activity location in the planning zone. A relatively high number of clusters was detected in the planning zones: Downtown Core, Orchard, Singapore River, Marina South, Museum and Sentosa. These zones typically contain numerous restaurants, as well as shopping opportunities and other leisure desti- nations. 11 123456789k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%k-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%02,0004,0006,0008,00010,00012,00014,00016,00018,000Number of users27.2%39.8%47.4%19.6%28.7%67.0%0.9%8.8%14.6%22.6%28.4%26.0%23.3%13.8%28.5%29.7%10.8%20.1%15.4%12.2%10.6%13.2%22.8%3.2%10.6%14.8%12.6%13.0%9.5%7.1%6.2%0.1%12.3%10.7%11.7%6.2%4.8%4.1%5.1%12.7%10.4%8.3%4.8%3.6%3.1%1.6%13.5%6.1%3.4%2.8%2.1%8.5%0.3%13.0%4.7%2.8%2.1%1.6%6.2%0.0%11.5%4.0%2.4%1.6%1.5%4.0%0.0%Number of clustersLegendk-means size > 0k-means size > 1k-means size > 2k-means size > 3k-means size > 4KDE 5%KDE 10%KDE 20% Figure 6: Number of reported activity locations in travel survey as compared to the number of clusters in Twitter by means of kernel density estimation Figure 7: Comparison of clusters detected in Twitter and reported activity locations in the 2012 household interview travel survey 12 123456789HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%HITS2012TwitterKDE10%02,0004,0006,0008,00010,00012,00014,00016,00018,00020,00022,000Number of users20.1%28.7%67.2%28.5%10.0%22.8%13.0%2.1%0.5%5.1%0.1%1.6%0.0%0.3%0.0%0.0%0.0%0.0%Number of clustersLegendHITS 2012Twitter KDE 10%Planning zone nameBedokWoodlandsTampinesJurong WestBukit MerahQueenstownAng Mo KioHougangGeylangYishunBukit BatokChoa Chu KangToa PayohBukit PanjangDowntown CoreJurong EastSengkangSerangoonKallangPasir RisBukit TimahClementiSembawangBishanPunggolMarine ParadeNovenaOrchardOutramRochorChangiPioneerTuasWestern catchmentMarina SouthSungei KadutBoon LayNewtonSingapore RiverMuseumTanglinRiver ValleyJurong IslandSentosaPaya LebarSeletarCentral catchmentMandaiChangi BayLim Chu KangMarina EastPulau UbinSimpangStraits ViewTengah0%2%4%6%8%PercentageData SourceHITS 2012Number of unique users Figure 8: Comparison of distances between reported activity locations in the household interview travel survey 2012 and activity locations detected in Twitter using kernel den- sity estimation (17,930 users). Distance comparison In addition to the visual inspection of clusters and assessing the total number of clusters per user, we compared distances between clusters detected in Twitter and dis- tances between reported activity locations in the Singapore travel diary survey. To assess whether the distances between activity locations found in different data sources corre- spond for both data sources, Euclidean distances between all unique reciprocal locations per user were calculated. For example, if a user reported trips to three distinct locations (e.g. home, work, leisure), we calculated the distances between home-work, home-leisure and leisure-work. A similar procedure was followed for clusters detected in Twitter using KDE with a threshold value of 10% as a reference case. In Figure 8, distance compari- son results are presented, showing that distances between detected clusters and reported activity locations match for most distance categories. In the household interview travel survey, a higher number of cluster-pairs was reported that were separated by less than 1 kilometer. A closer analysis of HITS reveals that clusters separated by less than 1 kilo- meter are often activity pairs 'home-education' (44%), 'home-pick up drop' (11%) and 'home-work' (10%). Furthermore, clusters detected in Twitter data are more separated from each other than activity locations observed in travel survey data. This is especially notable for clusters separated by more than 15 kilometers. To determine whether the two distributions can be considered similar, we performed a Kolmogorov-Smirnov test. The test revealed that the two distributions were similar, with a p-value of 0.93. s 13 Distance group [km]< 0.20.2 - 0.50.5 - 11-22-33-44-55-66-77-88-99-1010-1111-1212-1313-1414-1515-1616-1717-1818-1919-2020-2121-2222-2323-24> 240%1%2%3%4%5%6%7%8%9%10%11%12%Percent of total records3.73%0.00%8.73%0.19%8.97%3.42%10.42%10.77%7.66%9.97%6.40%7.45%5.33%6.47%5.07%7.71%4.65%5.71%4.58%4.62%3.99%3.96%3.98%3.48%3.64%3.39%3.08%3.67%3.05%3.43%2.78%3.45%2.63%3.05%2.21%3.47%1.99%4.17%1.74%3.36%1.33%2.61%0.97%1.18%0.73%0.93%0.44%1.39%0.42%0.75%0.32%0.37%1.16%1.05%Data sourceHITS 2012Twitter KDE 10% 5.3 Comparison with aggregated statistics Clusters detected through KDE and using a threshold of 10% were compared to Singa- pore's population statistics [Department of Statistics, 2010] and estimated work locations [Chakirov and Erath, 2012, Ord´onez Medina and Erath, 2013]. The results of the com- parison are presented in Figure 9, showing the number of users with one or more clusters in each respective planning zone against the population (top) and the number of work locations (bottom). Bedok has a resident population of 589,038, according to the 2010 Singapore census; the number of detected work locations with smart card data in the downtown core is 185,000. Because the order of magnitude differs from the number of users found in Twitter, the population percentage residing and working in each zone is shown and compared to the percentage of unique Twitter users with a cluster in this zone. A direct comparison between activity locations detected from Twitter data and resi- dent population and work activity densities is challenging. While KDE clustering seemed to reliably identify activity locations, it would require other analysis methods to deduce the type of activity performed at the identified location. On the whole, identified activity densities corresponded quite well with where people live or work. The percentage of detected clusters in various zones matched the population percent- age in several planning zones, most notably in the planning zones Bukit Timah, Novena, Marine Parade, Kallang and Queenstown. The first three planning zones were charac- terized by a high percentage of private property and correspondingly higher income. A further distinction by age and income is necessary to further analyze Twitter clusters and socio-demographics. The Pearson correlation between the number of unique users and workplaces per zone is 0.29. The Downtown core has the highest number of work locations and the second-highest percentage of Twitter users. A similar observation can be made for other planning zones, such as Bukit Merah and Queenstown. The Pearson correlation between the number of unique users and workplaces per zone is 0.70. Several zones revealed a higher number of Twitter users compared to population and workplace figures. These are: the shopping district Orchard, the airport Changi, the leisure island Sentosa and the entertainment area Singapore River. This comparison highlighted that clusters where users tweet are not limited to work, home or discretionary activity locations, but occur in areas that are particularly popular for leisure activities. 5.4 Detecting transitions The third comparison involved comparing origin-destination (OD) matrices derived from public transport smart card data with transitions observed in Twitter data. OD matrices from smart card data were derived from journey start and end transit stops; no attention was paid to transfers. For instance, consider a user traveling from zone A to zone C with a transfer in zone B. The travel from A to C is considered a journey. However, the user could have transferred in zone B and is required to tap his card if the transfer involves a bus trip. As we have multiple days of smart card data, it is possible to observe multiple journeys from zone A to zone B. However, and to ensure comparability with Twitter data, each distinct zonal pair was counted once per user. A transition is defined as the relationship between zone A to zone C for a single public transport user. To analyze Twitter data with similar definitions, we took - as a basis - clusters detected with kernel density estimation and apply a threshold of 10%. Tweets located within the kernel contour were considered to be part of the cluster. Subsequently, each user's total 14 Figure 9: Percentage of unique users with a cluster in planning zone i plotted against the population (top) and work locations (bottom). 15 BedokJurong WestTampinesWoodlandsHougangYishunAng Mo KioChoa Chu KangSengkangBukit MerahBukit BatokPasir RisBukit PanjangSerangoonToa PayohGeylangPunggolKallangQueenstownClementiBishanJurong EastSembawangBukit TimahMarine ParadeNovenaOutramTanglinRochorRiver ValleyNewtonDowntown CoreSingapore RiverChangiMandaiBoon LayCentral catchmentChangi BayJurong IslandLim Chu KangMarina EastMarina SouthMuseumOrchardPaya LebarPioneerPulau UbinSeletarSentosaSimpangStraits ViewSungei KadutTengahTuasWestern catchment0%2%4%6%8%10%12%PercentageResident population versus unique Twitter users with a cluster in planning zone iDowntown CoreQueenstownBukit MerahGeylangTampinesOrchardToa PayohJurong EastJurong WestBedokKallangHougangOutramClementiSembawangSerangoonRochorNovenaWoodlandsAng Mo KioPioneerChangiYishunPasir RisBukit BatokBukit TimahSingapore RiverSungei KadutMarina SouthMuseumWestern catchmentBishanBoon LayChoa Chu KangSengkangTuasBukit PanjangMarine ParadeNewtonTanglinPaya LebarSeletarPulau UbinPunggolRiver ValleySentosaMandaiCentral catchmentLim Chu KangMarina EastTengahChangi BayJurong IslandSimpangStraits View0%2%4%6%8%10%12%PercentageWork locations versus unique Twitter users with a cluster in planning zone iUnique usersWorkplacesUnique usersPopulation tweets were ordered, by time, to determine common transitions between locations. A transition occurred when two subsequent tweets stemmed from different clusters. For instance, consider tweet x occurring at t1 in cluster 1, tweet y occurring at t2 in cluster 2 and tweet z occurring at t3 in cluster 1. The transition from cluster 1 to cluster 2 is counted as a transition. Similar to studies using call detail records (CDR), we were faced with the handling of the time between two subsequent events, the inter-event time. In CDR data, a user's location is lost when the phone is not used and not all movement can be captured. The origins and destinations that can be captured as are referred to as transient origins and destinations Wang et al. [2012], Iqbal et al. [2014]. In order to analyze Twitter data according to similar definitions, we take as a basis clusters detected with kernel density estimation and apply a threshold of 10%. Tweets located within the contour of the kernel are considered to be part of the cluster. Sub- sequently, all tweets of each user are ordered by time to determine common transitions between locations. A transition occurs when two subsequent tweets stem from different clusters. For instance, consider tweet x occurring at t1 in cluster 1, tweet y occurring at t2 in cluster 2 and tweet z occurring at t3 in cluster 1. The transition from cluster 1 to cluster 2 is counted as a transition. Similar to studies using call detail records (CDR), we are faced with the handling of the time between two subsequent tweets, the inter-event time. In CDR data, a user's location is lost when the phone is not used and not all move- ment can be captured. The origins and destinations, that can be captured as transient origins and destinations are referred to as transient origins and destinations Wang et al. [2012], Iqbal et al. [2014]. Despite the fact that the exact OD pair might not be observed, it was still possible to capture a portion of it. In CDR data, different values for the median inter-event time were given, varying from 260 minutes to 500 minutes Calabrese et al. [2011]. The average inter-event time observed in the Twitter dataset was1576 minutes; the average user median was 1954 minutes. Given this long time span between two events, we chose not to use the inter-event time in this analysis. By discarding the time between two subsequent tweets in this analysis, transitions of users that tweet less frequently were included in this analysis. Also, locations where users tweet less frequently, such as the home location, can be included in the transition analysis. As such, all spatial fingerprints of users can be used, but the extracted OD-relations should be considered as trends and not exact figures. Per user, each distinct zonal pair is counted once. We thus assume that transitions will occur from time to time between these activity locations. One limitation of this approach was that other possible transitions of this user occurring outside the measured location-based social network (tweets) were not measured. In Figure 10, transitions are calculated from detected locations with KDE and a threshold of 10% versus public transport smart card data (top) and household interview travel survey data (HITS, bottom) per planning zone. Intra-zonal and weekend trips have been excluded; the latter were excluded because they do not occur often in travel survey data. To compare results from both data sources, the relative flow per OD-pair is shown. Records were sorted by the percentage per OD-pair from smart card data and HITS data respectively. This approach made it possible to compare trends and detect differences between both data sources. In both cases, transitions derived from Twitter followed a trend similar to both smart card data and HITS. The correlation coefficient between HITS and smart card data was 0.859 and the p-value associated was less than 10−3; the 16 Figure 10: Transitions as calculated from Twitter versus weekday public transport smart card data (top) and household interview travel survey data (bottom) journeys per plan- ning zone pair. Intra-zonal trips have been excluded. The relative flow per origin- destination pair is shown. Records are sorted by the percentage per OD-pair from public transport smart card data and household interview travel survey data, respectively. The numbers indicate that the zonal numbers. 17 dgp pair33 4912 718 3817 3831 317 632 4426 1915 5715 5626 157 628 5238 5048 172 1326 3739 388 2642 56 2552 4846 187 11 379 5750 2817 2443 2412 2843 2850 343 55 3710 284 5350 4841 2232 511 5411 3313 1115 918 3920 1821 121 522 423 3124 4127 127 5129 243 2332 2134 2435 4536 4338 234 1940 2341 4743 4545 2846 3447 85 5351 4153 2354 1354 5255 476 239 140.0000.0020.0040.0060.008PercentagePublic transport card origin destinations vs Twitter cluster transitionsdgp pair49 151 168 756 1418 814 814 4238 4331 5215 575 5230 649 1835 1330 4919 1348 512 1957 137 101 2637 3024 528 4240 3727 496 2642 3712 3733 4653 5226 348 1918 5039 3353 2522 4939 185 3311 4323 834 1641 4452 99 4311 1312 2216 2120 1120 5421 4322 3623 3324 4626 5428 4729 4631 2033 5135 1436 3438 204 2241 1043 1245 3146 3648 2050 2551 3153 2154 4657 209 230.0000.0020.0040.0060.008PercentageHousehold interview travel survey origin destinations vs Twitter cluster transitionsSourceEZLINKTWITTERSourceHITSTWITTER Table 2: Breakdown of the number of users applying a kernel density estimation with a threshold of 10%. The table shows if a user only has clusters in Singapore or both in Singapore and overseas. Country Singapore Malaysia Indonesia Thailand Region Only Singapore Singapore and outside Singapore 14,628 Singapore - all Johor Baharu Other Malaysia Batam Other Indonesia Thailand - all 3,944 1,517 39 426 27 67 correlation coefficient between HITS and Twitter was 0.512 and the p-value associated was less than 10−3 and the correlation coefficient between smart card data and Twitter is 0.655 and the p-value associated is, again, less than 10−3. While the correlation between HITS and smart card data is very high, the correlation between HITS and Twitter data is substantially lower, but statistically still very significant. The time between transitions in Twitter data can amount to multiple days. These transitions would not be recorded in a single day travel survey. An advantage of social network data is that the collection of data is not limited by geographical boundaries. Number of users and tweets in Singapore and outside of Singapore was presented earlier in (Table 1). In Table 2, a breakdown of user numbers is presented with clusters only in Singapore, and in Singapore, Malaysia, Indonesia and Thailand. Clusters are detected with KDE and a threshold of 10%. Almost 4,000 users have a cluster in Singapore and outside of Singapore. The majority of these users have one or more clusters in the province adjacent to Singapore, Johor Bahru. Johor Bahru, a city, is across the border from Singapore in Malaysia and is accessible by foot, car, motorcycle and frequent bus services; Batam is the most populated island within the archipelago of the Indonesian province Riau and only accessible by ferry. 6 Discussion & Outlook This paper highlighted the possibilities of using social network for transport demand models. Factors including detection of an individual's activity locations, spatial sepa- ration between these locations and transitions between these clusters were investigated. Whereas previous work [Hasan et al., 2013, Noulas et al., 2012, Hasan and Ukkusuri, 2014]considered only a subset of this data -location check-ins - we included all available data. Twitter is sometimes considered 'Big Data'. This can be considered relative to other data sources such as the number of records obtained from dedicated GPS track- ers. For Singapore, we counted approximately 45,000 unique users who tweet at least 10 times or more in a time span of 8 months and correspond to around 0.8% of Singapore's resident population. These users tweet 2 million times in total. This number of users is comparable to the usual sample size of a travel diary survey, but the observed time span as compared to multi-day and multi-week survey and the number of activity location data points is several orders of magnitudes larger and hence can be sensibly characterized as 'big'. To determine an individual's locations, two clustering methodologies were applied. A 18 first challenge lay in the distinction between en-route Twitter events and Twitter events at activity locations. The application of kernel density estimation for the detection of clusters, as proposed by Lichman and Smyth [2014], yielded more promising results than k-means clustering, which still can be considered the standard method for clustering. The kernel density approach required a bandwidth h. Setting a high value for h can result in over-smoothing. Translated to the detection of activity locations, this can result in a lower amount of detected locations in each others proximity. In this study we applied a bandwidth of 200 meters, roughly corresponding to an area of 500 meters around the KDE result, considered a reasonable setting considering positioning errors in a dense urban environment. In the case of GPS data, speed information can be used to detect activity locations. In the case of Twitter data, no speed information is available. Therefore, we determined the strength of a detected cluster relative to a user's other clusters and apply a threshold. This threshold determined whether a detected cluster was an activity location or en-route event. By applying this threshold, less frequently visited locations were filtered out. Despite this filtering, more locations were detected with all threshold settings than reported in survey data. An important input for transport demand models was the distribution of trip dis- tances. Spatial separation between detected clusters from Twitter and reported activity location from travel survey diary data corresponded well. Short trips under 1 kilometer, - 44% of which were home-school trips – were under-estimated. Whether this was due to over-smoothing, or the fact that primary school students are not active on Twitter, is open for discussion. Theoretically, detected activity locations could be used for trip distribution purposes (e.g. gravity model estimation). However, by just considering a user's Twitter locations, no information on trip purpose was known. By combining the temporal component of Tweets, rules incorporating time and text recognition the type of activity could be inferred. Also, redefining the threshold definition for KDE clustering gave an indication of the frequency with which a location was visited, an interesting topic for further research. More difficult to infer would be an individual's mode and route choice. For very frequent Twitters users, several paths can be observed between detected clusters. However, to infer routes from these tracks would require a wide range of assumptions and rules. An important input for activity-based models was the range of activity locations an individual frequents. While it seemed promising to use the detected locations for activity chain generation, inferring activity start time, activity end time, activity duration and sequence can be challenging due to the scattered nature of social network data. However, the number of locations detected besides main clusters such as 'home' and 'work' gave insight in spatial dispersion (i.e. distances) of these additional clusters and opens up possibilities for multi-day activity based models and the sampling of discretionary activ- ity locations. Schonfelder and Axhausen [2004] discussed several methods to calculate activity spaces. Despite the varying nature of different data sets, comparison of different activity spaces offers another method to compare different data sources. On an aggregated level, two comparisons were made. From the first comparison be- tween the detected cluster and population statistics it was deduced that Twitter events occur less frequently at home locations and/or that Twitter users form only a sub-sample of the population; in several homogeneous planning zones, a good match between detected clusters and population statistics was observed. A further distinction of population statis- tics by age and income remains for further work. A similar trend could be observed when comparing detected locations with work locations. The correlation between work loca- 19 tions and detected clusters was higher than the correlation with population statistics. Several zones, the main shopping area Orchard, the airport Changi, the entertainment area Singapore River and leisure island Sentosa showed more detected locations. An- other topic for further work is the inclusion of the temporal component in the clustering algorithm [e.g. Hasan and Ukkusuri, 2014]. By combining the temporal component and a wider range of zonal statistics, it would be possible to estimate what contributes to Twitter usage per zone. The second comparison considered transitions between zones as detected in Twitter data and transitions as observed in public transport smart card data and survey data. The high correlation between the Twitter data and the two traditional data sets opens promising avenues for future research. The time between two subsequent tweets was not included in this analysis, as the time between two tweets - the inter-event time – was high when compared to other data sources, such as call detail record data. The latter data sources included more data points per user, as it contained voice and data transactions, not just a subset of transactions, as is the case with Twitter data. However, transitions computed with Twitter can be considered a proxy between a user's main activity locations. Because Twitter data is available throughout the world, it presents an opportunity to compare how distances between activities are distributed for different cities and to relate the findings to the respective spatial extents and population densities. Another promising application could be the detection of long-distance and cross-border trips, which are difficult to observe representatively in travel diary surveys and are seldom covered in public transport smart card records. The availability of airline ticket records would allow similar comparisons to those presented in this paper, to test how well Twitter data represents actual long distance travel behavior. Despite these unanswered questions, location-based social network data provides a promising data source for the detection of activity locations and analysis of mobility pat- terns, especially considering the potential to track users over a longer span of time against negligible costs. Social network data can give a first impression about the prevalent dis- tribution of activity locations and trips distances. This is particularly useful for regions which lack mobility diary surveys, but feature an active Twitter user base. However, Twitter data does not document socio-demographic user characteristics or context of the observed activity locations. Although Twitter data allows identification of a user's main activity locations, it can not replace traditional travel surveys or smart card data and provide a similar level of understanding of travel behavior. However, given the limitations of those approaches to represent cross-border flows and long distance trips, Twitter data can still be considered a valuable supplement to more traditional travel surveys, espe- cially as the accessible user base is many times larger. We also see potential to better understand travel behavior in new mobile phone applications such as Strava, Moves, or human.co, which are designed to track individual movement patterns. References Samiul Hasan, West Lafayette, and Satish Ukkusuri. Understanding urban human ac- tivity and mobility patterns using large-scale location-based data from online social media. In UrbComp, editor, ACM SIGKDD International Workshop on Urban Com- puting, Chicago, August 2013. ACM Special Interest Group on Knowledge Discovery and Data Mining. 20 Anastasios Noulas, Salvatore Scellato, Renaud Lambiotte, Massimiliano Pontil, and Ce- cilia Mascolo. A tale of many cities: universal patterns in human urban mobility. PLoS ONE, 7(5), 2012. Juan de Dios Ort´uzar and Luis G. Willumsen. Modelling Transport. John Wiley & Sons, Chichester, 4th edition, 2011. Kay Werner Axhausen and Tommy Garling. Activity based approaches to travel analysis: Conceptual frameworks, models and research problems. Transport Reviews, 12(4):323– 341, 1992. Jean Wolf. Applications of new technologies in travel surveys. In ISCTSC, editor, 7th International Conference on Survey Methods in Transport, Costa Rica, August 2004. Timothy L. Forrest and David F. Pearson. Comparison of Trip Determination Methods in Household Travel Surveys Enhanced by a Global Positioning System. Transportation Research Record, 1917:63–71, 2005. Peter R. Stopher, Camden FitzGerald, and Min Xu. Assessing the accuracy of the Sydney Household Travel Survey with GPS. Transportation, 34(1):723–724, 2007. Robert Schlich and Kay Werner Axhausen. Habitual travel behaviour: Evidence from a six-week travel diary. Transportation, 30(1):13–36, 2003. Kay Werner Axhausen, Andrea Zimmermann, Stefan Schonfelder, Guido Rindsfuser, and Thomas Haupt. Observing the rhythms of daily life: A six-week travel diary. Trans- portation, 29(2):95–124, 2002. Marie-Pier Pelletier, Martin Tr´epanier, and Catherine Morency. Smart card data use in public transit: A literature review. Transportation Research Part C: Emerging Technologies, 19(4):557–568, 2011. M. Bagchi and P.R. White. The potential of public transport smart card data. Transport Policy, 12(5):464–474, 2005. Artem Chakirov and Alexander L. Erath. Activity identification and primary location modelling based on smart card payment data for public transport. In IATBR, editor, 13th International Conference on Travel Behaviour Research (IATBR), Toronto, July 2012. Francesco Calabrese, Giusy di Lorenzo, Liang Liu, and Carlo Ratti. Estimating origin- destination flows using mobile phone location data. Pervasive Computing, 11:36–44, 2011. Jing Wang, WangDianghai, Xianmin Song, and Di Sun. Dynamic od expansion method based on mobile phone location. In ICICTA, editor, Fourth International Conference on Intelligent Computation Technology and Automation, Shenzhen, China, March 2011. Md. Shahadat Iqbal, Charisma F. Choudhury, Pu Wang, and Marta C. Gonz´alez. De- velopment of origin–destination matrices using mobile phone call data. Transportation Research Part C: Emerging Technologies, 40:63–74, 2014. Yu Zheng. Location-based social networks: Users. In Yu Zheng and Xiaofang Zhou, editors, Computing with Spatial Trajectories. Springer, New York, 2011. 21 Samiul Hasan and Satish Ukkusuri. Urban activity pattern classification using topic mod- els from online geo-location data. Transportation Research Part C: Emerging Technolo- gies, 44:363–381, 2014. Bei Pan, Yu Zheng, David Wilkie, and Cyrus Shahabi. Crowd Sensing of Traffic Anoma- lies based on Human Mobility and Social Media Categories and Subject Descriptors. In ACM SIGPATIAL, editor, ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems 2013, Orlando, November 2013. Ling-Yin Wei, Yu Zheng, and Wen-Chih Peng. Constructing popular routes from un- In ACM SIGKDD, editor, 18th ACM SIGKDD Conference on certain trajectories. Knowledge Discovery and Data Mining (KDD '12), Beijing, August 2012. Moshe Lichman and Padhraic Smyth. Modeling Human Location Data with Mixtures In ACM SIGKDD, editor, 20th ACM SIGKDD Conference on of Kernel Densities. Knowledge Discovery and Data Mining (KDD '14), New York, August 2014. Timo Grossenbacher. Studying Human Mobility Through Geotagged Social Media Con- tent. Master's thesis, Department of Geography, University of Zurich, Zurich, 2014. Haklay. 'nobody wants to do council estates' - digital divide, spatial justice and outliers. webpage, 2012. URL http://povesham.wordpress.com/2012/03/05/ nobody-wants-to-do-council-estates-digital-divide-spatial-justice-and-outliers-aag-2012/. Twitter. Twitter Reports First Quarter 2014 Results. webpage, 2014a. URL https: //investor.twitterinc.com/releasedetail.cfm?ReleaseID=843245. Twitter. About Twitter. webpage, 2014b. URL https://about.twitter.com/company. S. Prakasam. The evolution of e-payments in public transport - singapore's experience. Japan Railway & Transport Review, 50:36–39, 2008. Department of Statistics. 2010. Census of population 2010 - administrative re- URL http://www.singstat.gov.sg/publications/ port. publications-and-papers/population/census10_admin. webpage, Sergio A. Ord´onez Medina and Alexander L. Erath. Estimating dynamic workplace capacities by means of public transport smart card data and household travel survey in Singapore. Transportation Research Record, 2344:20–30, 2013. Anil K. Jain. Data clustering: 50 years beyond K-means. Pattern Recognition Letters, 31(8):651–666, 2010. Mario A.T. Figueiredo and Anil K. Jain. Unsupervised Learning of Finite Mixture Mod- els. IEEE Transactions on pattern analysis and machine intelligence, 24(5):381–396, 2002. Mark H. Hansen and Bin Yu. Model selection and the principle of minimum description length. Journal of the American Statistical Association, 96(454):746–774, 2001. Robert Tibshirani, Guenther Walther, and Trevor Hastie. Estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 63(2):411–423, 2001. 22 Carl Edward Rasmussen and Kai Nagel. The infinite gaussian mixture model. In S.A. Solla, T.K. Leen, and K. R. Muller, editors, Advances in Neural Information Processing Systems 12, pages 554–560. MIT Press, Boston, 2000. P.J. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of the ACM, 20:53–65, 1987. Robert Arnott and Thad Starner. Using GPS to learn significant locations and predict movement across multiple users. Personal and Ubiquitous Computing, 7(5):275–286, 2003. B.W. Silverman. Density estimation for statistics and data analysis. Monographs on Statistics and Applied Probability. Chapman & Hall, London, 1986. Pu Wang, Timothy Hunter, Alexandre M. Bayen, Katja Schlechtner, and Marta C. Gonz´alez. Understanding Road Usage Patterns in Urban Areas. Scientific Reports, 2(1001):1–6, 2012. Stefan Schonfelder and Kay Werner Axhausen. On the variability of human activity spaces. In Martina Koll-Schretzenmayr, Marco Keiner, and Gustav Nussbaumer, edi- tors, The Real and Virtual Worlds of Spatial Planning, pages 237–262. Springer, Hei- delberg, 2004. Acknowledgements The research conducted at the Future Cities Laboratory is co-funded by the Singaporean National Research Fund and the ETH Zurich, and located at the Campus for Research Excellence And Technological Enterprise (CREATE). Data61 is funded by the Australian Government. The authors would like to thank Professor Kay W. Axhausen for his sugges- tions and comments. We wish to express our gratitude to the Land Transport Authority for providing us invaluable data sets on transport in Singapore. Also we are very thankful to the Urban Redevelopment Authority for providing us with a wide range of data sets. 23 Figure 11: Depicted is the number of tweets versus the number of clusters detected; each point represents a user. The left-most scatter plot shows the case where no threshold is set for the contribution of a single cluster to the total level of user; the three other scatter plots present the results for a 5%, 10% and 20% threshold respectively. Appendix One of the advantages of social network data is that the costs of collecting records for a longer time span are virtually free. Figure 11 shows the number of tweets collected, as a proxy for time, versus the number of clusters recognized with different thresholds for the number of clusters when using KDE. Only users tweeting 10 times or more have been included. The left-most plot shows a counter-intuitive result: despite the high number of tweets not a high number of clusters is recognized. The three other plots show the number of clusters detected with different thresholds for the level of contribution. While a high number of tweets is required to detect 1 or more clusters, the effect of a high number of tweets per user on detecting the number of clusters per user is limited. 24 0246810Number of clustersMinimum contribution 5%010203040Number of clusters050010001500200025003000Number of tweetsNo threshold0246810Number of clustersMinimum contribution 10%0246810Number of clustersMinimum contribution 20%
1504.05351
1
1504
2015-04-21T09:30:34
On the Role of Conductance, Geography and Topology in Predicting Hashtag Virality
[ "cs.SI", "physics.soc-ph" ]
We focus on three aspects of the early spread of a hashtag in order to predict whether it will go viral: the network properties of the subset of users tweeting the hashtag, its geographical properties, and, most importantly, its conductance-related properties. One of our significant contributions is to discover the critical role played by the conductance based features for the successful prediction of virality. More specifically, we show that the first derivative of the conductance gives an early indication of whether the hashtag is going to go viral or not. We present a detailed experimental evaluation of the effect of our various categories of features on the virality prediction task. When compared to the baselines and the state of the art techniques proposed in the literature our feature set is able to achieve significantly better accuracy on a large dataset of 7.7 million users and all their tweets over a period of month, as well as on existing datasets.
cs.SI
cs
On the Role of Conductance, Geography and Topology in Predicting Hashtag Virality Siddharth Bora, Harvineet Singh, Anirban Sen, Amitabha Bagchi, and Parag Singla Indian Institute of Technology, Delhi {cs5090253,anirban,mt5100595,bagchi,parags}@cse.iitd.ac.in September 26, 2018 Abstract We focus on three aspects of the early spread of a hashtag in order to predict whether it will go viral: the network properties of the subset of users tweeting the hashtag, its geographical properties, and, most importantly, its conductance-related properties. One of our significant contributions is to discover the critical role played by the conductance based features for the successful prediction of virality. More specif- ically, we show that the first derivative of the conductance gives an early indication of whether the hashtag is going to go viral or not. We present a detailed experimental evaluation of the effect of our various categories of features on the virality prediction task. When compared to the baselines and the state of the art techniques proposed in the literature our feature set is able to achieve significantly better accu- racy on a large dataset of 7.7 million users and all their tweets over a period of month, as well as on existing datasets. 1 Introduction The ability to predict the emergence of virality of a hashtag has far-reaching consequences in a number of domains. In the commercial domain knowledge 1 of potentially viral memes may present a variety of business opportunities but the most important application of a robust prediction system would be to provide the authorities with the capability of spotting the emergence of harmful rumors and the organization of destructive mass action. For exam- ple, the role of Twitter and Blackberry messenger in organizing looting and spreading rumors was widely observed during the London riots of 2011 [5]. In 2008 live accounts of the Mumbai terror attacks went viral on Twitter spreading panic and providing the attackers with a source of information on police movements [28]. In both cases early detection of the spread of a particular kind of meme could have helped arrest it and prevent disastrous consequences. The nature of such settings is that they require a prediction system to sift out important (potentially viral) content from the vast volume of content in the network. The usual metrics, precision and recall, take on special significance here. High recall ensures that we do not miss a poten- tially harmful meme, while high precision ensures that expensive resources are not expended on investigating false leads. In this paper we present pre- diction algorithms for Twitter, although we feel that techniques using similar features can be used on other social networks (like those derived from cellular messaging or calling data) as well and so will have wide applicability. Studying the factors that lead to virality in online systems has been an im- portant theme in the literature over the last few years, pioneered by Leskovec, Backstrom and Kleinberg's study of the evolution of memes in blogs [23]. The phenomenon of virality wherein a particular meme -- a theme or topic or piece of content -- spreads widely through the network has, in particular, attracted a lot of attention. What has been largely missing is prediction that focuses on the efficacy of structural properties of meme diffusion. The only efforts of this nature are the two attempts by Weng et. al. [36, 35] and their work, on a user network of about 0.6 million users is not conducted on a satisfactorily large scale. We undertake a classification task on a large dataset that we compiled containing 7.7 million Twitter users and all their tweets over a 35 day period. For every hashtag in our set that appears in a certain number of tweets (we call this number the prediction threshold and set it to 1500 in this paper) we try to predict, at the point when it reaches this number, if it will reach a number of tweets about one order of magnitude larger. This latter number, we call it the virality threshold, is set to 10,000. In what follows we will refer to this task as virality prediction. The features that we use for this classification task deliberately ignore the content of the tweeted hashtags, focusing instead on three aspects: network topology, geography, 2 and the isoperimetric properties of meme growth as expressed through the conductance of the set of users tweeting on a hashtag. This should not be seen as a claim that these characteristics are more important than semantic aspects of the topics under study. We omit using semantic features to main- tain a focus on the predictive power of structural properties of hashtags. It is not our intention to present a "best possible" prediction algorithm; such an algorithm would undoubtedly include semantic features along with our struc- tural and geographic features. Our intention is primarily to demonstrate that there is significant information contained in our new features based on con- ductance, geography and network characteristics of early adopters, and that this information can be effectively used in the important task of predicting virality. We view the evolution of the hashtag's spread across the network as a graph process and derive a number of network-based features. The geograph- ical spread of hashtags is also used for virality prediction for the first time, enabled by a methodology that is successfully able to tag 90% of active users with their time zones. We define features based on the isoperimetric quan- tity conductance that is known to have a strong relationship to mixing times in random walks [14], and find that these features greatly help improve our predictions. We use the criteria of information gain to identify the top fea- tures from each category providing us greater insight into the effectiveness of various features for characterizing virality. We perform an extensive experimental evaluation of our proposed set of features for the task of predicting virality. Our experimental results clearly demonstrate the effectiveness of our features for this task as well as their supremacy over existing approaches proposed in the literature. We also present some preliminary experimental analyses of virality prediction in in- dividual geographies which corroborate our findings in the larger dataset. Organization We survey the literature in Section 2, following that with a description of our dataset and how it was compiled in Section 3. Our task definition can be found in Section 4, followed by a detailed discussion of our features in Section 5 and the results of our algorithms on two datasets in Section 6. Finally we conclude with a discussion of the significance of conductance and some future directions in Section 7. 3 2 Related Work The problem of predicting which memes will grow in popularity has attracted some amount of attention recently. To save space we ignore the research on detecting popularity after it has been established and focus on the research on identifying memes that will go viral before they have already spread far and wide. Several aspects of this problem have been studied. Wu and Huberman, in an early paper, highlighted the importance of novelty: new memes override older ones [37]. In a similar vein, Weng et. al. [34] argued that finite user attention coupled with the structure of the network can help identify the ultimate popularity of a meme. Emotional, textual and visual features have been studied as drivers of virality [4, 13, 12, 33, 15]. In the context of viral marketing, Aral and Walker showed that personalization of promotional messages helps make particular products more "contagious" [2]. While all these aspects are undoubtedly important, our work falls into a different category of research which views the proliferation of memes as a kind of contagion process on a network and relies on spatial and temporal properties of the early evolution of this process to identify potentially viral memes. Leskovec et. al.'s work on memes falls into this category, positing a temporal growth model for viral memes [23]. With the growth of microblog- ging it was natural that such phenomena be investigated on Twitter and Kwak et. al. [21] performed the first analysis of information spreading on Twitter at scale. Subsequently, several groups of researchers have investi- gated the structural properties of rapidly spreading themes by looking at the spread as a cascade or a tree (e.g. Ghosh and Lerman [10]). Others tried to find the extent of external (or exogenous) influence on information diffusion (e.g. Myers et. al. [27]). Szabo and Huberman tried to predict the long- term popularity of a meme based on its nascent time series information [32]. Kitsak et. al. argued that the most efficient spreaders are those that exist within the core of the network and the distance between such spreaders often governs the maximum spread of topics [19]. The factors that govern a tweets ability to draw retweets, a possible precursor to virality, has been studied by Suh et. al. [31]. On the modeling front, Romero et. al. focused on the local dynamics of hashtag diffusion [30]. Lermann et. al. [22] propose an approach to predict popularity of news items in Digg using stochastic models of user behavior. Rajyalakshmi et. al. defined a stochastic model for local dynamics with implicit competition that was found to generate the global dynamics of a Twitter-like network [29]. Finally we mention the work that is the major 4 take off point for our current paper: Ardon et. al. conducted a study of information diffusion on a large data set and established that conductance and geographical spread could significantly discriminate between topics that went viral and those that did not [3]. Drawing on ideas from this work we create suite of features and show that they can be used effectively to predict virality. Efforts to use machine learning techniques to predict virality have recently begun to appear in the literature. Jenders et. al. use features very different from ours, relying mainly on sentiment-related features, to predict which tweets will go viral via the process of retweeting on a small data set of 15,000 users [17]. Zaman et. al. use a Bayesian approach to predict which tweets will generate large retweet trees on a small set of 52 tweets [38]. Ma et. al. combine a set of textual features with some network-based features to predict the number of users tweeting a hashtag in subsequent time intervals, a task somewhat different from ours since we focus on predicting an eventual ascent to a threshold-based virality [25]. In a major recent work, Cheng et. al. tried to predict which photo resharing cascades will grow past the median cascade size using a variety of features that included demographic, structural and temporal information [6]. The primary difference between that work and ours is that we do not work with a cascade model, but look at the spread of hashtags as a diffusion, i.e., the use of hashtag by a particular user need not be explicitly attributable to the prior use of that hashtag by another user in the neighborhood. This makes our work incomparable with that of Cheng et. al. [6] and gives it a different flavour. Closer to our approach in conception if the work of Weng et. al. who showed in a sequence of two papers that inter-community spread in the early life of a Twitter meme can be used to predict which meme will go viral and which will not [36, 35]. The main work against which our results should be compared is [35] where a straightforward attempt to predict virality is made, as opposed to [36] where a related but slightly different multi-label classification task is defined. Our current work overcomes some of the severe shortcomings of [36, 35]. Firstly, we perform prediction on a user set of size 7.7 million and view their interconnections as a directed graph. In [36, 35] the user set has size only 0.6 million and consists of edges only between those users who follow each other, i.e. only bidirectional edges. Secondly, the small size of their network allows Weng et. al. to run community detection algorithms which are prohibitively expensive to run. We show that on our much larger data set, to the best of our knowledge the largest on which virality prediction tasks have been run 5 so far, by leaving out community-based features and using computationally tractable features based on geography and conductance we are able to give better quality predictions than those in [35]. We also show that our feature set performs better than the community-based features of Weng et. al. [35] on their own data set, even though we do not have the geography information for their users. 3 Dataset and Methodology 3.1 Dataset description Our dataset is a complete snapshot of all tweets posted by 7.7 million users of Twitter between 27th March 2014 and 29th April 2014. We also have the follower-following information of all these users and have built the data set (as explained below) to ensure that these users form a strongly connected subnetwork of Twitter, i.e., for each pair of users u, v there is a directed path u to v and a directed path from v to u. Rather than filtering out tweets based on topical memes, we crawled all the tweets posted by our user set in the time window with a view to capture all the phenomena, viral and non-viral, present in the network at the time. Table 1 contains some basic statistics Users Average no. of followers Users who tweet at least once Filtered hashtags Tweets for filtered hashtags Hashtags with ≥ 10,000 tweets 7,695,882 450 3,008,496 8,793,155 220,012,557 177 Table 1: Dataset statistics of our data set. The follower distribution curve of our data (see Figure 1) follows the now familiar power law with a drooping tail that has been widely reported in the literature. From the tweets of our user set we extracted all the hashtags used, filtering some persistent generic hashtags out (as explained in Sec 3.3.) Additionally we geotagged all the users who have tweeted at least once with their location information to an accuracy of 98%, not down to the 6 Figure 1: Plot of the distribution of the Number of followers city level but down to the time zone level using the time zones that Twit- ter requires users to fill through a dropdown menu at the time of account creation. There were 141 time zones found in our data set. We note that Twitter provides annotated time zones that are more numerous than the 40 different time offsets from UTC that are generally used for timekeeping. For example, although all of India follows a single time (Indian Standard Time: UTC +5:30), Twitter gives Indian users four choices -- Chennai, New Delhi, Kolkata, Mumbai -- corresponding to four major metropolitan centres, all of which are marked as GMT +05:30 in the dropdown. 3.2 Retrieving the data from Twitter A seed set of approximately 108K users was shared with us by Pranay Agar- wal who devised a methodology for differentiating users whose tweets were informative from those users who used Twitter as a forum for chatting [1]. The seed set comprised users whose tweets were generally informative in na- ture, ensuring that our user set is focussed on a subset of users who transact emergent memes. We extracted the follower and following information of this seed set and computed the strongly connected component that turned out to be of size 64K. We then queried Twitter for all the users who were either following or followed by these 64K users. This gave us an initial set of 7 9,188,701 users. We then used the "GET followers" method of the Twitter API to extract the follower and following information of these 9.1 million users. We were successful in extracting this information for 8,379,871 users. The remaining users had their accounts suspended or their follower and following informa- tion was protected. We computed the strongly connected component of this reduced set. Its size was found to be 8,047,811. Using the "GET user timeline" method from Twitter's REST API (v 1.1) we collected tweets from these 8.04 million users' timelines. The GET user method provides the 3200 most recent tweets of each user and so in order to build a dataset of at least a month's duration we repeated the crawl after 10 days. The first crawl began on 18th April and ended on 20th April. The second crawl began on 30th April and ended on 2nd May. The two crawled sets were then combined to finally obtain all the tweets posted from 27th March to 29th April 2014, without duplication or omission. This process of combination involved discarding 26,624 of the users whose high frequency of tweeting made it impossible to guarantee that we had captured all their tweets in this 35 day time span. After removing these 26,624 users we recom- puted the strongly connected component of the remaining network and found it to have size 7,695,882. These 7,695,882 users with their interconnections formed our final user network. 3.3 Filtering the hashtags On examination we found that the most frequently occurring hashtags in the tweet dataset created were generic hashtags that persist on twitter with a very high frequency of occurrence e.g. #rt, #tlot, #win, #giveaway and #jobs. In order to filter out these hashtags and obtain a set of hashtags that are fresh in our time span and thereby refer to emergent phenomena we filtered out all the hashtags that had more than 5 tweets in the first 12 hours of our time duration. Table 2 shows the 5 most popular hashtags in our dataset after filtering along with the number of tweets for each of them. The first one, "bundyranch", refers to a major US news story of the time. The second one commemorates a Twitter celebrity Nash Grier's follower count reaching 2 Million. The third and fourth are related to voting prior to the MTV Movie awards that were held on 13th April 2014, and the fifth one "epnvsinternet" is part of a mass action by civil organizations in Mexico to oppose a proposed legislation. These five demonstrate anecdotally that our 8 Hashtag bundyranch nashto2mil votekatniss votetris epnvsinternet Tweets 395,179 152,657 140,031 135,206 104,575 Table 2: Top 5 hashtags in our dataset filtering process does generally capture emergent topics on Twitter and also that endogenous topics generated from within Twitter like "nashto2mil" and exogenous topics like "bundyranch" and "votekatniss" are both present in our dataset. 3.4 Geolocating the users Twitter users have the option of specifying their time zone, their country and their location. The first two of these are populated from a dropdown menu and the third is entered as a string and hence is often hard to map to an actual geographical location. These three fields are part of the user's profile and are embedded in the JSON object containing the user's tweet, which is where we extracted them from. This JSON object also contains geo-coordinates from tweets posted from GPS-enabled devices whose users have allowed this information to be shared but we found that to be a rare occurrence and not of much use. On examination we found that timezone was a widely present Time Zone Eastern Time (US & Canada) Central Time (US & Canada) Pacific Time (US & Canada) London Quito Users 967,849 636,541 549,611 395,738 212,584 Table 3: Top 5 time zones in our dataset attribute, missing only from 630,696, i.e., 11.9% of the 5.3 million users who had posted at least one tweet in our initial set of 9.1 million users. About a third of these users, 217,443, had tweeted from GPS-enabled devices and 9 so we were able to map them to time zones using the Google Time Zone API. For the remaining users we extracted their location string and tried to map it to a time zone by using common substring heuristics to match their location strings with popular cities and with location strings of users that have their time zones set. This helped us locate another 118,488 users. Finally, we were left with 294,765 users. To these users we assigned the time zone in which the maximum number of their neighbors were located. Testing this heuristic on users whose location was known we obtained a 48% success rate. So, in summary, we were able to correctly geolocate all but 294,765 users out of 5.3 million, i.e., 94.4% of our users. The remaining 5.6% were tagged with a heuristic that we expect to perform correctly about half the time. Even if we consider only the subset of 3 million users who tweet once in our 35 day period and assume that the 294,765 users whose location we guess all lie in this subset, we see that 90% of our users are correctly tagged and the remaining 10% are tagged by a heuristic that has 48% accuracy. We note that there have been several research efforts made to geolocate users but they have been either at the country level e.g. [20] or at a fine-grained level of tens of kilometers e.g. [26]. We adopt a simpler strategy here to achieve geo-location at the intermediate granularity of Twitter time zones since geo-location is not the primary focus of our paper. As reported we find that the accuracy we achieve using our simple, and computationally efficient, methods is significant and good enough for our purpose. Table 3 lists the top five time zones by population in our user set. We see that along with what we traditionally understand by time zones like "Eastern Time (US & Canada)", we also have individual cities like "London" and "Quito." 4 Prediction Task The goal of our study is to examine how successfully we can discriminate viral topics from non-viral ones based on their early spreading pattern. In this section we make this goal concrete. We undertake here a classification task whose objective is to predict at a particular, early, point in the spread of a hashtag whether that specific hashtag will, in the future, enter the class that we define as viral. Defining virality Various definitions of virality have been used in the literature. One of them is based on calling a topic viral if it is among the top 10 k% (for some small value of k) of all the topics ranked by their total number of tweets. This definition has been used by Weng et al. [35] for values of k starting at 10. A drawback of this definition is that, because of its relative nature, it is non-monotonic. In other words, a topic may become viral at a given point of time, but then be declared non-viral at a later point in its life when some other topics have surpassed it in terms of number of tweets and it is no longer in the top k%. While it is definitely true that a viral topic ceases to be viral after some time, to make this percentile-based definition stick we would also have to provide some kind of time window within which the topic must remain in the top k%. In order to avoid such complications we decided to use an alternate definition based on an absolute threshold, i.e., we say a topic has become viral if its total number of tweets cross a certain given threshold M . We call this the virality threshold. We used M = 10, 000 in our experiments. This number has no intrinsic significance. It is based on the sizes of the spreads of various hashtags in our data set. Note that while we saw in Table 2 that the 5 largest spreading tags had more than 100,000 tweets, choosing a virality threshold of 10,000 gives us only 6.29% of hashtags. This top 6.29th percentile that we consider viral is significantly smaller than the 10th percentile that is taken as viral by Weng et al. [35]. Prediction threshold Since we are interested in predicting the future spread based on early history, we decided to extract features from the first n = 1500 tweets. We call this value n the prediction threshold. In other words, for each hashtag, we examined its spread in the network upto the point the 1500th tweet containing that hashtag was posted and extracted various features based on this early spread. All the topics which did not cross the n = 1500 tweet mark were ignored for the purpose of our study. The total number of hashtags that we were left with was 2810, of which 177 crossed the virality threshold. Choosing a very small value of n may not give us sufficient information about the topic spread but a very large value of n will make the prediction meaningless as the peak would already be reached (or be very close). So, it is important to choose n in an appropriate manner. Further note that the choice of appropriate n would also depend on the size of the dataset. For a large dataset n would be higher compared to a smaller dataset simply because of the sheer volume of tweets generated in the network. To put in context our choice of n = 1500, another similar recent study by Weng et 11 Figure 2: Time taken to reach the prediction threshold. al. [35] has used n = 50 tweets as their threshold. The size of their dataset (in terms of the number of users) is about 5% of the size of the dataset that we use (595K nodes vs 7.7 million nodes). In order to show that these two prediction threshold values, Weng et. al's 50 and our 1500 are similar we plotted the time taken to reach n = 1500 tweets for a particular hashtag in our dataset and the time taken to reach n = 50 tweets in the dataset of Weng et. al. [35]. In Figure 2 we have time on the x-axis and the fraction of hashtags that take at most a given time to reach the prediction threshold for our dataset (TwitDat) theirs (WengDat). The overlapping nature of the two curves clearly demonstrates the similarity in the behavior of the topics at the two prediction thresholds for the two datasets, respectively. The median time taken to reach the prediction threshold is 12.38 days for our data set and 13.03 days for Weng et al's. We interpret these results to mean that the amount of information available at our prediction threshold for our dataset closely aligns with the amount of information available in the other prediction threshold for the other major study, and hence our results can be compared with theirs. 5 Our features The main contribution of this paper is the definition of a set of novel features that are critical to the task of predicting virality. We propose a number 12 of new features and argue that one of the most important aspects of early hashtag growth is the rate of change of the conductance of the subset of nodes that are tweeting the hashtag. Our prediction algorithm is also the first to incorporate a set of geography based features. Apart from our conductance and geography based features we also use a set of temporal features (we call these "evolution based features") and a set of features that capture the network characteristics of the early tweeters of a hashtag. In total we have experimented with 29 different features. The features are listed in Table 4. We will refer to the users who tweet on a hashtag up to the prediction threshold as adopters of that hashtag. Of these a special category are what we call self-initiated adopters who tweet on a hashtag before any of the users that they follow do so. In some places we will use the term "topic" interchangeably with "hashtag". The term "geography" will be used to denote Twitter time zones as described in Section 3 e.g., if we say "the average number of users in a geography is X" we mean that the average number of users in a Twitter time zone is X. Further, we will use the term weakly connected component in the way it has come to be understood i.e. given a directed graph if we treat each directed edge as undirected and compute the connected components of the transformed graph, then each of these connected components is known as a weakly connected component of the original directed graph. 5.1 Feature Categories We divided our features in the following four categories: 1) Evolution based features capture very basic analytics of the hashtag's evolution such as num- ber of adopters, number of retweets, number of user mentions and growth rate of the topic. Since these are very simple features we will be using them to generate baselines. 2) Network based features include various network char- acteristics of the adopters of the topic in terms of their followers, density, self-initiated adopters and weakly connected component based features. 3) Geography based features capture the geographical properties of the spread such as number of infected geographies, intra and inter geography features, number of self-initiated adopters in each geography etc. 4) Conductance based features, though based on network properties, have been put in a sep- arate category due to their prime importance for the task of characterizing virality. These include conductance as well as its first and second derivative. Next we discuss the features in each of the above categories. 13 Name NumOfAdopters NumOfRT NumOfMention TimeTakenToPredThr HeavyUsers NumFolAdopters NumOfEdges Density SelfInitAdopters SelfInitAdoptersFollowers RatioOfSingletons RatioOfConnectedComponents LargestSize RatioSecondToFirst InfectedGeo RatioSelfInitComm RatioCrossGeoEdges AdoptEntropy TweetingEntropy IntraGeoRT IntraGeoMention Description Evolution based features Number of adopters who tweeted on the hashtag Number of retweets (RT) on tweets within the prediction thresh- old Number of user mentions (@) in tweets within the prediction threshold Growth rate of the hashtag measured in terms of time taken to reach prediction threshold Network based features Number of adopters with at least 3000 followers Total number of followers of adopters Number of edges in the network spread, i.e., the subgraph in- duced by the set of adopters Subgraph density Number of Self-initiated adopters Total follower count of Self-initiated adopters Ratio of Self-initiated adopters to number of adopters Ratio of number of weakly connected components to number of adopters Size of the largest weakly connected component Ratio of sizes of the second largest to the largest weakly con- nected components Geography based features Number of infected geographies Fraction of Self-initiated geographies Fraction of edges across geographies in the induced subgraph of adopters Adoption Entropy measures the distribution of adopters across ai log ai, where ai is the frac- geographies and is defined as −(cid:80) ographies and is defined as −(cid:80) i tion of adopters in each geography i Tweeting Entropy measures the distribution of tweets across ge- ti log ti, where ti is the fraction i of tweets in each geography i Fraction of retweets occurring between users from the same ge- ography Fraction of user mentions occurring between users from the same geography Conductance based features CummConductance Conduct' k, k = {20, 50, 100, 250} Conduct" Conduct' stdev, Conduct" stdev Conductance of the subgraph induced by the set of adopters First derivative of conductance for different values of smoothing parameter k Second derivative of conductance Standard deviation of first and second derivative of conductance Table 4: Feature descriptions. All features have been captured with respect to tweets within the prediction threshold 14 (a) Evolution based features (E) (b) Network based features (N) (c) Geography based features (G) (d) Conductance based features (C) Figure 3: Change in correlation coefficient with increase in number of tweets. Bars indicate the 95% confidence interval 5.1.1 Evolution-based features These features include basic characteristics about the topic evolution and in- clude the following 4 features: 1) Number of Adopters 2) Number of Retweets 3) Number of User Mentions 4) Growth Rate defined as the time taken to reach the prediction threshold. We group these in two sets, denoting the first and the fourth features as the set E1, and the second and third as E2. We note that the first two features have been used before by Weng et. al. [36, 35]. Growth Rate was used, along with a number of variations thereof, by Cheng et. al. [6]. Zaman et. al. [38] used the number of retweets and other aspects of retweeting as features for their prediction task while Jenders et. al. [17] used number of user mentions as a feature. For us, as mentioned earlier, this set of features will be used to create non-trivial baselines. The first base- line will use only the features E1 while the second baseline will use all four features. The details of how these baselines will be used are discussed in Section 6. We plotted the change in Spearman's rank correlation coefficient, mea- sured between feature values and total hashtag growth, with increasing num- ber of tweets for all hashtags that had at least 5000 tweets (see Figure 3(a)). 15 For the feature set E we find the number of adopters and number of RTs are positively correlated with hashtag growth but the correlation levels out, while the time to prediction threshold is highly negatively correlated and continues to grow in this direction. This latter observation is similar to that of Cheng et. al. [6] who observed that successful cascades get many views in a short amount of time. 5.1.2 Network-based features We used the following 10 network based features (divided into 3 sub-categories) for our study. The first subset includes features based on adopters and their connections: 1) Number of Adopters with Heavy Following where a user with at least 3000 followers is said to have a heavy following (recall that the average number of followers in our dataset is 450). This discriminative significance of this feature has been discussed by Ardon et. al. [3]. A related but somewhat different feature, the average authority of users, was used by Ma et. al. [25]. 2) Number of Followers of Adopters. 3) Number of Edges in the Network Spread 4) Subgraph Density defined as the ratio of the number of edges to the number of nodes in the network spread. Versions of these three feature have been used by Cheng et. al. [6] and Jenders et. al. [17] and also discussed by Ardon et. al. [3]. The second subset includes 3 features based on self-initiated adopters, i.e., adopters with no neighbors who have adopted the same hashtag before the prediction threshold. These include 1) Number of Self-Initiated Adopters 2) Follower Count of Self-Initiated Adopters 3) Ratio of Self-Initiated Adopters to Number of Adopters. We note that the cascade setting of Cheng et. al. [6] involves, by definition, just one "root" whereas we can have any number of self-initiated adopters, reflecting the critical difference between that setting and the setting we study here. Lastly, we used 3 weakly connected component based features. These include 1) Ratio of Number of Weakly Connected Components to Number of Adopters 2) Size of the largest Weakly Connected Component 3) Ratio of the Sizes of the Two Largest Weakly Connected Components. Ardon et. al. [3] have posited a merging phenomenon in the growth of a hashtag to virality: initially the growth of the meme takes place in small separate clusters that begin merging for those memes that are moving towards virality, but remain separate for those memes that are not. These three features attempt to quantify this process. To the best of our knowledge they have never been 16 used for this kind of prediction task before. For the network features of feature set N, we find that the correlation co- efficient is generally positive and significant and remains stably so (Fig. 3(b)). An important deviation is the ratio of the second largest to the largest com- ponent which is negatively correlated with hashtag growth. This negative correlation continues to increase as the number of tweets seen increases re- flecting the fact that components merge to find a giant component as virality approaches. 5.1.3 Geography-based features Taking user geographies (time zones as defined by Twitter that we extracted (see Section 3)) into account, we were able to define a set of 7 features. 1) Number of Infected Geographies i.e. geographies with at least one tweet about the topic. 2) Fraction of Self-Initiated Geographies i.e. fraction of geogra- phies where the first user tweeting was self-initiated. 3) Fraction of Edges across Geographies i.e., fraction of total edges whose end points lie in different geographies. We used 1) Adoption Entropy and 2) Tweeting Entropy across geographies as two of our features. We captured intra-geography activity us- ing the following two features: 1) Fraction of Intra-Geography Retweets and 2) Fraction of Intra-Geography Mentions. The fractions refer to the fraction of total number of retweets and mentions to the intra-geography retweets and mentions, respectively. Of these features, we note that the fraction of edges across geographies has been highlighted as a discriminative metric by Ardon et. al. [3]. The rest are similar in flavor to the community-based features used by Weng et. al. [36, 35], except we use time zone as our notion of community here. The exception to this is the feature Fraction of Self- Initiated Geographies which is used for the first time here. We note that our current work is the first time, to the best of our knowledge, that geographical information is being used for virality or meme growth prediction. Looking at the correlation coefficient evolution of the feature set G we find that the number of infected geographies is positively correlated with successful topics and remains stably so (Fig. 3(c)). Notable here is that the tweeting entropy displays a high correlation with hashtag growth. 17 5.1.4 Conductance-based features Given a graph G = (V, E) and a subset of nodes S ⊆ V , the conductance φ(S) of the set S is defined as the ratio of the number of edges outgoing from S (i.e. follower links of the nodes in the set S) that land outside S i.e.: φ(S) = {(u → v) : u ∈ S, v ∈ V \S} {(u → v) : u ∈ S, v ∈ V } (1) Conductance is a isoperimetric quantity that has been shown to be closely related to mixing times of random walks in graphs [18]. In a diffusion setting more general than a random walk, Chierichetti et. al. showed that the time taken for a rumor to spread through a network can be characterized in terms of the conductance of the graph [7]. Empirical evidence linking conductance with diffusion in graphs was provided by Ardon et. al. [3] who found that the conductance of viral memes undergoes a sharp dip as they approach virality. To visualize this in the network setting, we can think of it this way: When a topic goes viral it saturates the structural community enveloping it, hitting the low conductance boundary of that community. With this in mind we chose to investigate a set of conductance based features for our prediction problem. We used 3 types of conductance based features in our study: the conduc- tance, and its first and second derivatives. To calculate the first derivative at prediction threshold n, the following methodology was used. Let us define a time instant as the occurrence of a tweet event. Let ci denote the conduc- tance value at the ith time instant. Then, for a given smoothing parameter k, the conductance derivative (w.r.t. number of time instants elapsed) is defined as ∆c ∆t = (cn − cn−k) (tn − tn−k) In words, the conductance derivative is the ratio of difference in the con- ductance value at the prediction threshold (n) and the conductance value k tweets prior to the prediction threshold to the difference in their correspond- ing timestamps. The second derivative of conductance is calculated in a sim- ilar manner using the values of the first derivative. For the first derivative, we used the value of k as 20, 50, 100 and 250. For the second derivative, we used the first derivative values at k = 50 and k = 100. We also measure the standard deviation of the first and second derivatives of the conductance over the last 100 tweets before the prediction threshold is reached. This resulted 18 in a total of 8 conductance based features (conductance, 5 first derivative based features and 2 second derivative based feature). The importance of the change in conductance as a feature becomes clear when we look at the way the correlation coefficients of the derivatives of conductance evolve with the number of tweets (Fig. 3(d)). In particular the standard deviation of both the first and second derivatives grow continuously, reaching a very high value of 0.4 when 5000 tweets have been seen. This strong correlation foreshadows the striking effect on prediction results that this feature set is found to have (see Section 6). The intuition behind Conductance based features Our conductance- based features should be compared to the "first surface" feature of Weng et. al. [36, 35], or the "border users" of Ma et. al. [25], which are simply the number of "uninfected" neighbors of users who have tweeted a hashtag i.e. neighbors who have not yet tweeted that hashtag. This "first surface" (and the similarly defined "second surface") is subtler than the features in the flavor of "number of neighbors" used by Jenders et. al. [17] and Cheng et. al. [6] which do not distinguish between neighbors that have already prop- agated the meme and those that have not. But conductance goes a step further. Conductance has been widely used to measure the quality of com- munities produced by community detection algorithms (see e.g. [24] or, [16]) and even been shown to be tightly related to the clustering coefficient of a graph [11]. In view of this, the correct way of interpreting the conductance based features is by viewing the diffusion process in its early stages as mov- ing inside communities. At the point of virality, a hashtag saturates each of these communities, i.e., it reaches the boundary of the community and the conductance falls since the edges leaving a community are a small fraction of the total edges of the community, the majority of the edges being pointed inward. Hence the ratio of the outward edges to the total edges is a much more important feature than simply the number of outward edges because it captures how clustered a certain set of nodes is. This intuition is borne out by the fact that the derivatives of conductance are highly correlated with topic growth (as we saw in Fig. 3(d) and by the strong impact these features have on the quality of prediction (see Sec. 6). Information gain of our features We further quantified the efficacy of our proposed features for the purpose of prediction by computing the 19 information gain of each feature. This metric, roughly speaking, reflects the amount of information the knowledge of a particular feature value of the evolution of a hashtag upto the prediction threshold gives us about the class -- viral or non-viral -- to which the hashtag belongs. Given two random variables X and Y , the information gain of Y with respect to X captures the reduction in entropy of Y given X. Information gain is a symmetric metric that is also known as the mutual information between X and Y and is represented as I(X, Y ) = H(Y ) − H(Y X). Here H(Y X) is the conditional entropy of Y given X and is defined analogous to the entropy, now using the conditional i P (Y = yi) log(P (Y = yi)) where P (Y = yi) is the probability that Y takes the ith state/value. Intuitively, information gain captures the amount of information that knowing X can give us about Y . distribution of Y X. Recall that entropy is defined as H(Y ) = −(cid:80) Table 5 shows the top 2 features from each category based on their in- formation gain. Conductance-based features were found to have the highest information gain among all the features across all the categories. The top feature in this category is the first derivative of the conductance which im- plies that the speed of the spreading process is a key indicator of its eventual success. This validates our earlier thesis about conductance and its prop- erties being very important features for characterizing virality. The highest value of information gain that we have is 0.04527 for the first derivative of the conductance. This is a non-trivial value but is relatively small, which provides us a quantitative measure of the hardness of the prediction prob- lem. We also note that computing the information gain of individual features does not reveal the entire story since it does not take their dependence into account. The joint effect of features comes out in our experimental results (Section 6.) 6 Experiments The goal of our experiments was to answer the following questions: a) How effective is each set of features (and the combinations thereof) defined in Section 5 in predicting hashtag virality? b) What is the impact of changing prediction threshold on virality prediction? c) How does our approach com- pare with existing approaches on existing datasets? In order to answer these questions, we used the features defined in Section 5 in a machine learning classification and learned a model to predict which hashtags go viral. Specif- 20 Feature Set 1. Growth Rate 2. No. of Adopters 1. No. of Adopters with Heavy Following 2. Number of Edges E E N N Info. Gain 0.02424 0.00979 Feature 1. Tweeting Entropy 2. No. Of Infected Geographies 0.01175 1. 1st Derivative 0.0099 of Conductance (k=50) 2. Stdev of 2nd Derivative of Conductance Set G G C C Info. Gain 0.01249 0.00938 0.04527 0.03526 Table 5: Top Ranking Features Based on Information Gain ically, the task was to predict whether the number of tweets containing a hashtag will cross the virality threshold or not given its feature values at the prediction threshold. To answer the first two questions, we experimented on the dataset com- piled by us as detailed in Section 3. In order to answer the last question, we compared our approach with that of Weng et al. [35] on their dataset, under the same experimental conditions. 6.1 Experimental Setup We will refer to our dataset detailed in Section 3 as TwitDat. For experiments on this data, we used the methodology defined in Section 4 for defining which hashtags are declared to be viral. The prediction threshold was chosen to be n = 1500. Only those hashtags which crossed the n = 1500 mark were used for training and testing purposes. This left us with a total of 2810 hashtags. Only about 6.3% of these hashtags were found to cross the virality threshold of 10,000. Algorithms We refer to our feature based approach for predicting viral- ity as CGNP (Conductance Geography and Network topology based Pre- dictor). We experimented with using various combinations of our feature sub-categories defined in Section 5 i.e. 1) Evolution Based (E) which was used to generate two baselines 2) Network Based (N) 3) Geography Based (G) 4) Conductance Based (C). When using CGNP with a certain subset of feature categories, we will append the names of categories used as fea- tures. For example, CGNP(E+N) means that we are using evolution based 21 and network based features only. We compare CGNP using various feature combinations with the following 3 baselines: Random: This is the naıve algorithm which randomly (with 0.5 proba- bility) predicts a hashtag to be viral. CGNP(E1): This is the feature based prediction using the very basic evolution features, i.e., number of adopters and number of retweets. We will refer to these set of features as E1. This is used as a baseline because of the very intuitive nature of these features for prediction and their prior use for prediction in the past literature (see Sec. 5.1.1 for details). CGNP(E): This is the feature based prediction using all the four evo- lution based features described in Section 5. These features enhance the feature set E1 but are still basic and have been used before (see Sec 5.1.1) and so can be thought of as a baseline. Learning Methodology We compare various prediction algorithms across two primary metrics: AUC, i.e. area under the Precision Recall curve and F-measure. We will also report Precision and Recall. For all our experi- ments, we used Random Forests with 500 trees as our learning algorithm. For training of each decision tree, (cid:100)log2 #f eatures(cid:101) number of random fea- tures are used, where #f eatures is the total number of features considered in the learning algorithm. We performed 10 fold cross validation over a random split of the data for training and testing purposes. We briefly describe the evaluation metrics used: AUC, Precision, Recall and F-measure. The class probabilities assigned to each test data example by the learning algorithm are subsequently compared with a threshold θ, to transform the probability values to binary outputs (1, if the class probability is greater than θ and 0, otherwise). These predicted labels for the examples are compared with the corresponding actual class labels to get the number of true positives (tp), false positives (fp), true negatives (tn) and false nega- tives (fn), where positive refers to the virality class. Then, Precision= tp tp+f p , Recall= tp tp+f n , and F-measure, or F1-score is the harmonic mean of Preci- sion and Recall, i.e., F-measure= 2.P recision.Recall P recision+Recall . The Precision-Recall curve is obtained by varying the value of the threshold, θ. AUC is calculated as the numerical approximation of area under this curve. Thus, AUC gives a threshold-independent measure of classifier performance and is often used in cases of datasets with high class imbalance [8]. Note that class distribution is very skewed for our dataset with class size 22 ratio for the virality and non-virality classes being close to 1:15. Using the ideas from literature to deal with high class imbalance [9], we undersampled the majority (non-viral) class at a rate of about 0.3 to bring the class size ratio to 1:4.5. Undersampling was done only on the training folds and test distribution was kept as is. 6.2 Effect of Feature Sets To answer the first question, Table 6 shows the values of AUC, F-Measure, Precision and Recall for the baselines used as well as various combinations of feature categories for CGNP. The best performing feaure combination has been highlighted in bold for each of the metrics. Random has the highest recall of 50% but has an extremely low precision. CGNP(E) is the strongest baseline algorithm among the 3 compared. There is a gradual improvement in both AUC and F-measure as more sophisticated features are added. Adding both network (E+N) and geography (E+G) based features leads to some improvement in prediction results, effect of geography being somewhat more than that of network based features. Combining them together (E+N+G) does not lead to any further improvement in results which probably means that the two feature categories are capturing similar effects. There is a significant improvement in Precision, Recall, F-measure as well as AUC over the baseline using conductance based features. Conductance results in both F-measure and AUC going up by more than 7% over the baseline. This points to a very strong efficacy of conductance features in predicting virality. This observation is in line with the correlation graphs and information gain numbers presented in Section 5. Adding network based and geography based features leads to a further improvement in results of about 1.5% for F-measure (E+N+C) and up to 3.5% for AUC (E+N+G+C). This means that though conductance is the most effective feature for prediction, there is some additional signal captured by network and geography based features for this task. The best performing feature combination for F-measure is (E+N+C) and for AUC is (E+N+G+C). Both our F-measure and AUC numbers appear somewhat on the lower side. This is because virality prediction is an extremely difficult task for prediction. Nevertheless, what we really care about is capturing early on a reasonable fraction of hashtags which would go viral with some accetable number of false positives (hashtages predicted viral which were actually not). With the (E+N+G+C) model, we have a recall of close to 40% with a pre- 23 cision of about 33%. This means that we are able to capture 2 out of every 5 hashtags that go viral, while paying the cost of sieving through 3 hashtags for every truly viral hashtag output by the system. This seems reasonable considering the difficutly of the task and a highly skewed positive class ratio of less than 7 in 100. Algorithm Random CGNP(E1) CGNP(E) CGNP(E+N) CGNP(E+G) CGNP(E+C) CGNP(E+N+G) CGNP(E+G+C) CGNP(E+N+C) CGNP(E+N+G+C) Precision Recall F-meas. AUC 6.30 14.9 18.5 20.7 20.9 26.2 20.3 28.0 28.2 30.0 11.19 19.49 27.52 27.88 29.53 34.91 28.02 36.12 36.28 35.57 6.30 13.51 30.00 21.69 29.12 36.65 22.65 30.08 31.4 32.7 50.0 35.03 25.42 38.98 29.94 33.33 36.72 45.19 42.94 38.98 Table 6: Results comparing CGNP using various feature combinations and baselines on TwitDat (all values in %) 6.3 Effect of Prediction Threshold To answer the second question, we analyzed the performance of our al- gorithms with varying prediction threshold. As explained in Section 4, a small value of the prediction threshold may not give good prediction results, whereas a large value of the threshold may not be very useful since we are not able to make the prediction early enough in the hashtag evolution history. Figure 4 plots the variation in AUC for different feature sets of CGNP. At any given value of prediction threshold, adding more sophisticated features helps improve the performance further (barring few minor exceptions). The most improvement is obtained by adding conductance based features as observed earlier. As expected, the performance of all the models improves with increasing prediction threshold. The maximum rate of increase is seen when prediction threshold goes from 1000 to 1500 (which is the value of prediction threshold in rest of our experiments) after which the gains seem to taper off. This 24 justifies our choice of prediction threshold by showing that 1500 tweets is the earliest point at which a certain quality of prediction can be achieved. Figure 4: AUC versus Prediction Threshold 6.4 Comparison on Existing Datasets To answer the third question, we experimented on the dataset of 595K users compiled by Weng et al. [35], made available on their website.1 We will refer to their dataset as WengDat. For our results to be directly comparable with Weng et al.'s approach on their dataset, we used their definition of virality, i.e., a hashtag is declared to be viral if it lies in the top 10% of all the hashtags in a ranking based on the total number of tweets for each hashtag at the end of the observation period. We used their prediction threshold as used by them, i.e., n = 50, and their learning setting as theirs i.e., Random Forests with 500 trees and 10 fold cross validation over a random split of the data. We did not perform any undersampling on this dataset. We compared our feature combinations with Weng et al.'s feature based approach. We refer to their approach as WFVP (Weng Feature based Virality Predictor). For 1http://carl.cs.indiana.edu/data/#virality2013 25 WFVP, we directly use the results reported by them in their paper using their best combination of features. Table 7 compares the performances of WFVP and CGNP using various feature combinations. Weng et al. already demonstrated the superior perfor- mance of their approach over a number of non-trivial baselines so we report their final results here. We do not have AUC numbers for WFVP as they are not reported by Weng et al. We did not have geography information for their dataset so we used CGNP with only the three feature groups E, N and C. First, note that as on TwitDat, adding sophisticated features to CGNP helps improve performance. The most improvement is obtained by adding conduc- tance based features as was the case with TwitDat. Compared to WFVP, we are able to achieve a significantly high recall at the cost of a smaller loss in precision. In a scenario where it is important not to miss a potentially viral topic (as is the case with many of our motivating applications), obtaining a high recall becomes important. Note that overall, our precision-recall com- bination results in an F-measure which is 4.5% more than the best results reported by Weng et al. A more fine grained comparison with WFVP throws additional light. Using only evolution and network based features, CGNP performs worse than WFVP in terms of F-measure. We attribute this pri- marily to the community based features used by Weng et al. which have been shown to be quite effective for prediction. Significantly, once conduc- tance based features are added, CGNP starts outperforming WFVP, even when we do not include network based features. Effectively, conductance is able to make-up for the lack of community based features for the task of virality prediction (and in fact, performs better). Further, we note that our conductance based features are local in the sense that they can be com- puted by examining the relevant portion of the network where the hashtag is currently diffusing and does not require the entire network to be taken into memory. 6.5 Geographical Trends We also evaluated the performance of CGNP over hashtags based on their spread within individual geographies, i.e., the graph of interest was restricted to the nodes lying within individual geographies in the dataset. In particular, we experimented with three different geographies, namely, London, India and Quito. Since the number of users across each geography varies, we appropri- ately scaled the prediction and virality thresholds for individual geographies. 26 Algorithm Random CGNP(E1) CGNP(E) CGNP(E+N) CGNP(E+C) CGNP(E+N+C) WFVP Precision Recall F-meas. AUC 10.0 28.7 33.8 39.1 52.5 53.1 16.66 36.28 37.28 39.94 49.91 51.08 46.58 10.00 26.07 29.50 32.22 46.12 43.61 66.00 50.0 59.59 50.65 52.51 54.37 61.63 36.00 - Table 7: Results comparing CGNP using various feature combinations with WFVP on WengDat (all values in %) Geogr- # Active Prediction aphy London India Quito Virality % of Viral users Threshold Threshold Hashtags 3.56 226906 28935 8.67 3.14 91871 1500 1000 500 150 100 50 Table 8: Individual Geography Statistics Virality threshold was maintained at 10 times the prediction threshold, in line with the ratio used for the entire dataset. The prediction threshold was hand tuned to ensure there was sufficient information in the data up to that point. Table 8 presents the details about number of active users (i.e. those who have tweeted at least once), prediction and virality thresholds, and % of viral hashtags for each of the above geographies. Table 9 presents the F-measure and AUC values for various feature combinations for each of the geographies. Note that since we are already within individual geographies, the feature category G is absent in the combination. As seen in case of the full dataset, the performance increases with increasing sophistication in the feature set. For London and India, maximum benefit is obtained using the conductance based features. Network based features help improve this fur- ther. For Quito, network based features seem to give a larger gain. Best feature combination is still E+N+C. 27 Quito London F AUC F AUC Algorithm 3.1 5.9 3.6 6.7 Random 19.42 8.8 14.53 9.1 CGNP(E1) 9.0 17.69 10.4 15.38 CGNP(E) 17.1 22.52 9.3 14.21 CGNP(E+N) 9.7 14.8 CGNP(E+C) 17.42 20.19 15.5 42.03 36.2 23.56 CGNP(E+N+C) 22.17 17.3 India F AUC 8.7 19.6 23.9 27.6 31.3 14.8 26.85 31.26 34.84 37.54 Table 9: Results on Individual Geographies. 7 Conclusions In this work, we have carefully studied the effect of three different sets of feature categories, i.e., network based, geography based and conductance based, for the task of predicting hashtag virality in a large dataset. Our main contribution is a novel feature set that includes new features based on the network properties of the users tweeting a hashtag and the geographical information contained in their profiles and in their tweets. Building on the intuition that the spread of memes across communities is a critical discrimi- nator of viral topics we have introduced a suite of conductance based features for the prediction task. We found that all our three feature categories (apart from the baseline evolution based features), have a significant impact on vi- rality prediction, with conductance being the most effective. This justifies the intuition regarding the relationships of communities and virality and sug- gests that a more dynamic view of communities, centred around the diffusion pattern of individual hashtags, is more appropriate and effective for the pre- diction task. The fact that our feature set outperforms approaches relying on static communities detected in the network (such as the work of [35]) is doubly important in view of the fact that detecting static communities in the entire network is very expensive computationally at scale. Future research directions include further investigating the use of our proposed feature sets for predicting spread of topics in individual geogra- phies, more carefully examining the relative impact of community based and conductance based features and incorporating semantic features in our frame- work. 28 References [1] Pranay Agarwal. Prediction of trends in online social network. Master's thesis, Indian Institute of Technology, Delhi, 2013. [2] Sinan Aral and Dylan Walker. Creating social contagion through vi- ral product design: A randomized trial of peer influence in networks. Manag. Sci., 57(9):1623 -- 1639, 2011. [3] Sebastien Ardon, Amitabha Bagchi, Anirban Mahanti, Amit Ruhela, Aaditeshwar Seth, Rudra Mohan Tripathy, and Sipat Triukose. Spatio- temporal and events based analysis of topic popularity in Twitter. In Proc. 22nd ACM Intl. Conf. on Information and Knowledge Manage- ment (CIKM 2013), pages 219 -- 228. ACM, 2013. [4] Jonah Berger and Katherine L Milkman. What makes online content viral? J. Marketing Res., 49(2):192 -- 205, 2012. [5] Peter Bright. How the london riots showed us two sides of social net- working. Posted on http://arstechnica.com/, 11 August 2011, August 2011. [6] Justin Cheng, Lada A. Adamic, P. Alex Dow, Jon M. Kleinberg, and Jure Leskovec. Can cascades be predicted? In Proc. 23rd Intl. World Wide Web Conference (WWW '14), pages 925 -- 936, 2014. [7] F. Chierichetti, S. Lattanzi, and A Panconesi. Almost tight bounds for rumour spreading with conductance. In Proc. 42nd ACM Symp. on Theory of computing (STOC '10), pages 399 -- 408, 2010. [8] Jesse Davis and Mark Goadrich. The relationship between precision- recall and roc curves. In Proceedings of the 23rd international conference on Machine learning, pages 233 -- 240. ACM, 2006. [9] Chris Drummond and Robert C. Holte. C4.5, class imbalance, and In ICML cost sensitivity: Why under-sampling beats over-sampling. Workshop on Learning from Imbalanced Datasets, pages 1 -- 8, 2003. [10] R. Ghosh and K. Lerman. A framework for quantitative analysis of cascades on networks. In Proc. 4th ACM International Conference on Web search and data mining (WSDM '11), pages 665 -- 674, 2011. 29 [11] David F. Gleich and C. Seshadhri. Vertex neighborhoods, low conduc- tance cuts, and good seeds for local community methods. In Proc. 18th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD '12), pages 597 -- 605, 2012. [12] Marco Guerini, Jacopo Staiano, and David Albanese. Exploring image virality in Google Plus. In Proc. ASE/IEEE Intl. Conference on Social Computing (SocialCom 2013), pages 671 -- 678, 2013. [13] Marco Guerini, Carlo Strapparava, and Gozde Ozbal. Exploring text virality in social networks. In Proc. Intl. AAAI Conf. on Weblogs and Social Media (ICWSM 2011), 2011. [14] Venkatesan Guruswami. A comparison chains: http://www.cs.cmu.edu/ venkatg/pubs/pubs.html, 2000. of Rapidly techniques. mixing Markov at: Available [15] Lars Kai Hansen, Adam Arvidsson, Finn Arup Nielsen, Elanor Colleoni, and Michael Etter. Good friends, bad news-affect and virality in twitter. In Future information technology, pages 34 -- 43. Springer, 2011. [16] Steve Harenberg, Gonzalo Bello, L. Gjeltema, Stephen Ranshous, Ji- tendra Harlalka, Ramona Seay, Kanchana Padmanabhan, and Nagiza Samatova. Community detection in large-scale networks: a survey and empirical evaluation. WIREs Comput Stat, 6:426 -- 439, 2014. [17] Maximilian Jenders, Gjergji Kasneci, and Felix Naumann. Analyzing and predicting viral tweets. In WWW (Companion Volume), pages 657 -- 664, 2013. [18] M. R. Jerrum and A. J. Sinclair. Approximating the permanent. SIAM J. Comput., 18:1149 -- 1178, 1989. [19] Maksim Kitsak, Lazaros K Gallos, Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H Eugene Stanley, and Hern´an A Makse. Identification of influential spreaders in complex networks. Nature Phys., 6(11):888 -- 893, 2010. [20] Juhi Kulshrestha, Farshad Kooti, Ashkan Nikravesh, and Krishna P. In Geographic Dissection of the Twitter Network. Gummadi. Proc. ICWSM 2012, 2012. 30 [21] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social In Proc. 19th Intl. conference on World network or a news media? Wide Web (WWW '10), pages 591 -- 600, 2010. [22] Kristina Lerman and Tad Hogg. Using a model of social dynamics to predict popularity of news. In Proc. 19th Intl. conference on World Wide Web (WWW '10), pages 621 -- 630. ACM, 2010. [23] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking and the dynamics of the news cycle. In Proc. KDD '09, pages 497 -- 506. ACM, 2009. [24] Jure Leskovec, Kevin J. Lang, and Michael W. Mahoney. Empirical com- parison of algorithms for network community detection. In Proc. 19th Intl. Conf. on World Wide Web (WWW '10), pages 631 -- 640, 2010. [25] Zongyang Ma, Aixin Sun, and Gao Cong. On predicting the popularity of newly emerging hashtags in twitter. J. Assoc. Inf. Sci. Technol., 64(7):1399 -- 1410, 2013. [26] J. McGee, J Caverlee, and Z. Cheng. Location prediction in social media based on tie strength. In Proc. 22nd ACM Intl. Conf. on Information and Knowledge Management (CIKM 2013), pages 459 -- 468, 2013. [27] Seth A. Myers, Chenguang Zhu, and Jure Leskovec. Information diffu- sion and external influence in networks. In Proc. KDD '12, pages 33 -- 41, 2012. [28] Onook Oh, Manish Agrawal, and H Raghav Rao. Rumor and Commu- nication in Asia in the Internet Age, chapter 8, pages 143 -- 155. Taylor and Francis, 2013. [29] S Rajyalakshmi, Amitabha Bagchi, Soham Das, and Rudra M Tripa- thy. Topic diffusion and emergence of virality in social networks. arXiv preprint arXiv:1202.2215, 2012. [30] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the mechan- ics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. In Proc. 20th Intl. conf. on World Wide Web (WWW '11), pages 695 -- 704, 2011. 31 [31] Bongwon Suh, Lichan Hong, Peter Pirolli, and Ed H Chi. Want to be retweeted? large scale analytics on factors impacting retweet in twitter network. In IEEE/ASE SocialCom 2010, pages 177 -- 184. IEEE, 2010. [32] Gabor Szabo and Bernardo A Huberman. Predicting the popularity of online content. Comm. ACM, 53(8):80 -- 88, 2010. [33] Luam Catao Totti, Felipe Almeida Costa, Sandra Eliza Fontes de Avila, Eduardo Valle, Wagner Meira Jr., and Virgilio Almeida. The impact of visual attributes on online image diffusion. In Proc. ACM Web Science Conference (WebSci '14), pages 42 -- 51, 2014. [34] Lilian Weng, Alessandro Flammini, Alessandro Vespignani, and Filippo Menczer. Competition among memes in a world with limited attention. Sci. Rep., 2, 2012. [35] Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. Virality prediction and community structure in social networks. Sci. Rep., 3, 2013. [36] Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. Predicting success- ful memes using network and community structure. In 8th Intl. AAAI Conference on Weblogs and Social Media (ICWSM 2014), 2014. [37] Fang Wu and Bernardo A Huberman. Novelty and collective attention. Proc. Natl. Acad. Sci. U.S.A, 104(45):17599 -- 17601, 2007. [38] T Zaman, E B Fox, and E T Bradlow. A bayesian approach for predicting the popularity of tweets. Ann. Appl. Stat., 8(3):1583 -- 1611, 2014. 32
1205.6822
1
1205
2012-05-30T20:08:17
Friendship networks and social status
[ "cs.SI", "physics.soc-ph" ]
In empirical studies of friendship networks participants are typically asked, in interviews or questionnaires, to identify some or all of their close friends, resulting in a directed network in which friendships can, and often do, run in only one direction between a pair of individuals. Here we analyze a large collection of such networks representing friendships among students at US high and junior-high schools and show that the pattern of unreciprocated friendships is far from random. In every network, without exception, we find that there exists a ranking of participants, from low to high, such that almost all unreciprocated friendships consist of a lower-ranked individual claiming friendship with a higher-ranked one. We present a maximum-likelihood method for deducing such rankings from observed network data and conjecture that the rankings produced reflect a measure of social status. We note in particular that reciprocated and unreciprocated friendships obey different statistics, suggesting different formation processes, and that rankings are correlated with other characteristics of the participants that are traditionally associated with status, such as age and overall popularity as measured by total number of friends.
cs.SI
cs
Friendship networks and social status Brian Ball1 and M. E. J. Newman1, 2 1Department of Physics, University of Michigan, Ann Arbor, MI 48109, U.S.A. 2Center for the Study of Complex Systems, University of Michigan, Ann Arbor, MI 48109, U.S.A. In empirical studies of friendship networks participants are typically asked, in interviews or ques- tionnaires, to identify some or all of their close friends, resulting in a directed network in which friendships can, and often do, run in only one direction between a pair of individuals. Here we analyze a large collection of such networks representing friendships among students at US high and junior-high schools and show that the pattern of unreciprocated friendships is far from random. In every network, without exception, we find that there exists a ranking of participants, from low to high, such that almost all unreciprocated friendships consist of a lower-ranked individual claiming friendship with a higher-ranked one. We present a maximum-likelihood method for deducing such rankings from observed network data and conjecture that the rankings produced reflect a measure of social status. We note in particular that reciprocated and unreciprocated friendships obey different statistics, suggesting different formation processes, and that rankings are correlated with other char- acteristics of the participants that are traditionally associated with status, such as age and overall popularity as measured by total number of friends. Introduction A social network, in the most general sense of the term, consists of a group of people, variously referred to as nodes or actors, connected by social interactions or ties of some kind [1]. In this paper we consider networks in which the ties represent friendship. Friendship networks have been the subject of scientific study since at least the 1930s. A classic example can be found in the stud- ies by Rapoport and collaborators of friendship among schoolchildren in the town of Ann Arbor, MI in the 1950s and 60s [2], in which the investigators circulated ques- tionnaires among the students in a school asking them to name their friends. Many similar studies have been done since then, with varying degrees of sophistication, but most employ a similar questionnaire-based method- ology. A counterintuitive aspect of the resulting networks is that they are directed. Person A states that person B is their friend and hence there is a direction to the ties between individuals. It may also be that person B states that person A is their friend, but it does not have to be the case, and in practice it turns out that a remarkably high fraction of claimed friendships are not reciprocated. In the networks we study in this paper the fraction of reciprocated ties rarely exceeds 50% and can be as low as 30%. This could be seen as a problem for the experimenter. One thinks of friendship as a two-way street—a friend- ship that goes in only one direction is no friendship at all. How then are we to interpret the many unreciprocated connections in these networks? Are the individuals in question friends or are they not? One common approach is simply to disregard the directions altogether and con- sider two individuals to be friends if they are connected in either direction (or both) [3]. In this paper, however, we take a different view and consider what we can learn from the unreciprocated connections. It has been con- jectured that, rather than being an error or an annoy- ance, the pattern of connections might reflect underlying features in the structure or dynamics of the community under study [4–6]. Working with a large collection of friendship networks from US schools, we find that in every network there is a clear ranking of individuals from low to high such that almost all friendships that run in only one direction con- sist of a lower-ranked individual claiming friendship with a higher-ranked one. We conjecture that these rankings reflect a measure of social status and present a number of results in support of this idea. For instance, we find that a large majority of reciprocated friendships are be- tween individuals of closely similar rank, while a signif- icant fraction of unreciprocated friendships are between very different ranks, an observation consistent with qual- itative results in the sociological literature going back several decades [5]. We also investigate correlations be- tween rank and other individual characteristics, finding, for example, that there is a strong positive correlation between rank and age, older students having higher rank on average, and between rank and overall popularity, as measured by total number of friends. The outline of the paper is as follows. First, we de- scribe our method of analysis, which uses a maximum- likelihood technique in combination with an expectation– maximization algorithm to extract rankings from di- rected network data. Then we apply this method to school friendship networks, revealing a surprisingly uni- versal pattern of connections between individuals in dif- ferent schools. We also present results showing how rank correlates with other measures. Finally we give our con- clusions and discuss possible avenues for future research. Inference of rank from network structure Consider a directed network of friendships between n individuals in which a connection running from person A to person B indicates that A claims B as a friend. Sup- pose that, while some of the friendships in the network may be reciprocated or bidirectional, a significant frac- tion are unreciprocated, running in one direction only, and suppose we believe there to be a ranking of the in- dividuals implied by the pattern of the unreciprocated friendships so that most such friendships run from lower to higher rank. One possible way to infer that ranking would be simply to ignore any reciprocated friendships and then construct a minimum violations ranking of the remaining network [7, 8]. That is, we find the ranking of the network nodes that minimizes the number of connec- tions running from higher ranked nodes to lower ranked ones. for the networks studied in this paper the minimum viola- tions rankings have an average of 98% of their unrecipro- cated friendships running from lower to higher ranks and only 2% running the other way. By contrast, versions of the same networks in which edge directions have been randomized typically have about 10% of edges running the wrong way. (Statistical errors in either case are 1% or less, so these observations are highly unlikely to be the results of chance.) In practice this approach works quite well: The minimum violations ranking, however, misses im- portant network features because it focuses only on un- reciprocated friendships. In most cases there are a sub- stantial number of reciprocated friendships as well, as many as a half of the total, and they contain significant information about network structure and ranking. For example, as we will see, pairs of individuals who report a reciprocated friendship are almost always closely similar in rank. To make use of this information we need a more flexible and general method for associating rankings with network structure. In this paper we use a maximum like- lihood approach defined as follows. Mathematically we represent the distinction between reciprocated and unreciprocated friendships in the net- work using two separate matrices. The symmetric matrix S will represent the reciprocated connections— undirected edges in graph theory terms—such that Sij = Sji = 1 if there are connections both ways between nodes i and j, and zero otherwise. The asymmetric matrix T will represent the unreciprocated (directed) edges with Tij = 1 if there is a connection to node i from node j (but not vice versa), and zero otherwise. The matrices S and T are related to the conventional adjacency ma- trix A of the network by A = S + T. Now suppose that there exists some ranking of the in- dividuals, from low to high, which we will represent by giving each individual a unique integer rank in the range 1 to n. We will denote the rank of node i by ri and the complete set of ranks by R. We have found it to be a good approximation to assume that the probability of friendship between two individuals is a function only of the difference between their ranks. We specifically al- low the probability to be different for reciprocated and unreciprocated friendships, which acknowledges the pos- sibility that the two may represent different types of rela- tionships, as conjectured for instance in [5, 9]. We define a function α(ri − rj) to represent the probability of an 2 undirected edge between i and j and another β(ri − rj ) for a directed edge to i from j. Since α(r) describes undirected edges it must be symmetric α(−r) = α(r), but β(r) need not be symmetric. If we were not given a network but we were given the probability functions α and β and a complete set of rankings on n vertices, then we could use this model to generate—for instance on a computer—a hypothetical but plausible network in which edges appeared with the appropriate probabilities. In effect, we have a random graph model that incorporates rankings. In this paper, however, we want to perform the reverse operation: given a network we want to deduce the rankings of the nodes and the values of the functions α and β. To put that another way, if we are given a network and we assume that it is generated from our model, what values of the rankings and probability functions are most likely to have generated the network we observe? This question leads us to a maximum likelihood for- mulation of our problem, which we treat using an expectation–maximization (EM) approach in which the ranks R are considered hidden variables to be determined and the functions α and β are parameters of the model. Using a Poisson formulation of the random network gen- eration process, we can write the probability of genera- tion of a network G with rankings R, given the functions α and β, as P (G, Rα, β) = Y i>j [α(ri − rj )]Sij Sij ! e−α(ri−rj ) [β(ri − rj)]Tij Tij! × Y i6=j e−β(ri−rj). (1) Note that we have excluded self-edges here, since indi- viduals cannot name themselves as friends. We have also assumed that the prior probability of R is uniform over all sets of rankings. The most likely values of the parameter functions α and β are now given by maximizing the marginal like- lihood P (Gα, β) = PR P (G, Rα, β), or equivalently maximizing its logarithm, which is more convenient. The logarithm satisfies the Jensen inequality logX R P (G, Rα, β) ≥ X R q(R) log P (G, Rα, β) q(R) , (2) for any set of probabilities q(R) such that PR q(R) = 1, with the equality being recovered when q(R) = P (G, Rα, β) PR P (G, Rα, β) . (3) This implies that the maximization of the log-likelihood on the left side of (2) is equivalent to the double max- imization of the right side, first with respect to q(R), which makes the right side equal to the left, and then with respect to α and β, which gives us the answer we are looking for. It may appear that expressing the prob- lem as a double maximization in this way, rather than as the original single one, makes it harder, but in fact that’s not the case. The right-hand side of (2) can be written as PR q(R) log P (G, Rα, β) − PR q(R) log q(R), but the second term does not depend on α or β, so as far as α and β are concerned we need consider only the first term, which is simply the average L of the log-likelihood over the distribution q(R): L = X q(R) log P (G, Rα, β). (4) R Making use of Eq. (1) and neglecting an unimportant overall constant, we then have L = X h 1 2 Sij log α(ri − rj) + Tij log β(ri − rj) q(R)X R i6=j − 1 2 α(ri − rj ) − β(ri − rj)i, (5) where we have used the fact that α(r) is a symmetric function. This expression can be simplified further. The first term in the sum is q(R)X 2 X 1 R i6=j Sij log α(ri − rj) = 1 2 X z Sij q(ri − rj = z) log α(z), (6) X i6=j where q(ri − rj = z) means the probability within the distribution q(R) that ri − rj = z. We can define a(z) = 1 n − z X i6=j Sij q(ri − rj = z), (7) which is the expected number of undirected edges in the observed network between pairs of nodes with rank dif- ference z. It is the direct equivalent in the observed net- work of the quantity α(z), which is the expected number of edges in the model. The quantity a(z), like α(z), is necessarily symmetric, a(z) = a(−z), and hence (6) can be written as 1 2 X R q(R)X i6=j Sij log α(ri − rj) = X z=1 (n − z)a(z) log α(z). n−1 Similarly, we can define b(z) = 1 n − z X i6=j Tij q(ri − rj = z) (8) (9) and X R q(R)X i6=j Tij log β(ri − rj ) = n−1 X z=1 (n − z)(cid:2)b(z) log β(z) + b(−z) log β(−z)(cid:3), (10) 3 where b(z) is the expected number of directed edges be- tween a pair of nodes with rank difference z. Our final expression for L is n−1 L = z=1 (n − z)(cid:2)a(z) log α(z) − α(z) X + b(z) log β(z) − β(z) + b(−z) log β(−z) − β(−z)(cid:3). (11) Our approach involves maximizing this expression with respect to α(z) and β(z) for given a(z) and b(z), which can be done using standard numerical methods. (Note that the expression separates into terms for the directed and undirected edges, so the two can be maximized in- dependently.) The values of a(z) and b(z) in turn are calculated from Eqs. (3), (7), and (9), leading to an it- erative method in which we first guess values for α(z) and β(z), use them to calculate q(R) and hence a(z) and b(z), then maximize L to derive new values of α and β, and repeat to convergence. This is the classic expectation–maximization approach to model fitting. Two further elements are needed to put this scheme into practice. First, we need to specify a parametrization for the functions α and β. We have found the results to be robust to the choice of parametrization, but in the results reported here we find α to be well represented by a Gaussian centered at the origin. The function β takes a more complicated form which we parametrize as a Fourier cosine series, keeping five terms and squaring to enforce nonnegativity, plus an additional Gaussian peak at the origin. Second, the sum in the denominator of Eq. (3) is too large to be numerically tractable, so we approximate it using a Markov chain Monte Carlo method—we gener- ate complete rankings R in proportion to the probabil- ity q(R) given by Eq. (3) and average over them to cal- culate a(z) and b(z). Results We have applied the method of the previous section to the analysis of data from the US National Longitudinal Study of Adolescent Health (the “AddHealth” study), a large-scale multi-year study of social conditions for school students and young adults in the United States [10]. Us- ing results from surveys conducted in 1994 and 1995, the study compiled friendship networks for over 90 000 stu- dents in schools covering US school grades 7 to 12 (ages 12 to 18 years). Schools were chosen to represent a broad range of socioeconomic conditions. High schools (grades 9 to 12) were paired with “feeder” middle schools (grades 7 and 8) so that networks spanning schools could be con- structed. To create the networks, each student was asked to select, from a list of students attending the same mid- dle/high school combination, up to ten people with whom they were friends, with a maximum of five being male and p i h s d n e i r f f o y t i l i b a b o r P 0.3 0.2 0.1 0 -1 (a) (b) 0.4 (a) (b) p i h s d n e i r f f o y t i l i b a b o r P 0.3 0.2 0.1 0 0.1 0.05 0 1 0 1 -1 0 Rank difference z -5 0 5 -5 0 5 Normalized rank difference 4 0.15 0.1 0.05 0 FIG. 1: (a) Probability of reciprocated friendships as a func- tion of rank difference (normalized to run from −1 to 1). The histogram shows empirical results for a single example net- work; the solid curve is the fitted function α(z). (b) The equivalent plot for unreciprocated friendships. FIG. 2: The fitted central peak of the friendship probabil- ity distributions for (a) reciprocated and (b) unreciprocated friendships. The horizontal axes are measured in units of ab- solute (unrescaled) rank difference divided by average network degree. Each blue curve is a network. The bold black curves represent the mean. five female. From these selections, 84 friendship networks were constructed ranging in size from tens to thousands of students, one for each middle/high school pair, along with accompanying data on the participants, including school grade, sex, and ethnicity. Some of the networks divide into more than one strongly connected component, in which case we restrict our analysis to the largest com- ponent only. We perform the EM analysis of the previous section on each network separately, repeating the itera- tive procedure until the rankings no longer change. Figure 1 shows results for a typical network. In panel (a), the histogram shows the measured value of the quantity a(z), Eq. (7), the empirical probability of a reciprocated friendship (technically the expected number of undirected edges) between a vertex pair with rank dif- ference z, with the horizontal axis rescaled to run from −1 to 1 (rather than −n to n). As the figure shows the probability is significantly different from zero only for small values of z, with a strong peak centered on the origin. The solid curve shows the fit of this peak by the Gaussian function α(z), which appears good. The fit is similarly good for most networks. The form of a(z) tells us that most reciprocated friendships fall between indi- viduals of closely similar rank: there is a good chance that two people with roughly equal rank will both claim the other as a friend, but very little chance that two peo- ple with very different ranks will do so. This result seems at first surprising, implying as it does that people must be able to determine their own and others’ rank with high accuracy in order to form friendships, but a num- ber of previous studies have suggested that indeed this is true [11]. Panel (b) of Fig. 1 shows b(z), Eq. (9), for the same net- work, which is the probability of a directed edge between nodes with rank difference z. Again there is a strong central peak to the distribution, of width similar to that for the undirected edges, indicating that many unrecipro- cated friendships are between individuals of closely simi- lar rank. However, the distribution also has a substantial asymmetric tail for positive values of the rank difference, indicating that in a significant fraction of cases individu- als claim friendship with those ranked higher than them- selves, but that those claims are not reciprocated. The black curve in the panel shows the best fit to the func- tion β(z) in the maximum-likelihood calculation. The general forms of these distributions are similar across networks from different schools. They also show interesting scaling behavior. The widths of the cen- tral peaks for both undirected and directed edges, when measured in terms of raw (unrescaled) rank difference are, to a good approximation, simply proportional to the average degree of a vertex in the network. Fig- ure 2 shows these peaks for 78 of the 84 networks on two plots, for undirected edges (panel (a)) and directed edges (panel (b)), rescaled by average degree, and the ap- proximately constant width is clear. (The six networks not shown are all small enough that the central peaks for the directed edges can be fit by the other parameters of the model and thus a direct comparison is not appropri- ate.) This result indicates that individuals have, roughly speaking, a fixed probability of being friends with others close to them in rank, regardless of the size of the com- munity as a whole—as the average number of friends in- creases, individuals look proportionately further afield in terms of rank to find their friends, but are no more likely to be friends with any particular individual of nearby rank. Outside of the central peak, i.e., for friendships be- tween individuals with markedly different ranks, there y t i l i b a b o r p p i h s d n e i r f d e z i l a m r o N 1.5 1 0.5 0 -1 -0.5 0 0.5 1 Rank difference FIG. 3: The fitted probability function for unreciprocated friendships, minus its central peak. The horizontal axis mea- sures rank difference rescaled to run from −1 to 1. Each blue curve is a network. The bold black curve is the mean. are, to a good approximation, only unreciprocated friend- ships, and for these the shape of the probability distri- bution appears by contrast to be roughly constant when measured in terms of the rescaled rank of Fig. 1, which runs from −1 to 1. This probability, which is equal to the function β(z) with the central Gaussian peak subtracted, is shown in Fig. 3 for the same 78 networks, rescaled vertically by the average probability of an edge to ac- count for differing network sizes, and again the similarity of the functional form across networks is apparent, with low probability in the left half of the plot, indicating few claimed friendships with lower-ranked individuals, and higher probability on the right. The roughly constant shape suggests that, among the unreciprocated friend- ships, there is, for example, a roughly constant probabil- ity of the lowest-ranked student in the school claiming friendship with the highest-ranked, relative to other stu- dents, no matter how large the school may be. The emerging picture of friendship patterns in these networks is one in which reciprocated friendships appear to fall almost entirely between individuals of closely sim- ilar rank. A significant fraction of the unreciprocated ones do the same, and moreover show similar scaling to their reciprocated counterparts, but the remainder seem to show a quite different behavior characterized by differ- ent scaling and by claims of friendship by lower-ranked individuals with substantially higher-ranked ones. Discussion Taking the results of the previous section as a whole, we conjecture that the rankings discovered by the anal- ysis correlate, at least approximately, with social status. If we assume that reciprocated friendships—almost all of which fall in the central peak—correspond to friendships in the conventional sense of mutual interaction, then a further conjecture, on the basis of similar statistics, is that the unreciprocated friendships in the central peak 5 are also mutual but, for one reason or another, only one side of the relationship is represented in the data. One explanation why one side might be missing is that re- spondents in the surveys were limited to listing only five male and five female friends, and so might not have been able to list all of their friendships. On the other hand, one might conjecture that the un- reciprocated claims of friendship with higher-ranked in- dividuals, those in the tail of the distribution in Fig. 1b, correspond to “aspirational” friendships, hopes of friend- ship with higher-ranked individuals that are, at present at least, not returned. Note also how the tail falls off with increasing rank difference: individuals are more likely to claim friendship with others of only modestly higher rank, not vastly higher. One way to test these conjectures is to look for corre- lations between the rankings and other characteristics of individuals in the networks. For instance, it is generally thought that social status is positively correlated with the number of people who claim you as a friend [9, 12]. Figure 4a tests this by plotting average rank over all indi- viduals in all networks (averaged in the posterior distri- bution of Eq. (1)) as a function of network in-degree (the number of others who claim an individual as a friend). As the figure shows, there is a strong positive slope to the curve, with the most popular individuals being nearly twice as highly ranked on average as the least popular. Figure 4b shows the corresponding plot for out-degree, the number of individuals one claims as a friend, and here the connection is weaker, as one might expect— claiming many others as friends does not automatically confer high status upon an individual—although the cor- relation is still statistically significant. Figure 4c shows rank as a function of total degree, in-degree plus out- degree, which could be taken as a measure of total social activity, and here again the correlation is strong. For all three panels the correlations are significant, with p-values less than 0.001. In addition to the network structure itself, we have additional data about each of the participants, including their age (school grade), sex, and ethnicity. The distri- butions of rank for each sex and for individual ethnicities turn out to be close to uniform—a member of either sex or any ethnic group is, to a good approximation, equally likely to receive any rank from 1 to n, indicating that there is essentially no effect of sex or ethnicity on rank. (A Kolmogorov–Smirnov test does reveal deviations from uniformity in some cases, but the deviations are small, with KS statistics D < 0.08 in all instances.) Age, how- ever, is a different story. Figure 5 shows the rescaled rank of individuals in each grade from 7 to 12, averaged over all individuals in all networks, and here there is a clear correlation. Average rank increases by more than a factor of two from the youngest students to the oldest (a one-way ANOVA gives p < 0.001). Since older stu- dents are generally acknowledged to have higher social status [13], this result lends support to the identification of rank with status. A further interesting wrinkle can 1 (a) (b) (c) k n a r e g a r e v A 0.5 1.0 0.75 0 0 5 10 15 0 2 4 6 8 0 5 10 15 20 In-degree Out-degree Degree k n a R 0.5 FIG. 4: Plots of rescaled rank versus degree, averaged over all individuals in all networks for (a) in-degree, (b) out-degree, and (c) the sum of degrees. Measurement errors are compa- rable with or smaller than the sizes of the data points and are not shown. 0.25 0 6 Shape Grade 7 8 9 10 11 12 Form Edge Type Directed Undirected 1.0 0.8 0.6 0.4 0.2 k n a r e g a r e v A 8 9 10 7 11 12 Grade FIG. 6: A sample network with (rescaled) rank on the vertical axis, vertices colored according to grade, and undirected edges colored differently from directed edges. Rank is calculated as an average within the Monte Carlo calculation (i.e., an average over the posterior distribution of the model), rather than merely the maximum-likelihood ranking. Note the clear correlation between rank and grade in the network. FIG. 5: Rescaled rank as a function of school grade, averaged over all individuals in all schools. Conclusions be seen in the results for the 8th and 9th grades. Unlike other pairs of consecutive grades, these two do not have a statistically significant difference in average rank (a t-test gives p > 0.95). This may reflect the fact that the 8th grade is the most senior grade in the feeder junior-high schools, before students move up to high school. When they are in the 8th grade, students are temporarily the oldest (and therefore highest status) students in school and hence may have a higher rank than would be ex- pected were all students in a single school together. Finally, in Fig. 6 we show an actual example of one of the networks, with nodes arranged vertically on a scale of inferred rank and colored according to grade. The increase of rank with grade is clearly visible, as is the fact that most undirected edges run between individuals of similar rank (and hence run horizontally in the figure). In this paper, we have analyzed a large set of net- works of friendships between students in American high and junior-high schools, focusing particularly on the dis- tinction between friendships claimed by both participat- ing individuals and friendships claimed by only one in- dividual. We find that students can be ranked from low to high such that most unreciprocated friendships con- sist of a lower-ranked individual claiming friendship with a higher-ranked one. We have developed a maximum- likelihood method for inferring such ranks from complete networks, taking both reciprocated and unreciprocated friendships into account, and we find that the rankings so derived correlate significantly with traditional measures of social status such as age and overall popularity, sug- gesting that the rankings may correspond to status. On the other hand, rankings seem to be essentially indepen- dent on average of other characteristics of the individuals involved such as sex or ethnicity. There are a number of questions unanswered by our analysis. We have only limited data on the personal characteristics of participants. It would be interesting to test for correlation with other characteristics. Are rank- ings correlated, for instance, with academic achievement, number of siblings or birth order, number of Facebook friends, after-school activities, personality type, body mass index, wealth, or future career success? There is also the question of why a significant number of appar- ently close friendships are unreciprocated. One idea that has appeared in the literature is that some directed edges may correspond to new, temporary, or unstable friend- ships, which are either in the process of forming and will become reciprocated in the future, or will disappear over time [12, 14]. Evidence suggests that in practice about a half of the unreciprocated friendships do the former and a half the latter, and it is possible that the two behav- iors correspond to the two classes of directed edges we identify in our analysis. A test of this hypothesis, how- 7 ever, would require time-resolved data—successive mea- surements of friendship patterns among the same group of individuals—data which at present we do not possess. Finally, there are potential applications of the statistical methods developed here to other directed networks in which direction might be correlated with ranking, such as networks of team or individual competition [15, 16] or dominance hierarchies in animal communities [17, 18]. Acknowledgments The authors thank Carrie Ferrario, Brian Karrer, Cris Moore, Jason Owen-Smith, Bethany Percha, and Claire Whitlinger for useful comments and suggestions. This work was funded in part by the National Science Foun- dation under grant DMS–1107796 and by the James S. McDonnell Foundation. [1] S. Wasserman and K. Faust, Social Network Analysis. Cambridge University Press, Cambridge (1994). [2] A. Rapoport and W. J. Horvath, A study of a large so- ciogram. Behavioral Science 6, 279–291 (1961). [3] E. M. Airoldi, D. S. Choi, and P. J. Wolfe, Confidence sets for network structure. Statistical Analysis and Data Mining 4, 461–469 (2011). [4] G. C. Homans, The Human Group. Harcourt, Brace, and Co., New York (1950). [5] J. A. Davis and S. Leinhardt, The structure of positive interpersonal relations in small groups. Sociological The- ories in Progress 2, 218–251 (1972). [6] P. Doreian, V. Batagelj, and A. Ferligoj, Symmetric- acyclic decompositions of networks. Journal of Classi- fication 17, 3–28 (2000). [7] G. Reinelt, The Linear Ordering Problem: Algorithms and Applications. Heldermann, Berlin (1985). [8] I. Ali, W. D. Cook, and M. Kress, On the minimum vi- olations ranking of a tournament. Management Science 32, 660–672 (1986). [9] J. K. Dijkstra, A. H. N. Cillessen, S. Lindenberg, and R. Veenstra, Basking in reflected glory and its limits: Why adolescents hang out with popular peers. Journal of Research on Adolescents 20, 942–958 (2010). [10] This work uses data from Add Health, a program project designed by J. Richard Udry, Peter S. Bearman, and Kathleen Mullan Harris, and funded by a grant P01- HD31921 from the National Institute of Child Health and Human Development, with cooperative funding from 17 other agencies. Special acknowledgment is due Ronald R. Rindfuss and Barbara Entwisle for assistance in the original design. Persons interested in obtaining data files from Add Health should contact Add Health, Carolina Population Center, 123 W. Franklin Street, Chapel Hill, NC 27516–2524 ([email protected]). [11] C. Anderson, S. Srivastava, J. S. Beer, S. E. Spataro, and J. A. Chatman, Knowing your place: Self-perceptions of status in face-to-face groups. Journal of Personality and Social Psychology 91, 1094–1110 (2006). [12] M. T. Hallinan and W. N. Kubitschek, The effect of indi- vidual and structural characteristics on intransitivity in social networks. Social Psychology Quarterly 51, 81–92 (1988). [13] J. S. Coleman, The Adolescent Society: The Social Life of the Teenager and its Impact on Education. Greenwood Press, Westport, Conn. (1961). [14] A. B. Sørensen and M. T. Hallinan, A stochastic model for change in group structure. Social Science Research 5, 43–61 (1976). [15] R. Stefani, Survey of the major world sports rating sys- tems. Journal of Applied Statistics 24, 635–646 (1997). [16] J. Park and M. E. J. Newman, A network-based rank- ing system for American college football. J. Stat. Mech. P10014 (2005). [17] C. Drews, The concept and definition of dominance in animal behaviour. Behaviour 125, 283–313 (1993). [18] H. De Vries, Finding a dominance order most consistent with a linear hierarchy: A new procedure and review. Animal Behaviour 55, 827–843 (1998).
1904.04690
1
1904
2019-03-25T16:57:27
Guidelines for Experimental Algorithmics in Network Analysis
[ "cs.SI" ]
The field of network science is a highly interdisciplinary area; for the empirical analysis of network data, it draws algorithmic methodologies from several research fields. Hence, research procedures and descriptions of the technical results often differ, sometimes widely. In this paper we focus on methodologies for the experimental part of algorithm engineering for network analysis -- an important ingredient for a research area with empirical focus. More precisely, we unify and adapt existing recommendations from different fields and propose universal guidelines -- including statistical analyses -- for the systematic evaluation of network analysis algorithms. This way, the behavior of newly proposed algorithms can be properly assessed and comparisons to existing solutions become meaningful. Moreover, as the main technical contribution, we provide SimexPal, a highly automated tool to perform and analyze experiments following our guidelines. To illustrate the merits of SimexPal and our guidelines, we apply them in a case study: we design, perform, visualize and evaluate experiments of a recent algorithm for approximating betweenness centrality, an important problem in network analysis. In summary, both our guidelines and SimexPal shall modernize and complement previous efforts in experimental algorithmics; they are not only useful for network analysis, but also in related contexts.
cs.SI
cs
Article Guidelines for Experimental Algorithmics in Network Analysis , Moritz von Looz1,‡, Henning Eugenio Angriman1,‡, Alexander van der Grinten1,‡ Meyerhenke1,‡,∗ , Martin Nöllenburg2,‡ , Maria Predari1,‡ and Charilaos Tzovas1,‡ 1 Department of Computer Science, Humboldt-Universität zu Berlin, Germany; {angrimae, avdgrinten, loozmori, meyerhenke, predarim, charilat}@hu-berlin.de Institute of Logic and Computation, Vienna University of Technology, Austria; [email protected] 2 * Correspondence: [email protected] ‡ These authors contributed equally to this work. Version April 10, 2019 submitted to Algorithms Abstract: The field of network science is a highly interdisciplinary area; for the empirical analysis of network data, it draws algorithmic methodologies from several research fields. Hence, research procedures and descriptions of the technical results often differ, sometimes widely. In this paper we focus on methodologies for the experimental part of algorithm engineering for network analysis -- an important ingredient for a research area with empirical focus. More precisely, we unify and adapt existing recommendations from different fields and propose universal guidelines -- including statistical analyses -- for the systematic evaluation of network analysis algorithms. This way, the behavior of newly proposed algorithms can be properly assessed and comparisons to existing solutions become meaningful. Moreover, as the main technical contribution, we provide SimexPal, a highly automated tool to perform and analyze experiments following our guidelines. To illustrate the merits of SimexPal and our guidelines, we apply them in a case study: we design, perform, visualize and evaluate experiments of a recent algorithm for approximating betweenness centrality, an important problem in network analysis. In summary, both our guidelines and SimexPal shall modernize and complement previous efforts in experimental algorithmics; they are not only useful for network analysis, but also in related contexts. Keywords: Experimental algorithmics, network analysis, applied graph algorithms, statistical analysis of algorithms 1. Introduction The traditional algorithm development process in theoretical computer science typically involves (i) algorithm design based on abstract and simplified models and (ii) analyzing the algorithm's behavior within these models using analytical techniques. This usually leads to asymptotic results, mostly regarding the worst-case performance of the algorithm. (While average-case [1] and smoothed analysis [2] exist and gained some popularity, worst-case bounds still make up the vast majority of running time results.) Such worst-case results are, however, not necessarily representative for algorithmic behavior in real-world situations, both for NP-complete problems [3,4] and poly-time ones [5,6]. In case of such a discrepancy, deciding upon the best-fitted algorithm solely based on worst-case bounds is ill-advised. Algorithm engineering has been established to overcome such pitfalls [7 -- 9]. In essence, algorithm engineering is a cyclic process that consists of five iterative phases: (i) modeling the problem (which Submitted to Algorithms, pages 1 -- 38 www.mdpi.com/journal/algorithms Version April 10, 2019 submitted to Algorithms 2 of 38 usually stems from real-world applications), (ii) designing an algorithm, (iii) analyzing it theoretically, (iv) implementing it, and (v) evaluating it via systematic experiments (also known as experimental algorithmics). Note that not all phases have to be reiterated necessarily in every cycle [10]. This cyclic approach aims at a symbiosis: the experimental results shall yield insights that lead to further theoretical improvements and vice versa. Ideally, algorithm engineering results in algorithms that are asymptotically optimal and have excellent behavior in practice at the same time. Numerous examples where surprisingly large improvements could be made through algorithm engineering exist, e. g., routing in road networks [11] and mathematical programming [12]. In this paper, we investigate and provide guidance on the experimental algorithmics part of algorithm engineering -- from a network analysis viewpoint. It seems instructive to view network analysis, a subfield of network science, from two perspectives: on the one hand, it is a collection of methods that study the structural and algorithmic aspects of networks (and how these aspects affect the underlying application). The research focus here is on efficient algorithmic methods. On the other hand, network analysis can be the process of interpreting network data using the above methods. We briefly touch upon the latter; yet, this paper's focus is on experimental evaluation methodology, in particular regarding the underlying (graph) algorithms developed as part of the network analysis toolbox.1 In this view, network analysis constitutes a subarea of empirical graph algorithmics and statistical analysis (with the curtailment that networks constitute a particular data type) [13]. This implies that, like general statistics, network science is not tied to any particular application area. Indeed, since networks are abstract models of various real-world phenomena, network science draws applications from very diverse scientific fields such as social science, physics, biology and computer science [14]. It is interdisciplinary and all fields at the interface have their own expertise and methodology. The description of algorithms and their theoretical and experimental analysis often differ, sometimes widely -- depending on the target community. We believe that uniform guidelines would help with respect to comparability and systematic presentation. That is why we consider our work (although it has limited algorithmic novelty) important for the field of network analysis (as well as network science and empirical algorithmics in general). After all, emerging scientific fields should develop their own best practices. To stay focused, we concentrate on providing guidelines for the experimental algorithmics part of the algorithm engineering cycle -- with emphasis on graph algorithms for network analysis. To this end, we combine existing recommendations from fields such as statistical analysis and data mining / machine learning and adjust them to fit the idiosyncrasies of networks. Furthermore, and as main technical contribution, we provide SimexPal, a highly automated tool to perform and analyze experiments following our guidelines. For illustration purposes, we use this tool in a case study -- the experimental evaluation of a recent algorithm for approximating betweenness centrality, a well-known network analysis task. The target audience we envision consists of network analysts who develop algorithms and evaluate them empirically. Experienced undergraduates and young PhD students will probably benefit most, but even experienced researchers in the community may benefit substantially from SimexPal. 1 We use the terms network and graph interchangeably. Version April 10, 2019 submitted to Algorithms 3 of 38 2. Common Pitfalls (and How to Avoid Them) 2.1. Common Pitfalls Let us first of all consider a few pitfalls to avoid.2 We leave problems in modeling the underlying real-world problem aside and focus on the evaluation of the algorithmic method for the problem at hand. Instead, we discuss a few examples from two main categories of pitfalls: (i) inadequate justification of claims on the paper's results and (ii) repeatability/replicability/reproducibility3 issues. Clearly, a paper's claims regarding the algorithm's empirical behavior need an adequate justification by the experimental results and/or their presentation. Issues in this regard may happen for a variety of reasons; not uncommon is a lack of instances in terms of their number, variety and/or size. An inadequate literature search may lead to not comparing against the current state of the art or if doing so, choosing unsuitable parameters. Also noteworthy is an inappropriate usage of statistics. For example, arithmetic averages over a large set of instances might be skewed towards the more difficult instances. Reporting only averages would not be sufficient then. Similarly, if the difference between two algorithms is small, it is hard to decide whether one of the algorithms truly performs better than the other one or if the perceived difference is only due to noise. Even if no outright mistakes are made, potential significance can be wasted: Coffin and Saltzmann [15] discuss papers whose claims could have been strengthened by an appropriate statistical analysis, even without gathering new experimental data. Reproducibility (the algorithm is implemented and evaluated independently by a different team) is a major cornerstone of science and should receive sufficient attention. Weaker notions include replicability (different team, same source code and experimental setup) and repeatability (same team, same source code and experimental setup). An important weakness of a paper would thus be if the description does not allow the (independent) reproduction of the results. First of all, this means that the proposed algorithm needs to be explained adequately. If the source code is not public, it is all the more important to explain all important implementation aspects -- the reader may judge whether this is the current community standard. Pseudocode allows to reason about correctness and asymptotic time and space complexity and is thus very important. But the empirical running time of a reimplementation may deviate from the expectation when the paper omitted crucial implementation details. Even the repetition of one's own results (which is mandated by major funding organizations for time spans such as 10 years) can become cumbersome if not considered from the beginning. To make this task easier, not only source code needs to documented properly, but also input and output data of experiments as well as the scripts containing the parameters. Probably every reader has heard about this one project where this documentation part has been neglected to some extent... 2.2. Outline of the Paper How do we avoid such pitfalls? We make this clear by means of a use case featuring betweenness approximation; it is detailed in Section 3. A good start when designing experiments is to formulate a hypothesis (or several ones) on the algorithm's behavior (see Section 4.1). This approach is not only part of the scientific method; it also helps in structuring the experimental design and evaluation, thereby decreasing the likelihood of some pitfalls. Section 4.2 deals with how to select and describe input instances 2 Such pitfalls are probably more often on a reviewer's desk than one might think. Note that we do not claim that we never stumbled into such pitfalls ourselves, nor that we always followed our guidelines in the past. 3 The terms will be explained below; for more detailed context please visit ACM's webpage on artifact review and badging: https://www.acm.org/publications/policies/artifact-review-badging. Version April 10, 2019 submitted to Algorithms 4 of 38 to support a certain generality of the algorithmic result. With a similar motivation, Section 4.3 provides guidance on how many instances should be selected. It also discusses how to deal with variance in case of non-determinism, e. g., by stating how often experiments should be repeated. If the algorithm contains a reasonable amount of tunable parameters, a division of the instances into a tuning set and an evaluation set may be advisable, which is discussed in Section 4.4. In order to compare against the best competitors, one must have defined which algorithms and/or software tools constitute the state of the art. Important aspects of this procedure are discussed in Section 4.5. One aspect can be the approximation quality: while an algorithm may have the better quality guarantee in theory, its empirical solution quality may be worse -- which justifies to consider not only the theoretical reference in experiments. The claim of superiority refers to certain measures -- typically related to resources such as running time or memory and/or related to solution quality. Several common measures of this kind and how to deal with them are explained in Section 4.6. Some of them are hardware-independent, many of them are not. A good experimental design can take you far -- but it is not sufficient if the experimental pipeline is not efficient or lacks clarity. In the first case, obtaining the results may be tedious and time-consuming. Or the experiments simply consume more computing resources than necessary and take too long to generate the results. In the second case, in turn, the way experimental data are generated or stored may not allow easy reproducibility. Guidelines on how to setup your experimental pipeline and how to avoid these pitfalls are thus presented in Section 5. The respective subsections deal with implementation issues (5.1), repeatability/replicability/reproducibility (5.2), job submission (5.3), output file structure for long-term storage (5.4), retrieval and aggregation of results (5.5). As mentioned, betweenness approximation and more precisely the KADABRA [16] algorithm will serve as our prime example. We have implemented this algorithm as part of the NetworKit toolbox [17]. As part of our experimental evaluation, a meaningful visualization (Section 6) of the results highlights many major outcomes to the human reader. Since visualization is typically not enough to show statistical significance in a rigorous manner, an appropriate statistical analysis (Section 7) is recommended. Both, visualization and statistical analysis, shall lead to a justified interpretation of the results. 3. Use Case Typically, algorithmic network analysis papers (i) contribute a new (graph) algorithm for an already known problem that improves on the state of the art in some respect or (ii) they define a new algorithmic problem and present a method for its solution. To consider a concrete example contribution, we turn towards betweenness centrality, a widely used and very popular measure for ranking nodes (or edges) in terms of their structural position in the graph [18]. 3.1. Betweenness Approximation as Concrete Example Betweenness centrality [19] measures the participation of nodes in shortest paths. More precisely, let G = (V , E) be a graph; the (normalized) betweenness centrality of a node v ∈ V is defined as X b(v) := 1 n(n − 1) s,t∈V ,s6=v6=t σst(v) σst , (1) where σst is the number of shortest paths from s to t, and σst(v) is the number of shortest paths from s to t that cross v (as intermediate node). Computing the exact betweenness scores for all nodes of an unweighted graph can be done in O(nm) time with Brandes's algorithm [20], where n is the number of nodes and m the number of edges in G. Since this complexity is usually too high for graphs with millions Version April 10, 2019 submitted to Algorithms 5 of 38 ex(v) ← 0 if f (ex(v)/τ, δL(v), ω, τ ) <  and g(ex(v)/τ, δU (v), ω, τ ) <  then Algorithm 1 KADABRA algorithm (absolute error variant) 1: procedure KADABRA(G = (V , E), , δ) ω ← non-adaptive number of iterations 2: compute δL, δU from δ 3: τ ← 0 4: for all v ∈ V do 5: 6: end for 7: while τ < ω do 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: end procedure s, t ← samplePair(G) π ← sampleShortestPath(G, s, t) for all v ∈ π do end for τ ← τ + 1 ex(v) ←ex(v) + 1 end if for i ∈ {1, . . . , c} do end for end while return ex/τ break . Requires upper bound of the diameter. . Number of sampled paths. . Occurrences of v in sampled paths. . Approximation is already good enough. . Draw c samples per round. . Uniformly at random. . Uniformly at random. . Betweenness centrality is estimated as: eb =ex/τ. of nodes and edges, several approximation algorithms have been devised [16,21 -- 24]. These algorithms trade solution quality for speed and can be much faster. For illustration purposes, we put ourselves now in the shoes of the authors of the most recent of the cited algorithms, which is called KADABRA [16]: we describe (some of) the necessary steps in the process of writing an algorithm engineering paper on KADABRA4 -- with a focus on the design and evaluation of the experiments. 3.2. Overview of the KADABRA Algorithm The KADABRA algorithm approximates the betweenness centrality of (un)directed graphs within a given absolute error of at most  with probability (1 − δ) [16]. The main rationale of the algorithm is to iteratively select two nodes s, t uniformly at random and then sample a shortest path π from s to t (again uniformly at random). This leads to a sequence of randomly selected shortest paths π1, π2, . . . , πτ. The betweenness centrality of each node v ∈ V is then estimated as: eb(v) = where exi is 1 iff v occurs in πi and 0 otherwise. 1 τ τX i=1 exi(v), Compared to earlier approximation algorithms that employ similar sampling techniques (e. g., [23]), the novelty of KADABRA relies on the clever stopping condition, used to determine the number of rounds τ. (2) 4 We select KADABRA not because the authors of the original paper did a bad job in their presentation -- au contraire. Our main reasons are (i) the high likelihood that the betweenness problem is already known to the reader due to its popularity in the field and (ii) the fact that approximation algorithms display important aspects of experimental algorithmics quite clearly. Version April 10, 2019 submitted to Algorithms 6 of 38 Pr(cid:16) b(v) ≤eb(v) − f and Pr(cid:16) Clearly, there is a number ω, depending on the input size but not the graph itself, such that if τ ≥ ω, the algorithm achieves the desired solution quality with probability (1− δ).5 KADABRA, however, avoids to run a fixed number of ω rounds by using adaptive sampling. At each round of the algorithm, it is guaranteed that (cid:17) ≤ δL(v) where f = f (eb(v), δL(v), ω, τ ) and g = g(eb(v), δU (v), ω, τ ) are (rather lengthy) expressions depending on eb(v), per-vertex probabilities δL(v) and δU (v), the current number of rounds τ and the static round count ω. δL(v) and δU (v) are chosen such thatP b(v) ≥eb(v) + g 2. Once f, g <  during some round, the algorithm terminates.6 Algorithm 1 displays the corresponding pseudocode with some expository comments. Besides adaptive sampling, KADABRA relies on a balanced bidirectional BFS to sample shortest paths. For details we refer the interested reader to the original paper. v∈V δL(v) + δU (v) ≤ δ (cid:17) ≤ δU (v), (3) 4. Guidelines for the Experimental Design Now, we want to set up experiments that give decisive and convincing empirical evidence whether KADABRA is better than the state of the art. This section discusses the most common individual steps of this process. 4.1. Determining Your Hypotheses Experiments are mainly used for two reasons; as an exploratory tool to reveal unknown properties and/or as a means to answer specific questions regarding the proposed algorithm. The latter suggests the development of certain hypotheses on the behavior of our algorithm that can be confirmed or contradicted by experiments. In the following, we group common hypotheses of algorithm engineering papers in network analysis into two categories: 1. Hypotheses on how our algorithm performs compared to the state of the art in one of the following metrics: running time, solution quality or (less often) memory usage. Ideally, an algorithm is deemed successful when it outperforms existing algorithms in terms of all three metrics. However, in practice, we are content with algorithms that exhibit a good tradeoff between two metrics, often running time performance and solution quality. As an example, in real-time applications, we may be willing to sacrifice the solution quality (until a certain threshold), in order to meet running time bounds crucial for the application. 2. Hypotheses on how the input instances or a problem-/algorithm-specific parameter affects our algorithm in terms of the aforementioned metrics. For example, a new algorithm might only outperform the existing algorithms on a certain type of graphs or an approximation algorithm might only be fast(er) if the desired approximation quality is within a certain range. If a hypothesis involves such restrictions, it should still be general enough for the algorithmic result to be relevant -- overtuning of algorithms to uninteresting classes of inputs should be avoided. Other aspects of investigation may be decoupled from the state of the art to some extent and explore the connection between instance and algorithm properties: for instance, a hypothesis on how the empirical approximation error behaves over a range of input sizes. than that. 5 For example, if ω is chosen so that almost all vertex pairs are sampled. In reality, ω can be chosen to be much smaller 6 Note also that for each round, the algorithm draws a number of samples and performs occurrence updates without checking the stopping condition. This number is determined by parameter c. In the original implementation of KADABRA (but not reported in the paper), c is fixed to 10 (without further explanation). Version April 10, 2019 submitted to Algorithms 7 of 38 KADABRA Example In the context of our betweenness approximation study, we formulate three basic hypotheses: 1. KADABRA has a better running time and scalability (with respect to the graph size) than other algorithms, specifically the main competitor RK [23]. 2. There is a significant difference between the solution quality of KADABRA and that of RK. (In Section 4.6, we explain how to evaluate the solution quality for approximation algorithms in more detail.) 3. The diameter of input graphs has an effect on the running time of KADABRA: The KADABRA algorithm computes the betweenness values faster for graphs with low diameter than for graphs with large diameter. The first two hypotheses belong to the first category, since we compare our implementation of the KADABRA algorithm to a number of related algorithms. The other hypothesis belongs to the second category and is related to the performance of the KADABRA algorithm itself. Namely, we test how a data-specific parameter may influence the running time in practice. To evaluate these hypotheses experimentally, we need to select instances with both low and high diameter values, of course. 4.2. Gathering Instances Selecting appropriate data sets for an experimental evaluation is a crucial design step. For sake of comparability, a general rule is to gather data sets from public sources; for network analysis purposes, well-known repositories are KONECT [25], SNAP [26], DIMACS10 [27], SuiteSparse [28], LWA [29] and Network Repository [30]. An appropriate data collection contains the type(s) of networks which the algorithm is designed for, and, for every type, a large enough number of instances to support our conclusions [7]. For instance, the data collection of an influence maximization algorithm should include social networks rather than street networks; a data collection to evaluate distributed algorithms should include instances that exceed the memory of a typical shared-memory machine. The selection of an appropriate subset of instances for our experimental analysis is simpler if we first categorize the available networks in different classes. There exist several ways to do this: first, we can simply distinguish real-world and synthetic (= (randomly) generated) networks. Even though network analysis algorithms generally target real-world networks, one should also use synthetic networks, e. g., to study the asymptotic scalability of an algorithm, since we can easily generate similar synthetic networks of different scales. Classification of real-world networks generally follows the phenomena they are modeling. Common examples are social networks, hyperlink networks or citation networks, which also fall under the umbrella of complex networks.7 Examples of real-world non-complex networks are certain infrastructure networks such as road networks. If our algorithm targets real-world data, we want to carefully build a diverse collection of instances that is representative of the graph classes we are targeting. Another interesting classification is one based on specific topological features of the input data such as the diameter, the clustering coefficient, the triangle count, etc. Classifying based on a certain property and reporting it should definitely be done when the property in question is relevant to the algorithm and 7 As the name suggests, complex networks have highly non-trivial (complex) topological features. Most notably, such features include a small diameter (small-world effect) and a skewed degree distribution (many vertices with low degree and a few vertices with high degree). Version April 10, 2019 submitted to Algorithms 8 of 38 Table 1. Graphs (taken from KONECT) for our evaluation of the betweenness approximation algorithms. Network name moreno_blogs petster-hamster ego-facebook openflights opsahl-powergrid p2p-Gnutella08 advogato wiki-Vote p2p-Gnutella05 p2p-Gnutella04 foldoc twin cfinder-google ca-AstroPh ca-cit-HepTh subelj_cora ego-twitter ego-gplus p2p-Gnutella24 ca-cit-HepPh cit-HepPh facebook-wosn-wall edit-frwikibooks dblp-cite loc-brightkite_edges edit-frwikinews dimacs9-BAY dimacs9-COL roadNet-PA roadNet-TX # of nodes # of edges Diameter 8 10 9 13 46 9 9 7 9 10 8 25 7 14 9 20 15 8 11 9 14 18 8 2 18 7 837 1 255 794 1 064 16 715 16 631 2 981 19 256 6 594 20 777 39 285 100 762 31 839 39 994 91 471 20 573 148 585 198 050 2 444 798 89 157 32 831 39 194 65 369 3 148 447 420 877 183 412 139 141 49 759 214 078 157 970 397 415 521 200 1 541 898 1 921 660 1 224 2 426 2 888 3 425 4 941 6 301 6 539 7 115 8 846 10 876 13 356 14 274 15 763 18 771 22 908 23 166 23 370 23 628 26 518 28 093 34 546 46 952 47 905 49 789 58 228 59 546 321 270 435 666 1 088 092 1 379 917 Class Hyperlink Social Social Infrastructure Infrastructure Peer-to-peer Social Social Peer-to-peer Peer-to-peer Hyperlink Intl. Relations Hyperlink Coauthorship Coauthorship Citation Social Social Peer-to-peer Citation Citation Social Authorship Citation Social Authorship Road Road Road Road may have an impact on its behavior. For instance, reporting the clustering coefficient could help with the interpretation of results concerning algorithms that perform triangle counting. A source of instances especially suited for scalability experiments are synthetic graphs generated with graph generators [31]. An advantage is easier handling especially for large graphs, since no large files need to be transferred and stored. Also, desired properties can often be specified in advance and in some models, a ground truth beneficial to test analysis algorithms is available. Important drawbacks include a lack of realism, especially when choosing an unsuitable generative model. KADABRA Example In a real-world scenario, we want to show the improvement of the KADABRA algorithm with respect to the competition. Clearly, the graph class of highest relevance should be most prominent in our data collection. With this objective in mind, we show a collection for the KADABRA experiments in Table 1. Note that in Table 1 we report the diameter of each graph, along with its size and application class. We include the diameter because it is part of our hypotheses, i. e., the performance of KADABRA depends on the diameter of the input graph (see Section 4.1). In a different scenario, such as triangle counting or community detection, a more pertinent choice would be the average local clustering coefficient. Finally, we Version April 10, 2019 submitted to Algorithms 9 of 38 focus on complex networks, but include a minority of non-complex infrastructure networks. All of these instances were gathered from one of the aforementioned public repositories. 4.3. Scale of Experiments Clearly, we cannot test all possible instances, even if they are small [32]. On the other hand, we want to draw significant conclusions about our new algorithm (and here not about a particular data set). This means that our experimental results should justify the later conclusions and allow to clearly distinguish between hypotheses. While Section 4.2 discusses which instances to select, we proceed with the question "how many?". Also, if the results are affected by randomness, how many repeated runs should we make for each? Too few instances may be insufficient to support a conclusion. Plots then look sparse, hypothesis tests (Section 7.3.1) are inconclusive and inferred parameters are highly uncertain, which is reflected in unusably wide confidence and credible intervals (Sections 7.3.2 and 7.4). Choosing too many instances, though, costs unnecessary time and expense. As a very rough rule of thumb reflecting community custom, we recommend at least 10-15 instances for an experimental paper. If you want to support specific conclusions about algorithmic behavior within a subclass of instances, you should have that many instances in that subclass. Yet, the noisier the measurements and the stronger the differences of output between instances, the more experiments are needed for a meaningful (statistical) analysis. More formally, the uncertainty of s2 n , where s2 is the sample variance. Generally many test statistics and inferred parameters8 scales with speaking, if we want a result that is twice as precise, we need to quadruple the number of measurements. The same applies for the number of repetitions for each instance. When plotting results affected by randomness, it is often recommended to average over the results of multiple runs. The expected deviation of such an average from the true mean9 is called the standard error and also scales with s2√ [34]. For plotting purposes, we suggest that this standard error for the value of one plotted point (i. e., the size of the error bars) should be one order of magnitude smaller than the variance between plotted points. In the companion notebook, we give an example of code which calculates the number of repetitions required for a desired smoothness. Frameworks exist that automate the repeated measurements, for example Google Benchmark.10 q n In the context of binary hypothesis tests, the statistical power of a test is the probability that it correctly distinguishes between hypotheses, i. e., rejects a false null hypothesis in the classical approach. A larger sample size, a stronger effect or less variance in measurements all lead to a more powerful test. For further reading, see the extensive literature about statistical power [35,36]. All these calculations for the number of necessary experiments require an estimate of the variance of results -- which might be unavailable before conducting the experiments. It might thus be necessary to start with a small initial set of instances to plan and prepare for the main experiments.11 4.4. Parameter Tuning Experiments are not only a necessary ingredient to validate our hypothesis, but also a helpful discovery tool in a previous stage [9]. Some algorithm's behavior depends on tunable parameters. For example, the 8 Most importantly the t-statistic used in confidence intervals and t-tests. In Bayesian statistics, the marginal posterior distribution of a parameter with a Gaussian likelihood also follows a t-distribution, at least when using a conjugate prior [33]. 9 The mean that would result given infinite samples. 10 https://github.com/google/benchmark. 11 Also called pilot study, as opposed to the main experiments called workhorse study, see [37] and [38]. Version April 10, 2019 submitted to Algorithms 10 of 38 well-known hybrid implementation of Quicksort switches between Insertionsort and Quicksort depending on whether the current array size is above or below a tunable threshold M [39]. An example from network analysis includes a plethora of approximation methods that calculate some centrality measure using sampling [22,23,40]. In such cases the number of selected samples may highly impact the performance of the algorithm. Experiments are thus used to determine the adequate number of samples that achieves a good approximation. The KADABRA algorithm consists of two phases, in which bounds for a sampling process are first computed (Line 3 in Algorithm 1 of Section 3.2) and then used (when checking the stopping condition in line 9). Tighter bounds are more expensive to compute but save time in the later phase; their quality is thus an important tradeoff. When evaluating a newly developed algorithm, there is the risk (or even temptation) to tune its parameters for optimal performance in the experiments while using general default parameters for all competitors. This may often happen with no ill intent -- researchers usually know their own algorithm best. To ensure generalizability of results, we recommend to split the set of instances into a tuning set and an evaluation set. The tuning set is used to find good tuning parameters for all algorithms, while the main experiments are performed on the evaluation set. Only results from the evaluation set should be used to draw and support conclusions. Note that the tuning set can also be used to derive an initial variance estimate, as discussed in Section 4.3. How to Create the Tuning Set and the Evaluation Set The tuning set should be structurally similar to the whole data set, so that parameter tuning yields good general performance and is representative for the evaluation set.12 Tuning and evaluation sets should be disjoint. For large data sets, simple random sampling (i. e., simply picking instances from the data set uniformly at random and without replacement) yields such a representative split in expectation. Stratified sampling (i. e., partitioning the data set, applying simple random sampling to each partition and merging the result) [41] guarantees it. In our example, note that our data set is already partitioned into different classes of networks (hyperlink, social, infrastructure, etc.), and that those classes are fairly balanced (see Table 2). We can thus select a certain fraction of instances in each network class as tuning set. In case of computationally expensive tuning, it is advantageous to keep the tuning set small, for large data sets it can be much smaller than the evaluation set. In our example, we select a single instance per network class, as seen in Table 3. Note that these considerations are similar to the creation of training, test and validation sets in machine learning. While some other sampling methods are equally applicable, more sophisticated methods like statistical learning theory optimize for different objectives and are thus not considered here [42 -- 44]. 4.5. Determining Your Competition Competitor algorithms solve the same or a similar problem and are not dominated in the relevant metrics by other approaches in the literature. Since we focus on the design of the experimental pipeline, we consider only competitors that are deemed implementable. The best ones among them are considered the state of the art (SotA), here with respect to the criteria most relevant for our claims about KADABRA. Other considerations are discussed next. 12 Due to symmetry, this also requires that the tuning set is structurally similar to the evaluation set. Version April 10, 2019 submitted to Algorithms 11 of 38 Table 2. Network class frequency of the data set in Table 1 Class Social Citation Peer-to-peer Road Hyperlink Infrastructure Coauthorship Authorship Intl. Relationship Frequency 26.67 % 13.33 % 13.33 % 13.33 % 10.00 % 6.67 % 6.67 % 6.67 % 3.33 % Table 3. Split of instances into tuning and evaluation set. Tuning set Evaluation set Network name opsahl-powergrid advogato foldoc p2p-Gnutella24 dblp-cite edit-frwikinews dimacs9-BAY V 4 941 6 539 13 356 26 518 12 591 25 042 321 270 E 6 594 43 277 91 471 65 369 49 635 68 679 397 415 Network name moreno_blogs petster-hamster ego-facebook openflights p2p-Gnutella08 wiki-Vote p2p-Gnutella05 p2p-Gnutella04 twin cfinder-google ca-AstroPh ca-cit-HepTh subelj_cora ego-twitter ego-gplus edit-frwikibooks ca-cit-HepPh cit-HepPh loc-brightkite_edges dimacs9-COL roadNet-PA roadNet-TX V 1 224 2 426 2 888 3 425 6 301 7 115 8 846 10 876 14 274 15 763 18 771 22 908 23 166 23 370 23 628 27 754 28 093 34 546 58 228 435 666 1 088 092 1 379 917 E 16 718 16 631 19 257 2 981 20 777 100 762 31 839 39 994 20 573 149 456 198 050 2 444 798 89 157 32 831 39 194 67 584 3 148 447 420 921 214 078 521 200 1 541 898 1 921 660 Version April 10, 2019 submitted to Algorithms 12 of 38 Unavailable Source Code The source code of a competing algorithm may be unavailable and sometimes even the executable is not shared by its authors. If one can implement the competing algorithm with reasonable effort (to be weighted against the importance of the competitor), you should do so. If this is not possible, a viable option is to compare experimental results with published data. For a fair comparison, the experimental settings should then be replicated as closely as possible. In order to avoid this scenario, we recommend open-source code; it offers better transparency and replicability (also see 5.2). Solving a Different Problem In some cases, the problem our algorithm solves is different from established problems and there is no previous algorithm solving it. Here, it is often still meaningful to compare against the SotA for the established problem. For example, if we consider the dynamic case of a static problem for the first time [45 -- 47] or an approximation version for an exact problem [21,22,48] or provide the first parallel version of an algorithm [49]. Another example can be an optimization problem with a completely new constraint. While this may change optimal solutions dramatically compared to a previous formulation, a comparison to the SotA for the previous formulation may still be the best assessment. If the problem is so novel that no comparison is meaningful, however, there is no reason for an experimental comparison.13 Comparisons on Different Systems Competitors may be designed to run on different systems. Recently, many algorithms take advantage of accelerators, mainly GPUs, and this trend has also affected the algorithmic network analysis community [50 -- 52]. A direct comparison between CPU and GPU implementations is not necessarily meaningful due to different architectural characteristics and memory sizes. Yet, such a comparison may be the only choice if no other GPU implementation exists. In this case, one should compare against a multithreaded CPU implementation that should be tuned for high performance as well. Indirect comparisons can, and should, be done using system independent measures (4.6). KADABRA Example The most relevant candidates to compare against KADABRA are the SotA algorithms RK [23] and ABRA [24]. The same algorithms are chosen as competitors in the original KADABRA paper. However, in our paper we focus only on a single comparison, the one between KADABRA and RK. This is intended in order to highlight the main purpose of our work -- to demonstrate the benefits of a thoughtful experimental design for meaningful comparisons of network-related algorithms. Reporting the actual results of such a comparison is of secondary importance. Furthermore, RK and ABRA exhibit similar behavior in the original KADABRA paper, with RK being overall slightly faster. Again, for the purpose of our paper, this is an adequate reason to choose RK over ABRA.14 4.6. Metrics The most common metric for an algorithm's performance is its wall-clock running time. For solution quality, the metrics are usually problem-specific; often, the gap between an algorithm's solution and the 13 Nonetheless, experiments can still reveal empirical insights into the behavior of the new algorithm. 14 Of course, if we were to perform experiments for a new betweenness approximation algorithm, we would include all relevant solutions in the experiments. Version April 10, 2019 submitted to Algorithms 13 of 38 optimum is reported as a percentage (if known). In the following, we highlight situations that require more specific metrics. First, we discuss metrics for evaluating an algorithm's running time. 4.6.1. Running Time CPU Time vs. Wall-clock Time For sequential algorithms, evaluations should prefer CPU time over wall-clock time. Indeed, this is the running time metric that we use in our KADABRA experiments. Compared to wall-clock time, CPU time is less influenced by external factors such as OS scheduling or other processes running on the same machine. The exception to this rule are algorithms that depend on those external factors such as external memory algorithms (where disregarding the time spent in system-level I/O routines would be unfair). In the same line of reasoning, evaluations of parallel algorithms would be based on wall-clock time as they depend on specifics of the OS scheduler. Architecture-specific Metrics CPU and wall-clock times heavily depend on the microarchitecture of the CPU the algorithm is executed on. If comparability with data generated on similar CPUs from other vendors or microarchitectures is desired, other metrics should be taken into account. Such metrics can be accessed by utilizing the performance monitoring features of modern CPUs: these allow determining the number of executed instructions, the number of memory accesses (both are mostly independent of the CPU microarchitecture) or the number of cache misses (which depends on the cache size and cache strategy, but not necessarily the CPU model). If one is interested in how efficient algorithms are in exploiting the CPU architecture, the utilization of CPU components can be measured (example: the time spent on executing ALU instructions compared to the time that the ALU is stalled while waiting for results of previous instructions or memory fetches). Among some common open-source tools to access CPU performance counters are the perf profiler, Oprofile (on linux only) and CodeXL. System-independent Metrics It is desirable to compare different algorithms on the same system. However, in reality, this is not always possible, e. g., because systems required to run competitors are unavailable. For such cases, even if we do not run into such issues ourselves, we should also consider system-independent metrics. For example, this can be the speedup of a newly proposed algorithm against some base algorithm that can be tested on all systems. As an example, for betweenness centrality, some papers re-implement the Brandes [20] algorithm and compare their performance against it [24,45,53]. As this metric is independent of the hardware, it can even be used to compare implementations on different systems, e. g., CPU versus GPU implementations. System-independent metrics also include algorithm-specific metrics, like the number of iterations of an algorithm or the number of edges visited. Those are particularly useful when similar algorithms are compared, e. g., if the algorithms are iterative and only differ in their choice of the stopping condition. Aggregation and Algorithmic Speedup Running time measurements are generally affected by fluctuations, so that the same experiment is repeated multiple times. To arrive at one value per instance, one usually computes the arithmetic mean over the experiments (unless the data are highly skewed). A comparison between the running times (or other metrics) of two algorithms A and B on different data sets may result in drastically different values, e. g., because the instances differ in size or complexity. For a concise evaluation, one is here also interested in aggregate values. In such a case it is recommended to aggregate over ratios of these metrics; Version April 10, 2019 submitted to Algorithms 14 of 38 regarding running time, this would mean to compute the algorithmic speedup15 of A with respect to B.16 To summarize multiple ratios, one can use the geometric mean [55]: # of valuesY i=1 GM(speedup) = speedup on instance i  1 # of values as it has the fundamental property that GM(speedup) = appropriate for which aggregation is a matter of some discussion [56 -- 58]. GM(running times of A) GM(running times of B). Which mean is most 4.6.2. Solution Quality Next, we discuss metrics for solution quality. Here, the correct measurements are naturally problem-specific; often, there is no single quality indicator but multiple orthogonal indicators are used. Empirical vs. Worst-case Solution Quality As mentioned in the introduction, worst-case guarantees proven in theoretical models are rarely approached in real-world settings. For example, the accuracy of the ABRA algorithm for betweenness approximation has been observed to be always below the fixed absolute error, even in experiments where this was only guaranteed for 90% of all instances [24]. Thus, experimental comparisons should include also metrics for which theoretical guarantees are known. Comparing Against (Unknown) Ground Truth For many problems and instances beyond a certain size, ground truth (in the sense of the exact value of a centrality score or the true community structure of a network) is neither known nor feasible to compute. For betweenness centrality, however, AlGhamdi et al. [59] have computed exact scores for large graphs by investing into considerable supercomputing time. The absence of ground truth or exact values, in turn, clearly requires the comparison to other algorithms in order to evaluate an algorithm's solution quality. 5. Guidelines for the Experimental Pipeline Organizing and running all the required experiments can be a time-consuming activity, especially if not planned and carried out carefully. That is why we propose techniques and ideas to orchestrate this procedure efficiently. The experimental pipeline can be divided into four phases. In the first one, we finalize the algorithm's implementation as well as the scripts/code for the experiments themselves.17 Next, we submit the experiments for execution (even if the experiments are to be executed locally, we advise to use some scheduling/batch system). In the third phase, the experiments run and create the output files. Finally, we parse the output files to gather the information about the relevant metrics. 15 The parallel speedup of an algorithm A is instead the speedup of the parallel execution of A against its sequential execution, more precisely the ratio of the running time of the fastest sequential algorithm and the running time of the parallel algorithm. It can be used to analyze how efficiently an algorithm has been parallelized. 16 To achieve a fair comparison of the algorithmic aspects of A and B, the algorithmic speedup is often computed over their sequential executions [54]. In view of today's ubiquitous parallelism, this perspective may need to be reconsidered, though. 17 It is important to use scripts or some external tool in order to automate the experimental pipeline. This also helps to reduce human errors and simplifies repeatability and replicability. Version April 10, 2019 submitted to Algorithms 15 of 38 5.1. Implementation Aspects Techniques for implementing algorithms are beyond the scope for this paper; however, we give an overview of tooling that should be used for developing algorithmic code. Source code should always be stored in version control systems (VCS); nowadays, the most commonly used VCS is Git [60]. For scientific experiments, a VCS should also be used to version scripts that drive experiments, valuable raw experimental data and evaluation scripts. Storing instance names and algorithm parameters of experiments in VCS is beneficial, e. g., when multiple iterations of experiments are done due to the AE cycle. The usual principles for software testing (e. g., unit tests and assertions) should be applied to ensure that code behaves as expected. This is particularly important in growing projects where seemingly local changes can affect other project parts with which the developer is not very familiar. It is often advantageous to open-source code.18 The Open Source Initiative keeps a list19 of approved open source licenses. An important difference is whether they require users to publish derived products under the same license. If code is open-sourced, we suggest well-known platforms like Github [61], Gitlab [62], or Bitbucket [63] to host it. An alternative is to use a VCS server within one's own organization, which reduces the dependence on commercial interests. In an academic context, a better accessibility can have the benefit of a higher scientific impact of the algorithms. For long-term archival storage, in turn, institutional repositories may be necessary. Naturally, code should be well-structured and documented to encourage further scientific participation. Code documentation highly benefits from documentation generator tools such as Doxygen.20 Profiling is usually used to find bottlenecks and optimize implementations, e. g., using tools such as the perf profiler on Linux, Valgrind [64] or a commercial profiler such as VTune [65]. 5.2. Repeatability, Replicability and Reproducibility Terminology differs between venues; the Association of Computing Machinery defines repeatability as obtaining the same results when the same team repeats the experiments, replicability for a different team but the same programs and reproducibility for the case of a reimplementation by a different team. Our recommendations are mostly concerned with replicability. In a perfect world scenario, the behavior of experiments is completely determined by their code version, command line arguments and configuration files. From that point of view, the ideal case for replicability, which is increasingly demanded by conferences and journals21 in experimental algorithms, looks like this: A single executable program automatically downloads or generates the input files, compiles the programs, runs the experiments and recreates the plots and figures shown in the paper from the results. Unfortunately, in reality some programs are non-deterministic and give different outputs for the same settings. If randomization is used, this problem is usually avoided by fixing an initial seed of a pseudo-random number generator. This seed is just another argument to the program and can be handled like all others. However, parallel programs might still cause genuine non-determinism in the output, e. g., if the computation depends on the order in which a large search space is explored [66,67] or on the order 18 We acknowledge that open-sourcing code is not always possible, e. g., due to intellectual property or political reasons. 19 https://opensource.org/licenses/alphabetical. 20 http://www.doxygen.nl. 21 For example, see the Replicated Computational Results Initiative of the Journal on Experimental Algorithms, http: //jea.acm.org. Version April 10, 2019 submitted to Algorithms 16 of 38 instances: konect: - 'advogato' - 'ego-twitter' - 'ego-facebook' - 'ego-gplus' # ... (more instances follow) configurations: - name: kadabra-1t args: ['./run', '--threads=1', 'kadabra', '@INSTANCE@'] output: stdout - name: kadabra-2t args: ['./run', '--threads=2', 'kadabra', '@INSTANCE@'] output: stdout # ... (more configurations follow) - name: rk args: ['./run', 'rk', '@INSTANCE@'] output: stdout Figure 1. SimexPal configuration (experiments.yml) for KADABRA in which messages from other processors arrive.22 If these effects are of a magnitude that they affect the final result, these experiments need to be repeated sufficiently often to cover the distribution of outputs. A replication would then aim at showing that its achieved results are, while not identical, equivalent in practice. For a formal way to show such practical equivalence, see Section 7.4.1. Implementations often depend on libraries or certain compiler versions. This might lead to complications in later replications when dependencies are no longer available or incompatible with modern systems. Providing a virtual machine image or container addresses this problem. 5.3. Running Experiments Running experiments means to take care of many details: Instances need to be generated or downloaded, jobs need to be submitted to batch systems23 or executed locally, running jobs need to be monitored, crashes need to be detected, crashing jobs need to be restarted without restarting all experiments, etc. To avoid human errors, improve reproducibilty and accelerate those tasks, scripts and tooling should be employed. To help with these recurring tasks, we provide as a supplement to this paper SimexPal, a command-line tool to automate the aforementioned tasks (among others).24 This tool allows the user to manage instances and experiments, launch jobs and monitor the status of those jobs. While our tool is not the only possible way to automate these tasks, we do hope that it improves over the state of writing custom scripts for each individual experiment. SimexPal is configured using a simple YAML [69] file and only requires a minimal amount of user-supplied code. To illustrate this concept, we give an example configuration in Figure 1. Here, run is the only piece of user-supplied code that needs to be written. run executes the algorithm and prints the output (e.g. running times) to stdout. Given such a configuration file, the graph instances can be downloaded using simex instances download. After that is done, jobs can be started using the command simex experiments launch. SimexPal takes care of not launching experiments twice and never overwrites existing output files. simex experiments list monitors the progress of all jobs. If 22 As an example, some associative calculations are not associative when implemented with floating point numbers [68]. In such a case, the order of several, say, additions, matters. 23 Note that the exact submission mechanism is beyond the scope of this paper, as it heavily depends on the batch system in question. Nevertheless, our guidelines and tooling suggestions can easily be adapted to all common batch system, such as Slurm (https://slurm.schedmd.com/) or PBS (https://www.pbspro.org/). 24 SimexPal can be found at https://github.com/hu-macsy/simexpal. Version April 10, 2019 submitted to Algorithms 17 of 38 a job crashes, simex experiments purge can be used to remove the corresponding output files. The next launch command will rerun that particular job. 5.4. Structuring Output Files Output files typically store three kinds of data: (i) experimental results, e. g., running times and measures of solution quality, (ii) metadata that completely specify the parameters and the environment of the run, so that the run can be replicated (see Section 5.2), and (iii) supplementary data, e. g., the solution to the input problem that can be used to understand the algorithm's behavior and to verify its correctness. Care must be taken to ensure that output files are suitable for long-term archival storage (which is mandated by good scientific practices [70]). Furthermore, carefully designing output files helps to accelerate experiments by avoiding unnecessary runs that did not produce all relevant information (e. g., if the focus of experiments changes after exploration). Choosing which experimental results to output is problem-specific but usually straightforward. For metadata, we recommend to include enough information to completely specify the executed algorithm version, its parameters and input instance, as well as the computing environment. This usually involves the following data: The VCS commit hash of the implementation and compiler(s) as well as all libraries the implementation depends on25 name (or path) of the input instance, values of parameters of the algorithm (including random seeds26), host name of the machine and current date and time.27 Implementations that depend on hardware details (e. g., parallel algorithms or external-memory algorithms) want to log CPU, GPU and/or memory configurations, as well as versions of relevant libraries and drivers. The relevance of different kinds of supplementary data is highly problem-dependent. Examples include (partial) solutions to the input problem, numbers of iterations that an algorithm performs, snapshots of the algorithm's state at key points during the execution or measurements of the time spent in different parts of the algorithm. Such supplementary data is useful to better understand an algorithm's behavior, to verify the correctness of the implementation or to increase confidence in the experimental results (i. e., that the running times or solution qualities reported in a paper are actually correct). If solutions are stored, automated correctness checks can be used to find and debug problems or to demonstrate that no such problems exist. The output format itself should be chosen to be both human readable and machine parsable. Human readability is particularly important for long-term archival storage, as parsers for proprietary binary formats (and the knowledge of how to use them) can be lost over time. Machine parsability enables automated extraction of experimental results; this is preferable over manual extraction, which is inefficient and error-prone. Thus, we recommend structured data formats like YAML (or JSON [71]). Those formats can be easily understood by humans; furthermore, there is a large variety of libraries to process them in any commonly used programming language. If plain text files are used, we suggest to ensure that experimental results can be extracted by simple regular expressions or similar tools. KADABRA Example Let us apply these guidelines to our example of the KADABRA algorithm using SimexPal with the YAML file format. For each instance, we report KADABRA's running time, the values of the parameters  25 Experiments should never run uncommitted code. If there are any uncommitted changes, we suggest to print a comment to the output file to ensure that the experimental data in question does enter a paper. 26 If the implementation's behavior can be controlled by a large number of parameters, it makes sense to print command line arguments as well as relevant environment variables and (excerpts from) configuration files to the output file. 27 Date and time help to identify the context of the experiments based on archived output data. Version April 10, 2019 submitted to Algorithms 18 of 38 info: commit: fef6c5ca date: '2018-09-14T12:21:55.497368' host: erle iterations: 12598 parameters: delta: 0.1 epsilon: 0.015 seed: 0 run_time: 1.6034371852874756 topk_nodes: - 156 - 45 - 596 # ... (more nodes follow) topk_scores: - 0.0651690744562629 - 0.04643594221304969 - 0.0349261787585331 # ... (more scores follow) Figure 2. Output of KADABRA example in YAML format import simex import yaml cfg = simex.config_for_dir('.') res = cfg.collect_successful_results(yaml.load) for algo in 'kadabra', 'rk': rts = [r['run_time'] for r in res if r['algo'] == algo and r['threads'] == 1] print(algo, sum(rts)/len(rts)) Figure 3. Script to collect KADABRA output and δ, the random seed that was used for the run, the number τ of samples that the run required and the top-25 nodes of the resulting betweenness centrality ranking and their betweenness scores. The number 25 here is chosen arbitrarily, as a good balance between the amount of information that we store to verify the plausibility of the results and the amount of space consumed by the output. To fully identify the benchmark setting, we also report the hostname, our git commit hash, our random generator seed and the current date and time. Figure 2 gives an example how the resulting output file looks like. 5.5. Gathering Results When the experiments are done, one has to verify that all runs were successful. Then, the output data has to be parsed to extract the desired experimental data for later evaluation. Again, we recommend the use of tools for parsing. In particular, SimexPal offers a Python package to collect output data. Figure 3 depicts a complete script that computes average running times for different algorithms on the same set of instances, using only seven lines of Python code. Note that SimexPal takes care of reading the output files and checking that all runs indeed succeeded (using the function collect_successful_results()). In our example, we assume that the output files are formatted as YAML (thus we use the function yaml.load() to parse them). In case a custom format is used (e. g., when reading output from a competitor where the output format cannot be controlled), the user has to supply a small function to parse the output. Fortunately, this can usually be done using regular expressions (e. g., with Python's regex module). Now would also a good time to aggregate data appropriately (unless this has been taken care of before, also see Section 4.6). 6. Visualizing Results After the experiments have finished, the recorded data and results need to be explored and analyzed before they can finally be reported. Data visualization in the form of various different plots is a helpful tool both in the exploration phase and also in the final communication of the experimental results and the formal Version April 10, 2019 submitted to Algorithms 19 of 38 statistical analysis. The amount of data collected during the experiments is typically too large to report in its entirety and hence meaningful and faithful data aggregations are needed.28 While descriptive summary statistics such as means, medians, quartiles, variances, standard deviations, or correlation coefficients, as well as results from statistical testing like p-values or confidence intervals provide a well-founded summary of the data, they do so, by design, only at a very coarse level. The same statistics can even originate from very different underlying data: a famous example is Anscombe's quartet [72], a collection of four sets of eleven points in R2 with very different point distributions, yet (almost) the same summary statistics such as mean, variance, or correlation.29 It is a striking example of how important it can be not to rely on summary statistics alone, but to visualize experimental data graphically. A more recent example is the datasaurus.30 Here we discuss a selection of plot types for data visualization with focus on algorithm engineering experiments, together with guidelines when to use which type of plot depending on the properties of the data. For a more comprehensive introduction to data visualization, we refer the reader to some of the in-depth literature on the topic [73 -- 75]. Furthermore, there are many powerful libraries and tools for generating data plots, e. g., R31 and the ggplot2 package32, gnuplot33, matplotlib.34 Also mathematical software such as MATLAB35 (or even spreadsheet tools) can generate various types of plots from your data. For more details about creating plots in one of these tools, we refer to the respective user manuals and various available tutorials. When presenting data in two-dimensional plots, marks are the basic graphical elements or geometric primitives to show data. They can be points (zero-dimensional), lines (1D), or areas (2D). Each mark can be further refined and enriched by visual variables or channels such as their position, size, shape, color, orientation, texture, etc. to encode different aspects of the data. The most important difference between those channels is that some are more suitable to represent categorical data (e. g., graph properties, algorithms, data sources) by assigning different shapes or colors to them, whereas others are well suited for showing quantitative and ordered data (e. g., input sizes, timings, quantitative quality measures) by mapping them to a spatial position, size, or lightness. For instance, in Figure 6 we use blue circles as marks for one of the algorithms, while for the other we use orange crosses. Using different shapes makes sure that the plots are still readable if printed in grey-scale. Not all channels are equally expressive and effective in encoding information for the human visual system, so that one has to carefully select which aspects of the data to map to which channels, possibly also using redundancy. For more details see the textbooks [76] and [77]. As discussed in Section 4.6, the types of metrics from algorithmic experiments comprise two main aspects: running time data and solution quality data. Both types of metrics can consist of absolute or relative values. Typically, further attributes and parameters of the experimental data, of the algorithms, and of the input instances are relevant to include in a visualization to communicate the experimental findings. These can range from hardware-specific parameters, over the set of algorithms and possible algorithm-specific parameters, to instance-dependent parameters such as certain graph properties. Depending on the experiment's focus, one needs to decide on the parameters to show in a plot and on how to map them 28 For future reference and repeatability, it may make sense to include relevant raw data in tables in the appendix. But raw data tables are rarely good for illustrating trends in the data. 29 For example plots of the four point sets see https://commons.wikimedia.org/w/index.php?curid=9838454. 30 https://www.autodeskresearch.com/publications/samestats. 31 https://www.r-project.org. 32 https://ggplot2.tidyverse.org. 33 http://www.gnuplot.info. 34 https://matplotlib.org. 35 https://www.mathworks.com/products/matlab.html. Version April 10, 2019 submitted to Algorithms 20 of 38 Figure 5. The running time speedup of KADABRA over RK for all the instances in the evaluation set for c = 4375. Every bar is the ratio of the arithmetic means for 5 repeated runs per instance. The smallest speedup is 4.5 for instance roadNet-PA (rdPA) and the largest speedup is 478.7 for instance ca-AstroPh (caAs). The geometric mean for all speedups is around 145.1. Instances are sorted by their number of nodes. The y-axis is in log scale. to marks and channels. Typically, the most important metric to answer the guiding research question (e. g., running time or solution quality) is plotted along the y-axis. The x-axis, in turn, is used for the most relevant parameter describing the instances (e. g., instance size for a scalability evaluation or a graph parameter for evaluating its influence on the solution quality). Additional parameters of interest can then be represented by using distinctly colored or shaped marks for different experimental conditions such as the respective algorithm, an algorithmic parameter or properties of the used hardware, see for example that, in Figures 6 instance roadNet-TX is plotted differently because RK did not finish within the allocated time frame of 7 hours. Before starting to plot the data, one needs to decide whether raw absolute data should be visualized (e. g., running times or objective function values) or whether the data should be shown relative to some baseline value, or be normalized prior to plotting. This decision typically depends on the specific algorithmic problem, the experimental setup and the underlying research questions to be answered. For instance, when the experiment is about a new algorithm for a particular problem, the algorithmic speedup or possible improvement in solution quality with respect to an earlier algorithm may be of interest; hence, running time ratios or quality ratios can be computed as a variable to plot -- as shown in Figure 5 with respect to KADABRA and RK. Another possibility of data preprocessing is to normalize certain aspects of the experimental data before creating a plot. For example, to understand effects caused by properties of the hardware, such as cache sizes and other memory effects, one may normalize running time measurements by the algorithm's time complexity in terms of n and m, the number of vertices and edges of the input graph, and examine if the resulting computation times are constant or not. A wide range of meaningful data processing and analysis can be done before showing the resulting data in a visualization. While we just gave a few examples, the actual decision of what to show in a plot needs to be made by the designers of the experiment after carefully exploring all relevant aspects of the data from various perspectives. For the remainder of this section, we assume that all data values to be visualized have been selected. mrnbpetsegfbopenGn08wkVoGn05Gn04twincfincaAscaThsubctwitegplcaPhciPhfbwowkbolocbdCOLrdPA23252729algorithmic speedup145.1geometric mean=145.1 Version April 10, 2019 submitted to Algorithms 21 of 38 Figure 6. Scatter plot for running times of KADABRA for c = 4375 and RK for all instances in the evaluation set. Both axes are in log scale. Every point is the (arithmetic) mean running time for 5 repeated runs for each instance. The one square represents the run of KADABRA for the network roadNet-TX for which RK did not finish within the cutoff time of 7 hours. A very fundamental plot is the scatter plot, which maps two variables of the data (e. g., size and running time) onto the x- and y-axis, see Figure 6. Every instance of the experiment produces its own point mark in the plot, by using its values of the two chosen variables as coordinates. Further variables of the data can be mapped to the remaining channels such as color, symbol shape, symbol size, or texture. If the number of instances is not too large, a scatter plot can give an accurate visualization of the characteristics and trends of the data. However, for large numbers of instances, overplotting can quickly lead to scatter plots that become hard to read. In such cases, the data needs to be aggregated before plotting, by grouping similar instances and showing summaries instead. The simplest way to show aggregated data, such as repeated runs of the same instances, is to plot a single point mark for each group, e. g., using the mean or median, and then optionally putting a vertical error bar on top of it showing one standard deviation or a particular confidence interval of the variable within each group. Such a plot can be well suited for showing how running times scale with the instance size. If the sample sizes in the experiment have been chosen to cover the domain well, one may amplify the salience of Figure 4. Tuning parameter search. Every point is the (arithmetic) mean running time for all the instances in the tuning set. Experiments on each instance are repeated 3 times for the respective value of the parameter. The value that gives the best results is picked; here it is 4375 as it provides the lowest running time of about 142 seconds. 222528211214217tunning parameter value200300400running time (secods)211212213140150best tuning valuefor c=4375 Version April 10, 2019 submitted to Algorithms 22 of 38 (a) A violin plot for running time deviation of KADABRA. (b) A box plot for running time deviation of RK. The orange line indicates the median. Figure 7. Plots on variance of running times. For each instance in the evaluation set, we perform 5 repeated runs and calculate the mean. Shown in the plot are, for each run, the distance to the mean, divided by the mean. This way we get the relative running time variance for every instance. Here, we use a box and a violin plot for illustration purposes; in a scientific paper one of the two should be chosen. Notice also that instance roadNet-TX is missing for RK since it did not finish within the 7 hours limit. the trend in the data by linking the point marks by a line plot. However, this visually implies a linear interpolation between neighboring measurements and therefore should only be done if sufficiently many sample points are included and the plot is not misleading. Obviously, if categorical data are represented on the x-axis, one should never connect the point marks by a line plot. At the same time, the scale of the two coordinate axes is also of interest. While a linear scale is the most natural and least confusing for human interpretation, some data sets contain values that may grow exponentially. On a linear scale, this results in the large values dominating the entire plot and the small values disappear in a very narrow band. In such cases, axes with a logarithmic scale can be used; however, this should always be made explicit in the axis labeling and the caption of the plot. A more advanced summary plot is the box plot (or box-and-whiskers plot), where all repeated runs of the same instance or sets of instances with equal or similar size form a group, see Figure 7a. This group is represented as a single glyph showing simultaneously the median, the quartiles, the minimum and maximum values or another percentile, as well as possibly outliers as individual marks. If the x-axis shows an ordered variable such as instance size, one can still clearly see the scalability trend in the data as well as the variability within each homogeneous group of instances. Violin plots take the idea of box plots even further and draw the contour of the density distribution of the variable mapped to the y-axis within each group, see Figure 7b. It is thus visually more informative than a simple box plot, but also more complex and thus possibly more difficult to read. When deciding for a particular type of plot, one has to explore the properties of the data and choose a plot type that is neither oversimplifying them nor more complex than needed. Data from algorithmic experiments may also often be aggregated by some attribute into groups of different sizes. In order to show the distribution of the instances into these groups, bar charts (for categorical data) or histograms (for continuous data) can be used to visualize the cardinality of each group. Such diagrams are often available in public repositories like KONECT.36 For a complex network, for example, one may want to plot the degree distribution of its nodes with the degree (or bins with a specific degree range) on the x-axis and the number of vertices with a particular degree (or in a particular degree range) 36 For example, one can find this information for moreno_blogs in http://konect.uni-koblenz.de/networks/moreno_blogs. mrnbpetsegfbopenGn08wkVoGn05Gn04twincfincaAscaThsubctwitegplcaPhciPhfbwowkbolocbdCOLrdPArdTX-16.0%-12.0%-8.0%-4.0%0.0%4.0%8.0%12.0%16.0%relative deviation in running timemrnbpetsegfbopenGn08wkVoGn05Gn04twincfincaAscaThsubctwitegplcaPhciPhfbwowkbolocbdCOLrdPA-4.0%-3.0%-2.0%-1.0%0.0%1.0%2.0%3.0%4.0%relative deviation in running time Version April 10, 2019 submitted to Algorithms 23 of 38 on the y-axis. Such a histogram can then quickly reveal how skewed the degree distribution is. Similarly, histograms can be useful to show solution quality ratios obtained by one or more algorithms by defining bins based on selected ranges of quality ratios. Such a plot quickly indicates to the reader what percentage of instances could be solved within a required quality range, e. g., at least 95% of the optimum. of the algorithm(s) and the y-axis displays the quality. This allows A single plot can contain multiple experimental conditions simultaneously. For instance, when showing running time behavior and scalability of a new algorithm compared to previous approaches, a single plot with multiple trend lines in different colors or textures or with visually distinct mark shapes can be very useful to make comparisons among the competing algorithms. Clearly, a legend needs to specify the mapping between the data and the marks and channels in the plot. Here it is strongly advisable to use the same mapping if multiple plots are used that all belong together. But, as a final remark, bear in mind the size and resolution of the created figures. Avoid clutter and ensure that your conclusion remains clearly visible! 7. Evaluating Results with Statistical Analysis Even if a result looks obvious37, it can benefit from a statistical analysis to quantify it, especially if random components or heuristics are involved. The most common questions for a statistical analysis are: • Do the experimental results support a given hypothesis, or is the measured difference possibly just random noise? This question is addressed by hypothesis testing. • How large is a measured effect, i. e., which underlying real differences are plausible given the experimental measurements? This calls for parameter estimation. • If we want to answer the first two questions satisfactorily, how many data points do we need? This is commonly called power analysis. As this issue affects the planning of experiments, we discussed it already in Section 4.3. The two types of hypotheses we discussed in Section 4.1 roughly relate to hypothesis tests and parameter estimation. Papers proposing new algorithms mostly have hypotheses of the first type: The newly proposed algorithm is faster, yields solutions with better quality or is otherwise advantageous. In many empirical sciences, the predominant notion has been null hypothesis significance testing (NHST), in which a statistic of the measured data is compared with the distribution of this statistic under the null hypothesis, an assumed scenario where all measured differences are due to chance. Previous works on statistical analysis of experimental algorithms, including the excellent overviews of McGeoch [37] and Coffin and Saltzmann [15], use this paradigm. Due to some limitations of the NHST model, a shift towards parameter estimation [78 -- 81] and also Bayesian methods [82 -- 84] is taking place in the statistical community. We aim at applying the current state of the art in statistical analysis to algorithm engineering, but since no firm consensus has been reached [80], we discuss both frequentist and Bayesian approaches. As an example for null hypothesis testing, we investigate whether the KADABRA and the RK algorithms give equivalent results for the same input graphs. While this equivalence test could also be performed using Bayesian inference, we use a null hypothesis test for illustration purposes. It is easy to see from running time plots (e. g., Figure 6) that KADABRA is faster than RK. To quantify this speedup, we use Bayesian methods to infer plausible values for the algorithmic speedup and different scaling behavior. We further evaluate the influence of the graph diameter on the running time. 37 It fulfills the "inter-ocular trauma test", as the saying goes, the evidence hitting you between the eyes. Version April 10, 2019 submitted to Algorithms 24 of 38 7.1. Statistical Model A statistical model defines a family of probability distribution over experimental measurements. Many experimental running times have some degree of randomness: Caching effects, network traffic and influence of other processes contribute to this, sometimes the tested algorithm is randomized itself. Even a deterministic implementation on deterministic hardware can only be tested on a finite set of input data, representing a random draw from the infinite set of possible inputs. A model encodes our assumptions about how these sources of randomness combine to yield the distribution of outputs we see. If, for example, the measurement error consists of many additive and independent parts, the central limit theorem justifies a normal distribution. To enable useful inferences, the model should have at least one free parameter corresponding to a quantity of interest. Any model is necessarily an abstraction, as expressed in the aphorism "all models are wrong, but some are useful" [85]. 7.1.1. Example Suppose we want to investigate whether KADABRA scales better than RK on inputs of increasing size. Figure 6 shows running times of KADABRA and RK with respect to the instance size. These are spread out, implying either that the running time is highly variable, or that it depends on aspects other than the instance size. A companion Jupyter notebook including this example and the following inferences is included in the supplementary materials. In general, running times are modeled as functions of the input size, sometimes with additional properties of the input. The running time of KADABRA, for example, possibly depends on the diameter of the input graph. Algorithms in network analysis often have polynomial running times where a reasonable upper bound for the leading exponent can be found. Thus, the running time can be modeled as such a polynomial, written as a + bn + cn2 + dn3 + . . . + α log n + β log log n + . . ., with the unknown coefficients of the polynomial being the free parameters of the model. However, a large number of free model parameters makes inference difficult. This includes the danger of overfitting, i. e., inferring parameter values that precisely fit the measured results but are unlikely to generalize. To evaluate the scaling behavior, it is thus often more useful to focus on the largest exponent instead. Let TA(n) be the running time of the implementation of RK and TB(n) the running time of the implementation of KADABRA on inputs of size n, with unknown parameters αA, αB, βA and βB.38 TA(n) = αA · nβA ·  TB(n) = αB · nβB ·  The term  explicitly models the error; it can be due to variability in inputs (some instances might be harder to process than others of the same size) and measurement noise (some runs suffer from interference or caching effects). Since harder inputs are not constrained to additive difficulty and longer runs have more 38 For estimating asymptotic upper bounds, see the work of McGeoch et al. [32] on curve bounding. Version April 10, 2019 submitted to Algorithms 25 of 38 opportunity to experience adverse hardware effects, we choose a multiplicative error term.39 Taking the logarithms of both sides makes the equations linear: log(TA(n)) = log(αA) + βA log(n) + log() log(TB(n)) = log(αB) + βB log(n) + log() (4) (5) A commonly chosen distribution for additive errors is Gaussian, justified by the central limit theorem [86]. Since longer runs have more exposure to possibly adverse hardware or network effects we consider multiplicative error terms to be more likely and use a log-normal distribution.40 Since the logarithm of the log-normal distribution is a normal (Gaussian) distribution, Equations 4 and 5 can be rewritten as normally distributed random variables: log(TA(n)) ∼ N (log(αA) + βA log(n), σ2  ) log(TB(n)) ∼ N (log(αB) + βB log(n), σ2  ) (6) (7) This form shows more intuitively the idea that a statistical model is a set of probability measures on experimental outcomes. In this example, the set of probability measures modeling the performance of an algorithm are parametrized by the tuple (α, β, σ) ∈ R3. A problem remains if the input instances are very inhomogeneous. In that case, both A and B have a large estimated variance (σ2). Even if the variability of performance on the same instance is small, any genuine performance difference might be wrongly attributed to the large inter-instance variance. This issue can be addressed with a combined model as recommended by Coffin and Saltzmann [15], in which the running time TA(x) of A is a function of the running time TB(x) of B on the same instance x: log(TA(x)) ∼ N (log(αA/B) + βA/B log(TB(x)), σ2) For a more extensive overview of modeling experimental algorithms, see [37]. (8) 7.1.2. Model Fit Several methods exist to infer parameters when fitting a statistical model to experimental data. The most well-known is arguably the maximum-likelihood fit, choosing parameters for a distribution that give the highest probability for the observed measurements. In the case of a linear model with a normally distributed error, this is equivalent to a least-squares fit [87]. Such a fit yields a single estimate for plausible parameter values. Given random variations in the measurement, we are also interested in the range of plausible values, quantifying the uncertainty involved in measurement and instance selection. This is covered in Sections 7.3.2 and 7.4. 7.2. Formalizing Hypotheses Previously (Section 4.1), we discussed two types of hypotheses. The first type is that a new algorithm is better in some aspect than the state of the art. The second type claims insight into how the behavior of 39 Summands with smaller exponents are also subsumed within the error term. If they have a large effect, an additive error might reflect this more accurately. 40 In some cases, it might even make sense to use a hierarchical model with two different error terms: One for the input instances, the other one for the differences on the same input. Version April 10, 2019 submitted to Algorithms 26 of 38 an algorithm depends on settings and properties of the input. We now express these same hypotheses more formally, as statements about the parameters in a statistical model. The two types are then related to the statistical approaches of hypothesis testing and parameter estimation. Considering the scaling model presented in Equation (8) and the question whether implementation A scales better than implementation B, the parameter in question is the exponent βA/B. The hypothesis that A scales better than B is equivalent to log(βA/B) < 0; both scaling the same implies log(βA/B) = 0. Note that the first hypothesis does not imply a fully specified probability distribution on βA/B, merely restricting it to the negative half-plane. The hypothesis of log(βA/B) = 0 does completely specify such a distribution (i. e., a point mass of probability 1 at 0), which is useful for later statistical inference. 7.3. Frequentist Methods Frequentist statistics defines the probability of an experimental outcome as the limit of its relative frequency when the number of experiments trends towards infinity. This is usually denoted as the classical approach. 7.3.1. Null Hypothesis Significance Testing As discussed above, null hypothesis significance testing evaluates a proposed hypothesis by contrasting it with a null hypothesis, which states that no true difference exists and the observed difference is due to chance. As an example application, we compare the approximation quality of KADABRA and RK. From theory, we would expect higher approximation errors from KADABRA, since it samples fewer paths. We investigate whether the measured empirical difference supports this theory, or could also be explained with random measurement noise, i. e., with the null hypothesis (denoted with H0) of both algorithms having the same distribution of errors and just measuring higher errors from KADABRA by coincidence. Here it is an advantage that the proposed alternate hypothesis (i. e., the distributions are meaningfully different) does not need an explicit modeling of the output distribution, as the distribution of differences in our case does not follow an easily parameterizable distribution. When deciding whether to reject a null hypothesis (and by implication, support the alternate hypothesis), it is possible to make one of two errors: (i) rejecting a null hypothesis, even though it is true (false positive), (ii) failing to reject a false null hypothesis (false negative). In such probabilistic decisions, the error rate deemed acceptable often depends on the associated costs for each type of error. For scientific research, Fisher suggested that a false positive rate of 5% is acceptable [88], and most fields follow that suggestion. This threshold is commonly denoted as α. Controlling for the first kind of error, the p-value is defined as the probability that a summary statistic as extreme as the observed one would have occurred given the null hypothesis [89]. Please note that this is not the probability P (H0observations), i. e., the probability that the null hypothesis is true given the observations. For practical purposes, a wide range of statistical hypothesis tests have been developed, which aggregate measurements to a summary statistic and often require certain conditions. For an overview of which of them are applicable in which situation, see the excellent textbook of Young and Smith [89]. In our example the paired results are of very different instances and clearly not normally distributed. We thus avoid the common t-test and use a Wilcoxon test of pairs [90] from the SciPy [91] stats module, yielding a p-value of 5.9 · 10−5, see cell 14 of the statistics notebook in the supplementary materials. Since this is smaller than our threshold α of 0.05, one would thus say that this result allows us to reject the null hypothesis at the level of 5.9 · 10−5. Such a difference is commonly called statistically significant. To decide whether it is actually significant in practice, we look at the magnitude of the difference: The error of KADABRA is about one order of magnitude higher for most instances, which we would call significant. Version April 10, 2019 submitted to Algorithms 27 of 38 Multiple Comparisons The NHST approach guarantees that of all false hypotheses, the expected fraction that seem significant when tested is at most α. Often though, a publication tests more than one hypotheses. For methods to address this problem and adjust the probability that any null hypothesis in an experiment is falsely rejected (also called the familywise error rate), see Bonferroni [92] and Holm [93]. 7.3.2. Confidence Intervals One of the main criticism of NHST is that it ignores effect sizes; the magnitude of the p-value says nothing about the magnitude of the effect. More formally, for every true effect with size  > 0 and every significance level α, there exists an n0 so that all experiments containing n ≥ n0 measurements are likely to reject the null hypothesis at level α. Following this, Coffin and Saltzmann [15] caution against overly large data sets - a recommendation which comes with its own set of problems. The statistical response to the problem of small but meaningless p-values with large data sets is a shift away from hypothesis testing to parameter estimation. Instead of asking whether the difference between populations is over a threshold, the difference is quantified as a parameter in a statistical model, see also Section 7.2. As Kruschke et al. [83] put it, the null hypothesis test asks whether the null value of a parameter would be rejected at a given significance level. A confidence interval merely asks which other parameter values would not be rejected [83]. We refer to [94,95] for a formal definition and usage guidelines. 7.4. Bayesian Inference Bayesian statistics defines the probability of an experimental outcome as the uncertainty of knowledge about it. Bayes's theorem gives a formal way to update probabilities on new observations. In its simplest form for discrete events and hypotheses, it can be given as: P (H1A) = P (AH1)P (H1) P (A) (9) When observing outcome A, the probability of hypothesis H1 is proportional to the probability of A conditioned on H1 multiplied by the prior probability P (H1). The conditional probability P (AH1) of an outcome A given an hypothesis H1 is also called the likelihood of H1. The prior probability reflects the estimation before making observations, based on background knowledge. Extended to continuous distributions, Bayes's rule allows to combine a statistical model with a set of measurements and a prior probability distribution over parameters to yield a posterior probability distribution over parameters. This posterior distribution reflects both the uncertainty in measurements and possible prior knowledge about parameters. A thorough treatment is given by Gelman et al. [96]. For our example model introduced in Section 7.1, we model the running times of implementation B as a function of the time of implementation A, as done in Equation (8): log(TA(n)) ∼ N (αA/B + βA/B · log(TB(n)), σ2 A/B) This defines the likelihood function as a Gaussian noise with variance σ2. Since this variance is unknown, we keep it as a model parameter. As we have no specific prior information about plausible values of α and β, we define the following vague prior distributions: αA/B ∼ N (0, 10), βA/B ∼ N (1, 10), σA/B ∼ InvGamma(1, 1) Version April 10, 2019 submitted to Algorithms 28 of 38 import pymc3 as pm from scipy import optimize basic_model = pm.Model() with basic_model: alpha = pm.Normal('alpha', mu=0, sd=10) with basic_model: pm.summary(trace) beta = pm.Normal('beta', mu=0, sd=10) sigma = pm.InverseGamma('sigma', alpha=1,beta=1) mu = alpha + beta*logTimeRK Y_obs = pm.Normal('Y_obs', mu=mu, sd=sigma, observed=logTimeKadabra) # approximate posterior distribution with 10000 samples trace = pm.sample(10000) Figure 8. Example listing for inference of parameters αA/B, βA/B and σA/B. HPD 2.5 Mean HPD 97.5 -6.87 0.70 0.80 -3.58 1.29 1.54 -5.22 1.01 1.13 αA/B βA/B σA/B Table 4. Posterior distribution of parameter values. The first two distributions represent our initial -- conservative -- belief that the two implementations are equivalent in terms of scaling behavior and constants. We model the variance of the observation noise σ2 as an inverse gamma distribution instead of a normal distribution, since a variance cannot be negative. Figure 8 shows a listing to compute and show the posterior distribution of these three parameters using SciPy [91] and PyMC3 [97]. Results are listed in Table 4. The interval of Highest Probability Density (HPD) is constructed to contain 95% of the probability mass of the respective posterior distribution. It is the Bayesian equivalent of the confidence interval (Section 7.3.2) and also called credible interval. The most probable values for αA/B and βA/B are -5.22 and 1.01, respectively. Taking measurement uncertainty into account, the true values are within the intervals [−6.87,−3.58] respective [0.70, 1.29] with 95% probability. This shows that KADABRA is faster on average, but results about the relative scaling behavior are inconclusive. While the average for βA/B is 1.01 and suggests similar scaling, the interval [0.7, 1.29] neither excludes the hypothesis that KADABRA scales better, nor the hypothesis that it scales worse. 7.4.1. Equivalence Testing Computing the highest density interval can also be used for hypothesis testing. In Section 7.3.1 we discussed how to show that two distributions are different. Sometimes, though, we are interested in showing that they are sufficiently similar. An example would be wanting to show that two sampling algorithms give the same distribution of results. This is not easily possible within the NHST paradigm, as the two answers of a classical hypothesis test are "probably different" and "not sure". This problem can be solved by calculating the posterior distribution of the parameter of interest and defining a region of practical equivalence (ROPE), which covers all parameter values that are effectively indistinguishable from 0. If x% of the posterior probability mass are in the region of practical equivalence, the inferred parameter is practically indistinguishable with probability x%. If x% of the probability mass are outside the ROPE, the parameter is meaningfully different with probability x%. If the intervals overlap, the observed data is insufficient to come to either conclusion. In our example, the scaling behavior of two algorithms is equivalent if the inferred exponent modeling their relative running times is more or less 1. We could define practical equivalence as ±5%, resulting in a region of practical equivalence of [0.95, 1.05]. The Version April 10, 2019 submitted to Algorithms 29 of 38 interval [0.7, 1.29] containing 95% of the probability mass for β is neither completely inside [0.95, 1.05] nor completely outside it, implying that more experiments are needed to come to a conclusion. 7.4.2. Bayes Factor Bayes factors are a way to compare the relative fit of several models and hypotheses to a given set of observations. While NHST (Section 7.3.1) evaluates the fit of observations to the null hypothesis and confidence intervals and credible intervals infer the range of plausible values of parameters in a model, the Bayes factor between two hypotheses gives the ratio between their posterior probabilities. This probability ratio of hypotheses is then: P (H1obs) P (H0obs) P (H1) P (H0) P (obsH1) P (obsH0) = Crucially, the ratio of prior probabilities, which is subjective, is a separate factor from the ratio of likelihoods, which is objective. This objective part, the ratio P (obsH1) P (obsH0), is called the Bayes factor. The first obvious difference to NHST is that calculating a Bayes Factor consists of comparing the fit of both hypotheses to the data, not only the null hypothesis. It thus requires that an alternate hypothesis is stated explicitly, including a probability distribution over observable outcomes. If the alternative hypothesis is meant to be vague, for example just that two distributions are different, an uninformative prior with a high variance should be used. However, specific hypotheses like "the new algorithm is at least 20% faster" can also be modeled explicitly. This explicit modeling allows inference in both directions; using NHST, on the other hand, one can only ever infer that a null hypothesis is unlikely or that the data is insufficient to infer this. Using Bayes factors, it is possible to infer that H1 is more probable than H0, or that the observations are insufficient to support this statement, or that H0 is more probable than H1. In the previous running time analysis, we hypothesized a better scaling behavior, which was not confirmed by the experimental measurements. However, the graphs with high diameter are larger than average and a cursory complexity analysis of the KADABRA algorithm suggests that the diameter has an influence on the running time. Might the relative scaling of KADABRA and RK depend on the running time? To answer this question, we compare the fit of two models: The first model is the same as discussed earlier (Equation 8), it models the expected running time of KADABRA on instance x as eα · TRK(x)β, where TRK(x) is the running time of RK on the same instance. The second model has the additional free parameter γ, controlling the interaction between the diameter and running times: log(T (x)) ∼ N (log(α) + β log(TRK(x)) + γ log(diamx), σ). (10) Comparing for example the errors of a least-squares fit of the two models would not give much insight, since including an additional free parameter in a model almost always results in a better fit. This does not have to mean that the new parameter captures something interesting. Instead, we calculate the Bayes factor, for which we integrate over the prior distribution in each model. Since this integral over the prior distribution also includes values of the new parameter which are not a good fit, models with too many additional parameters are automatically penalized. Our two models are similar, thus we can phrase them as a hierarchical model with the additional parameter controlled by a boolean random variable, see Listing 9. The posterior for the indicator variable selected_model is 0.945, yielding a Bayes factor of ≈ 17 in support of including the diameter in the model. We can thus conclude that it is very probable that the diameter has an influence on the relative scaling between KADABRA and RK. The inferred mean of the variable γ is 0.79, meaning that higher diameter values lead to higher running times. Version April 10, 2019 submitted to Algorithms 30 of 38 import pymc3 as pm from scipy import optimize basic_model = pm.Model() with basic_model: pi = (0.5, 0.5) selected_model = pm.Bernoulli('selected_model', p=pi[1]) alpha = pm.Normal('alpha', mu=0, sd=10) beta = pm.Normal('beta', mu=0, sd=10) gamma = pm.Normal('gamma', mu=0, sd=10) sigma = pm.InverseGamma('sigma', alpha=1, beta=1) mu = alpha + beta*logTimesRK + gamma*logDiameters*selected_model Y_obs = pm.Normal('Y_obs', mu=mu, sd=sigma, observed=logTimeKadabra) Figure 9. Listing to compute the Bayes factor, the relative likelihood of two models, between the model including the graph diameter and the model with just the graph sizes. The variable selected_model is an indicator for which model is selected. Estimation Frequentist Confidence Interval Bayesian Posterior Hypothesis Equivalence Difference Model Selection TOST NHST AIC Posterior + ROPE or BF Bayes Factor (BF) Table 5. Overview of different statistical methods. TOST stands for Two One-Sided T-Tests and AIC is the Akaike Information Criterion [98], a combined measure for model fit and model complexity. 7.5. Recommendations Which statistical method is best, depends on what needs to be shown. For almost all objectives, both Bayesian and frequentist methods exist, see Table 5. In experimental algorithmics, most hypotheses can be expressed as statements constraining parameters in a statistical model, i. e., "the average speedup of A over B is at least 20%". Thus, in contrast to earlier statistical practice, we recommend to approach evaluation of hypotheses by parameter estimation and to only use the classical hypothesis tests when parameter estimation is not possible. The additional information gained by parameter estimates has a couple of advantages. For example, when using only hypothesis tests, small differences in large data sets can yield impressively small p-values and thus claims of statistical significance even when the difference is irrelevant in practice and the significance is statistical only [15]. Using confidence intervals (Section 7.3.2) or the posterior distribution in addition with a region of practical equivalence avoids this problem [83]. Below is a rough guideline (also shown in Figure 10) outlining our method selection process. It favors Bayesian methods, since the python library PyMC3 [97] offering them fits well into our workflow. 1. Define a model that captures the parts of the measured results that interest you, see Section 7.1. 2. Using confidence intervals (Section 7.3.2) or credible intervals (Section 7.4), estimate plausible values for the model parameters, including their uncertainty. If this proves intractable and you are only interested in whether a measured difference is due to chance, use a significance test instead (Section 7.3.1). 3. If you want to show that two distributions (of outcomes of algorithms) are similar, use an equivalence test, in which you define a region of practical equivalence. 4. If you want to show that two distributions (of outcomes of algorithms) are different, you may also use an equivalence test or alternatively, a significance test. 5. If you want to compare how well different hypotheses explain the data, for example compare whether the diameter has an influence on relative scaling, compare the relative fit using a Bayes factor (Section 7.4.2). Needless to say, these are only recommendations. Version April 10, 2019 submitted to Algorithms 31 of 38 Hypothesis test or Parameter estimation? Parameter Hypothesis Bayesian or Frequentist preference? Difference, Equivalence or Model Comparison? Model Comparison Bayes Factor 7.4.2 Bayesian Difference Frequentist Credible Interval 7.4 Equivalence Hypothesis of difference possible to model? Yes No Confidence Interval 7.3.2 8. Conclusions Region of Practical Equivalence 7.4.1 Null Hypothesis Statistical Tests 7.3.1 Figure 10. Flowchart outlining our method selection. Besides setting guidelines for experimental algorithmics, this paper provides a tool for simplifying the typical experimental workflow. We hope that both are useful for the envisioned target group -- and beyond, of course. We may have omitted material some consider important. This happened on purpose to keep the exposition reasonably concise. To account for future demands, we could imagine an evolving "community version" of the paper, updated with the help of new co-authors in regular time intervals. That is why we invite the community to contribute comments, corrections and/or text.41 Let us conclude by reminding the reader: most of the guidelines in the paper are not scientific laws nor set in stone. Always apply common sense to adapt a guideline to your concrete situation! Also, we cannot claim that we always followed the guidelines in the past. But this was all the more motivation for us to write this paper, to develop SimexPal and to have a standard to follow -- we hope that the community shares this motivation. Acknowledgments: We thank Michael Hamann and Sebastian Schlag for their timely and thorough feedback on a working draft of the paper. We also thank Alexander Meier and Dimitri Ghouse for valuable advice on statistics. A subset of the authors was partially supported by grant ME 3619/3-2 within German Research Foundation (DFG) Priority Programme 1736 Algorithms for Big Data. 41 The source files of this paper can be found at https://github.com/hu-macsy/ae-tutorial-paper. We encourage readers post suggestions via GitHub issues and welcome pull requests. Version April 10, 2019 submitted to Algorithms 32 of 38 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. Bogdanov, A.; Trevisan, L. Average-Case Complexity. Foundations and Trends R(cid:13) in Theoretical Computer Science 2006, 2, 1 -- 106. doi:10.1561/0400000004. Spielman, D.; Teng, S.H. Smoothed Analysis of Algorithms: Why the Simplex Algorithm Usually Takes Polynomial Time. Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing; ACM: New York, NY, USA, 2001; STOC '01, pp. 296 -- 305. doi:10.1145/380752.380813. Heule, M.J.H.; Järvisalo, M.J.; Suda, M., Eds. Proceedings of SAT Competition 2018; Solver and Benchmark Descriptions, 2018. Applegate, D.L.; Bixby, R.E.; Chvatal, V.; Cook, W.J. The Traveling Salesman Problem: A Computational Study (Princeton Series in Applied Mathematics); Princeton University Press: Princeton, NJ, USA, 2007. Mehlhorn, K.; Sanders, P. Algorithms and Data Structures: The Basic Toolbox; SpringerLink: Springer e-Books, Springer, 2008. Puglisi, S.J.; Smyth, W.F.; Turpin, A.H. A Taxonomy of Suffix Array Construction Algorithms. ACM Comput. Surv. 2007, 39. doi:10.1145/1242471.1242472. Johnson, D.S. A theoretician's guide to the experimental analysis of algorithms. Data Structures, Near Neighbor Searches, and Methodology: Fifth and Sixth DIMACS Implementation Challenges, Proceedings of a DIMACS Workshop, USA, 1999, 1999, pp. 215 -- 250. Muller-Hannemann, M.; Schirra, S., Eds. Algorithm Engineering: Bridging the Gap Between Algorithm Theory and Practice; Springer-Verlag: Berlin, Heidelberg, 2010. Moret, B., Towards a discipline of experimental algorithmics; American Mathematical Society, 2002; pp. 197 -- 213. doi:10.1090/dimacs/059/10. Sanders, P. Algorithm Engineering - An Attempt at a Definition Using Sorting as an Example. ALENEX. SIAM, 2010, pp. 55 -- 61. Bast, H.; Delling, D.; Goldberg, A.; Müller-Hannemann, M.; Pajor, T.; Sanders, P.; Wagner, D.; Werneck, R.F. Route planning in transportation networks. In Algorithm engineering; Springer, 2016; pp. 19 -- 80. Applegate, D.L.; Bixby, R.E.; Chvatal, V.; Cook, W.J. The traveling salesman problem: a computational study; Princeton university press, 2006. Brandes, U.; Robins, G.; McCranie, A.; Wasserman, S. What is network science? Network Science 2013, 1, 1 -- 15. doi:10.1017/nws.2013.2. Newman, M. Networks; Oxford university press, 2018. Coffin, M.; Saltzman, M.J. Statistical Analysis of Computational Tests of Algorithms and Heuristics. INFORMS Journal on Computing 2000, 12, 24 -- 44. Borassi, M.; Natale, E. KADABRA is an ADaptive Algorithm for Betweenness via Random Approximation. LIPIcs-Leibniz International Proceedings in Informatics. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2016, Vol. 57. Staudt, C.L.; Sazonovs, A.; Meyerhenke, H. NetworKit: A tool suite for large-scale complex network analysis. Network Science 2016, 4, 508 -- 530. Boldi, P.; Vigna, S. Axioms for centrality. Internet Mathematics 2014, 10, 222 -- 262. Freeman, L.C. A set of measures of centrality based on betweenness. Sociometry 1977, pp. 35 -- 41. Brandes, U. A faster algorithm for betweenness centrality. 25, 163 -- 177. Bader, D.A.; Kintali, S.; Madduri, K.; Mihail, M. Approximating betweenness centrality. International Workshop on Algorithms and Models for the Web-Graph. Springer, 2007, pp. 124 -- 137. Geisberger, R.; Sanders, P.; Schultes, D. Better Approximation of Betweenness Centrality. Proceedings of the Meeting on Algorithm Engineering & Expermiments; Society for Industrial and Applied Mathematics: Philadelphia, PA, USA, 2008; pp. 90 -- 100. Riondato, M.; Kornaropoulos, E.M. Fast approximation of betweenness centrality through sampling. Data Mining and Knowledge Discovery 2016, 30, 438 -- 475. Journal of mathematical sociology 2001, Version April 10, 2019 submitted to Algorithms 33 of 38 24. 25. 26. 27. 28. 29. 30. 31. Riondato, M.; Upfal, E. ABRA: Approximating betweenness centrality in static and dynamic graphs with rademacher averages. ACM Transactions on Knowledge Discovery from Data (TKDD) 2018, 12, 61. Kunegis, J. Konect: the koblenz network collection. Proceedings of the 22nd International Conference on World Wide Web. ACM, 2013, pp. 1343 -- 1350. Leskovec, J.; Krevl, A. SNAP Datasets: Stanford Large Network Dataset Collection. http://snap.stanford. edu/data, 2014. Bader, D.; Meyerhenke, H.; Sanders, P.; Wagner, D., Eds. Proc. of the 10th DIMACS Implementation Challenge, Contemporary Mathematics. American Mathematical Society, 2012. Davis, T.A.; Hu, Y. The University of Florida sparse matrix collection. ACM Transactions on Mathematical Software (TOMS) 2011, 38, 1. Boldi, P.; Vigna, S. The WebGraph Framework I: Compression Techniques. Proc. of the Thirteenth International World Wide Web Conference (WWW 2004); ACM Press: Manhattan, USA, 2004; pp. 595 -- 601. Rossi, R.A.; Ahmed, N.K. An Interactive Data Repository with Visual Analytics. SIGKDD Explor. 2016, 17, 37 -- 41. Goldenberg, A.; Zheng, A.X.; Fienberg, S.E.; Airoldi, E.M.; others. A survey of statistical network models. Foundations and Trends R(cid:13) in Machine Learning 2010, 2, 129 -- 233. 33. 34. 35. 36. 37. BMJ 2005, 331, 903, Standard deviations and standard errors. 32. McGeoch, C.C.; Sanders, P.; Fleischer, R.; Cohen, P.R.; Precup, D. Using Finite Experiments to Study Asymptotic Performance. Experimental Algorithmics, From Algorithm Design to Robust and Efficient Software [Dagstuhl seminar, September 2000], 2000, pp. 93 -- 126. Bernardo, J.M.; Smith, A.F. Bayesian theory; Vol. 405, John Wiley & Sons, 2009. Altman, D.G.; Bland, J.M. [https://www.bmj.com/content/331/7521/903.full.pdf]. Ellis, P.D. The essential guide to effect sizes: Statistical power, meta-analysis, and the interpretation of research results; Cambridge University Press, 2010. Cohen, J. Statistical power analysis for the behavioral sciences; Routledge, 1988. McGeoch, C.C. A Guide to Experimental Algorithmics, 1st ed.; Cambridge University Press: New York, NY, USA, 2012. Rardin, R.L.; Uzsoy, R. Experimental Evaluation of Heuristic Optimization Algorithms: A Tutorial. Journal of Heuristics 2001, 7, 261 -- 304. doi:10.1023/A:1011319115230. Sedgewick, R. Implementing quicksort programs. Communications of the ACM 1978, 21, 847 -- 857. Eppstein, D.; Wang, J. Fast Approximation of Centrality. Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms; Society for Industrial and Applied Mathematics: Philadelphia, PA, USA, 2001; SODA '01, pp. 228 -- 229. James, G.; Witten, D.; Hastie, T.; Tibshirani, R. An Introduction to Statistical Learning -- with Applications in R, 2013. Hinton, G.E. A practical guide to training restricted Boltzmann machines. In Neural networks: Tricks of the trade; Springer, 2012; pp. 599 -- 619. Larochelle, H.; Erhan, D.; Courville, A.; Bergstra, J.; Bengio, Y. An empirical evaluation of deep architectures on problems with many factors of variation. Proceedings of the 24th international conference on Machine learning. ACM, 2007, pp. 473 -- 480. LeCun, Y.; Bottou, L.; Bengio, Y.; Haffner, P. Gradient-based learning applied to document recognition. Proceedings of the IEEE 1998, 86, 2278 -- 2324. Bergamini, E.; Meyerhenke, H.; Staudt, C.L., Approximating Betweenness Centrality in Large Evolving Networks. In 2015 Proceedings of the Seventeenth Workshop on Algorithm Engineering and Experiments (ALENEX); SIAM, 2015; pp. 133 -- 146, [https://epubs.siam.org/doi/pdf/10.1137/1.9781611973754.12]. doi:10.1137/1.9781611973754.12. Green, O.; McColl, R.; Bader, D.A. A Fast Algorithm for Streaming Betweenness Centrality. Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International 41. 42. 43. 44. 45. 38. 39. 40. 46. Version April 10, 2019 submitted to Algorithms 34 of 38 Conference on Privacy, Security, Risk and Trust; IEEE Computer Society: Washington, DC, USA, 2012; SOCIALCOM-PASSAT '12, pp. 11 -- 20. doi:10.1109/SocialCom-PASSAT.2012.37. Kourtellis, N.; Morales, G.D.F.; Bonchi, F. Scalable Online Betweenness Centrality in Evolving Graphs. CoRR 2014, abs/1401.6981. Brandes, U.; Pich, C. Centrality estimation in large networks. INTL. JOURNAL OF BIFURCATION AND CHAOS, SPECIAL ISSUE ON COMPLEX NETWORKS' STRUCTURE AND DYNAMICS, 2007. Bader, D.; Madduri, K. Parallel Algorithms for Evaluating Centrality Indices in Real-world Networks. Proceedings of the 2006 International Conference on Parallel Processing (ICPP '06), 2006, pp. 539 -- 550. McLaughlin, A.; Bader, D.A. Scalable and High Performance Betweenness Centrality on the GPU. SC '14: Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, 2014, pp. 572 -- 583. doi:10.1109/SC.2014.52. Sariyüce, A.E.; Kaya, K.; Saule, E.; Çatalyürek, U.V. Betweenness Centrality on GPUs and Heterogeneous Architectures. Proceedings of the 6th Workshop on General Purpose Processor Using Graphics Processing Units; ACM: New York, NY, USA, 2013; GPGPU-6, pp. 76 -- 85. doi:10.1145/2458523.2458531. Shi, Z.; Zhang, B. Fast network centrality analysis using GPUs. BMC Bioinformatics 2011, 12, 149. doi:10.1186/1471-2105-12-149. Crescenzi, P.; D'Angelo, G.; Severini, L.; Velaj, Y. Greedily Improving Our Own Centrality in A Network. Experimental Algorithms; Bampis, E., Ed.; Springer International Publishing: Cham, 2015; pp. 43 -- 55. Hennessy, J.L.; Patterson, D.A. Computer architecture: a quantitative approach; Elsevier, 2011. Bixby, R.E. Solving real-world linear programs: A decade and more of progress. Operations research 2002, 50, 3 -- 15. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. Mitchell, D.W. 88.27 more on spreads and non-arithmetic means. The Mathematical Gazette 2004, 88, 142 -- 144. Smith, J.E. Characterizing Computer Performance with a Single Number. Commun. ACM 1988, 31, 1202 -- 1206. doi:10.1145/63039.63043. Fleming, P.J.; Wallace, J.J. How Not To Lie With Statistics: The Correct Way To Summarize Benchmark Results. Commun. ACM 1986, 29, 218 -- 221. doi:10.1145/5666.5673. AlGhamdi, Z.; Jamour, F.; Skiadopoulos, S.; Kalnis, P. A Benchmark for Betweenness Centrality Approximation Algorithms on Large Graphs. Proceedings of the 29th International Conference on Scientific and Statistical Database Management, Chicago, IL, USA, June 27-29, 2017, 2017, pp. 6:1 -- 6:12. doi:10.1145/3085504.3085510. git. git. https://git-scm.com/, 2005. GitHub. GitHub. https://github.com/, 2007. GitLab. GitLab. https://gitlab.com/, 2011. Bitbucket. Bitbucket. https://bitbucket.org/, 2008. Nethercote, N.; Seward, J. Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM Sigplan notices. ACM, 2007, Vol. 42, pp. 89 -- 100. Reinders, J. VTune performance analyzer essentials. Intel Press 2005. Hamadi, Y.; Wintersteiger, C.M. Seven Challenges in Parallel SAT Solving. Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012. Kimmig, R.; Meyerhenke, H.; Strash, D. Shared Memory Parallel Subgraph Enumeration. 2017 IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPS Workshops 2017, Orlando / Buena Vista, FL, USA, May 29 - June 2, 2017. IEEE Computer Society, 2017, pp. 519 -- 529. doi:10.1109/IPDPSW.2017.133. Goldberg, D. What Every Computer Scientist Should Know About Floating-point Arithmetic. ACM Comput. Surv. 1991, 23, 5 -- 48. doi:10.1145/103162.103163. YAML. The YAML Project. https://yaml.org/, 2002. (DFG), G.R.F., 2010. JSON. JSON. https://www.json.org/index.html, 2001. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. Version April 10, 2019 submitted to Algorithms 35 of 38 72. 73. 74. The American Statistician 1973, 27, 17 -- 21. Anscombe, F.J. Graphs in Statistical Analysis. doi:10.1080/00031305.1973.10478966. Healy, K. Data Visualization: A Practical Introduction; Princeton University Press, 2018. Sanders, P. Presenting Data from Experiments in Algorithmics. In Experimental Algorithmics; Fleischer, R.; Moret, B.; Schmidt, E.M., Eds.; Springer-Verlag Berlin Heidelberg, 2002; Vol. 2547, LNCS, chapter 9, pp. 181 -- 196. Tufte, E.R. The Visual Display of Quantitative Information; Graphics Press, 2001. Munzner, T. Visualization Analyis and Design; CRC Press, 2014. 75. 76. 77. Ware, C. Information Visualization: Perception for Design, 3rd ed.; Morgan Kaufmann, 2012. 78. Anderson, D.R.; Burnham, K.P.; Thompson, W.L. Null hypothesis testing: problems, prevalence, and an alternative. The journal of wildlife management 2000, pp. 912 -- 923. Trafimow, D.; Marks, M. Editorial. Basic and Applied Social Psychology 2015, 37, 1 -- 2. 79. 80. Wasserstein, R.L.; Lazar, N.A. The ASA's statement on p-values: context, process, and purpose, 2016. 81. The New Statistics: Why and How. Psychological Science 2014, 25, 7 -- 29, Lash, T.L. The harm done to reproducibility by the culture of null hypothesis significance testing. American journal of epidemiology 2017, 186, 627 -- 635. Cumming, G. [https://doi.org/10.1177/0956797613504966]. PMID: 24220629, doi:10.1177/0956797613504966. Kruschke, J.K.; Liddell, T.M. The Bayesian New Statistics: Hypothesis testing, estimation, meta-analysis, and power analysis from a Bayesian perspective. Psychonomic Bulletin & Review 2018, 25, 178 -- 206. Murtaugh, P.A. In defense of P values. Ecology 2014, 95, 611 -- 617. Box, G.E.P. Science and Statistics. Journal of the American Statistical Association 1976, 71, 791 -- 799. Pólya, G. Über den zentralen Grenzwertsatz der Wahrscheinlichkeitsrechnung und das Momentenproblem. Mathematische Zeitschrift 1920, 8, 171 -- 181. The Equivalence of Generalized Least Squares and Charnes, A.; Frome, E.L.; Yu, P.L. Maximum Likelihood Estimates in the Exponential Family. Journal of the American Statistical Association 1976, 71, 169 -- 171, [https://www.tandfonline.com/doi/pdf/10.1080/01621459.1976.10481508]. doi:10.1080/01621459.1976.10481508. Fisher, R.A. Statistical methods for research workers. In Breakthroughs in Statistics; Springer, 1992; pp. 66 -- 70. Young, G.A.; Smith, R.L.; others. Essentials of statistical inference; Vol. 16, Cambridge University Press, 2005. 82. 83. 84. 85. 86. 87. 88. 89. 92. 93. 94. 95. 96. 97. 98. 99. 90. Wilcoxon, F. Individual comparisons by ranking methods. Biometrics bulletin 1945, 1, 80 -- 83. 91. [Online; Jones, E.; Oliphant, T.; Peterson, P.; others. SciPy: Open source scientific tools for Python, 2001 -- . accessed <today>]. Dunn, O.J. Multiple comparisons among means. Journal of the American Statistical Association 1961, 56, 52 -- 64. Holm, S. A Simple Sequentially Rejective Multiple Test Procedure. Scandinavian Journal of Statistics 1979, 6, 65 -- 70. Smithson, M. Confidence Intervals; SAGE Publications, Inc., 2003. Neyman, J. Outline of a Theory of Statistical Estimation Based on the Classical Theory of Probability. Phil. Trans. R. Soc. Lond. A 1937, 236, 333 -- 380. Gelman, A.; Stern, H.S.; Carlin, J.B.; Dunson, D.B.; Vehtari, A.; Rubin, D.B. Bayesian data analysis; Chapman and Hall/CRC, 2013. Salvatier, J.; Wiecki, T.V.; Fonnesbeck, C. Probabilistic programming in Python using PyMC3. PeerJ Computer Science 2016, 2, e55. Akaike, H. A new look at the statistical model identification. IEEE Transactions on Automatic Control 1974, 19, 716 -- 723. doi:10.1109/TAC.1974.1100705. Barr, R.S. Designing and Reporting on Computational Experiments with Heuristic Methods; Technical report, Department of Computer Science and Engineering, Southern Methodist University, 1995. Version April 10, 2019 submitted to Algorithms 36 of 38 100. Moret, B.M.E.; Shapiro, H.D.D. Algorithms and Experiments: The New (and Old) Methodology. j-jucs 2001, 7, 434 -- 446. 101. Gent, I.P.; Grant, S.A.; MacIntyre, E.; Prosser, P.; Shaw, P.; Smith, B.M.; Walsh, T. How Not To Do It. Research Report 97.27 (School of Computer Studies, University of Leeds) 1997. 102. McGeoch, C.C.; Moret, B.M.E. How to present a paper on experimental work with algorithms. SIGACT News 1999, 30, 85 -- 90. 103. McGeoch, C.C. Toward an Experimental Method for Algorithm Simulation. INFORMS Journal on Computing 1996, 8, 1 -- 15. 104. McGeoch, C.C. Analyzing Algorithms by Simulation: Variance Reduction Techniques and Simulation Speedups. ACM Comput. Surv. 1992, 24, 195 -- 212. doi:10.1145/130844.130853. 105. Council, N.R. Network Science; The National Academies Press: Washington, DC, 2005. doi:10.17226/11516. 106. Hanks, S.; Pollack, M.E.; Cohen, P.R. Benchmarks, Test Beds, Controlled Experimentation, and the Design of Agent Architectures. AI Magazine 1993, 14, 17 -- 42. 107. Cohen, P.R. Empirical Methods for Artificial Intelligence; MIT Press: Cambridge, MA, USA, 1995. 108. Eckles, D.; Brian, K.; Johan, U. Design and Analysis of Experiments in Networks: Reducing Bias from Interference. Journal of Causal Inference 2017, 5. 109. Gui, H.; Xu, Y.; Bhasin, A.; Han, J. Network A/B Testing: From Sampling to Estimation. Proceedings of the 24th International Conference on World Wide Web; International World Wide Web Conferences Steering Committee: Republic and Canton of Geneva, Switzerland, 2015; WWW '15, pp. 399 -- 409. doi:10.1145/2736277.2741081. Jensen, D.D.; Cohen, P.R. Multiple comparisons in induction algorithms. Machine Learning 2000, 38, 309 -- 338. 110. 111. Kuhn, M.; Johnson, K. Applied predictive modeling; Vol. 26, Springer, 2013. 112. Funke, D.; Sanders, P. Parallel d-D Delaunay Triangulations in Shared and Distributed Memory. ALENEX. SIAM, 2017, pp. 207 -- 217. 113. Booth, A.; Papaioannou, D.; Sutton, A. Systematic Approaches to a Successful Literature Review; SAGE Publications, 2012. 114. Keshav, S. How to Read a Paper. SIGCOMM Comput. Commun. Rev. 2007, 37, 83 -- 84. doi:10.1145/1273445.1273458. 115. Kaijanaho, A.J. Teaching Master's Degree Students to Read Research Literature: Experience in a Programming Languages Course 2002 -- 2017. Proceedings of the 17th Koli Calling International Conference on Computing Education Research; ACM: New York, NY, USA, 2017; Koli Calling '17, pp. 143 -- 147. doi:10.1145/3141880.3141893. 116. Garousi, V.; Felderer, M. Experience-based Guidelines for Effective and Efficient Data Extraction in Systematic Reviews in Software Engineering. Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering; ACM: New York, NY, USA, 2017; EASE'17, pp. 170 -- 179. doi:10.1145/3084226.3084238. 117. Brooks, A. Searching and Reviewing the Computer Science Literature: A Guide for Research Students, 1990. 118. Karger, D.R.; Stein, C. A new approach to the minimum cut problem. Journal of the ACM (JACM) 1996, 43, 601 -- 640. 119. Brandes, U.; Delling, D.; Gaertler, M.; Görke, R.; Hoefer, M.; Nikoloski, Z.; Wagner, D. On Finding Graph Clusterings with Maximum Modularity. Proceedings of the 33rd International Conference on Graph-theoretic Concepts in Computer Science; Springer-Verlag: Berlin, Heidelberg, 2007; WG'07, pp. 121 -- 132. 120. Hijazi, H.L.; Bonami, P.; Cornuéjols, G.; Ouorou, A. Mixed Integer NonLinear Programs featuring "On/Off" constraints: convex analysis and applications. Electronic Notes in Discrete Mathematics 2010, 36, 1153 -- 1160. 121. Morey, R.D.; Hoekstra, R.; Rouder, J.N.; Lee, M.D.; Wagenmakers, E.J. The fallacy of placing confidence in confidence intervals. Psychonomic bulletin & review 2016, 23, 103 -- 123. Version April 10, 2019 submitted to Algorithms 37 of 38 122. Greenland, S.; Senn, S.J.; Rothman, K.J.; Carlin, J.B.; Poole, C.; Goodman, S.N.; Altman, D.G. Statistical tests, P values, confidence intervals, and power: a guide to misinterpretations. European journal of epidemiology 2016, 31, 337 -- 350. Ioannidis, J.P. Why most published research findings are false. PLoS medicine 2005, 2, e124. 123. 124. Tukey, J.W. We Need Both Exploratory and Confirmatory. The American Statistician [https://amstat.tandfonline.com/doi/pdf/10.1080/00031305.1980.10482706]. 1980, doi:10.1080/00031305.1980.10482706. 23 -- 25, 34, 125. Amdahl, G.M. Validity of the single processor approach to achieving large scale computing capabilities. Proceedings of the April 18-20, 1967, spring joint computer conference. ACM, 1967, pp. 483 -- 485. 126. Gustafson, J.L. Reevaluating Amdahl's law. Communications of the ACM 1988, 31, 532 -- 533. 127. Shi, Y. Reevaluating Amdahl's law and Gustafson's law. Computer Sciences Department, Temple University (MS: 38-24) 1996. 128. Costa, L.d.F.; Rodrigues, F.A.; Travieso, G.; Villas Boas, P.R. Characterization of complex networks: A survey of measurements. Advances in physics 2007, 56, 167 -- 242. 129. Kim, J.; Wilhelm, T. What is a complex graph? Physica A: Statistical Mechanics and its Applications 2008, 387, 2637 -- 2652. 130. Boccaletti, S.; Latora, V.; Moreno, Y.; Chavez, M.; Hwang, D.U. Complex networks: Structure and dynamics. Physics reports 2006, 424, 175 -- 308. 131. Watts, D.J.; Strogatz, S.H. Collective dynamics of 'small-world'networks. nature 1998, 393, 440. 132. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. science 1999, 286, 509 -- 512. 133. Newman, M.E. Assortative mixing in networks. Physical review letters 2002, 89, 208701. 134. Milo, R.; Shen-Orr, S.; Itzkovitz, S.; Kashtan, N.; Chklovskii, D.; Alon, U. Network motifs: simple building blocks of complex networks. Science 2002, 298, 824 -- 827. 135. Newman, M.E. Modularity and community structure in networks. Proceedings of the national academy of sciences 2006, 103, 8577 -- 8582. 136. Barabási, A.L.; Bonabeau, E. Scale-free networks. Scientific american 2003, 288, 60 -- 69. 137. Amaral, L.A.N.; Scala, A.; Barthelemy, M.; Stanley, H.E. Classes of small-world networks. Proceedings of the national academy of sciences 2000, 97, 11149 -- 11152. Sedgewick, R. The analysis of quicksort programs. Acta Informatica 1977, 7, 327 -- 355. 138. 139. Easley, D.; Kleinberg, J. Networks, crowds, and markets: Reasoning about a highly connected world; Cambridge University Press, 2010. 140. Bavelas, A. A mathematical model for group structures. Applied anthropology 1948, 7, 16 -- 30. 141. Shimbel, A. Structural parameters of communication networks. The bulletin of mathematical biophysics 1953, 15, 501 -- 507. Shaw, M.E. Group structure and the behavior of individuals in small groups. The Journal of psychology 1954, 38, 139 -- 149. 142. 143. Cohn, B.S.; Marriott, M. Networks and centres of integration in Indian civilization. Journal of social Research 1958, 1, 1 -- 9. 144. Borgatti, S.P.; Everett, M.G. A graph-theoretic perspective on centrality. Social networks 2006, 28, 466 -- 484. 145. Chung, F.; Chung, F.R.; Graham, F.C.; Lu, L.; Chung, K.F.; others. Complex graphs and networks; 146. American Mathematical Soc., 2006. Lü, J.; Chen, G.; Ogorzalek, M.J.; Trajković, L. Theory and applications of complex networks: Advances and challenges. Circuits and Systems (ISCAS), 2013 IEEE International Symposium on. IEEE, 2013, pp. 2291 -- 2294. 147. Clauset, A.; Shalizi, C.R.; Newman, M.E. Power-law distributions in empirical data. SIAM review 2009, 148. 51, 661 -- 703. Fan, R.; Xu, K.; Zhao, J. A GPU-Based Solution to Fast Calculation of Betweenness Centrality on Large Weighted Networks. PeerJ Computer Science 2017, 3. Version April 10, 2019 submitted to Algorithms 38 of 38 149. D'Angelo, G.; Severini, L.; Velaj, Y. On the Maximum Betweenness Improvement Problem. Electronic Notes in Theoretical Computer Science 2016, 322, 153 -- 168. Proceedings of ICTCS 2015, the 16th Italian Conference on Theoretical Computer Science, doi:https://doi.org/10.1016/j.entcs.2016.03.011. Jacob, R.; Koschützki, D.; Lehmann, K.A.; Peeters, L.; Tenfelde-Podehl, D., Algorithms for Centrality Indices. In Network Analysis: Methodological Foundations; Springer Berlin Heidelberg: Berlin, Heidelberg, 2005; pp. 62 -- 82. doi:10.1007/978-3-540-31955-9_4. 150. 151. Hong, C.T.; Chen, D.H.; Chen, Y.B.; Chen, W.G.; Zheng, W.M.; Lin, H.B. Providing Source Code Level Portability Between CPU and GPU with MapCG. Journal of Computer Science and Technology 2012, 27, 42 -- 56. doi:10.1007/s11390-012-1205-4. 152. Hayashi, T.; Akiba, T.; Yoshida, Y. Fully Dynamic Betweenness Centrality Maintenance on Massive Networks. Proc. VLDB Endow. 2015, 9, 48 -- 59. doi:10.14778/2850578.2850580. 153. Nemhauser, G.L.; Wolsey, L.A. Best algorithms for approximating the maximum of a submodular set function. Mathematics of operations research 1978, 3, 177 -- 188. 154. Chacon, S.; Straub, B. Pro Git, 2nd ed.; Apress: Berkely, CA, USA, 2014. 155. R Core Team. R-project. https://www.r-project.org/, 1993. 156. R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2012. ISBN 3-900051-07-0. 157. Williams, T.; Kelley, C. gnuplot. https://www.r-project.org/, 1986. 158. Hunter, J.D. Matplotlib: A 2D graphics environment. Computing In Science & Engineering 2007, 9, 90 -- 95. doi:10.1109/MCSE.2007.55. 159. The MathWorks, Inc.. Matlab 8.0. https://www.mathworks.com/products/matlab.html, 1984. 160. Cox, D.R. Principles of statistical inference; Cambridge university press, 2006. 161. Cox, N.J. Stata tip 96: Cube roots. Stata Journal 2011, 11, 149 -- 154(6). 162. Demsar, J. Statistical Comparisons of Classifiers over Multiple Data Sets. Journal of Machine Learning Research 2006, 7, 1 -- 30. 163. García, S.; Fernández, A.; Luengo, J.; Herrera, F. Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: Experimental analysis of power. Inf. Sci. 2010, 180, 2044 -- 2064. doi:10.1016/j.ins.2009.12.010. 164. Garcia, S.; Herrera, F. An extension on"statistical comparisons of classifiers over multiple data sets"for all pairwise comparisons. Journal of Machine Learning Research 2008, 9, 2677 -- 2694. 165. Knuth, D.E. The art of computer programming; Vol. 3, Pearson Education, 1997. c(cid:13) 2019 by the authors. Submitted to Algorithms for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
1708.05569
2
1708
2018-09-12T10:38:07
Community detection in networks via nonlinear modularity eigenvectors
[ "cs.SI", "math.OC", "stat.ML" ]
Revealing a community structure in a network or dataset is a central problem arising in many scientific areas. The modularity function $Q$ is an established measure quantifying the quality of a community, being identified as a set of nodes having high modularity. In our terminology, a set of nodes with positive modularity is called a \textit{module} and a set that maximizes $Q$ is thus called \textit{leading module}. Finding a leading module in a network is an important task, however the dimension of real-world problems makes the maximization of $Q$ unfeasible. This poses the need of approximation techniques which are typically based on a linear relaxation of $Q$, induced by the spectrum of the modularity matrix $M$. In this work we propose a nonlinear relaxation which is instead based on the spectrum of a nonlinear modularity operator $\mathcal M$. We show that extremal eigenvalues of $\mathcal M$ provide an exact relaxation of the modularity measure $Q$, however at the price of being more challenging to be computed than those of $M$. Thus we extend the work made on nonlinear Laplacians, by proposing a computational scheme, named \textit{generalized RatioDCA}, to address such extremal eigenvalues. We show monotonic ascent and convergence of the method. We finally apply the new method to several synthetic and real-world data sets, showing both effectiveness of the model and performance of the method.
cs.SI
cs
COMMUNITY DETECTION IN NETWORKS VIA NONLINEAR MODULARITY EIGENVECTORS ∗ FRANCESCO TUDISCO†, PEDRO MERCADO‡, AND MATTHIAS HEIN‡ Abstract. Revealing a community structure in a network or dataset is a central problem arising in many scientific areas. The modularity function Q is an established measure quantifying the quality of a community, being identified as a set of nodes having high modularity. In our terminology, a set of nodes with positive modularity is called a module and a set that maximizes Q is thus called leading module. Finding a leading module in a network is an important task, however the dimension of real-world problems makes the maximization of Q unfeasible. This poses the need of approximation techniques which are typically based on a linear relaxation of Q, induced by the spectrum of the modularity matrix M. In this work we propose a nonlinear relaxation which is instead based on the spectrum of a nonlinear modularity operator M. We show that extremal eigenvalues of M provide an exact relaxation of the modularity measure Q, in the sense that the maximum eigenvalue of M is equal to the maximum value of Q, however at the price of being more challenging to be computed than those of M. Thus we extend the work made on nonlinear Laplacians, by proposing a computational scheme, named generalized RatioDCA, to address such extremal eigenvalues. We show monotonic ascent and convergence of the method. We finally apply the new method to several synthetic and real-world data sets, showing both effectiveness of the model and performance of the method. Key words. Community detection, graph modularity, spectral partitioning, nonlinear eigenval- ues, Cheeger inequality. AMS subject classifications. 05C50, 05C70, 47H30, 68R10 1. Introduction. This paper is concerned with the problem of finding leading communities in a network. A community is roughly defined as a set of nodes being highly connected inside and poorly connected with the rest of the graph. Identifying important communities in a complex network is a highly relevant problem which has applications in many disciplines, such as computer science, physics, neuroscience, social science, biology, and many others, see e.g. [19, 43, 51, 54]. In order to address this problem from the mathematical point of view one needs a quantitative definition of what a community is. To this end several merit functions have been introduced in the recent literature [24]. A very popular and successful idea is based on the concept of modularity introduced by Newman and Girvan in [44]. The modularity measure of a set of nodes A in a graph G = (V, E) quantifies the difference between the actual and expected weight of edges in A, if edges were placed at random according to a random null model. A subgraph G(A) is then identified as a community if the modularity measure of A is "large enough". The modularity-based community detection problem thus boils down to a combi- natorial optimization problem, that is reminiscent of another famous task known as graph partitioning. Graph partitioning can be roughly described as the problem of finding a k-partition of the set of vertices of G, where k is a given number of disjoint sets to be identified. Modularity-based community detection does not prescribe the number of subsets ∗ of F.T. has been partially supported by the Marie Curie Individual Fellowship MAGNET. Funding: The work of the authors has been supported by the ERC grant NOLEPRO. The work †Department of Mathematics and Statistics, University of Strathclyde, G11XH Glasgow, UK ‡Department of Mathematics and Computer Science, Saarland University, 66123 Saarbrücken, ([email protected]) Germany ([email protected], [email protected]) 1 2 into which the network is divided, and it is generally assumed that the graph is intrinsically structured into groups that are delimited to some extent. The main objective is to reveal the presence and the consistency of such groups. As modularity-based community detection is known to be NP-hard [7], different strategies have been proposed to compute an approximate solution. Linear relaxation approaches are based on the spectrum of specific matrices (as the modularity matrix or the Laplacian matrix) and have been been widely explored and applied to various research areas, see e.g. [21, 40, 41, 52]. Computational heuristics have been developed for optimizing directly the discrete quality function (see e.g. [36, 45]), including for example greedy algorithms [14], simulated annealing [28] and extremal optimization [18]. Among them, the locally greedy algorithm known as Louvain method [5] is arguably the most popular one. In recent years, and mostly in the context of graph partitioning, nonlinear relaxation approaches have been proposed (see for instance [8,9,29,56]). In the context of community detection, a nonlinear relaxation based on the Ginzburg-Landau functional is considered for instance in [6,32], where it is shown to be Γ-convergent to the discrete modularity optimum. In this paper, we propose two nonlinear relaxations of different modularity set functions, and prove them to be exact, in the sense that the maximum values of our proposed nonlinear relaxations are equal to the maximum of the corresponding modularity set functions. More precisely, we introduce two nonlinear relaxations that are based on a nonlinear modularity operator M : Rn → Rn. We associate to M two different Rayleigh quotients, inducing two different notions of eigenvalues and eigenvectors of M and we prove two Cheeger-type results for M that show that the maximal eigenvalues of M associated to such Rayleigh quotients coincide with the maxima of two different modularity measures of the graph. Interestingly enough we observe that the modularity matrix completely overlooks the difference between these two modularity measures, which instead M allows to address individually. Although nonlinearity generally prevents us to compute the eigenvalues of M, the optimization framework proposed in [30] allows for an algorithm addressing the minimization of positive valued Rayleigh quotients. As the Rayleigh quotients we associate to M attain positive and negative values, here we extend that method to a wider class of ratios of functions, proving monotonic descent and convergence to a nonlinear eigenvector. The paper is organized as follows: Section 2 gives an overview of the concept of modularity measure, modularity matrix and the Newman's spectral method for com- munity detection, as proposed in [44]. In Section 3 we define the nonlinear modularity operator M and the associated Rayleigh and dual Rayleigh quotients. We show that both ensure an exact relaxation of suitable modularity-based combinatorial optimiza- tion problems on the graph. In Section 4 we propose a nonlinear spectral method for community detection in networks through the eigenvectors of the nonlinear modular- ity and, finally, in Section 5 we show extensive results on synthetic and real-world networks highlighting the improvements that nonlinearity ensures over the standard linear relaxation approach. 1.1. Notation. Throughout this paper we assume that an undirected graph G = (V, E) is given, with the following properties: V is the vertex set equipped with the positive measure µ : V → R+; E is the edge set equipped with positive weight function w : E → R+. The symbol R+ denotes the set of positive numbers. The vertex set V is everywhere identified with {1, . . . , n}. We denote by (cid:104)·,·(cid:105)µ the weighted i µixip be scalar product (cid:104)x, y(cid:105)µ =(cid:80) i µixiyi. Similarly, for p ≥ 1 we let (cid:107)x(cid:107)p p,µ =(cid:80) 3 (cid:88) i∈A (cid:88) the weighted (cid:96)p norm on V . Given two subsets A, B ⊆ V , the set of edges between nodes in A and B is denoted by E(A, B). When A and B coincide we use the short notation E(A). The overall weight of a set is the sum of the weights in the set, thus for A, B ⊆ V , we write µ(A) = µi, w(E(A, B)) = w(ij) . w(E({i}, V )) = di is the degree of the node i, and w(E(A, V )) = vol(A) =(cid:80) Special notations are reserved to the case where B is the whole vertex set. Precisely, i∈A di For a subset A ⊆ V we write A to denote the complement V \ A and we let the volume of the set A. 1A ∈ Rn be the characteristic vector (1A)i = 1 if i ∈ A and (1A)i = 0 otherwise. ij∈E(A,B) 2. Modularity measure. A central problem in graph mining is to look for quantitative definitions of community. Although there is no universally accepted definition and a variety of merit functions have been proposed in recent literature, the global definition based on the modularity quality function proposed by Newman and Girvan [44] is an effective and very popular one [24]. Such measure is based on the assumption that A ⊆ V is a community of nodes if the induced subgraph G(A) = (A, E(A)) contains more edges than expected, if edges were placed at random according to a random graph model G0 (also called null-model). Let G0 = (V0, E0) be the expected graph of the random ensemble G0, with weight measure w0 : E0 → R+. The definition of modularity Q(A) of A ⊆ V , is as follows (1) Q(A) = w(E(A)) − w0(E0(A)) , so that Q(A) > 0 if the actual weight of edges in G(A) exceeds the expected one in G0(A). A set of nodes A is a community if it has positive modularity, and the associated subgraph G(A) is called a module. A number of different null-models and variants of the modularity measure have been considered in recent literature, see e.g. [2, 22, 47, 50]. An alternative formulation relates with a normalized version of the modularity, where the measure µ(A) of the set A is used as a balancing function, for different choices of the measure µ. We define the normalized modularity Qµ(A) of A ⊆ V as follows (2) Qµ(A) = Q(A)/µ(A) . As we discuss in Section 5, the use of such normalized version can help to identify small group of nodes as important communities in the graph, whereas it is known that the standard (unnormalized) measure tends to overlook small groups [25]. The definition of modularity of a subset is naturally extended to the measure of the modularity of a partition of G, by simply looking at the sum of the modularities: given a partition {A1, . . . , Ak} of V , its modularity and normalized modularity are defined respectively by q(A1, . . . , Ak) = Q(Ai), and qµ(A1, . . . , Ak) = Qµ(Ai) . Clearly the normalization factor 1/µ(V ) does not affect the community structure and is considered here for compatibility with previous works. When the partition consists k(cid:88) 1 µ(V ) i=1 k(cid:88) i=1 4 of only two sets {A, A} we use the shorter notation q(A) and qµ(A) for q(A, A) and qµ(A, A), respectively. The definition and effectiveness of the modularity measure (1) highly depends on the chosen random model G0. A very popular and successful one, considered originally by Newman and Girvan in [44], is based on the Chung-Lu random graph (see f.i. [1, 12, 46]) and its weighted variant [21]. For the sake of completeness, we recall hereafter the definition of weighted Chung-Lu model. i=1 δi. Definition 2.1. Let δ = (δ1, . . . , δn)T > 0, and let X(p) be a nonnegative ran- dom variable parametrized by the scalar parameter p ∈ [0, 1], whose expectation is E(X(p)) = p. We say that a graph G = (V, E) with weight function w follows the X-weighted Chung-Lu random graph model G(δ, X) if, for all i, j ∈ V , w(ij) are independent random variables distributed as X(pij) where pij = δiδj/(cid:80)n The unweighted model coincides with the special case of G(δ, X) where X(p) is the Bernoulli trial with success probability p. On the other hand, if X(p) has a continuous part, then G(δ, X) may contain graphs with generic weighted edges. In any case, as in the original Chung-Lu model, if G is a random graph drawn from G(δ, X) then the expected degree of node i is E(di) = δi. Given the degree sequence d = (d1, . . . , dn) of the actual network G = (V, E), we assume from now on that the null-model G0 follows the weighted Chung-Lu random graph model G(δ, X) above, with δ = d. Note that, under this assumption, the modularity measure (1) becomes Q(A) = w(E(A)) − vol(A)2/vol(V ) and we have, in particular, Q(A) = Q(A), for any A ⊆ V . The main contributions we propose in this work deal with the leading module problem, that is the problem of finding a subset A ⊆ V having maximal modularity. Due to the identity Q(A) = Q(A), such problem coincides with finding the bi-partition {A, A} of the vertex set, having maximal modularity. Note that, for the special case of partitions consisting of two sets, the corresponding modularity and normalized modularity set functions are (3) q(A) = 2 µ(V ) Q(A), and qµ(A) = µ(V ) Q(A) µ(A)µ(A) . 2.1. The modularity matrix and the spectral method. Looking for a lead- ing module is a major task in community detection which coincides with the discovery of an optimal bi-partition of G into communities, in terms of modularity. This problem is equivalent to maximizing the modularity and normalized modularity through the set functions q and qµ, respectively, over the possible subsets of V , namely computing the quantities (4) q(G) = max A⊆V q(A), qµ(G) = max A⊆V qµ(A) . As both q(G) and qµ(G) are NP-hard optimization problems [7], a globally optimal solution for large graphs is out of reach. One of the best known techniques for an approximate solution to these problems -- typically referred to as "spectral method" -- relates with the modularity matrix, and its leading eigenpair. Let d be the vector of the degrees of the graph, the normalized modularity matrix of G, with vertex measure µ, is defined as follows (cid:18) (cid:19) (M )ij = 1 µi w(ij) − didj vol(V ) , for i, j = 1, . . . , n . 5 √ Note that the term didj/vol(V ) is the (i, j) entry of the one-rank adjacency matrix of the expected graph of a random ensemble following the weighted Chung-Lu random model. eigenvalue λ1(M ). It is proved in [22] that if (cid:101)d = (d1/ The spectral method roughly selects a bi-partition of the vertex set V accordingly with the sign of the elements in an eigenvector x of M, associated with its largest µn) is not an eigenvector of M, then λ1(M ) is a simple eigenvalue and thus x is uniquely defined. If λ1(M ) > 0, one computes x such that M x = λ1(M )x, then the vertex set V is partitioned into A+ = {i ∈ V : xi ≥ t∗} and A+, being t∗ = arg maxt q({i ∈ V : ui ≥ t}). If λ1(M ) = 0, the graph is said algebraically indivisible, i.e. it resembles no community structure (see e.g. [21,41]). The motivations behind this technique are based on a relaxation argument, that we discuss in what follows. √ µ1, . . . , dn/ The Rayleigh quotient of M is the real valued function rM (x) = (cid:104)x, M x(cid:105)µ (cid:107)x(cid:107)2 2,µ . As the matrix M is symmetric with respect the weighted scalar product (cid:104)·,·(cid:105)µ, its eigenvalues can be characterized as variational values of rM. In particular, if the eigenvalues of M are enumerated in descending order, then λ1(M ) is the global max- imum of rM, (5) λ1(M ) = max x∈Rn rM (x) . The quantity q(G) can be rewritten in terms of rM, thus in terms of M. Consider the binary vector vA = 1A − 1A. Using the identities 1A = 1 − 1A, M1 = 0 and (cid:107)vA(cid:107)2 2,µ = µ(V ), we get (cid:104)vA, M vA(cid:105)µ = 4Q(A), thus (6) q(G) = max A⊆V 2 Q(A) µ(V ) = 1 2 max A⊆V rM (vA) = 1 2 max x∈{−1,1}n rM (x) . Computing the global optimum of rM over {−1, 1}n is NP-hard. However, this max- imum can be approximated by dropping the binary constraint on x and, thus, trans- forming the problem into the eigenvalue problem (5), which can be easily solved. This observation is one of the main motivations of the spectral method based on the mod- ularity matrix M and its largest eigenvalue λ1(M ), whereas the main drawback of this approach is that, in general, the eigenvalue λ1(M ) can arbitrary differ from the actual modularity q(G). From Equation (6) we can see that rM coincides with q when evaluated on binary vectors x ∈ {−1, 1}n. For this reason and the fact that maxx∈Rn rM (x) coincides with an eigenvalue of the linear operator M we say that rM is a linear relaxation of q. Before concluding this section we would like to point out another drawback of the linear relaxation approach which, to our opinion, is often overlooked: as we will show in Section 5, the solutions of q(G) and qµ(G) are in general far from being the same, however the linear relaxation approach in principle ignores such difference. In fact, the linear relaxation rM of the modularity set function q is also a linear relaxation of the normalized modularity set function qµ. We show such observation via the following Proposition 2.2. If the largest eigenvalue λ1(M ) of M is positive, then rM is a linear relaxation of both q and qµ. 6 Proof. We already observed that rM coincides with q on the set of binary vectors x ∈ {−1, 1}n. A similar simple argument is used for qµ. Consider the vector wA = 1A − µ(A) µ(V ) 1. Since µ(A) = µ(V ) − µ(A) we get (cid:107)wA(cid:107)2 and rM (wA) = qµ(A, A). Note that (cid:104)wA, 1(cid:105)µ = 0, thus 2,µ = µ(A)µ(A) µ(V ) µ(V ) Q(A) µ(A) µ(A) max rM (x) . = max A⊆V rM (wA) = qµ(G) = max A⊆V x∈{−a,b}n, (cid:104)x,1(cid:105)µ=0 (7) Therefore, rM and qµ coincide on the set of binary vectors x ∈ {−a, b}n such that (cid:104)x, 1(cid:105)µ = 0 (for suitable a, b > 0). As M has a positive eigenvalue by assumption, dropping the binary constraint x ∈ {−a, b}n and recalling that 1 ∈ ker(M ), we get maxx∈Rn, (cid:104)x,1(cid:105)µ=0 rM (x) = maxx∈Rn rM (x) = λ1(M ). 3. Tight nonlinear modularity relaxation. In this section we introduce a nonlinear modularity operator M, through a natural generalization of the modularity matrix M. To this operator we associate a Rayleigh quotient and a dual Rayleigh quotient to which naturally correspond a notion of nonlinear eigenvalues and eigen- vectors. We use the new Rayleigh quotients to derive nonlinear relaxations of the modularity q and the normalized modularity qµ set functions, respectively. Moreover, unlike the standard linear relaxation, we show that such relaxations are tight, that is we prove a Cheeger-type result showing that certain eigenvalues of M coincide with the graph modularities (4). 3.1. Nonlinear modularity operator. The nonlinear modularity operator we are going to define is related with the Clarke's subdifferential ∂ (see [13] e.g.). We recall that, for f : Rn → R Lipschitz around x ∈ Rn, the subdifferential of f at x is defined as the following subset of Rn f (z + tv) − f (z) y ∈ Rn : (cid:104)y, v(cid:105) ≤ lim sup z→x,t→0 ∂f (x) = The subdifferential of the one norm f (x) = (cid:107)x(cid:107)1 and the infinity norm f (x) = (cid:107)x(cid:107)∞ are of particular importance of us. For these particular functions explicit ex- pressions for ∂f (x) are available. We recall them below in (8) and (13), respectively. As the absolute value is not differentiable at zero, the subdifferential of the 1-norm t , . for all v ∈ Rn (cid:27) (cid:26) (cid:26) (cid:27) is the set valued map Φ defined by yi = sign(xi) if xi (cid:54)= 0, yi ∈ [−1, 1] if xi = 0 x (cid:55)→ Φ(x) = y ∈ Rn : (8) where sign(xi) = 1 if xi > 0 and sign(xi) = −1 if xi < 0. Note that if y ∈ Φ(x) then any component of y belongs to the image of the corresponding component of x. Precisely, y ∈ Φ(x) if and only if yi ∈ Φ(xi) for all i = 1, . . . , n. In order to define the nonlinear modularity operator, let us first observe that, due j=1 Mij = 0, for i = 1, . . . , n, the following formula holds for the to the identity (cid:80)n , modularity matrix M: (M x)i = Mijxj − xi Mij = (−M )ij(xi − xj) . This implies the following identity (9) (cid:104)x, M x(cid:105)µ = µi(−M )ijxi(xi − xj) = µi(−M )ijxi − xj2 , n(cid:88) n(cid:88) j=1 i,j=1 n(cid:88) j=1 n(cid:88) n(cid:88) j=1 1 2 i,j=1 for any x ∈ Rn. Thus we define the nonlinear modularity operator as follows: (10) M(x)i = (−M )ijΦ(xi − xj), i = 1, . . . , n . n(cid:88) j=1 7 Note that, by definition, for any y ∈ M(x) we have (11) (cid:104)x, y(cid:105)µ = 1 2 µi(−M )ijxi − xj . n(cid:88) i,j=1 n(cid:88) Since the right-hand side of (11) does not depend on the choice of the vector y ∈ M(x), we write (cid:104)x,M(x)(cid:105)µ to denote the quantity in (11), in analogy with (9). Note that (cid:104)x,M(x)(cid:105)µ and (cid:104)x, M (x)(cid:105)µ coincide on binary vectors, for instance when x ∈ {−1, 1}n. Also note that (cid:104)x,M(x)(cid:105)µ is strictly related with the total variation of the vector x. More precisely, (cid:104)x,M(x)(cid:105)µ is the difference of two weighted total variations of x, as we will discuss with more detail in Section 3.4. For completeness, we recall that the weighted total variation of x ∈ Rn is the scalar function xρ T V = ρ(i, j)xi − xj , where ρ(i, j) ≥ 0 are the nonnegative weights. We now consider two Rayleigh quotients associated with M(x), defined as follows i,j=1 rM(x) = (cid:104)x,M(x)(cid:105)µ (cid:107)x(cid:107)1,µ , r∗ M(x) = (cid:104)x,M(x)(cid:105)µ (cid:107)x(cid:107)∞ , (12) where (cid:107)x(cid:107)1,µ =(cid:80) i µixi and (cid:107)x(cid:107)∞ = maxi xi. The functions rM and r∗ M generalize the Rayleigh quotient rM of the linear modularity, and we will show in the next section that the global maxima of r∗ M and rM provide an exact nonlinear relaxation of the modularity q and normalized modularity qµ set functions, defined in (3), respectively. Here we show that the optimality conditions for rM and r∗ M are related to a notion of eigenvalues and eigenvectors for the nonlinear modularity operator M. We also briefly discuss the underlying mathematical reason why rM naturally generalizes into rM and r∗ M. 3.2. Nonlinear modularity eigenvectors. As for the 1-norm, we consider the subdifferential Ψ of the infinity norm x (cid:55)→ (cid:107)x(cid:107)∞. For a vector x ∈ Rn, let m1, . . . , mk be the indices such that xmi = (cid:107)x(cid:107)∞, then the subdifferential of the infinity norm is the set valued map Ψ defined by (13) x (cid:55)→ Ψ(x) = Conv{σ11m1, . . . , σk1mk} , where, for i = 1, . . . , k, σi = sign(xmi) and Conv denotes the convex hull. of M To the subdifferentials Φ and Ψ correspond a notion of eigenvalue and eigenvector Definition 3.1. We say that λ is a nonlinear eigenvalue of M with eigenvector x if either 0 ∈ M(x) − λΦ(x) or 0 ∈ M(x) − λΨ(x). We have 8 Proposition 3.2. Let x be a critical point of rM, then x is a nonlinear eigen- vector of M such that 0 ∈ M(x)− λΦ(x) with λ = rM(x). Similarly, if x is a critical M, then x is a nonlinear eigenvector of M such that 0 ∈ M(x) − λΨ(x) point of r∗ with λ = r∗ M(x). Proof. Let ∂ denote the subdifferential. A direct inspection reveals that ∂(cid:107)x(cid:107)1,µ = DµΦ(x), where Dµ is the diagonal matrix (Dµ)i = µi and Φ(x) is the vector with components Φ(x)i = Φ(xi). Using the chain rule for ∂ (see e.g. [13]) we get (cid:8)(cid:107)x(cid:107)1,µ ∂ (cid:104)x,M(x)(cid:105)µ − (cid:104)x,M(x)(cid:105)µ ∂(cid:107)x(cid:107)1,µ (cid:8)DµM(x) − rM(x) DµΦ(x)(cid:9) (cid:9) ∂ rM(x) ⊆ 1 (cid:107)x(cid:107)2 1,µ 1 = (cid:107)x(cid:107)1,µ M. Therefore 0 ∈ ∂ rM(x) implies 0 ∈ M(x) − rM(x) Φ(x). As ∂(cid:107)x(cid:107)∞ = Ψ(x), a similar computation shows the proof for r∗ Thus critical points and critical values of rM and r∗ M satisfy generalized eigenvalue equations for the nonlinear modularity operator M. Despite the linear case, where the eigenvalues of the modularity matrix M coincide with the variational values of rM, the number of eigenvalues of M defined by means of the Rayleigh quotients in (12) is much larger than just the set of variational ones. However in many situations the variational spectrum plays a central role, as for instance in the case of the nonlinear Laplacian [11, 17, 55]. This work provides a further example: in what follows we consider the dominant eigenvalues of M, coinciding with suitable variational values of rM and r∗ M, we prove two optimality Cheeger-type results and we discuss how to use these eigenvalues to locate a leading module in the network by means of a nonlinear spectral method. The task of multiple community detection can also be addressed by successive bi-partitions, as we discuss in Section 5.3. Advantages of the nonlinear spectral method over the linear one are highlighted Section 5 where extensive numerical results are shown. 3.3. On the relation between r∗ M, rM and rM. We briefly discuss the math- ematical reason why rM generalizes into rM and r∗ M. This gives further reason- ing to the definition in (12). To this end we suppose for simplicity that µi = 1. Therefore (−M )ij = didj/vol(V ) − w(ij) for all i, j = 1, . . . , n. Given the graph G = (V, E), consider the linear difference operator B : Rn → RE entrywise defined by (Bx)ij = xi − xj, ij ∈ E, and let wM : E → R be the real valued function wM (ij) = (−M )ij/2. Then we can write (cid:104)x, M x(cid:105)µ = (cid:104)Bx, Bx(cid:105)wM = (cid:107)Bx(cid:107)2 2,wM = wM (ij)(Bx)2 ij , (cid:88) ij∈E where we use the compact notation (cid:107)·(cid:107)2,wM , even though that quantity is not a norm on RE, as wM attains positive and negative values. We have, as a consequence, rM (x) = ((cid:107)Bx(cid:107)2,wM /(cid:107)x(cid:107)2)2. A natural generalization of such quantity is therefore given by (cid:18)(cid:107)Bx(cid:107)p,wM (cid:19)p (cid:107)x(cid:107)p rp(x) = , where, for p ≥ 1 and z ∈ RE, we are using the notation (cid:107)z(cid:107)p ij wM (ij)zijp. Clearly rM is retrieved from rp for p = 2. Now, let p∗ be the Hölder conjugate of p, that is the solution of the equation 1/p + 1/p∗ = 1. As 2∗ = 2, the quantity rM (x) is p,wM =(cid:80) 9 q exact, nonlinear approximate, linear r∗ M p = 1 r∗ p rM p = 2 a p p r o x i m a t e , i n e a r l qµ exact, nonlinear rM rp p = 1 Fig. 1. This diagram summarizes how the relaxation functions rp and r∗ p (for p = 1, 2) are related with q and qµ and which are their main properties. p(x) = ((cid:107)Bx(cid:107)p,wM /(cid:107)x(cid:107)p∗ )p as well. The Rayleigh quotients in fact a special case of r∗ in (12) are obtained by plugging p = 1 into rp and r∗ p, respectively. Even though in this work we shall focus only on the case p = 1, we believe that further investigations on rp and r∗ p for different values of p would be of significant interest. Figure 1 outlines this observation and the relation between the set valued functions q and qµ and the Rayleigh quotients rp and r∗ p, for the specific values p = 1, 2. The next section gives further detail in this sense. 3.4. Exact relaxation via nonlinear Rayleigh quotients. From (6) and Proposition 2.2 we deduce that the leading eigenvalue λ1(M ) of the modularity ma- trix M is an upper bound for both the quantities q(G) and qµ(G). This intuitively motivates the use of such eigenvalue and the corresponding eigenvectors to approxi- mate the modularity of the graph. However λ1(M ) is an approximation that can be arbitrarily far from the true value of the modularity. In particular, when µ = d is the degree vector, a Cheeger-type inequality showing a lower bound for qµ(G) in terms of λ1(M ) has been shown in [23], whereas a lower bound for q(G) is known only for regular graphs [21], the general case being still an open problem. In what follows we show that moving from the linear to the nonlinear modularity operator, allows to shrink the distance between the combinatorial quantities q(G) and qµ(G) defined in (4) and the spectrum of M. More precisely, we show that the new Rayleigh quotients r∗ M and rM, as for rM, coincide with the modularity and normalized modularity functions q and qµ, respectively, on suitable set of binary vectors. However, unlike the linear case, we prove that the quantities (14) λ1(r∗ M) = max x∈Rn r∗ M(x), λ⊥ 1 (rM) = max x∈Rn, (cid:104)x,1(cid:105)µ=0 rM(x) coincide exactly with the modularity q(G) and normalized modularity qµ(G), respec- tively. For these reasons we say that the functions r∗ M and rM are exact nonlinear relaxations of the modularity q and normalized modularity qµ set functions, respec- tively. The diagram in Figure 1 summarizes these relaxation relations. To address the case of q(G) we make use of the Lovász extension of the modularity set function. The Lovász extension, also referred to as Choquet integral, allows the extension of set valued functions to the entire space Rn and is particularly well- suited to deal with optimization of sub-modular functions. We refer to [3] for a careful introduction to the topic. Below we recall one possible definition of the Lovász extension Definition 3.3. Given the set of vertices V , let P(V ) be the power set of V , and consider a function F : P(V ) → R. For a given vector x ∈ Rn let σ be any n−1(cid:88) 10 permutation such that xσ(1) ≤ xσ(2) ≤ ··· ≤ xσ(n) and let Ci(x) ⊆ V be the set Ci(x) = {k ∈ V : xσ(k) ≥ xσ(i)} The Lovász extension fF : Rn → R of F is defined by fF (x) = F (Ci+1(x))(xσ(i+1) − xσ(i)) + F (V )xσ(1) i=1 We collect in the next proposition some useful properties of the Lovász extension, which will be helpful in the following. We refer to [3] for their proofs. Proposition 3.4 (Some properties of the Lovász extension). Consider two set valued functions F, H : P(V ) → R such that F (∅) = H(∅) = 0. Then 1. fF + fH is the Lovász extension of F + H, i.e. fF + fH = fF +H. 2. For all A ⊆ V it holds F (A) = fF (1A). 3. fF is positively one-homogeneous, i.e. fF (αx) = αfF (x) for all α ≥ 0. 4. Given a graph G = (V, E) let w : E → R+ denote its edge weight function and let cutG denote the set valued function cutG(A) = w(E(A, A)). The Lovász extension of cutG is the weighted total variation n(cid:88) i,j=1 fcutG (x) = 1 2 w(ij)xi − xj = xw T V . 1 2 5. Given x ∈ Rn and t > 0 consider the level set At fF (x) = {F (At x) − F (V )} dt + (cid:90) 0 −∞ (cid:90) +∞ x = {i ∈ V : xi > t}. Then F (At x) dt . 0 The formula at point 5 is actually one of the many equivalent definitions of the Lovász extension and is sometimes referred to as the co-area theorem. Remark 3.5. From the proposition above we deduce that (cid:104)x,M(x)(cid:105)µ is the Lovász extension of the modularity function Q and it corresponds to the difference of two weighted total variations of x ∈ Rn. In fact, given a graph G = (V, E) with weight function w, consider the complete graph K0 = (V, V × V ) with weight function w0(ij) = didj/volG(V ), where di = w(E({i}, V )) and volG(V ) = w(E) are the degree of node i and the volume of G, respectively. Then, for any A ⊆ V we have w(E(A, V )) = di = di dj/volG(V ) = w0(E(A, V )) (cid:88) i∈A (cid:88) i∈A (cid:88) j∈V Therefore, from (1) and the identity w(E(A, A)) = w(E(A, V )) − w(E(A)), we can decompose the modularity of a set A into Q(A) = cutK0 (A)− cutG(A), where cutG is the set valued function defined at point 4 of Proposition 3.4. Combining points 1 and 4 of Proposition 3.4 we obtain (15) fQ(x) = f{cutK0−cutG}(x) = fcutK0 (cid:8)xw0 = 1 2 T V − xw T V (x) − fcutG (x) (cid:9) = (cid:104)x,M(x)(cid:105)µ . The following technical lemma will be useful in the proof of Theorem 3.7 below, being one of our two main theorems of the section. 11 Lemma 3.6. Let F, H : P(V ) → R be set valued functions such that 0 < H(A) ≤ 1 for all A ⊆ V s.t. A /∈ {∅, V }. If F (V ) = 0, then max A⊆V F (A) H(A) ≥ 1 2 max (cid:107)x(cid:107)∞≤1 fF (x) . Proof. Suppose w.l.o.g. that the entries of x ∈ Rn are labeled in ascending order, that is x1 ≤ ··· ≤ xn. We have n−1(cid:88) F (Ci+1(x))(xi+1 − xi) ≤ n−1(cid:88) i=1 i=1 fF (x) = As 0 < H(Ci+1(x)) ≤ 1 and (xi+1 − xi) ≥ 0 we get fF (x) ≤ max i=2,...,n F (Ci(x)) H(Ci(x)) (xn − x1) ≤ We get as a consequence F (Ci+1(x)) H(Ci+1(x)) H(Ci+1(x))(xi+1 − xi) (cid:18) max i=1,...,n (cid:19) 2(cid:107)x(cid:107)∞ F (Ci(x)) H(Ci(x)) max (cid:107)x(cid:107)∞≤1 fF (x) ≤ 2 max (cid:107)x(cid:107)∞≤1 max i=1,...,n F (Ci(x)) H(Ci(x)) = 2 max A⊆V F (A) H(A) The above lemma allows us to show that r∗ M is an exact nonlinear relaxation of and this proves the claim. the modularity function q Theorem 3.7. Let r∗ M(x). Then r∗ maxx∈Rn r∗ M be the Rayleigh quotient defined in (12) and let λ1(r∗ M(1A − 1A) = q(A)µ(V ), for any A ⊆ V and q(G) = max A⊆V q(A) = λ1(r∗ M)/µ(V ) . M) = Proof. For a subset A ⊆ V , consider the vector vA = 1A − 1A. Then (cid:104)vA,M(vA)(cid:105)µ = 1 2 µi(−M )ij(vA)i − (vA)j = 2 Q(A) n(cid:88) i,j=1 and (cid:107)vA(cid:107)∞ = 1. Therefore r∗ (16) M(vA) = 2 Q(A) = q(A)µ(V ) and µ(V )q(G) = max A⊆V M(vA) ≤ max r∗ x∈Rn r∗ M(x) . To show the reverse inequality we use Lemma 3.6 and Remark 3.5. By (15) we have fQ(x) = (cid:104)x,M(x)(cid:105)µ. Now let H : P(V ) → R be the constant function H(A) = 1. As Q(V ) = 0, we can use such H into Lemma 3.6, with F = Q, to get max A⊆V Q(A) ≥ 1 2 max (cid:107)x(cid:107)∞≤1 (cid:104)x,M(x)(cid:105)µ = 1 2 max x∈Rn r∗ M(x) . where the second identity holds since fQ is positively one-homogeneous (Proposition 3.4, point 3). Combining the latter inequality with (16) we conclude. We now prove an analogous result involving qµ(G) and rM, To this end we for- mulate the following Lemma 3.8. The proof is a straightforward modification of the proof of Lemma 3.1 in [30], and is omitted for brevity. 12 Lemma 3.8. A function f : Rn → R is positively one-homogeneous, even, convex and f (x + y) = f (x) for any y ∈ span(1) if and only if there exists µ : V → R+ such that f (x) = supy∈Y (cid:104)x, y(cid:105)µ where Y is a closed symmetric convex set such that (cid:104)y, 1(cid:105)µ = 0 for any y ∈ Y . The following theorem shows that rM is an exact nonlinear relaxation of the normalized modularity function qµ. Theorem 3.9. Let rM be the Rayleigh quotient defined in (12) and let λ⊥ 1 (rM) = maxx∈Rn,(cid:104)x,1(cid:105)µ=0 rM(x). Then rM(1A − µ(A)/µ(V )1) = qµ(A)/2 for any A ⊆ V and qµ(G) = max A⊆V qµ(A) = 2 λ⊥ 1 (rM) . Proof. For A ⊆ V let ν(A) = µ(A)µ(A)/µ(V ). Then qµ(A) = Q(A)/ν(A). More- over, if wA = 1A − µ(A)/µ(V )1, we have (cid:107)wA(cid:107)1,µ = 2 ν(A) and (cid:104)wA,M(wA)(cid:105)µ = (cid:104)1A,M(1A)(cid:105)µ = Q(A). Thus rM(wA) = qµ(A)/2 and (17) max qµ(G) = 2 rM(x) . x∈{−a,b}n,(cid:104)x,1(cid:105)µ=0 Now, for x ∈ Rn and t > 0 consider the level set At x = {i ∈ V : xi > t} and let xmin = mini xi and xmax = maxi xi. From the co-area formula (Proposition 3.4 point 5) and the identity fQ(x) = (cid:104)x,M(x)(cid:105)µ shown in (15) we have (cid:104)x,M(x)(cid:105)µ = Q(At x) dt = Q(At x) dt . (cid:90) +∞ −∞ (cid:27)(cid:90) xmax (cid:90) xmax xmin (cid:26) (cid:26) Given A ⊆ V , let wA denote the vector wA = 1A − µ(A)/µ(V )1. From (cid:107)wA(cid:107)1,µ = 2ν(A) we obtain t max 2ν(At Q(At x) 2ν(At x) (cid:104)x,M(x)(cid:105)µ ≤ Let P : Rn → Rn be the orthogonal projection onto {x : (cid:104)x, 1(cid:105)µ = 0}, that is P (x) = x − (cid:104)x, 1(cid:105)µ /µ(V )1, and consider the function f (x) = (cid:107)P (x)(cid:107)1,µ. Note that f satisfies all the hypothesis of Lemma 3.8 above. Moreover note that f (1A) = (cid:107)wA(cid:107)1,µ for any A ⊆ V . Thus, by Lemma 3.8, there exists Y ⊆ range(P ) such that Q(At x) 2ν(At x) (cid:107)1,µ dt. (cid:107)wAt x) dt = max xmin xmin t x (cid:27)(cid:90) xmax (cid:90) xmax (cid:10)1At x , y(cid:11) dt . µ (cid:107)wAt x (cid:107)1,µdt = sup y∈Y xmin Assume w.l.o.g. that x is ordered so that x1 ≤ ··· ≤ xn. Note that the function x we have , y(cid:11) is constant on the intervals [xi, xi+1]. Thus, letting Ai = Axi xmin (cid:90) xmax n−1(cid:88) φ(t) =(cid:10)1At (cid:90) xmax x xmin i=1 thus, by Lemma 3.8, φ(t)dt = (xi+1 − xi)(cid:104)1Ai, y(cid:105)µ = µ = (cid:104)x, y(cid:105)µ , n(cid:88) i=1 xi (cid:10)1Ai−1 − 1Ai, y(cid:11) (cid:90) xmax (cid:107)wAt x (cid:107)1,µ dt . xmin (cid:107)P (x)(cid:107)1,µ = f (x) = sup y∈Y (cid:104)x, y(cid:105)µ = Denote by A∗ (cid:104)P (x),M(P (x))(cid:105)µ, all together we have x the set that attains the maximum maxt Q(At x)/ν(At 13 x). As (cid:104)x,M(x)(cid:105)µ = (18) λ⊥ 1 (rM) = max x∈Rn (cid:104)x,M(x)(cid:105) (cid:107)P (x)(cid:107)1,µ On the other hand, using (17) we get qµ(G) ≤ 2λ⊥ proves the statement. rM(P (x)) = max x∈Rn ≤ max x∈Rn Q(A∗ x) 2ν(A∗ x) ≤ qµ(G)/2 . 1 (rM) and together with (18) this 1 (rM). The pseudo code for the method for r∗ 4. Spectral method for nonlinear modularity. As in the spectral method proposed by Newman [41], we can identify a leading module in the network by parti- tioning the vertex set into two subsets associated to the maximizers of either λ1(r∗ M) or λ⊥ M is presented below, obvious changes are needed when r∗ 1 . Compute λ1(r∗ 2 . If λ1(r∗ M) > 0 : M) and an associated eigenvector x M is replaced by rM. (M1) partition the vertex set into A+ and A+ by optimal thresholding the eigenvector x with respect to the community measure  The optimal thresholding technique for x at step 2 returns the partition {A+, A+} defined by A+ = {i ∈ V : xi > t∗}, being t∗ such that t∗ = arg maxt q({i : xi > t}). The procedure (M1) can be iterated into a successive bi-partitioning strategy which can be sketched as follows: Consider the nonlinear modularity operator Mi, i = 1, 2, associated with the two subgraphs G1 = G(A+) and G2 = G(A+), respectively, and look for a maximal module within G1 and G2 by repeating points 1 and 2, and so forth. As in the linear case, each time this procedure is iterated, we have to consider a new nonlinear modularity operator. If A ⊆ V is the subset of nodes associated with the current recursion, that is Gi = G(A), the new nonlinear modularity operator Mi is defined by replacing the modularity matrix M in (10) with the modularity matrix MA of the corresponding subgraph G(A), given by [22, 42] (cid:40) 1 (cid:0)Mii − (WG(A)1)i + vol(A) if i (cid:54)= j Mij vol(V ) (WG1)i (cid:1) (MA)ij = µi 1 µi for i, j ∈ A , where WG and WG(A) are the weight matrices of the graphs G and G(A), respectively. We discuss in what follows a generalized version of the RatioDCA method [30] for approaching step 1 in the above procedure (M1). The method converges to a critical value of the Rayleigh quotients (12) and ensures a better approximation of q(G) and qµ(G) than the standard linear spectral method. 4.1. Generalized RatioDCA method. The RatioDCA technique [30] is a general scheme for minimizing the ratio of nonnegative differences of convex one- homogeneous functions. We extend that technique to the case where the difference of functions in the numerator can attain both positive and negative values. As our goal is to maximize rM and r∗ M respectively. The generalized RatioDCA technique we propose is of self-interest. For this rea- son, we formulate and analyze the method for general ratio of differences of convex one-homogeneous functions f1, f2, g1, g2 : Rn → R, such that g1(x) − g2(x) ≥ 0 for all x ∈ Rn. M, we then apply the method to −rM and −r∗ 14 Algorithm 1: Generalized RatioDCA Input: Initial guess x0, with (cid:107)x0(cid:107) = 1 and λ0 = r(x0) 1 repeat 2 3 if λk ≥ 0 then F2(xk) ∈ ∂f2(xk), xk+1 = arg min(cid:107)ξ(cid:107)2≤1 F2(xk) ∈ ∂f2(xk), xk+1 = arg min(cid:107)ξ(cid:107)2≤1 else 4 5 6 7 (cid:110) (cid:110) G1(xk) ∈ ∂g1(xk) f1(ξ) − (cid:104)ξ, F2(xk)(cid:105) + λk G2(xk) ∈ ∂g2(xk) g1(ξ) − (cid:104)ξ, G2(xk)(cid:105) + 1 λk (cid:0)g2(ξ) − (cid:104)ξ, G1(xk)(cid:105)(cid:1)(cid:111) (cid:0)(cid:104)ξ, F2(xk)(cid:105) − f1(ξ)(cid:1)(cid:111) end λk+1 = r(xk+1) 8 9 10 until λk+1 − λk/λk < tolerance Output: Eigenvalue λk+1 and associated eigenvector xk+1 Define the function (19) r(x) = f1(x) − f2(x) g1(x) − g2(x) and consider the problem of computing the minimum minx r(x). The function (19) can be seen as a generalized Rayleigh quotient and the critical values λ of r(x) satisfy the generalized eigenvalue equation (20) 0 ∈ ∂f1(x) − ∂f2(x) − λ(∂g1(x) − ∂g2(x)) . In analogy with Definition 3.1, when (20) holds we say that λ is a nonlinear eigenvalue associate to r, with corresponding nonlinear eigenvector x. Computing the minimum of r(x) is in general a non-smooth and non-convex optimization problem, so an exact computation of the global minimum of r(x) for general functions and large values of n is out of reach. However, in Theorems 4.1 and 4.2 we prove that the generalized RatioDCA technique described in Algorithm 1 generates a monotonically descending sequence converging to a nonlinear eigenvalue of r(x). The following theorems describe the convergence properties of the generalized RatioDCA algorithm. Theorem 4.1. Let {λk}k be the sequence generated by the generalized RatioDCA. Then either λk+1 < λk or the method terminates and it outputs a nonlinear eigenvalue λk+1 of r and a corresponding nonlinear eigenvector xk+1. Proof. Define τ1 and τ2 as in Lines 4 and 7 of Algorithm 1. Namely, τ1(ξ) = f1(ξ) − (cid:104)ξ, F2(xk)(cid:105) + λk and τ2(ξ) = g1(ξ) − (cid:104)ξ, G2(xk)(cid:105) + 1 λk (cid:0)g2(ξ) − (cid:104)ξ, G1(xk)(cid:105) (cid:0)(cid:104)ξ, F2(xk)(cid:105) − f1(ξ)(cid:1) . By construction we have τ1(xk) = τ2(xk) = 0, due to the fact that for any convex one- homogeneous function f, and any F (x) ∈ ∂f (x), it holds (cid:104)x, F (x)(cid:105) = f (x). Recall moreover that, for any convex one-homogeneous function f : Rn → R, it holds f (x) ≥ (cid:104)x, F (y)(cid:105), for any x, y ∈ Rn and any F (y) ∈ ∂f (y) (see e.g. [31]). 15 If λk ≥ 0, by definition of xk+1 we have τ1(xk+1) ≤ 0. Two cases are possible: either τ1(xk+1) < 0 or τ1(xk+1) = 0. In the first case we have f1(xk+1)+λk g2(xk+1) < (cid:104)xk+1, F2(xk)(cid:105)+λk (cid:104)xk+1, G1(xk)(cid:105) ≤ f2(xk+1)+λkg1(xk+1) therefore f1(xk+1)−f2(xk+1) < λk(g1(xk+1)−g2(xk+1)) that is λk+1 < λk. Otherwise τ1(xk+1) = 0, thus λk+1 = λk and the method terminates. As f1, f2, g1, g2 are one- homogeneous we deduce that xk+1 = xk is a global minimum of τ1, thus 0 ∈ ∂τ1(xk+1). This implies 0 ∈ ∂f1(xk+1) − F2(xk+1) − λk+1(G1(xk+1) − ∂g2(xk+1)), that is λk+1 is a nonlinear eigenvalue of r with corresponding nonlinear eigenvector xk+1. Let us now consider the case λk < 0. We have τ2(xk+1) = g1(xk+1) − (cid:104)xk+1, G2(xk)(cid:105) + (cid:0)(cid:104)xk+1, F2(xk)(cid:105) − f1(xk+1)(cid:1) ≤ 0 . 1 λk If τ2(xk+1) < 0, together with λk < 0 and g1 − g2 ≥ 0 this implies g1(xk+1)− 1 λk f1(xk+1) < (cid:104)xk+1, G2(xk)(cid:105)− 1 λk (cid:104)xk+1, F2(xk)(cid:105) ≤ g2(xk+1)− 1 λk f2(xk+1) (f2(xk+1)− f2(xk+1)), that is λk+1 < λk. Again, therefore g1(xk+1)− g2(xk+1) < − 1 note that the equality holds only if the optimal value in the inner problem is zero, which implies in turn that the sequence terminates and the point xk+1 = xk is a critical value of τ2, thus 0 ∈ ∂τ2(xk+1). We get λk 0 ∈ ∂g1(xk+1) − G2(xk+1) − (∂f1(xk+1) − F2(xk+1))/λk+1 . Multiplying the previous equation by −λk+1 (cid:54)= 0 we conclude the proof. Theorem 4.2. Let {λk}k ⊆ R and {xk}k ⊆ Rn be the sequences defined by the generalized RatioDCA method. Then 1. λk converges to a nonlinear eigenvalue λ of r, 2. there exists a subsequence of {xk}k converging to a nonlinear eigenvector of r corresponding to λ and the same holds for any convergent subsequence of {xk}k. Proof. The sequence {xk}k belongs to the compact set {x : (cid:107)x(cid:107)2 ≤ 1} thus λk = r(xk) is decreasing and bounded, and there exits a convergent subsequence xkj . We deduce that there exists λ such that min(cid:107)x(cid:107)2≤1 r(x) ≤ λ = limk r(xk) and thus, for any convergent subsequence xkj of xk, we have limj xkj = x∗ with r(x∗) = λ. Similarly to the previous proof, define τ1 and τ2 as τ1(ξ) = f1(ξ) − (cid:104)ξ, F2(x∗)(cid:105) + λ(cid:0)g2(ξ) − (cid:104)ξ, G1(x∗)(cid:105) (cid:0)(cid:104)ξ, F2(x∗)(cid:105) − f1(ξ)(cid:1) . τ2(ξ) = g1(ξ) − (cid:104)ξ, G2(x∗)(cid:105) + 1 λ Assume λ < 0. We observe that τ2 has to be nonnegative. let (cid:101)x = arg min(cid:107)ξ(cid:107)≤1 τ2(ξ) and assume that τ2((cid:101)x) < 0. Arguing as in the proof of Theo- rem 4.1, we get r((cid:101)x) > λ = r(x∗) which is a contradiction, as λ is the limit of the sequence λk = r(xk). This implies that x∗ is a critical point for τ2, thus 0 ∈ ∂τ2(x∗), showing that x∗ is a nonlinear eigenvector of r with critical value λ. If λ ≥ 0, an analogous argument applied to τ1 leads to the same conclusion, thus concluding the proof. In fact, 16 (cid:8)xw0 (cid:9). As we aim at maximizing the Rayleigh quotients (12), we apply the gen- 4.2. Generalized RatioDCA for modularity Rayleigh quotients. In or- der to apply Algorithm 1 to r∗ M and rM recall that, as observed in (15), the quantity T V − (cid:104)x,M(x)(cid:105)µ is the difference of two weighted total variations (cid:104)x,M(x)(cid:105)µ = 1 xw eralized RatioDCA to either −r∗ M or −rM. However, for rM, we are interested in λ⊥ 1 (rM), and thus we want to maximize rM over the subspace range(P ), being P the orthogonal projection P (x) = x−(cid:104)x, 1(cid:105)µ /µ(V )1. This issue is addressed by applying the generalized RatioDCA to the function T V 2 (cid:101)rM(x) = (cid:104)x,M(x)(cid:105)µ (cid:107)P (x)(cid:107)1,µ . In fact, due to the definition of M, we have rM(P (x)) = (cid:101)rM(x). Thus, optimizing (cid:101)rM is equivalent to optimizing rM on the subspace range(P ). T V , g1(x) = (cid:107)x(cid:107)∞ and g2(x) = 0. 1 (rM) we apply Algorithm 1 with the choices f1(x) = T V , g1(x) = (cid:107)P (x)(cid:107)1,µ and g2(x) = 0. The following Algorithm 2 shows an implementation of Algorithm 1 tailored to 1 (rM). Straightforward changes are required when im- Therefore: • In order to address λ1(r∗ 2xw0 2xw • In order to address λ⊥ 2xw 2xw0 the problem of computing λ⊥ plementing the method for λ1(r∗ M) we apply Algorithm 1 with the choices f1(x) = T V , f2(x) = 1 T V , f2(x) = 1 1 1 M). 1 (rM) δ0(xk) ∈ ∂(cid:8)xkw0 Algorithm 2: Generalized RatioDCA for λ⊥ Input: Initial guess x0 (cid:54)= 0 such that (cid:104)x0, 1(cid:105)µ = 0 and λ0 = rM(x0) 1 repeat 2 3 (cid:9) such that (cid:104)1, δ0(xk)(cid:105)µ = 0, φ(xk) ∈ Φ(xk) (cid:110)ξw T V −(cid:10)ξ, δ0(xk) − 2 λk P(cid:0)φ(xk)(cid:1)(cid:11)(cid:111) (cid:110) (cid:16)(cid:104)ξ, δ0(xk)(cid:105)µ − ξw 2(cid:107)P (ξ)(cid:107)1,µ − 1 if λk ≤ 0 then yk+1 = arg min(cid:107)ξ(cid:107)2≤1 yk+1 = arg min(cid:107)ξ(cid:107)2≤1 else 4 5 6 T V T V λk (cid:17)(cid:111) end xk+1 = P (yk+1) λk+1 = rM(xk+1) 7 8 9 10 until λk+1 − λk/λk < tolerance Output: Eigenvalue λk+1 and associated eigenvector xk+1 Note that in the algorithm we need to select an element δ0(x) of the subdifferential of the total variation of x, weighted with w0, being also an element of range(P ), i.e. fulfilling the condition (cid:104)1, δ0(x)(cid:105)µ = 0. This is always possible, as long as x is not the constant vector. In fact, consider the sign function σ : R → {−1, 0, 1} defined by σ(λ) = λ/λ if λ (cid:54)= 0 and σ(λ) = 0 otherwise. One easily realizes that the vector y, with components belongs to ∂(cid:8)xkw0 T V yi = (cid:9) and is such that (cid:104)1, y(cid:105)µ = 0, that is y ∈ range(P ). i = 1, . . . , n , j=1 didj vol(V ) σ(xi − xj) , A number of optimization strategies can be used to solve the inner convex- optimization problem at steps 4 and 6 of Algorithm 2. Two efficient methods used n(cid:88) 1 µi 17 in [29, 30] are FISTA [4] and PDHG [10]. Both methods ensure a quadratic conver- gence rate. Moreover, the computational cost of each iteration of both FISTA and PDHG is led by the cost required to perform the two matrix-vector multiplications Bx and BT x, being B the node-edge transition matrix of the graph B : Rn → RE, entrywise defined by (Bx)(ij) = w(ij)(xi − xj). As it is known, B is typically a very sparse matrix. We use PDHG in the experiments that we present in the next section. Let us conclude with some important remarks related with the practical imple- mentation of the generalized RatioDCA technique. First, note that an exact solution of the inner problems at steps 4 and 6 is not required in order to ensure monotonic ascending. In fact, the proof of Theorem 4.1 goes through unchanged if xk+1 is re- placed by any vector y such that τ1(y) < τ1(xk), resp. τ2(y) < τ2(xk). Therefore one can speed up the inner problem phase by computing any y with such a property, especially at an early stage, when the solution is far from the limit. Second, Theorem 4.1 ensures that the sequence of approximations of the Rayleigh quotient generated by the generalized RatioDCA scheme is monotonically increasing. As a consequence, if we run the algorithm by using the leading eigenvector of the modularity matrix M as a starting vector x0, the output is guaranteed to be a better approximation of the modularities q(G) and qµ(G). On the other hand, convergence to a global optimum is not ensured, so in practice one runs the method with a number of starting points and chooses the solution having largest modularity. An effective choice of the starting point can be done by exploiting a diffusion process on the graph, as suggested in [8]. We shall discuss this with more detail in Section 5.5. 5. Numerical experiments. In this section we apply our method to several real-world networks with the aim of highlighting the improvements that the nonlinear modularity ensures over the standard linear approach. All the experiments shown in what follows assume µ = d, that is each vertex is weighted with its degree. We subdivide the discussion as follows. In Section 5.1 we discuss the differences between identified communities associated to the exact nonlinear relaxations r∗ M and rM of the modularity and normalized modularity set functions, respectively. Then, in Sec- tions 5.2 and 5.3, we focus only on the optimization of the modularity function q and compare the proposed nonlinear approach with other standard techniques. Precisely, in Section 5.2 we analyze the handwritten digits dataset known as MNIST, restricting our attention to the subset made by the digits 4 and 9 . We show several statistics in- cluding modularity value and clustering error. Finally, in Section 5.3 we perform com- munity detection on several complex networks borrowed from different applications, comparing the modularity value obtained with the generalized RatioDCA method for λ1(r∗ M) against standard methods. We also discuss some experiments where multiple communities are computed. 5.1. On the difference between q(G) and qµ(G): unbalanced community structure. There are many situations where the community structure in a network is not balanced. Communities of relatively small size can be present in a network alongside communities with a much larger amount of nodes. It is in fact not dif- ficult to imagine the situation of a social network of individual relationships made by communities of highly different sizes. However, a known drawback of modularity maximization [25,37] is the tendency to overlook small-size communities, even if such groups are well interconnected and can be clearly identified as communities. Many possible solutions to this phenomenon have been proposed in the recent literature, as for instance through the introduction of a tunable resolution parameter γ, by in- troducing weighted self-loops, or by considering different null-models (see [22,47,53], 18 e.g.). In [23,57] it is pointed out that the use of a normalized modularity measure qµ is a further potential approach. In fact, if we seek at localizing a set A ⊆ V with high modularity Q(A) but relatively small size µ(A), then we expect the maximum of qµ to be a good indicator of the partition involving A. In this section we compare the community structure obtained from applying the nonlinear spectral method with r∗ M and with rM, aiming at maximizing the mod- ularity q and the normalized modularity qµ functions, respectively. In Figure 2 we show the clustering obtained on a synthetic dataset built trying to model the situation considered in Fig. 2 of [25]: two small communities poorly connected with each other and with the rest of the network. Our aim is to localize the small community as the leading module in the graph. In our synthetic model we generate a random graph G = (V, E) as follows: The small community A1 has 50 nodes, each two nodes in A1 are connected with probability 0.6, and the weight function for G is such that w(ij) = 2 for any ij ∈ E(A1). Another group A2 ⊆ V has 100 nodes, each two nodes in A2 are connected with probability 0.4, and the weight function for G is such that w(ij) = 1 for any ij ∈ E(A2). Finally, the rest of the graph V \ (A1 ∪ A2) consist of 450 nodes and each of them is connected by an edge ij with probability 0.05 and w(ij) = 1. The weight matrix of the graph is shown on the left-most side of Fig 2, whereas the table in the right-most part shows the value of the modularities q(Ci) and qµ(Ci) evaluated on the three different partitions {Ci, Ci}, i = 1, 2, 3, obtained by the linear spectral method, the nonlinear spectral method with r∗ M and the one for rM, respec- tively. Although the modularity obtained applying the nonlinear spectral method to r∗ M is the highest one, as expected, the clustering shown in Figure 2 highlights how the unbalanced solution obtained through λ⊥ 1 (rM) is able to recognize the small community A1, whereas the other approaches are not. WG (a) λ1(M ) (b) λ1(r∗ M) (c) λ⊥ 1 (rM) q(Ci) qµ(Ci) 0.012 0.022 0.029 (a) 0.29 (b) 0.37 (c) 0.13 Fig. 2. Experiments on synthetic data. From left to right: Sparsity pattern (spy) plot of the weight matrix of the graph; partition {C1, C1} obtained through Newman's spectral method; partitions {C2, C2} and {C3, C3} obtained through (M1) with λ1(r∗ 1 (rM), respectively; value of the modularity of the three partitions. Relation between matrix spy (WG) and the graph drawings: the smallest ground-truth community (top-left block of WG) corresponds to the right-most community in graph displays of (a), (b) and (c), whereas the largest community (bottom-right block of WG) is displayed as the bottom-left community in (a), (b) and (c). M) and λ⊥ In Figure 3 we propose a similar comparison made on the Jazz bands network [27]. The network has been obtained from "The Red Hot Jazz Archive" digital database, and includes 198 bands that performed between 1912 and 1940, with most of the bands performing in the 1920's. In this case each vertex corresponds to a band, and an edge between two bands is established if they have at least one musician in common. A relatively small community seems to be captured by the normalized modularity qµ, corresponding to an unbalanced subdivision of the network, whereas a relatively poor community structure corresponds to the standard modularity. The graph drawings are realized by means of the Kamada-Kawai algorithm [34]. 0100200300400500nz = 485060100200300400500 19 q(Ci) qµ(Ci) 0.035 0.038 0.050 (a) 0.30 (b) 0.32 (c) 0.27 WG (a) λ1(M ) (b) λ1(r∗ M) (c) λ⊥ 1 (rM) Fig. 3. Experiments on Jazz Network. From left to right: Sparsity pattern (spy) plot of the weight matrix of the graph; partition {C1, C1} obtained through Newman's spectral method; partitions {C2, C2} and {C3, C3} obtained through (M1) with λ1(r∗ 1 (rM), respectively; value of the modularity of the three partitions. M) and λ⊥ 5.2. MNIST: handwritten 4-9 digits. The database known as MNIST [38] consists of 70K images of 10 different handwritten digits ranging from 0 to 9. This dataset is a widespread benchmark for graph partitioning and data mining. Each digit is an image of 28 × 28 pixels which is then represented as a real matrix Xi ∈ R28×28. Here we do not apply any form of dimension reduction strategy, as for instance pro- jection on principal subspaces. For a chosen integer m, we build a weighted graph G = (V, E) out of the original data points (images) Xi by placing an edge between node i and its m-nearest neighbors j, weighted by (cid:18) (cid:19) w(ij) = exp − 4(cid:107)Xi − Xj(cid:107)2 min{ν(i), ν(j)} F , ν(s) = min t: st∈E (cid:107)Xs − Xt(cid:107)2 F , being (cid:107) · (cid:107)F the Frobenius norm. We limit our attention to the subset of samples representing the digits 4 and 9 which result into a graph with 13,782 nodes. We refer to this dataset as 49 MNIST. The reason for choosing such two digits is due to the fact that they are particularly difficult to distinguish, as handwritten 4 and 9 look very similar (see f.i. [30]). Although the use of MNIST dataset is not common in the community detection literature, it gives us a ground-truth community structure to which compare the result of our methods and thus allows for a clustering error measurement. In the following Table 1 we compare linear and nonlinear spectral methods on 49 MNIST for different values of m (the number of nearest neighbors defining the edge set of the graph), ranging among {5, 10, 15, 20}. As the two groups we are looking for are known to be of approximately same size, we apply the nonlinear method (M1) with λ1(r∗ M), i.e. with the exact nonlinear relaxation of the modularity set function q. Let {A, A} be the ground-truth partition of the graph, and let {A+, A+} be the partition obtained by the spectral method. Table 1 shows the following measurements: Modularity. This is the modularity value q(A+) of the partition {A+, A+} computed by optimal thresholding the eigenvector of λ1(M ) and λ1(r∗ M), respectively. Clustering error. This error measure counts the fraction of incorrectly assigned labels with respect to the ground truth. Namely (cid:110) (cid:88) i∈A+ C.Error = 1 n (cid:88) i∈A+ (cid:111) δ(Li, LA+) + δ(Li, LA+ ) where δ is the Dirac function, Li is the true label of node i, and LA+, LA+ dominant true-labels in the clusters A+ and A+, respectively. Normalized Mutual Information (NMI). This is an entropy-based similarity measure comparing two partitions of the node set. This measure is borrowed from are the 20 with distribution pX (x), is defined by H(X) = −(cid:80) information theory, where was originally used to evaluate the Shannon information content of random variables. The Shannon entropy of a discrete random variable X, x pX (x) log pX (x), whereas the mutual information of two discrete random variables X and Y is defined as (cid:88) (cid:88) x y I(X, Y ) = p(X,Y )(x, y) log (cid:18) p(X,Y )(x, y) (cid:19) pX (x)pY (y) . Finally the NMI of X and Y is N M I(X, Y ) = 2I(X, Y )/{H(X) + H(Y )}. The use of NMI for comparing network partitions has been then proposed in [15, 26, 36]. 10 5 m Method λ1(M ) λ1(r∗ M) λ1(M ) λ1(r∗ M) λ1(M ) λ1(r∗ M) λ1(M ) λ1(r∗ M) 20 15 C.Error N M I 0.14 0.88 0.36 0.81 0.05 0.82 0.03 0.82 0.30 0.01 0.23 0.03 0.39 0.03 0.41 0.03 q 0.79 0.95 0.71 0.93 0.77 0.91 0.80 0.91 Table 1 Experiments on 49MNIST dataset and the associated network built out of a m-nearest-neighbors M) we indicate the linear method and our graph, with m ∈ {5, 10, 15, 20}. With λ1(M ) and λ1(r∗ nonlinear variant (M1), respectively. 5.3. Community detection on complex networks. In this section we apply the method (M1) with r∗ M, i.e. the exact nonlinear relaxation of the modularity set function q, to analyze the community structure of several complex networks of differ- ent sizes and representing data taken from different fields, including ecological net- works (such as Benguela, Skipwith, StMarks, Ythan2), social and economic networks (such as SawMill, UKFaculty, Corporate, Geom, Erdős), protein-protein interaction networks (such as Malaria, Drugs, Hpyroli, Ecoli, PINHuman), technological and in- formational networks (such as Electronic2, USAir97, Internet97, Internet98, AS735, Oregon1), transcription networks (such as YeastS), and citation networks (such as AstroPh, CondMat). Overall we have gathered 68 different networks with sizes rang- ing from n = 29 to n = 23133, all of whom are freely available online. We show the complete list of data sets in Appendix A. For each of them we look for the leading module with respect to the unbalanced modularity measure q. In particular, we apply the generalized RatioDCA for λ1(r∗ M). As this method does not necessarily converge to the global maximum, we run it with different starting points and then take as a result the one achieving higher modularity. We discuss the choice of the starting points with more detail in Subsection 5.5. Note that, due to Theorem 4.1, the choice of the eigenvector corresponding to λ1(M ) as starting point ensures improvement with respect to the linear case and is often an effective choice. Table 2 shows results in this sense: we compare the number of times the nonlinear spectral method outperforms the linear one (in terms of modularity value), with different strategies for the starting point. and our nonlinear spectral technique (M1) for λ1(r∗ Table 3 shows modularity values obtained by the linear spectral method for λ1(M ) M), with the generalized RatioDCA Starting point strategy Best Strictly Best Eig 100% 95.59% 30 Rand 82.35% 82.35% Table 2 21 All 30 Diff 95.59% 100% 94.12% 97.06% Experiments on real world networks looking for two communities. Fraction of cases where the nonlinear spectral method (M1) achieves best and strictly best modularity value q with respect to the linear method. Columns from left to right show results for different sets of starting points: linear modularity eigenvector as starting point, 30 uniformly random starting points, 30 diffused starting points (see Sec. 5.5), all of them. Experiments are done on 68 networks, listed in Appendix A. described in Algorithm 1, on 15 example networks. For the results of our method the shown values are the best value of modularity obtained with the spectral method (M1) run with with 61 starting points: 30 random, 30 diffusive (see Sec. 5.5) and the leading eigenvector of M. The linear modularity approach is outperformed by our nonlinear method: the improvement over the modularity matrix linear approach is up to 128%, which corresponds to the case of AS735. Also, the size of the modules identified by the two methods often significantly differ. In Figure 5 we show further statistics on this experiment. In particular, the first plot on the left shows medians and quartiles of the modularity value obtained by the nonlinear method with 61 starting points, highlighting the value obtained with the linear modularity eigenvector as a starting point (magenta triangle) and the best value obtained (black dot). These modularity values are compared with the modularity values obtained with the linear method (green triangle). The second plot on the right of Figure 5 shows timing performances of the nonlinear method (M1) for λ1(r∗ M) implemented via the generalized RatioDCA Algorithm 1 on the 15 datasets here considered. The generalized RatioDCA is here implemented using PDHG as inner-optimization method [10]. Finally, in Figure 4 we show graph drawings comparing the bi-partitions obtained with the two methods on some sample networks. We consider this drawing give a good qualitative intuition of the advantages obtained by using our nonlinear method. Fig. 4. Bi-partition obtained by the linear (left) and nonlinear (right) spectral methods. Net- works shown, from left to right: Electronic2, Drugs, and YeastS. 5.4. Recursive splitting for multiple communities. The final test we pro- pose concerns the detection of multiple communities. Although our method is meant to address the leading module problem, as in the standard spectral method, we can address multiple communities by performing Successive Graph Bipartitions (SGB). This procedure requires to update the modularity operator at each recursion, as dis- cussed in Section 4. A comparison between the modularity value of the community structure obtained with different strategies on a number of datasets is shown in Tables 4 and 5 where we compare our method with the linear spectral bi-partition and the locally greedy algorithm known as Louvain method [5]. For the latter method we use 22 ID Network Social 3A Skipwith Stony Malaria Electronic 2 Electronic 3 1 Macaque cortex 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Transc Main Software VTK YeastS Main Drugs ODLIS Erdős 2 AS 735 CA CondMat n 32 32 35 112 229 252 512 616 662 771 2224 2898 6927 7716 23133 Linear Method A1 q(A1) 0.22 16 14 0.28 0.04 14 0.09 34 0.25 65 0.36 88 95 0.23 0.43 220 0.20 91 0.32 317 471 0.25 0.30 1285 0.28 1804 0.18 2390 2243 0.21 Table 3 Nonlinear Method A2 16 17 17 40 113 115 253 285 318 364 883 1379 2333 3040 8777 q(A2) 0.23 0.30 0.06 0.12 0.35 0.48 0.49 0.49 0.44 0.39 0.37 0.34 0.42 0.41 0.42 Gain (%) q(A2)/q(A1) +4 +7 +50 +8 +40 +33 +113 +14 +120 +22 +48 +13 +50 +128 +100 Experiments on real world networks looking for two communities. For the nonlinear spectral method (M1) we consider 61 starting points: 30 random, 30 diffusive (see Sec. 5.5) and the leading eigenvector of M. The column n shows the size of the graph; A1 and A2 are the smallest communities identified by the linear and the nonlinear method, respectively; columns Ai and q(Ai) shows size and modularity value of Ai, i = 1, 2, respectively; the last column shows the ratio between the modularity of both partitions. Fig. 5. Boxplots of modularity values (left plot) and execution times (right plot) for the non- linear method (M1) implemented via the generalized RatioDCA Algorithm 1 with 61 starting points: 30 random, 30 diffusive (see Sec. 5.5) and the leading eigenvector of M. The black dots show the best value obtained by the method (also shown in Table 3). The magenta triangles show values and timing for the method started with the linear modularity eigenvector. Green triangles correspond to the standard linear method. Experiments have been made on the 15 datasets of Table 3 (where the dataset sizes are shown), with MATLAB R2016b and forcing one single computing thread. the GenLouvain Matlab toolbox [33]. These two strategies are arguably the most popular methods for revealing com- munities in networks. The SGB approach is a relatively naive extension of the spec- tral method for the leading module. For the modularity-based community detection problem the SGB strategy has been probably first proposed in [41]. Although this technique works well in certain cases, it typically does not outperform the Louvain method and it is known that there are situations where this approach may fail. This is 1 2 3 4 5 6 7 8 9101112131415Dataset ID00.050.10.150.20.250.30.350.40.450.5ModularityNonlinear Method (best)Nonlinear Method (eig)Linear Method 1 2 3 4 5 6 7 8 9101112131415Dataset ID10-210-1100101102Execution TimeLinear Method 23 shown for example in [48] where the method based on the linear modularity eigenvec- tors is shown to fail on the 8-node bucket brigade and on some real-world datasets. This negative results have led to different extensions of spectral algorithms to the problem of multiple communities, see for instance [49, 58]. A more careful extension of our nonlinear spectral approach to the multi-community case goes beyond the scope of this paper and is left to future work. In the following experiments we compute an initial community assignment via SGB and then refine it by moving the nodes among communities following a relatively standard flipping strategy based on the Kernighan -- Lin algorithm [35], see also [42]. This refinement procedure identifies the node that, when assigned to another com- munity, generates the biggest increase on modularity (or the smallest decrease if no increase is possible). This procedure is repeated until all the n nodes have been moved, with the constraint that each node assignment can be changed only once. By identifying the intermediate community of this process that leads to the biggest increase on modularity, the current communities are updated. Starting from these new communities, the process is repeated until no further modularity improvement is observed. This technique can be efficiently implemented in parallel, to speed up its time execution. We apply node flipping to both the linear and the nonlinear SGB. Table 4 shows the percentage of cases where the nonlinear method achieves best and strictly best modularity on the 68 networks listed in Appendix A. Table 5 com- pares modularity values and number of assigned communities on some example net- works and for the three strategies: linear spectral method for λ1(M ), nonlinear spec- tral method (M1) for λ1(r∗ M) with the generalized RatioDCA Algorithm 1, and Gen- Louvain toolbox. Both our method and the Louvain method are run several times. As before, our method is run with 61 starting points: 30 random, 30 diffusive (see next subsection) and the leading eigenvector of M. The Louvain method is run with 100 random initial node orderings. Results in Tables 4 and 5 are based, for each method, on the best modularity assignment achieved among all the runs. As expected, the performance of our nonlinear spectral method are now less remarkable: The nonlinear method systematically outperforms the linear one, as for the leading module case discussed in the previous section, whereas it shows a performance competitive to the Louvain technique in terms of modularity value, even though the community assignment of the two methods often considerably differ. In fact, the median ratio between the modularity assignments of our method and the Louvain one over the 68 datasets of Appendix A is 0.9998 with a variance of 0.0005. 5.5. On the choice of the starting points. The optimization method in Algorithm 1 often converges to local maxima, thus performances of that strategy rely on the choice of the starting points x0. According to our Theorem 4.1, the sequence r∗ M(xk) increases monotonically. This suggests that using the leading eigenvector of the modularity matrix as a starting point ensures a higher modularity value with respect to the linear spectral method. This observation applies to the case of two communities, whereas does not necessarily work anymore when looking for multiple groups. A standard approach in that case is to pick some additional random starting point. However a better choice can be done by choosing a set of diffuse starting points as suggested in [8]: At each recursion of SGB let x be the eigenvector of the matrix MA, corresponding to one of the current subgraphs G(A). Let vi, vj be two nodes sampled uniformly at random from A such that vi ∈ C and vj ∈ C, where {C, C} is 24 Starting point strategy Best Strictly Best Eig 18% 11.8% Table 4 30 Rand 29.4% 22.1% All 30 Diff 30.9% 44.1% 25% 33.8% Experiments on real world networks looking for two or more communities. Fraction of cases where the nonlinear spectral method (M1) achieves best and strictly best modularity value q with respect to the linear method and the best modularity value obtained by the Louvain method after 100 runs with random initial node ordering. Columns from left to right show results for different sets of starting points: linear modularity eigenvector as starting point, 30 uniformly random starting points, 30 diffused starting points (see Sec. 5.5), all of them. Experiments are done on 68 networks, listed in Appendix A. Network n Macaque cortex Social 3A Skipwith Stony Malaria Electronic 2 Electronic 3 Drugs Transc Main Software VTK YeastS Main ODLIS Erdős 2 AS 735 CA CondMat 30 32 35 112 229 252 512 616 662 771 2224 2898 6927 7716 23133 Linear SGB qlin Nc 2 0.22 4 0.36 0.06 2 3 0.16 8 0.51 9 0.72 25 0.76 0.75 21 17 0.74 38 0.61 48 0.57 9 0.43 0.70 63 28 0.53 0.66 43 Nonlinear SGB qnlin 0.23 0.37 0.07 0.17 0.53 0.75 0.82 0.77 0.76 0.67 0.59 0.48 0.75 0.63 0.72 Nc 2 4 2 5 9 11 16 17 22 21 46 17 73 77 832 Table 5 GenLouvain qLou Nc 3 0.19 4 0.37 0.07 2 5 0.17 0.53 8 11 0.75 15 0.79 0.77 15 16 0.76 17 0.67 26 0.60 17 0.48 0.75 1433 1274 0.63 0.74 619 Gain (%) qnlin qlin +4 +2 +7 +6 +4 +4 +8 +3 +4 +12 +4 +12 +7 +19 +9 qnlin qLou +20 0 0 0 0 0 +4 0 0 0 -2 0 0 0 -3 Experiments on real world networks looking for two or more communities. For the Louvain method we consider 100 initial random node orderings. For the nonlinear spectral method (M1) we consider 61 random starting points: 30 random, 30 diffusive (see Sec. 5.5) and the leading eigenvector of M. Column n is the size of the graph, whereas, for each method, Nc denote the number of communities identified. The three quantities qlin, qnlin and qLou denote the modularity of the partition obtained with the linear, nonlinear and Louvain methods, respectively. The last two columns show the ratio between the modularity of the partitions obtained with the nonlinear method (M1) with respect the linear and the Louvain algorithms, respectively. a partition of A obtained through optimal thresholding the eigenvector x. Then, for the zero vector z we set zi = 1 and zj = −1. We then propagate this initial stage with(cid:101)z = (I + L)−1z where L denotes the unnormalized graph Laplacian of G(A), and take(cid:101)z as starting point for our method. 6. Conclusions. The linear spectral method [44] and the locally greedy tech- nique known as Louvain method [5] are among the most popular techniques for com- munities detection. Our nonlinear modularity approach is an extension of the linear spectral method and has a number of properties that identify it as valid alternative in several circumstances: (a) The method is supported by a detailed mathematical understanding and two exact relaxation identities (Theorems 3.9 and 3.7) that can be seen as nonlinear extensions of modularity Cheeger-type inequalities; (b) it exploits for the first time the use of nonlinear eigenvalue theory in the context of community detection; (c) the use of the nonlinear modularity operator M, here presented, allows 25 us to address individually both balanced (equally sized) and unbalanced (small size) leading module problems. The analysis of Section 5 shows experimental evidence of the quality of our ap- proach and the advantage over the linear method. Several interesting research direc- tions remain open, in particular for what concerns the computational efficiency of the nonlinear Rayleigh quotients optimization and the overall nonlinear spectral method, and for what concerns the possibility of tailoring the method to the problem of mul- tiple communities -- which is currently addressed by the naive strategy of successive bi-partitions -- in a more effective way. Acknowledgements. We are grateful to Francesca Arrigo for sharing with us several of the networks we used in the numerical experiments. A. Networks used in the experiments. Here we list the names of the net- works we used in Section 5. For the sake of brevity, we do not give individual refer- ences nor individual descriptions of the data sets, whereas we refer to [16, 19, 20, 39] for details. Network names: Benguela, Coachella, Macaque Visual Cortex Sporn, Macaque Visual Cortex, PIN Afulgidus, Social3A, Chesapeake, Hi-tech main, Zackar, Skipwith, Sawmill, StMartin, Trans urchin, StMarks, KSHV, ReefSmall, Dolphins, Newman dol- phins, PRISON SymA, Bridge Brook, grassland , WorldTrade Dichot SymA, Shelf, UK- faculty, Pin Bsubtilis main, Ythan2, Canton, Stony, Electronic1, Ythan1, Software Digital main-sA, ScotchBroom, ElVerde, LittleRock, Jazz, Malaria PIN main, PINEcoli validated main, SmallW main, Electronic2, Neurons, ColoSpg, Trans Ecoli main, USAir97, Elec- tronic3, Drugs, Transc yeast main, Hpyroli main, Software VTK main-sA, Software XMMS main-sA, Roget, Software Abi main-sA, PIN Ecoli All main, Software Mysql main-sA, Cor- porate People main, YeastS main, PIN Human main, ODLIS, Internet 1997, Drosophila PIN Confidence main, Internet 1998, Geom, USpowerGrid, Power grid, Erdos02, As-735, Oregon1, Ca-AstroPh, Ca-CondMat. REFERENCES [1] N. Arcolano, K. Ni, B. A. Miller, N. T. Bliss, and P. J. Wolfe, Moments of parameter estimates for Chung-Lu random graph models, in 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2012, pp. 3961 -- 3964. [2] A. Arenas, A. Fernández, and S. Gómez, Analysis of the structure of complex networks at different resolution levels, New Journal of Physics, 10 (2008), p. 053039. [3] F. Bach, Learning with submodular functions: A convex optimization perspective, Foundations and Trends in Machine Learning, 6 (2013), pp. 145 -- 373. [4] A. Beck and M. Teboulle, A fast iterative shrinkage-thresholding algorithm for linear in- verse problems, SIAM Journal on Imaging Sciences, 2 (2009), pp. 183 -- 202. [5] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, Fast unfolding of communities in large networks, Journal of Statistical Mechanics: Theory and Experiment, 2008 (2008), p. P10008. [6] Z. Boyd, E. Bae, X.-C. Tai, and A. L. Bertozzi, Simplified energy landscape for modu- larity using total variation, arXiv:1707.09285, (2017). [7] U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hoefer, Z. Nikoloski, and D. Wagner, On modularity clustering, IEEE Transactions on Knowledge and Data Engi- neering, 20 (2008), pp. 172 -- 188. [8] X. Bresson, T. Laurent, D. Uminsky, and J. von Brecht, Multiclass total variation clustering, in Advances in Neural Information Processing Systems 26, 2013, pp. 1421 -- 1429. [9] T. Bühler and M. Hein, Spectral clustering based on the graph p-Laplacian, in Proceedings of the 26th Annual International Conference on Machine Learning, ICML '09, New York, NY, USA, 2009, ACM, pp. 81 -- 88. [10] A. Chambolle and T. Pock, A first-order primal-dual algorithm for convex problems with applications to imaging, J. Math. Imaging Vision, 40 (2011), pp. 120 -- 145. 26 [11] K. C. Chang, Spectrum of the 1-Laplacian and Cheeger's constant on graphs, Journal of [12] F. R. K. Chung and L. Lu, Complex graphs and networks, vol. 107, American Mathematical Graph Theory, 81, pp. 167 -- 207. Society, Providence, 2006. [13] F. H. Clarke, Optimization and nonsmooth analysis, vol. 5, SIAM, 1990. [14] A. Clauset, M. E. J. Newman, and C. Moore, Finding community structure in very large networks, Phys. Rev. E, 70 (2004), p. 066111. [15] L. Danon, A. Diaz-Guilera, J. Duch, and A. Arenas, Comparing community structure identification, Journal of Statistical Mechanics: Theory and Experiment, 2005 (2005), p. P09008. [16] T. A. Davis and Y. Hu, The University of Florida sparse matrix collection, ACM Trans. Math. Softw., 38 (2011), pp. 1 -- 25. [17] P. Drábek and S. B. Robinson, On the generalization of the Courant nodal domain theorem, Journal of Differential Equations, 181 (2002), pp. 58 -- 71. [18] J. Duch and A. Arenas, Community detection in complex networks using extremal opti- mization, Phys. Rev. E, 72 (2005), p. 027104. [19] E. Estrada, The structure of complex networks: theory and applications, Oxford University Press, 2012. [20] E. Estrada and F. Arrigo, Predicting triadic closure in networks using communicability distance functions, SIAM Journal on Applied Mathematics, 75 (2015), pp. 1725 -- 1744. [21] D. Fasino and F. Tudisco, An algebraic analysis of the graph modularity, SIAM Journal on Matrix Analysis and Applications, 35 (2014), pp. 997 -- 1018. [22] D. Fasino and F. Tudisco, Generalized modularity matrices, Linear Algebra and its Appli- cations, 502 (2016), pp. 327 -- 345. [23] D. Fasino and F. Tudisco, Modularity bounds for clusters located by leading eigenvectors of the normalized modularity matrix, Journal of Mathematical Inequalities, 11 (2016), pp. 701 -- 714. [24] S. Fortunato, Community detection in graphs, Physics reports, 486 (2010), pp. 75 -- 174. [25] S. Fortunato and M. Barthélemy, Resolution limit in community detection, Proceedings of the National Academy of Sciences, 104 (2007), pp. 36 -- 41. [26] A. L. N. Fred and A. K. Jain, Learning pairwise similarity for data clustering, in 18th International Conference on Pattern Recognition (ICPR), 2006, pp. 925 -- 928. [27] P. M. Gleiser and L. Danon, Community structure in jazz, Advances in Complex Systems, 06 (2003), pp. 565 -- 573. [28] R. Guimerà, M. Sales-Pardo, and L. A. N. Amaral, Modularity from fluctuations in random graphs and complex networks, Phys. Rev. E, 70 (2004), p. 025101. [29] M. Hein and T. Bühler, An inverse power method for nonlinear eigenproblems with ap- plications in 1-spectral clustering and sparse PCA, in Adv. Neural Inf. Process. Syst. 23 (NIPS), 2010, pp. 847 -- 855. [30] M. Hein and S. Setzer, Beyond spectral clustering - tight relaxations of balanced graph cuts, in Advances in Neural Information Processing Systems 24, 2011, pp. 2366 -- 2374. [31] J.-B. Hiriart-Urruty and C. Lemaréchal, Fundamentals of convex analysis, Springer Science & Business Media, 2012. [32] H. Hu, T. Laurent, M. A. Porter, and A. L. Bertozzi, A method based on total variation for network modularity optimization using the MBO scheme, SIAM Journal on Applied Mathematics, 73 (2013), pp. 2224 -- 2246. [33] L. G. S. Jeub, M. Bazzi, I. S. Jutla, and P. J. Mucha, A generalized Louvain method for community detection implemented in MATLAB, (2011 -- 16), http://netwiki.amath.unc. edu/GenLouvain. [34] T. Kamada and S. Kawai, An algorithm for drawing general undirected graphs, Information Processing Letters, 31 (1989), pp. 7 -- 15. [35] B. W. Kernighan and S. Lin, An efficient heuristic procedure for partitioning graphs, The Bell System Technical Journal, 49 (1970), pp. 291 -- 307. [36] A. Lancichinetti and S. Fortunato, Community detection algorithms: A comparative anal- ysis, Phys. Rev. E, 80 (2009), p. 056117. [37] A. Lancichinetti and S. Fortunato, Limits of modularity maximization in community detection, Phys. Rev. E, 84 (2011), p. 066122. [38] Y. LeCun, C. Cortes, and C. J. C. Burges, The MNIST database of handwritten digits, (1998), http://yann.lecun.com/exdb/mnist/. [39] J. Leskovec and A. Krevl, SNAP Datasets: Stanford large network dataset collection. http://snap.stanford.edu/data, June 2014. [40] P. Mercado, A. Gautier, F. Tudisco, and M. Hein, The power mean Laplacian for 27 multilayer graph clustering, in Proceedings of the 21st International Conference on Arti- ficial Intelligence and Statistics (AISTATS), vol. 84 of Proceedings of Machine Learning Research, 2018, pp. 1828 -- 1838. [41] M. E. J. Newman, Finding community structure in networks using the eigenvectors of ma- trices, Phys. Rev. E, 74 (2006), p. 036104. [42] M. E. J. Newman, Modularity and community structure in networks, Proceedings of the National Academy of Sciences, 103 (2006), pp. 8577 -- 8582. [43] M. E. J. Newman, Networks: an introduction, Oxford University Press, 2010. [44] M. E. J. Newman and M. Girvan, Finding and evaluating community structure in networks, [45] M. A. Porter, J.-P. Onnela, and P. J. Mucha, Communities in networks, Notices of the Phys. Rev. E, 69 (2004), p. 026113. AMS, 56 (2009), pp. 1082 -- 1097. [46] N. Pržulj and D. J. Higham, Modelling protein -- protein interaction networks via a stickiness index, Journal of The Royal Society Interface, 3 (2006), pp. 711 -- 716. [47] J. Reichardt and S. Bornholdt, Statistical mechanics of community detection, Phys. Rev. [48] T. Richardson, P. J. Mucha, and M. A. Porter, Spectral tripartitioning of networks, E, 74 (2006), p. 016110. Phys. Rev. E, 80 (2009), p. 036111. [49] M. A. Riolo and M. E. J. Newman, First-principles multiway spectral partitioning of graphs, Journal of Complex Networks, 2 (2014), pp. 121 -- 140. [50] P. Ronhovde and Z. Nussinov, Local resolution-limit-free potts model for community detec- tion, Phys. Rev. E, 81 (2010), p. 046114. [51] S. E. Schaeffer, Graph clustering, Computer science review, 1 (2007), pp. 27 -- 64. [52] H.-W. Shen and X.-Q. Cheng, Spectral methods for the detection of network community structure: a comparative analysis, Journal of Statistical Mechanics: Theory and Experi- ment, 2010 (2010), p. P10020. [53] V. A. Traag, P. Van Dooren, and Y. Nesterov, Narrow scope for resolution-limit-free community detection, Phys. Rev. E, 84 (2011), p. 016114. [54] A. Traud, E. Kelsic, P. Mucha, and M. Porter, Comparing community structure to characteristics in online collegiate social networks, SIAM Review, 53 (2011), pp. 526 -- 543. [55] F. Tudisco and M. Hein, A nodal domain theorem and a higher-order Cheeger inequality for the graph p-Laplacian, EMS Journal of Spectral Theory, in press (2016). [56] F. Tudisco and D. J. Higham, A nonlinear spectral method for core-periphery detection in networks, arXiv:1804.09820, (2018). [57] S. Zhang and H. Zhao, Normalized modularity optimization method for community identi- fication with degree adjustment, Phys. Rev. E, 88 (2013), p. 052802. [58] X. Zhang and M. E. J. Newman, Multiway spectral community detection in networks, Phys. Rev. E, 92 (2015), p. 052808.
1211.5184
1
1211
2012-11-22T01:57:20
Faster Random Walks By Rewiring Online Social Networks On-The-Fly
[ "cs.SI", "cs.DS", "physics.soc-ph" ]
Many online social networks feature restrictive web interfaces which only allow the query of a user's local neighborhood through the interface. To enable analytics over such an online social network through its restrictive web interface, many recent efforts reuse the existing Markov Chain Monte Carlo methods such as random walks to sample the social network and support analytics based on the samples. The problem with such an approach, however, is the large amount of queries often required (i.e., a long "mixing time") for a random walk to reach a desired (stationary) sampling distribution. In this paper, we consider a novel problem of enabling a faster random walk over online social networks by "rewiring" the social network on-the-fly. Specifically, we develop Modified TOpology (MTO)-Sampler which, by using only information exposed by the restrictive web interface, constructs a "virtual" overlay topology of the social network while performing a random walk, and ensures that the random walk follows the modified overlay topology rather than the original one. We show that MTO-Sampler not only provably enhances the efficiency of sampling, but also achieves significant savings on query cost over real-world online social networks such as Google Plus, Epinion etc.
cs.SI
cs
Faster Random Walks By Rewiring Online Social Networks On-The-Fly Zhuojie Zhou1 , Nan Zhang2 , Zhiguo Gong3 , Gautam Das4 1,2Computer Science Department, George Washington University [email protected] [email protected] 3Computer and Information Science Department, University of Macau [email protected] 4Computer Science Department, University of Texas at Arlington [email protected] Abstract— Many online social networks feature restrictive web interfaces which only allow the query of a user’s local neighbor- hood through the interface. To enable analytics over such an online social network through its restrictive web interface, many recent efforts reuse the existing Markov Chain Monte Carlo methods such as random walks to sample the social network and support analytics based on the samples. The problem with such an approach, however, is the large amount of queries often required (i.e., a long “mixing time”) for a random walk to reach a desired (stationary) sampling distribution. In this paper, we consider a novel problem of enabling a faster random walk over online social networks by “rewiring” the social network on-the-fly. Specifically, we develop Modified TOpology (MTO)-Sampler which, by using only information exposed by the restrictive web interface, constructs a “virtual” overlay topology of the social network while performing a random walk, and ensures that the random walk follows the modified overlay topology rather than the original one. We show that MTO- Sampler not only provably enhances the efficiency of sampling, but also achieves significant savings on query cost over real-world online social networks such as Google Plus, Epinion etc. I . IN TRODUC T ION A. Aggregate Estimation over Online Social Networks An online social network allows its users to publish contents and form connections with other users. To retrieve infor- mation from a social network, one generally needs to issue a individual-user query through the social network’s web interface by specifying a user of interest, and the web interface returns the contents published by the user as well as a list of other users connected with the user1 . An online social network not only provides a platform for users to share information with their acquaintance, but also enables a third party to perform a wide variety of analytical applications over the social network - e.g., the analysis of rumor/news propagation, the mining of sentiment/opinion on certain subjects, and social media based market research. While some third parties, e.g., advertisers, may be able to negotiate contracts with the network owners to get access to the full underlying database, many third parties lack the 1We currently focus on the undirected relationship between users. resources to do so. To enable these third-party analytical applications, one must be able to accurately estimate big- picture aggregates (e.g., the average age of users, the COUNT of user posts that contain a given word) over an online social network by issuing a small number of individual-user queries through the social network’s web interface. We address this problem of third-party aggregate estimation in the paper. B. Existing Sampling Based Solutions and Their Problems An important challenge facing third-party aggregate esti- mation is the lack of cooperation from online social network providers. In particular, the information returned by each individual-user query is extremely limited - only containing information about the neighborhood of one user. Furthermore, almost all large-scale online social networks enforce limits on the number of web requests one can issue (e.g., 600 open graph queries per 600 seconds for Facebook2 , and 350 requests per hour for Twitter3 ). As a result, it is practically impossible to crawl/download most or all data from an online social network before generating aggregate estimations. There is also no available way for a third party to obtain the entire topology of the graph underlying the social network. To address this challenge, a number of sampling techniques have been proposed for performing analytics over an online social network without the prerequisite of crawling [10]–[12], [15]. The objective of sampling is to randomly select elements (e.g., nodes/users or edges/relationships) from the online social network according to a pre-determined probability distribution, and then to generate aggregate estimations based on the retrieved samples. Since only individual local neighborhoods (i.e., a user and the set of its neighbors) - rather than the entire graph topology - can be retrieved from the social network’s web interface, to the best of our knowledge, all existing sampling techniques without prior knowledge of all nodes/edges are built upon the idea of performing random walks over the graph which only require knowledge of the local neighborhoods visited by the random walks. 2 https://developers.facebook.com/docs/best-practices/ 3 https://dev.twitter.com/docs/rate-limiting In literature, there are two popular random walk schemes: simple random walk and Metropolis Hastings random walk. Simple random walk (SRW) [17] starts from an arbitrary user, repeatedly hops from one user to another by choosing uniformly at random from the former user’s neighborhood, and stops after a number of steps to retrieve the last user as a sample. When the simple random walk is sufficiently long, the probability for each user to be sampled tends to reach a stationary (probability) distribution proportional to each user’s degree (i.e., the number of users connected with the user). Thus, based on the retrieved samples and knowledge of such a stationary distribution, one can generate unbiased estimations of AVG aggregates (with or without selection conditions) over all users in the social network. If the total number of users in the social network is available4 , then COUNT and SUM aggregates can be answered without bias as well. Metropolis Hastings random walk (MHRW) is a random walk achieving any distribution (typically uniform distribution) constructed by the famous MH algorithm. As an extension of MHRW, based on the knowledge of all the ids of a graph, [11] suggests that we can conduct random jump (RJ), which jumps to any random vertex5 in the graph with a fixed probability in each step when it carries on the MHRW. Although MHRW can yield asymptotically uniform samples, which requires no additional processing for subsequent analysis, it is slower than SRW almost for all practical measurements of convergence, such as degree distribution distance, KS distance and mean degree error. According to [10] and [14], SRW is 1.5-8 times faster than MHRW. Thus we set the baseline as SRW, while we also include MHRW in the experimental section. A critical problem of existing sampling techniques, how- ever, is the large number of individual-user queries (i.e., web requests) they require for retrieving each sample. Consider the above-described simple random walk as an example. In order to reach the stationary distribution (and thereby an accurate aggregate estimation), one may have to issue a large number of queries as a “burn-in” period of the random walk. Traditional studies on graph theory found that the length of such a burn-in period is determined by the graph conductance - an intrinsic property of the graph topology (formally defined in Section II). In particular, the smaller the conductance is, the longer the burn-in period will be (i.e., the more individual-user queries will be required by sampling). Unfortunately, a recent study [18] on real-world social net- works such as Facebook, Livejournal, etc. found the conduc- tance of their graphs to be substantially lower than expected. As a result, a random walk on these social networks often requires a large number of individual-user queries - e.g., approximately 500 to 1500 single random walk length for a real-world social network Livejournal of one million nodes to achieve acceptable variance distance [18]. One can see that, in order to retrieve enough samples to reach an accurate 4Which is the case for many real-world social networks whose providers publish the total number of users for advertising purposes. 5 It may need the global topology or the whole user id space for generate random vertex, thus not viable for all online social networks. aggregate estimation, the existing sampling techniques may require a very large number of individual-user queries. C. Outline of Technical Results In this paper, we consider a novel problem of how to sig- nificantly increase the conductance of a social network graph by modifying the graph topology on-the-fly (during the third- party random walk process). In the following, we shall first explain what we mean by on-the-fly topology modification, and then describe the rationale behind our main ideas for topology modification. First, by topology modification we do not actually modify the original topology of the social network graph - indeed, no third party other than the social network provider has the ability to do so. What we modify is the topology of an overlay graph on which we perform the random walks. Fig 1 depicts an example: if we can decide that not considering a particular edge in the random walk process can make the burn-in period shorter (i.e., increase the conductance), then we are essentially performing random walks over an overlay graph on which this edge is removed. By doing so, we can achieve same accurate aggregate estimation with lower query cost. One can see that, with traditional random walk techniques, the overlay graph is exactly the same as the original social network graph. Our objective here is to manipulate edges in the overlay graph so as to maximize the graph conductance. It is important to note that the technical challenge here is not how edge manipulations can boost graph conductance - a simple method to reach theoretical maximum on conductance is to repeatedly insert edges to the graph until it becomes a complete graph. This requires the knowledge of all nodes in the social network, which a third-party does not have. The key challenge here is how to perform edge manipulations only based on the knowledge of local neighborhoods that a random walk has passed by, and yet increases the conductance of the entire graph in a significant manner. In the following, we provide an intuitive explanation of our main ideas for topology modification. To understand the main ideas, we first introduce the con- cepts of cross-cutting and non-cross-cutting edges intuitively with an example in Fig 1 (we shall formally define these concepts in Section II). Generally speaking, if we consider a social network graph consisting of multiple densely con- nected components (e.g., S and ¯S in Fig 1), then the edges connecting them are likely to be cross-cutting edges, while edges inside each densely connected component are likely non-cross-cutting ones. A key intuition here is that the more cross-cutting edges and/or the fewer non-cross-cutting edges a graph has, the higher its conductance is. For example, Graph G in Fig 1 has a low conductance (i.e., high burn-in period) as a random walk is likely to get “stucked” in one of the two dense components which are difficult to escape, given that there is only one cross-cutting edge (u, v). On the other hand, with far fewer non-cross-cutting edges and a few additional cross- cutting edges, G∗ has a much higher conductance as it is much sampling techniques. I I . PR EL IM INAR I E S A. Model of Online Social Networks In this paper, we consider an online social network with an interface that allows input queries of the form q(v): SELECT * FROM D WHERE USER-ID = v , and responds with the information about user v (e.g., user name, self-description, user-published contents) as well as the list of all other users connected with v (e.g., v ’s friends in the network). This is a model followed by many online social networks - e.g., Google Plus, Facebook, etc - with the interface provided as either an end-user-friendly web page or a developer-specific API call. Consider the social-network topology as an undirected graph G(V , E ), where each node in V is corresponding to a user in the social network7 , and each edge in E represents the connection between two users. One can see that the answer to query q(v) (v ∈ V ) is a set of nodes N (v) ⊆ V , such that ∀u ∈ N (v), there is an edge e : (u, v) ∈ E . We henceforth refer to N (v) as the neighborhood of v . We use kv to denote the degree of v - i.e., kv = N (v). For abbreviation, we also write e : (u, v) as euv . Running Example: We shall use, throughout this paper, the 22-node, 111-edge, barbell graph shown (as the original graph G) in Fig 1 as a running example. B. Performance Measures for Sampling In the following, we shall discuss two key objectives for sampling: (1) minimizing bias - such that the retrieved samples can be used to accurately estimate aggregate query answers, and (2) reducing the number of queries required for sampling - given the stringent requirement often put in place by real- world social networks on the number of queries one can issue per day. Bias: In general, sampling bias is the “distance” between the target (i.e., ideal) distribution of samples and the actual sampling distribution - i.e., the probability for each tuple to be retrieved as a sample. We shall further discuss a concrete bias measure in the next subsection and an experimental measure in Section V-A.3. Query Cost: To this end, we consider the number of unique queries one has to issue for the sampling process, as any duplicate query can be answered from local cache without consuming the query limit enforced by the social network provider. C. Random Walk A random walk is a Markov Chain Monte Carlo (MCMC) method which takes successive random steps on the above- described graph G according to a transition matrix P = 7Note that without introducing ambiguity, we use “node” and “social network user” interchangeably in this paper. Fig. 1. A concept of a random walk on the topologically modified overlay graph. easier now for a random walk to move from one component to the other. With the concepts of cross-cutting and non-cross-cutting edges, we develop Modify TOpology Sampler (MTO- Sampler), a topology manipulation technique which first de- termines6 whether a given edge in the graph is a cross-cutting edge based solely upon knowledge of the local neighborhood topology, and then removes the edge if it is non-cross-cutting. MTO-Sampler may also “move” an edge by changing a node connected to the edge if it is determined that, by doing so, the new edge is more likely to be a cross-cutting edge. We shall show in the paper that MTO-Sampler is capable of significantly improving the efficiency of random walks: For the example in Fig 1, MTO-Sampler is capable of reducing the mixing time (i.e., query cost of a random walk) by 97%. We also demonstrate through experimental results the significant improvement of efficiency achieved by MTO-Sampler for real- world social networks such as Epinions, Google Plus, etc. The main contributions of our approach include: • (Problem Novelty) We consider a novel problem of mod- ifying the graph topology on-the-fly (during the random walk process) for the efficient third-party sampling of online social networks. • (Solution Novelty) We develop MTO-Sampler which determines whether an edge is (non-)cross-cutting based solely upon local neighborhood knowledge retrieved by the random walk, and then manipulates the graph topol- ogy to significantly improve sampling efficiency. • Our contributions also include extensive theoretical anal- ysis (on various social network models) and experimental evaluation on synthetic and real-world social networks as well as online at Google+ which demonstrate the superiority of our MTO-Sampler over the traditional 6Note that, as we shall prove in section III-A, it is impossible to assert deterministically that an edge is cross-cutting. Nonetheless, it is possible to assert deterministically that an edge is non-cross-cutting. Thus, our algorithm has two possible outputs: non-cross-cutting or uncertain. We shall show in the paper that it outputs non-cross-cutting for a large number of (non-cross- cutting) edges in real-world social networks. uvwuvSSuvSSww(b)(a)vvijww0GG'uvw(b)(a)uvwuvSSuvS'S'(b)(a)u0u0uvSSuvS'S'(d)(c)u0u0vursvursOverlay graph G*Original graph GwS*S*SS (puv ), u, v ∈ V , where puv represents the probability for the random walk to transit from node u to v . The premise here is that, after performing a random walk for a sufficient number of steps, the probability distribution for the walk to land on each node in G converges to a stationary distribution π which then becomes the sampling distribution8 . There are many different types of random walks, corresponding to the different designs of P and different stationary distributions. In this paper, we consider the simple random walk that has a stationary distribution of π(v) = kv /(2E ) for all v ∈ V . Definition 1: (Simple Random Walk). Given a current node v , a simple random walk chooses uniformly at random a neighboring node u ∈ N (v) and transit to u in the next step (cid:26) 1/kv - i.e., if u ∈ N (v), (1) Pvu = otherwise. 0 One can see that each step of a simple random walk requires exactly one query (i.e., q(v) to identify the neighborhood of v and select the next stop u). Thus, the performance of sampling - i.e., the tradeoff between bias and query cost - is determined by how fast the random walk converges to the stationary distribution. Formally, we measure the convergence speed as the mixing time defined as follows. Definition 2: (Mixing Time) Given G : (V , E ), after t steps of simple random walk, the relative point-wise distance between the current sampling distribution and the stationary (cid:27) (cid:26) P t distribution is uv − π(v) (cid:52)(t) = π(v) max u,v∈V ,v∈N (u) (2) uv is the element of P t with indices u and v . The where P t mixing time of the random walk is the minimum value of t such that (cid:52)(t) ≤  where  is a pre-determined threshold on relative point-wise distance. One can see from the definition that the relative point-wise distance (cid:52)(t) measures the bias of the random walk after t steps. Mixing time, on the other hand, captures the query cost required to reduce the bias below a pre-determined threshold . In the following subsection, we describe a key characteristics of the graph that determines the mixing time - the conductance of the graph. D. Conductance: An Efficiency Indicator Intuitively, the conductance Φ, which indicates how fast the simple random walk converges to its stationary distribution, measures how “well-knit” a graph is. Specifically, the conduc- tance is determined by a cut of the graph G - i.e., a partition of V into two disjoint subsets S and ¯S - which minimizes the ratio between the probability for the random walk to move from one partition to the other and the probability for the random walk to stay in the same partition. Formally, we have the following definition. 8 That is, if we take the end node as a sample Definition 3: (Conductance). The conductance9 of a graph G : (V , E ) is min (cid:8){euv u ∈ S, v ∈ V }, {euv u ∈ ¯S , v ∈ V }(cid:9) . {euv u ∈ S, v ∈ ¯S } Φ(G) = min S⊆V The relationship between the graph conductance and the mixing time of a simple random walk is illustrated by the (cid:19)t (cid:18) following inequality [3]: 1 − Φ(G)2 2 (1 − 2Φ(G))t ≤ (cid:52)(t) ≤ 2E minv∈V kv One can see that the graph conductance Φ(G) ranges between 0 and 1 - and the larger Φ(G) is, the smaller the mixing time will be (for a fixed threshold ). Also note from (3) the log scale relationship between Φ(G) and the mixing time. This indicates a small change on Φ(G) may lead to a significant (cid:18) (cid:19)t ≤  change of the mixing time. Let 2E (cid:33) (cid:32) 1 − Φ(G)2 minv∈V kv 2 ⇒ t ≥ 1 log(1 − Φ(G)2 ) log ⇒ t ≥ − 1 log(1 − Φ(G)2 )  2E minv∈V kv log(c/) . (3) (4) (5) (6) 2E Here c = . For example, increasing conductance minv∈V kv from 0.010 to 0.012 will change the mixing time from 46050.5 · log(c/) to 31979.1 · log(c/). graph in the running example is Φ(G) = 1/((cid:0)11 (cid:1) + 1) = Running Example: The conductance of the barbell 2 0.018. The corresponding (and unique) S and ¯S are shown in Fig 1. Correspondingly, the mixing time to reach a relative point-wise distance of (cid:52)(t) ≤  is bounded from above by 14212.3 · log(22.2/). We shall show throughout the paper how our on-the-fly topology modification techniques can significantly increase con- ductance and reduce the mixing time for this running example. E. Key for Conductance: Cross-Cutting Edges A key observation from Definition 3 is that the graph conductance critically depends on the number of edges which {euv u ∈ S, v ∈ ¯S }. The “cross-cut” S and ¯S - i.e., more such cross-cutting edges there are, the higher the graph conductance is likely to be. On the other hand, since a non- cross-cutting edge is only counted in the denominator, the more non-cross-cutting edges there are in the graph, the lower the conductance is likely to be. Formally, we define cross- cutting edges as follows. Definition 4: (Cross-cutting edges). For a given graph G(V , E ), an edge euv is a cross-cutting edge if and only if 9Rigidly, the conductance is determined by both the graph topology and the transition matrix of the random walk. Here we tailor the definition to the simple random walk considered in this paper. ϕ(S ) = there exists S ⊆ V such that u ∈ S , v ∈ ¯S where ¯S = V \S , and min (cid:8){euv u ∈ S, v ∈ V }, {euv u ∈ ¯S , v ∈ V }(cid:9) {euv u ∈ S, v ∈ ¯S } takes the minimum value among all possible S ⊆ V . We note that in large graphs such as online social networks, it is reasonable to assume that the number of cross-cutting edges is relatively small when compared to total number of edges in S or ¯S . One can see that our objective of on-the-fly topology modification is then to increase the number of cross-cutting edges and decrease the number of non-cross-cutting edges as much as possible. We describe our main ideas for doing so in the next section. Running Example: For the barbell graph, adding any edge between the two halves of the graph produces a new cross-cutting edge, and increases the graph conduc- tance from Φ(G) = 0.018 to 0.035 - i.e., the mixing- time will be reduced to 3758.1/14212.3 = 0.264 - a significant reduction of 75%. I I I . MA IN ID EA S O F ON -TH E -F LY TO PO LOGY MOD I FICAT ION A. Technical Challenges: Negative Results One can see from Section II-E that the key for increasing the conductance of a social network (and thereby reducing the query cost of sampling) through topology modification is to determine whether an edge is a cross-cutting edge or not. Unfortunately, the deterministic identification of a cross- cutting edge is a hard problem (in the worst case) even if the entire graph topology is given as prior knowledge, as shown in the following theorem. Theorem 1: The problem of determining whether an edge is cross-cutting or not is NP-hard. Proof: Consider the case of equal transition probability for each edge. The problem of finding all cross-cutting edges is equivalent with finding the optimum cut of the graph according to the Cheeger constant - a problem proved to be NP-hard [7]. Given the worst-case hardness result, we now consider the best-case scenario - i.e., is there any graph topology (which is not the worst-case input, of course) for which it is possible to efficiently identify cross-cutting edges? It is easy to see that, if the entire graph topology is given, then there certainly exist such graphs - with the original graph in Fig 1 being an example - for which the cross-cutting edge(s) can be straightforwardly identified. Nonetheless, our interest lies on making such identifications based solely upon local neighborhood knowledge - because of the aforementioned restrictions of online social-network interfaces. The following theorem, unfortunately, shows that it is impossible for one to deterministically confirm the cross-cutting nature of an edge unless the entire graph topology has been crawled. Fig. 2. By cloning graph G, we can always construct graph G(cid:48) such that simply adding an edge e : (vi , vj ) may decrease the conductance. Theorem 2: Given the local neighborhood topology of ver- tices accessed by a third-party sampler, {v1 , . . . , vk } ⊂ V in G(V , E ) where k < V , for any given edge e : (vi , vj ), there must exist a graph G(cid:48) (V (cid:48) , E (cid:48) ) such that: (1) e : (vi , vj ) is not a cross-cutting edge for G(cid:48) , and (2) G and G(cid:48) are indistinguishable from the view of the sampler - i.e., there exists {v (cid:48) k } ⊂ V (cid:48) which have the exactly same local 1 , . . . , v (cid:48) neighborhood as {v1 , . . . , vk }. Proof: The construction of G(cid:48) can be stated as follows: n and e extra edges into First, insert n extra vertices v0 1 , . . . , v0 the graph, such that ∀e : (vi , vj ) ∈ E , there is e0 : (v0 i , v0 j ) in the new graph. Note that at this moment, there is no edge between any vi and v0 j . Then, in the second step, identify from G a vertex w which has not been accessed by the sampler - i.e., w (cid:54)⊆ {v1 , . . . , vk } - and insert into the graph an edge e : (w, w0 ). One can see that the only cross-cutting edge in the output graph G(cid:48) is (w, w0 ) - i.e., e : (vi , vj ) cannot be a cross-cutting edge for G(cid:48) . An intuitive demonstration of the proof is shown in Fig 2. It is important to note from the theorem, however, that it still leaves two possible ways for one to increase the conductance of a social network based on only the local neighborhood knowledge: (1) While the theorem indicates that it is impossible to deterministically confirm the cross-cutting nature of an edge, it may still be possible to deterministically disprove an edge from being cross-cutting - i.e., we may prove that an edge is definitely non-cross-cutting based on just local neighborhood knowledge, and therefore remove it to increase the conductance deterministically. (2) It is still possible to conditionally or probabilistically evaluate the likelihood of an edge being cross-cutting - e.g., we may determine that an edge absent from the original graph is more likely to be a cross-cutting edge (if added) than an existing edge, and thereby replace the existing edge with the new one to increase the conductance in a probabilistic fashion. We consider the removal and replacement strategies, respectively, in the next two subsections. B. Deterministic Identification of Non-cross-cutting Edges To illustrate the main idea of our deterministic identification of non-cross-cutting edges (for removals), we start with an example in Fig 3 to show why we can determine, based solely upon the local neighborhoods of u and v as shown in the graph, that e : (u, v) (henceforth denoted by euv ) in the Fig is not a uvSSuvS'S'(b)(a)u0u0uvwuvw(b)(a)uvSSuvSSww(b)(a)vvijww0GG' (c)). Then, drag one of u and v to ensure that both of them are in this more popular partition under the new configuration. One can see that, since at most 2 common neighbors of u and v are in the less popular partition, the number of cross- cutting edges under the new configuration is at most 2 ∗ 2 + 1, where 2 ∗ 2 is the number of cross-cutting edges associated with the 2 common neighbors in the less popular partition (at most 2 for each), and 1 is the number of cross-cutting edge associated with the other (non-common) neighbor of the node being dragged (i.e., u0 in Fig 3 (a)). The following theorem depicts the general case for which we can remove an edge on-the-fly to increase the graph conductance. Recall that N (u) and ku represent the set of neighbors and the degree of a node u, respectively. Theorem 3: [Edge Removal Criteria]: Given G(V , E ), ∀u, v ∈ V , if euv ∈ E and (cid:25) (cid:24) N (u) ∩ N (v) 2 max{ku , kv }, + 1 > (7) 1 2 then euv is not a cross-cutting edge. Proof: Let n = N (u) ∩N (v), without losing generality, assuming u ∈ S, v ∈ ¯S , then there must be n cross-cutting edges in these n disjoint paths of length 2 between u and v . We denote nu , nv as the number of cross-cutting edges in these n paths connected with u and v, so nu + nv = n. One can see that if we try to “drag” u from u ∈ S to u ∈ ¯S , all the edges connected with u would be modified, e.g. flip the the assumption from inequality (7): (cid:6) n (cid:7)+1 > 1 edges linked to u, which means the old cross-cutting edges will be the new non-cross-cutting edges, and vice versa. As 2 max{ku , kv }, 2 2 ku or nv + 1 > 1 2 kv holds. Without so either nu + 1 > 1 losing generality, assuming for vertex u the inequality holds, we change u from set S to ¯S , so the number of cross-cutting edges must be strictly decreasing. Since we have assumed that the number of edges in S or ¯S is much greater than the number of cross-cutting edges, so Φ(G) must decrease according to the decrease of the number of cutting-edges, which leads to the contradiction of euv is a cross-cutting edge. Due to space limitations, please refer to the technical report [23] for the proofs of all theorems in the rest of the paper. Intuitively, theorem 3 gives us a clue that if two nodes have enough common neighbors, then we can deterministically say that the edge between them is non-cross-cutting. Moreover, (7) is tight - i.e., if it does not hold, then we can always construct a counter example where euv is cross-cutting - as shown in the following theorem. (cid:25) (cid:24) N (u) ∩ N (v) Corollary 1: For all N (u), N (v), ku , kv which satisfy 2 max{ku , kv }, + 1 ≤ 1 2 (8) there always exists a graph G(V , E ) in which euv is cross- cutting. Fig. 3. A figure shows that the edge euv cannot be the cross-cutting edge in theorem 3. Locally, (a) and (c) have 6 cross-cutting edges, while (b) and (d) only have 5 of them. cross-cutting edge. The intuition behind this is fairly simple: When u and v share a large number of common neighbors (e.g., 5 in Fig 3) but have relatively few other edges (e.g., 1 each in Fig 3), it is highly unlikely for the partition to cut through euv rather than the other edges of u and v - e.g., (u, u0 ) in Fig 3 - if it cuts through any edges associated with u and v at all. The rigid (dis-)proof can be constructed with contradiction. Suppose euv is a cross-cutting edge between two partitions of the graph, S and ¯S . One can see that since u and v belong to different partitions, there must be at least 6 cross-cutting edges in the subgraph (Fig 3 (a) depicts an example). We now show in the following discussion that this is actually impossible because one can always construct another partition S (cid:48) and ¯S (cid:48) (by “dragging” u and v into the same part) and reduce the number of cross-cutting edges to at most 5. Note that this contradicts the definition of S and ¯S being a configuration which minimizes the number of cross-cutting edges. Thus, euv cannot be a cross-cutting edge. To understand how the construction of S (cid:48) and ¯S (cid:48) works, consider Fig 3 (b) as an example. For the partition illustrated in Fig 3 (a), we can “drag” u into ¯S to form the new configuration, such that the number of cross-cutting edges associated with u and v is now at most 5, as shown in Fig 3 (b). Note that the other edges not shown in the subgraph (no matter cross-cutting or not) are not affected by the re-configuration, because all vertices associated with u are already known in the local neighborhood of u (shown in Fig 3). More generally, for the other possible settings of S and ¯S (such as Fig 3(c)), one can construct the re-configuration in analogy with the following general principle: First, find the “more popular” partition (i.e., either S or ¯S ) among the 5 common neighbors of u and v (e.g., ¯S in Fig 3 (a) or Fig 3 uvwuvSSuvSSww(b)(a)vvijww0GG'uvw(b)(a)uvwuvSSuvS'S'(b)(a)u0u0uvSSuvS'S'(d)(c)u0u0vursvursOverlay graph G*Original graph GwS*S*SS Fig. 4. Replace the edge euv with euw Fig. 5. A demo shows that euv cannot be a cross-cutting edge in theorem VIII. Running Example: With our on-the-fly edge removals, any random walk is essentially following an overlay topology G∗ which can be constructed by applying Theorem 3 to every edge in the original graph G. For the bar-bell running example, the solid lines in Fig 1 depicts G∗ . The conductance is now Φ(G∗ ) = 0.053. Compared with the original conductance of 0.018, the corresponding lower bound on mixing time is reduced to 1638.3/14212.3 = 0.115 of the original value - a reduction of 89%. C. Conditional Identification of Cross-cutting Edges We now describe our second idea of conditionally identify- ing cross-cutting edges. We start with an example in Fig 4 to show why we can replace an existing edge with a new one such that (1) the new edge is more likely to be crosscutting, and (2) the replacement is guaranteed to not decrease the conductance. Specifically, consider the replacement of euv by euw given the neighborhoods of u and v . A key observation here is that euv and evw cannot be both cross-cutting edges. The reason is that otherwise we could always “drag” v into the same partition as u and w to reduce the number of cross-cutting edges by at least 1. Given this key observation, one can see that the replacement of euv by euw will only have two possible outcomes: • if euv is a cross-cutting edge, then euw must also be a cross-cutting edge because, due to the observation, evw cannot be a cross-cutting edge. Thus, the replacement leads to no change on the graph conductance. • if euv is not a cross-cutting edge, then replacing it with euw will either keep the same conductance, or increase the conductance if euw is cross-cutting. As such, the replacement operation never reduces the conduc- tance, and might increase it when euw is cross-cutting. More generally, we have the following theorem. Theorem 4: Given G(V , E ), ∀v ∈ V , if kv = 3, u, w ∈ N (v), then replacing edge euv with euw will not decrease the conductance, while it also has positive possibility to increase the conductance. Next, we are going to prove that kv = 3 is actually the only case when replacement is guaranteed to not reduce the conductance, as shown by the following corollary. Corollary 2: For v ∈ V , if kv (cid:54)= 3, then there always exist a graph G(V , E ), ∀u, w ∈ N (v), such that replacing euv with euw will decrease the conductance or have no effect. Running Example: With Theorem VIII, an example of the replacement operations one can perform over the bar-bell running example in Fig 1 is to replace eur with erv , given that u (after edge removals) has a degree of 3. Compared with the original conductance of Φ(G) = 0.018 and the post-removal conductance of Φ(G∗ ) = 0.053, the conductance is now further increased to Φ(G∗∗ ) = 0.105. The corresponding lower bound on mixing time is reduced to 416.6/1638.3 = 0.25 of the post-removal bound - a further reduction of 75% - and 416.6/14212.3 = 0.029 of the original bound - an overall reduction of 97%. D. Extension If we know more about the user’s neighbors, especially the common neighbors of the user and the random walk’s next candidate, we will deterministically identify more non-cross- cutting edges. When the random walk reaches the nodes we have accessed before, we can use their degree information without issuing extra web requests since we could retrieve data from our local database. Fig 5 (a) shows an example that with the extra degree knowledge of u and v ’s common neighbor w , euv must be a non-cross-cutting edge. As kw = 3, if we assume euv is a cross-cutting edges, then there must be 3 cross-cutting edges between u and v . However, there exists another configuration Fig 5 (b), which only has 2 cross-cutting edges. Thus, it contradicts the assumption that euv is a cross-cutting edge. Noticed that if we do not know the degree of w , we could not deterministically identify euv since theorem 3 does not apply here. (cid:24) N (u) ∩ N (v) − N ∗ (cid:25) Theorem 5: Given G(V , E ), ∀u, v ∈ V , if euv ∈ E and (cid:88) (4−kw ) > max{ku , kv }, 1 1 +1+ 2 2 2 w∈N ∗ (9) we can assert that euv is not a cross-cutting edge. Here we denote N ∗ = {w ∈ N (u) ∩ N (v) kw is known , 2 ≤ kw ≤ 3}. Intuitively, the edge between two nodes which have many common neighbors has higher probability to be a non-cross- cutting edge. Also, it is easy for us to find these edges in online social networks. If a friend knows almost every other uvSSuvS'S'(b)(a)u0u0uvwuvw(b)(a)uvSSuvSSww(b)(a)vvijww0GG'uvwuvSSuvS'S'(b)(a)u0u0uvwuvw(b)(a)uvSSuvSSww(b)(a) friends of a person, then this edge may be considered as non- cross-cutting edge according to theorem 3 and VIII. IV. A LGOR I THM MTO -SAM PL ER A. Algorithm implementation Algorithm description. To explain how the on-the-fly modi- fication works, we demonstrate an example in Fig 6. Fig 6(a) is an overlay graph G∗ that has been modified according to former theorems, in which edges A, C and D are removed, and edge B is replaced. Fig 6(b) shows one possible track of how our MTO-sampler change the simple random walk. For instance, when the random walk sees a node u, and ku = 3 (it satisfies the condition of replacement), then it may replace an edge as we described in theorem VIII. The colored area contains all the nodes that the random walk visits. Algorithm 1 depicts the detailed procedure of MTO sampler, and the stopping rule (which indicates that the random walk should stop and output samples) can be any convergence monitor used in Markov Chain. Algorithm 1 MTO-Sampler for Simple Random Walk for i = 1 → sample size do Starting from vertex u while !(Stopping rule) do while N (u) ≥ 1 do Uniformly pick a neighbor v , and issue a query if euv is removable then N (u) ← N (u) − {v} continue else if kv == 3 then /* One of v ’s edge can be replaced*/ if choose to replace euv then v ← v (cid:48) else N (u) ← N (u) ∪ {v (cid:48)} choose u ← v or u ← v (cid:48) randomly break end if end if if rand(0, 1) < 1/2 then u ← v break else continue end if end while end while Record sample xi ← u end for Aggregate estimation and probability revision. After col- lecting samples, we use Importance Sampling to directly estimate the aggregate information through the samples from the random walk’s stationary distribution τ . Importance Sampling: for i = 1 to Sample Size N do xi ← sampling from τ w(xi ) ← π(xi ) record f (xi ) /*Aggregate Function f (·) */ τ (xi ) (cid:80)N end for (cid:80)N 1 i=1 f (xi )w(xi ) Output estimation A(f (X )) = N 1 i=1 w(xi ) N The key challenge for MTO-Sampler using importance sampling is to estimate the stationary distribution of MTO- Sampler random walk τ ∗ . Since MTO-Sampler modifies the topology, τ ∗ may not equal to the stationary distribution τ . Here we have k∗ τ ∗ (u) = u (10) 2E ∗ . k∗ u is unknown in overlay graph G∗ , but we can draw simple random sample from u’s neighbors in G∗ to get an unbiased estimation of k∗ u . , (11) B. Theoretical Model Analysis In order to theoretically analysis the performance of MTO- Sampler, we introduce a well known graph generation model: Latent space model. Latent space model. Latent space graph model [21] are connecting two nodes with the probability related to their distance in the latent space. P (i ∼ j dij ) = 1 1 + eα(dij −r) here dij is the distance between two nodes i and j ; r controls the level of sociability of a node in this graph, and α is the sharpness of the function. We will show that in the following theorem if two nodes’ distance is smaller than a threshold d0 , then it is likely to be an non-cross-cutting edge. Therefore, after finding the expected number of edges that can be removed we can calculate the increment of the conductance. Theorem 6: Given a latent space graph model G(V , E ), assume α = +∞, then the expected number of edges we (cid:19)1/D(cid:33)(cid:33) (cid:32) (cid:32) (cid:18) 1 can removed E[R] ≥ E · P d < V (r) 3 1 − , (12) here V(r) is the volume of a hypersphere with radius r in D dimensional latent space. The proof can be found at [23]. Simple simulations show that from 20000 points experi- ment, one can get the empirical distribution of point-wise distance. More specifically, If we let r = 0.7, a = 4 and b = 5, D = 2, then E[Φ(G∗ )] ≥ 1.052Φ(G) We compared the experimental results together with this theoretical bound of latent space model in section V-B. (13) (a) Modified overlay graph G∗ (b) Carry out the random walk by modify the topology on-the-fly. It is identical to the random walk in overlay graph G∗ . Fig. 6. A demo shows how the MTO-Sampler modifies the topology of the graph on-the-fly. Dataset Epinions [19] Slashdot A [16] Slashdot B [16] #edges #nodes 100120 26588 428714 70068 70999 436453 TABLE I LOCA L DATA S ET S 90% diameter 4.8 4.5 4.5 V. EX PER IM EN T S A. Experimental Setup 1) Hardware and Platform: We conducted all experiments on a computer with Intel Core i3 2.27GHz CPU, 4GB RAM and 64bit Ubuntu operating system. All algorithms were implemented in Python 2.7. Our local, synthetic and online datasets are stored in the in-memory Redis database and the MongoDB database. 2) Datasets: We tested three types of datasets in the experiments: local real-world social networks, Google Plus online social network, and synthetic social networks - which we describe respectively as follows. Local Datasets: The local social networks - i.e., real-world so- cial networks for which the entire topology is downloaded and stored locally in our server. For these datasets, we simulated the individual-user-query-only web interface strictly according to the definition in Section 1, and ran our algorithms over the simulated interface. The rationale behind using such local datasets is so as we have the ground truth (e.g., real aggregate query answers over the entire network) to compare against for evaluating the performance of our algorithms. Table I shows the list of local social networks we tested with (collected from [1]). All three datasets are previously- captured topological snapshots of Epinions and Slashdot, two real-world online social networks. Since we focus on sampling undirected graphs in this paper, for a real-world directed graph (e.g., Epinions), we first convert it to an undirected one by only keeping edges that appear in both directions in the original directed graph. Note by following this conversion strategy, we guarantee that a random walk over the undirected graph can also be performed over the original directed graph, with an additional step of verifying the inverse edge (resp. v → u) before committing to an edge (resp. u → v ) in the random walk. The number of edges and the 90% effective diameter reported in Table I represent values after conversion. Google Plus Online Social Graph: We also tested a second type of dataset: remote, online, social networks for which we have no access to the ground truth. In particular, we chose the Google Plus10 network because its API11 is the most generous among what we tested in terms of the number of accesses allowed per IP address per day. Using random walk and MTO-Sampler random walk, we have accessed 240,276 users in Google Plus. We observed that the interface provided by Google Social Graph API strictly adheres to our model of an individual-user-query-only web interface, in that each API request returns the local neighborhood of one user. We also collected the data of users’ self-description. Synthetic Social Networks: One can see that, for the real- world social network described above, we cannot change graph parameters such as size, connectivity, etc, and observe the corresponding performance change of our algorithms. To do so, we also tested synthetic social networks which were generated according to theoretical models. In particular, we tested the latent space model. We note that, since the effectiveness of these theoretical models are still under research/debate, we tested these syn- thetic social networks for the sole purpose of observing the potential change of performance for social networks with different characteristics. The superiority of our algorithm over simple random walk, on the other hand, is tested by our experiments on the two types of real-world social networks. Implementation and Evaluation: Algo- 3) Algorithms rithms: We tested four algorithms, the simple random walk (i.e., baseline), Metropolis Hastings Random Walk (MHRW), Random Jump (RJ) and our MTO-Sampler, and compared their performance over all of the above-described datasets. Input Parameters: Both simple random walk and our MTO- sampler are parameter-less algorithms with one exception: They both need a convergence indicator to determine when 10 https://plus.google.com/ 11 The found be can its Python wrapper source code of https://github.com/pct/python-googleplusapi. After April 20, 2012, social graph api will be fully retired. at this uvuvuvuvuvuvwuvwuvwuvuvSSSSuvSSN*uvuvv'uvv'Option (a)uvv'uvv'Option (b)vursvursOverlay graph G*Original graph GC1C2uvSSC1C2ABABCABCDuvuvuvuvuvuvwuvwuvwuvuvSSSSuvSSN*uvuvv'uvv'Option (a)uvv'uvv'Option (b)vursvursOverlay graph G*Original graph GC1C2uvSSC1C2ABABCABCDDuv Z = (14) the random walk has reached (or become sufficiently close to) the stationary distribution - so a sample can be retrieved from it. In the experiments, we used the Geweke indicator [9], one of the most popularly used methods in the literature, which we briefly explain as follows. Given a sequence of nodes retrieved by a random walk, the Geweke method determines whether the random walk reaches the stationary distribution after a burn-in of k steps by first constructing two “windows” of nodes: Window A is formed by the first 10% nodes retrieved by the random walk after the k-step burn-in period, and Window B formed by the last 50%. One can see that, if the random walk indeed converges to the stationary distribution after burn-in, then the two windows should be statistically indistinguishable. This is exactly how the Geweke indicator tests convergence. In particular, consider any attribute θ that can be retrieved for each node in the network (a commonly used one is degree that applies to every (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) , (cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ¯θA − ¯θB graph). Let (cid:113) θ + SB SA θ where ¯θA and ¯θB are means of θ for all nodes in Windows A and B , respectively, and SA θ and SB θ are their corresponding variances. One can see that Z → 0 when the random walk converges to the stationary distribution. Thus, the Geweke indicator confirms convergence if Z falls below a threshold. In the experiments, we set the threshold to be Z ≤ 0.1 by default, while also performing tests with the threshold ranging from 0.01 to 1. Performance Measures for Sampling: As mentioned in Section II-B, a sampling technique for online social net- p(v) = deg(v)/ (cid:80) works should be measured by query cost and bias - i.e., the distance between the (ideal) stationary distribution (i.e., v deg(v) for a simple random walk) and the actual probability distribution for each node to be sampled. To measure the query cost, we simply used the number of unique queries issued by the sampler. Bias, on the other hand, is more difficult to measure, as shown in the following discussions. For a small graph, we measured bias by running the sampler for an extremely long amount of time (long enough so that each node is sampled multiple times). We then estimated the sampling distribution by counting the number of times each node is retrieved, and compared this distribution with the ideal one to derive the bias. In particular, we measured bias as the KL-divergence between the two distributions, specifically DKL (P Psam ) + DKL (Psam P ), where P and Psam are the ideal distribution and the (measured) sampling distribution, respectively. For a larger graph, one may need a prohibitively large number of queries to sample each node multiple times. To measure bias in this case, we use the collected samples to estimate aggregate query answers over all nodes in the graph, and then compare the estimation with the ground truth. One can see that, a sampler with a smaller bias tends to produce an estimation with lower relative error. Specifically, for the local social networks, we used the average degree as the aggregate query (as only topological information is available for these networks). For the Google Social Graph experiment, we tested various aggregate queries including the average degree and the average length of user self-description. Finally, to verify the theoretical results derived in the paper, we also tested a theoretical measure: the mixing time of the graph. In particular, we continuously ran our MTO-Sampler until it hits each node at least once - so we could actually obtain the topology of the overlay graph (e.g., as in Fig 1). Then, we computed the mixing time of the overlay graph (from the Second-Largest Eigenvalue Modulus (SLEM) of its adjacency matrix12 , see [6]). We would like to caution that, while we used it to verify our theoretical results of MTO- Sampler never decreasing the conductance of a graph, this theoretically computed measure does not replace the above- described bias vs. query cost tests because it is often sensitive to a small number of “badly-connected” nodes (which may not cause significant bias for practical purposes). B. Performance Comparison Between Simple Random Walk and MTO-Sampler We started by comparing the performance of Simple Ran- dom Walk (SRW) and MTO-Sampler over real-world social networks using all three performance measures described above - KL-divergence, relative error vs. query cost, and theoretical mixing time. Local Datasets: We started by testing the relative error vs. query cost tradeoff of SRW, MTO, MHRW and RJ for estimating aggregate query answers. Since only topological information is available for local datasets, we used the average degree as the aggregate query. Fig 7 depicts the performance comparison for the three real-world social networks. Here each point represents the average of 20 runs of each algorithm, and the query cost (i.e., y-axis) represents the maximum query cost for a random walk to generate an estimation with relative error above a given value (i.e., x-axis). For random jump in the experiments, we set the probability of jumping as 0.5. One can see that, for all three datasets, our MTO-Sampler achieves a significant reduction of query cost compared with the SRW sampler, MHRW sampler and Random Jump sampler. We also tested the KL-divergence measured by performing an extremely long execution of SRW and MTO in Fig 8 - with each producing 20000 samples - to estimate the sampling probability for each node. The Geweke threshold was set to be 0.1 for the test. One can see that our MTO-Sampler not only requires fewer queries for generating each sample (i.e., converges to the stationary distribution faster), but also produces less bias than the SRW sampler. To further test the bias of samples generated by our MTO- Sampler, we also conducted the test while varying the Geweke threshold from 0.1 to 0.8 on the dataset Slashdot B. Fig 9 12 Typical theoretical mixing time of Simple Random Walk can be defined as Θ(1/ log(1/µ)), where µ is SLEM of transition matrix P . (a) Slashdot A (b) Slashdot B (c) Epinions Fig. 7. Bias vs. Query Cost tests for local datasets’ average degree. Fig. 8. Comparison between SRW and MTO on query cost and the Kullback–Leibler divergence measure defined in Section V-A.3 over all three datasets. Fig. 9. Varying Geweke Threshold to get different KL divergence on dataset Slashdot B. KL and QC stands for KL divergence and Query Cost respectively. Fig. 10. Comparison of theoretical mixing time on latent space graph model. MTO Both: Remove and replace edges. MTO RM: Only remove edges. MTO RP: Only replace edges. depicts the change of measured bias for SRW and MTO, respectively. One can see from the figure that our MTO- Sampler achieves smaller bias than SRW for all cases being tested. In addition, a smaller threshold leads to a smaller bias and larger query cost, as indicated by the definition of Geweke convergence monitor. Google Plus online social network: For Google Plus, we do not have the ground truth as the entire social network is too large (about 85.2 million users in Feb 201213 ) to be crawled. Thus, we performed the tests in two steps. First, we continuously ran each sampler until their Geweke convergence monitor indicated that it had reached its stationary distribution. We then used the final estimation as the presumptive ground truth which we refer to as the converged value. In the second step, we used the converged value to compute the relative error vs. query cost tradeoff as previously described. Fig 11(a) shows the estimated average degree when running SRW and MTO-Sampler random walk on Google Plus. It clearly shows that MTO-Sampler’s variance is smaller and converges faster than simpler random walk. Fig 11(b) and 11(c) illustrate the comparison between SRW and MTO of the relative error vs query cost of multiple attributes. We note that the self-description length is the number of characters in 13 Estimated by Paul Allen’s model, http://goo.gl/nZCzN users’ self-description. One can see that our MTO-Sampler significantly outperforms SRW. Synthetic Social Networks: Finally, we conducted further analysis of our MTO-Sampler, in particular the individual effects of edge removals (RM) and edge replacements (RP), using the synthetic latent space model described in Section V- A.2. Fig 10 depicts the results when the number of nodes in the graph varies from 50 to 100 (with the latent space model, we distributed these nodes in an area of [0, 4] × [0, 5], and set r = 0.7). We derived the theoretical mixing time from the second largest eigenvalue modulus of the transition matrix. Note that Fig 10 also includes the theoretical bound derived in Section 4.2. One can see from the figure that our final MTO-Sampler achieves better efficiency than the individual applications of edge removal and replacement. In addition, the theoretical model represents a conservation estimation that is outperformed by the real efficiency of MTO-Sampler - consistent with our results in Section 4.2. V I . R E LATED WORK Sampling from online social networks. Several papers [2], [13], [15] have considered sampling from general large graph, and [10], [12], [18] focus on sampling from online social networks. 0.10.120.140.160.180.2020004000600080001000012000Relative ErrorQuery Cost SRWMTOMHRWRJ0.10.120.140.160.180.20200040006000800010000Relative ErrorQuery Cost SRWMTOMHRWRJ0.10.150.20.250.30500100015002000250030003500Relative ErrorQuery Cost SRWMTOMHRWRJ0.10.20.30.40.50.60.70.8Geweke Threshold0.180.200.220.240.260.280.300.32Kullback-Leibler divergenceKL_SRWKL_MTOQC_SRWQC_MTO0100002000030000400005000060000Query Cost505560657075Number of Nodes50100150200250Mixing TimeOriginal GraphTheoretical BoundMTO_BothMTO_RMMTO_RP (a) Estimated Average Degree (b) Average Degree (c) Average Self-description Length Fig. 11. Google Plus online social network With global topology, [15] discussed sampling techniques like random node, random edge, random subgraph in large graphs. [11] introduced Albatross sampling which combines random jump and MHRW. [10] also demonstrated true uniform sampling method among the users’ id as “ground-truth”. Without global topology, [10], [15] compared sampling techniques such as Simple Random Walk, Metropolis-Hastings Random Walk and traditional Breadth First Search (BFS) and Depth First Search (DFS). Also [4], [10] considered many parallel random walks at the same time, and MTO-sampler can be applied to each parallel random walk straightforwardly, since it is an parameter-free and online algorithm. Moreover, to the best of our knowledge, random walk is still the most practical way to sampling from large graphs without global topology. Shorten the mixing time of random walks. [18] found that the mixing time of typical online social networks is much larger than anticipated, which validates our motivation to shorten the mixing time of random walk. [5] derived the fastest mixing random walk on a graph by convex optimization on second largest eigenvalue of the transition matrix, but it need the whole topology of the graph, and its high time complexity make it inapplicable in large graphs. Theoretical models of online social network. [22] compared latent space model with real social network data. [8] intro- duced hybrid graph model to incorporate the small world phe- nomenon. [20] also measured the difference between multiple synthetic graphs and real world social network graphs. V I I . CONC LU S ION S In this paper we have initiated a study of enabling faster random walk over an online social network (with a restrictive web interface) by “rewiring” the social network on-the-fly. We showed that the key for speeding up a random walk is to increase the conductance of the graph topology followed by the random walk. As such, we developed MTO-Sampler which provably increases the graph conductance by constructing an overlay topology on-the-fly through edge removals and replacements. We provided theoretical analysis and extensive experimental studies over real-world social networks to illus- trate the superiority of MTO-Sampler on achieving a smaller sampling bias while consuming a lower query cost. R E F ER ENC E S [1] Stanford large network dataset collection http://snap.stanford. edu/data/. [2] E. M. Airoldi. Sampling algorithms for pure network topologies. SIGKDD Explorations, 7:13–22, 2005. [3] N. Alon. Eigenvalues and expanders. Combinatorica, 6:83–96, 1986. 10.1007/BF02579166. [4] N. Alon, C. Avin, M. Koucky, G. Kozma, Z. Lotker, and M. R. Tuttle. Many random walks are faster than one. In SPAA, 2008. [5] S. Boyd, P. Diaconis, and L. Xiao. Fastest mixing markov chain on a graph. SIAM REVIEW, 46:667–689, 2003. [6] S. Boyd, A. Ghosh, and B. Prabhakar. Mixing times for random walks on geometric random graphs. SIAM ANALCO, 2005. [7] F. Chung. Random walks and local cuts in graphs. Linear Algebra and its Applications, 423(1):22–32, May 2007. [8] F. Chung and L. Lu. The small world phenomenon in hybrid power law graphs. In Complex Networks, (Eds. E. Ben-Naim et. al.), Springer- Verlag, pages 91–106. Springer, 2004. [9] J. Geweke. Evaluating the accuracy of sampling-based approaches to In IN BAYESIAN STATISTICS, the calculation of posterior moments. pages 169–193. University Press, 1992. [10] M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. Walking in facebook: A case study of unbiased sampling of osns. In INFOCOM, 2010. [11] L. Jin, Y. Chen, P. Hui, C. Ding, T. Wang, A. V. Vasilakos, B. Deng, and X. Li. Albatross sampling: robust and effective hybrid vertex sampling for social graphs. In MobiArch, 2011. [12] L. Katzir, E. Liberty, and O. Somekh. Estimating sizes of social networks via biased sampling. In WWW, 2011. [13] M. Kurant, M. Gjoka, C. T. Butts, and A. Markopoulou. Walking on a graph with a magnifying glass: stratified sampling via weighted random walks. In SIGMETRICS, 2011. [14] C.-H. Lee, X. Xu, and D. Y. Eun. Beyond random walk and metropolis- hastings samplers: Why you should not backtrack for unbiased graph sampling. In Sigmetrics, 2012. [15] J. Leskovec and C. Faloutsos. Sampling from large graphs. In SIGKDD, 2006. [16] J. Leskovec, K. Lang, A. Dasgupta, and M. Mahoney. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Mathematics, 6(1):29–123, 2009. [17] L. Lov ´asz. Random walks on graphs: A survey. Combinatorics, Paul Erdos is Eighty, 2(1):1–46, 1993. [18] A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In SIGCOMM, 2010. [19] M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In ISWC, 2003. [20] A. Sala, L. Cao, C. Wilson, R. Zablit, H. Zheng, and B. Zhao. Measurement-calibrated graph models for social network experiments. In WWW, 2010. [21] P. Sarkar, D. Chakrabarti, and A. W. Moore. Theoretical justification of popular link prediction heuristics. In COLT, 2010. 010002000300040005000510152025Query CostEstimated Average Degree SRWMTO0.10.150.20.250.30.350.40.450.50500100015002000250030003500400045005000Relative ErrorQuery Cost SRWMTO0.10.150.20.250.30.350.40.450.5300035004000450050005500Relative ErrorQuery Cost SRWMTO Fig. 13. When replacing euv with euw from a node v whose degree is larger than 3, it may decrease the conductance if both euv and ewv are cross-cutting edges. Fig. 12. An counter example of lemma 1 that edge euv must be a cross- cutting edge. [22] P. Sarkar and A. W. Moore. Dynamic social network analysis using latent space models. SIGKDD Explor. Newsl., 7:31–40, December 2005. [23] Z. Zhou, N. Zhang, Z. Gong, and G. Das. http://www.seas.gwu. edu/nzhang10/rewiring.pdf. V I I I . A P PEND IX (cid:24) N (u) ∩ N (v) (cid:25) Corollary 1. For all N (u), N (v), ku , kv which satisfy max{ku , kv }, + 1 ≤ 1 2 2 there always exists a graph G(V , E ) in which euv is cross- cutting. (15) Proof: Let n = N (u)∩N (v). We only need to construct a counter-example for each case that satisfies (15), but euv is a cross-cutting edge. Assume we have a graph like Fig 12, which shows the whole view of it. We let the number of common neighbors of node u and v be n. Assuming ku ≥ kv , from (cid:26) Ou = max{ku , kv } − n − 1 ≥ 1, (15) we get: if n is even (16) Ou = max{ku , kv } − n − 1 ≥ 2, if n is odd Here Ou = {ewu w ∈ N (u) − N (v) ∪ {v}}, which denotes the outer edges of u which is not linked to the node v and their common neighbors. We can carefully construct a graph like Fig 12: for each neighbor of node u and v , it only has 1-degree neighbors. So we need to prove that after assigning the degree for each node, euv will be a cross-cutting edge. If we simply let: kw (cid:29) max{ku , kv } ∀w ∈ {V − {u, v}} (17) and then we divide these nodes into two sets S and ¯S . Suppose n is even. In order to achieve the minimum in the (cid:26) n + 1, definition of conductance, there must exist the case such that we only need to decide whether node u is in S or in ¯S . if u ∈ S # Cross-Cutting Edges = (18) n + Ou , if u ∈ ¯S If Ou > 1, we can easily assert that euv is a cross-cutting edge. If Ou = 1, we can let a(S ) = a( ¯S ) when u ∈ S to minimize min{a(S ), a( ¯S )}. So euv is an cross-cutting (cid:26) n + 1, edge under this circumstance. Also, suppose n is odd. Similarly, we have if u ∈ S (19) # Cross-Cutting Edges = if u ∈ ¯S 2 (cid:99) + Ou , 2(cid:98) n Since Ou ≥ 2, in the same way we know that euv is a cross- cutting edge. Theorem 4. Given G(V , E ), ∀v ∈ V , if kv = 3, u, w ∈ N (v), then replacing edge euv with euw will not decrease the conductance, while it also has positive possibility to increase the conductance. Proof: First, no matter euv is a cross- cutting edge or not, replace it with euw should at least obtain the same conductance. If euv is not a cross-cutting edge, then obviously we are not going to decrease the conductance because a(S ) or a( ¯S ) will not change. If euv is a cross-cutting edge, we only need to prove that euw is also a cross-cutting edge. Let’s assume euw is not a cross-cutting edge, then we can infer that the evw is a cross-cutting edge. But v only has degree of 3, so it is obvious that letting u, v and w be the same side will achieve less conductance, which contradicts the definition of conductance. But if evw is a cross-cutting edge, and we replace euv with euw , then euw has the positive probability to become one more cross-cutting edge in this local view of u, v and w , which result in higher conductance. Corollary 2. For v ∈ V , if kv (cid:54)= 3, then there always exist a graph G(V , E ), ∀u, w ∈ N (v), such that replacing euv with euw will decrease the conductance or have no effect. Proof: If kv = 1, then we could not cut it to disconnect the graph. If kv = 2, we need to check some possible situations. If none of these edges linked to v are cross-cutting edges, then replacing would not has effect on the conductance. If either euv or ewv is a cross-cutting edge, then replace one of them with euw will not generate another cross-cutting edge; because now kv = 1, and it should belongs to one side of the separation, S or ¯S . So we only need to consider the situation when kv ≥ 4. See Fig 13. There exist the case when both euv and ewv are cross- cutting edges. Then replacing euv with ewv would decrease the number of cross-cutting edges from 2 to 1 locally, which may lead to dramatic decrease of the conductance of the graph. uvuvuvuvwuvwuvwuvuvSSSSuvSSN*uvuvv'uvv'Option (a)uvv'uvv'Option (b)C1C2uvSSC1C2ABABCDABCDuvuvSSuvSSwwvursvursOverlay graph G*Original graph GvursOverlay graph G*Original graph GvursuvwuvuvuvuvuvuvwuvwuvwABvursvursuvuvSSSSuvSS (kw − 2) u + n(i) n(o) v + 1 > 1 u + n(o) n(i) v + 1 > 2 − 1 2 Fig. 14. N ∗ is the set we have accessed before and whose nodes are of degree 2 and 3. We do not know the blue nodes’ degree. following inequality would hold: (cid:32) (max{ku , kv }) 1 2N ∗ − (cid:88) 2 − 1 2 w∈N ∗ (cid:32) (max{ku , kv }) 2N ∗ − (cid:88) w∈N ∗ Without losing generality, assume the first one holds, then we are going to prove that by rearrange the set N ∗ ∪ {u} we can achieve a lower conductance and thus lead to the contradiction. Imagine that if we try to drag the whole set of N ∗∪{u} from S to ¯S , then we need to “rearrange” all the edges linked to the The uniqueness of kv = 3 is that there would not exist the set: those cross-cutting edges linked to the set but outside N ∗ case when both euv and ewv are cross-cutting edges. will be “fliped”, i.e. from cross-cutting edges to non-cross- (cid:25) (cid:24) N (u) ∩ N (v) − N ∗ (cid:88) cutting edges and vice versa; those cross-cutting edges linked Theorem 5. Given G(V , E ), ∀u, v ∈ V , if euv ∈ E and to the set but inside N ∗ will be eliminated, otherwise there will be two cross-cutting edges linked to the node in N ∗ , which is max{ku , kv }, (4−kw ) > 1 1 impossible because ∀w ∈ N ∗ , 2 ≤ kw ≤ 3. 2 2 2 Let ON ∗∪{u} = {evw ∈ E v ∈ (N ∗ ∪ {u}), w /∈ (N ∗ ∪ w∈N ∗ (cid:88) (20) {u})}, then we can assert that euv is not a cross-cutting edge. Here we denote N ∗ = {w ∈ N (u) ∩ N (v) kw is known , 2 ≤ kw ≤ kw − 2N ∗ . ON ∗∪{u} = max{ku , kv } + 3}. Proof: Noticed that if we do not know any degree (cid:109) (cid:108) n−N ∗ w∈N ∗ And we know that the minimum number of cross-cutting edges + 1 + N ∗ . So as we can manipulate will be at least (cid:24) n − N ∗ (cid:25) 2 the result of one line calculation of (20), ON ∗∪{u} . + 1 + N ∗ > 1 (22) 2 2 Therefore moving the set N ∗ ∪ {u} from S to ¯S will always results in a lower conductance. +1+ information about the common neighbors of u and v , then N ∗ = ∅, and theorem VIII is exactly the same as theorem 3. We are going to prove this theorem by contradiction, which means if we assume euv is a cross-cutting edge, then we can find another configuration of S and ¯S such that euv is not a cross-cutting edge but obtain less conductance. Again, let n = N (u) ∩ N (v), according to the assumption the number of common neighbors of u and v is n, then there must be n+ 1 cross-cutting edges in this local view of the graph, see Fig 14. Given a node w ∈ N (u) ∩ N (v), and according to some historical information we can achieve its degree kw without paying any query cost. So obviously, if kw ≥ 4 then it makes no sense to consider the rearrangement of it because dragging w from S to ¯S would probably increase the number of cross- cutting edges without knowing the edge information outside this local view of the graph. Therefore, we only need to consider N ∗ , which is the set of all the nodes belongs to common neighbors of degree 2 and 3. if we denote that the number of cross-cutting edges linked to u within N ∗ ∪{u} is n(i) u , the number of cross-cutting edges linked to u outside N ∗ ∪{u} is n(o) u , and similarly we have n(i) v and n(o) v + n(o) u + n(i) u + n(o) v . So we have n(i) v = n. According to the condition described in Proposition VIII, either of the (cid:33) (cid:33) (kw − 2) (21) Theorem 6. Given a latent space graph model G(V,E), assume α = +∞, then the expected number of edges we can (cid:19)1/D(cid:33)(cid:33) (cid:32) (cid:32) (cid:18) 1 removed 1 − E[R] ≥ E · P d < V (r) 3 (23) (24) Moreover, if we assume the dimension D = 2, and nodes are uniformly distributed in a rectangle [0, a] × [0, b], then for the graph G∗ (after removing edges from G) is: 1 − (cid:82)(cid:82) E[Φ(G∗ )] ≥ Φ(G) 2 ≤0.75r2 fa (z1 )fb (z2 )dz1 z2 z2 1 +z2 where z1 and z2 are independent uniform random variable supported on [0, a] and [0, b]. (cid:18) (cid:19)D ≤ N (i) ∩ N (j ) Proof: According to [21], we have 1 − dij N (i) ∪ N (j ) . 2r V (r) is the volume of a D dimensional hypersphere of radius r. Therefore, if we have small enough dij , than we can confirm that we can remove the edge eij . Conservatively, from theorem V (r) (25) uvuvuvuvuvuvwuvwuvwABvursvursuvuvSSSSuvSSN* 3 we can reasonably assert that if N (i) ∩ N (j ) ≥ N (i) ∪ (cid:19)1/D(cid:33) (cid:32) (cid:18) 1 N (j ) − 2, then the edge eij can be safely removed. So when (1 − dij ≤ 2r 1 − V (r) 2 N (i) ∪ N (j ) ) = d0 , (26) the edge eij can be removed. Now, we have transformed the probability of removing an edge to the probability of two node’s distance is within a threshold. Since N (i)∪N (j ) ≥ 3, so (23) holds. Given more assumptions of dimension and the distribution of nodes, the probability of two nodes’ euclidean distance (cid:90) (cid:90) smaller than the threshold is: P(d ≤ d0 ) = (27) fa (z1 )fb (z2 )dz1 z2 . 2 ≤d2 1 +z2 z2 0 Also, since N (u) ∩ N (v) ≥ 3, the change of conductance can be calculated as E[Φ(G∗ )] = (28) (29) . (30) σ(S ) a(S ) − P(d ≤ d0 )a(S ) 1 1 − P(d ≤ d0 ) Φ(G) 1 − (cid:82)(cid:82) Φ(G) 2 ≤0.75r2 fa (z1 )fb (z2 )dz1 z2 1 +z2 z2 = ≥
1903.06232
2
1903
2019-06-07T04:20:29
Profile Closeness in Complex Networks
[ "cs.SI", "cs.DM", "physics.soc-ph" ]
We introduce a new centrality measure, known as profile closeness, for complex networks. This network attribute originates from the graph-theoretic analysis of consensus problems. We also demonstrate its relevance in inferring the evolution of network communities. Keywords: Complex networks, Centrality, Community, Median, Closeness, Consensus theory
cs.SI
cs
Profile Closeness in Complex Networks 1st Divya Sindhu Lekha Dept. Computer Applications Cochin Univ. of Sci. & Tech. 2nd Sruthi K S Dept. Computer Applications Cochin Univ. of Sci. & Tech. 3rd Kannan Balakrishnan Dept. Computer Applications Cochin Univ. of Sci. & Tech. 4th Sreekumar A Dept. Computer Applications Cochin Univ. of Sci. & Tech. Kochi, India Kochi, India Kochi, India Kochi, India [email protected] [email protected] [email protected] [email protected] 9 1 0 2 n u J 7 ] I S . s c [ 2 v 2 3 2 6 0 . 3 0 9 1 : v i X r a Abstract -- We introduce a new centrality measure, known as profile closeness, for complex networks. This network attribute originates from the graph-theoretic analysis of consensus prob- lems. We also demonstrate its relevance in inferring the evolution of network communities. Index Terms -- Complex networks, Centrality, Community, Me- dian, Closeness, Consensus theory When a governing body plans to install a public utility centre in a locality, they investigate the availability of suit- able locations and find an optimum place that addresses the demands of the population. In this case, the total distance from this optimum location to the entire locality should be as small as possible. This situation is an adequate instance of the facility location problem known as the median problem. Given a graph G = (V, E), a median vertex is the one which minimizes the total distance to all other vertices. Here, the distance between two vertices is given by the length of the shortest path between them. For a vertex v ∈ V , the total distance of v is defined as the sum of the distances from v to all other vertices. (cid:88) u∈V d(v) = d(u, v) The vertices with minimum total distance are known as the median vertices of G. Median set M (G) is the set of all median vertices of G. M (G) = {vd(v) = min v∈V {d(v)}}. In a realistic world, the customer demand at every location may not be uniform. It can vary. An adequate notion to capture this variation in customer preferences is to construct a customer profile for the network. Locations which are preferred by more than one customer may be considered more than once. A profile is thus, a multiset of vertices in which a vertex can occur zero or more times. Definition 0.1: A profile π on G is a finite sequence π = (x1, x2, . . . , xk) of vertices of G. Note that a vertex may occur more than once as an element in π. Therefore, π is a multiset. Now, the median problem will be more generalized to compute the median in a graph with respect to a given profile. Given a profile π in graph G, the total distance of a vertex v ∈ V (G) is dπ(v) = d(u, v). (cid:88) u∈π {dπ(v)}}. Now, we can define the median of G with respect to π as follows: M (π) = {vdπ(v) = min v∈V Definition 0.2: The median of G with respect to π is A prominent work that deals with the generalized median problem is by Bandelt and Berthelemy (1984) [1]. They char- acterized the medians of arbitrary profiles in median graphs. Mulder (1997) [18] applied the majority strategy to find the median set for all profiles in a median graph. Following Mulder, Balakrishnan et.al [2], [3] applied other consensus strategies like plurality, hill climbing, and steepest ascent hill climbing for the computation of median sets of profiles in arbitrary graphs. In 2015, Changat et al. [6] devised algorithms for computing the median of profiles in hypercube-embeddable graphs known as (cid:96)1-graphs. Now, let us again analyze the above three scenarios in the context of the median problem. • The location of the median point in a network is highly critical. Once a threat reaches the median location, it needs only very less time to spread through the entire network. Therefore, finding the location of the median point in a network is a problem of prime interest here. • The median nodes in a network need fewer steps to communicate with others. • Median nodes can act as crucial start nodes for quaran- tine. The closeness centrality cC, introduced by Freeman [8], is a related centrality measure. The nodes with higher closeness centrality are the median nodes when the profile under con- sideration is the entire network. Based on these observations, we propose a new centrality measure, known as profile closeness centrality. In the next section, we give the details of the construction of the new measure. I. COMPUTING PROFILE CLOSENESS Consider a large network N with n nodes and m links. Since n is very large, we modify the definition of the profile. It is no more defined as a multiset. To improve the convenience, we define the profile as a weighted subset of nodes. π = {(u, r(u))} where u is an arbitrary vertex of N and r(u) is the rank of u in π based on its priority. N may contain disconnected components. When two nodes are unconnected, the distance between them becomes infinity. We avoid such pairs in our computation. Given a node v, the total distance of v with respect to π is (cid:88) d(u, v) × r(u) Dπ(v) = u∈π,u(cid:54)=v Note that we consider a distance d(u, v) only when it is not ∞. Now, we define the profile closeness cπ(v) as the normal- ized inverse of Dπ(v). cπ(v) = n Dπ(v) . As in the case of a normal closeness centrality, nodes with higher cπ values are the ones with better access to profile nodes. The median of the network, Mπ(N ), is the set of nodes with maximum profile closeness. Mπ(N ) = {vcπ(v) = cmax } π where cmax π = max v∈V cπ(v). A. Choosing rank function Degree (δ) of a node refers to the number of edges incident on it. A high-degree node has a direct influence on a larger part of the network (See Opsahl et al. [20]). Therefore, it is a potentially important decision-maker in the consensus problem. Such nodes should be given a higher priority. We can do this by assigning r(u) → δ(u). However, the choice of the rank function depends on the problem being discussed. An excellent candidate for the rank function in problems involving spreading dynamics, such as information (rumour) dissemination or epidemic outbreak, is the node influence. An example of this can be the epidemic impact discussed in [21]. B. Choosing a profile The relevance of a profile depends on the proportion of high- rank nodes included in it. If π consists of prominent nodes (say, hubs) from different disconnected components in N, then it follows that, cπ effectively captures the relative closeness of a node to the key nodes in N. A high cπ(v) indicates that v can act as a critical access point to the vital areas of the network. There are several ways to identify a set of vital nodes in a network. Refer [15] for a state-of-art review of vital node identification. Detecting a set of vital nodes can help adopt budget- constrained methods to enhance the security of a network. But, this does not hold true when the identified set itself is very large. In such a case, we need to find the minimum number of nodes which have easy access to this set. This can be evaluated using the profile closeness. The set of vital nodes can be denoted as the profile π, the nodes ranked based on their vitality, cπ computed, and nodes with higher cπ values identified. Let k be the maximum number of nodes that can be secured within the given budget. Then, k nodes with highest possible cπ values are the efficient candidates that ought to be protected. II. CLOSENESS AND PROFILE CLOSENESS As discussed in the introduction, the profile closeness of a node v measures its closeness centrality when the profile is the entire node set and rank of the nodes is unity. i.e. cπ(v) = cC(v) when π = V (N ) × {1}. In 1979, Freeman [8] introduced the concept of centraliza- tion of a graph or network to compare the relative importance of its nodes. Centralization is also a way to compare different graphs based on their respective centrality scores. In order to find the centralization scores, we need to determine the maximum possible value of centrality (c∗ π) and the deviation of the centrality of different nodes (cπ(v)) from c∗ π. The centralization index Ccπ is the ratio of this deviation to the maximum possible value for a graph containing the same number of nodes. Freeman [8] showed that the closeness centrality attains the maximum score if and only if the graph is a star. This was proven later by Everett et al. [7]. Also, the minimum value is attained when the graph is complete or a cycle. The profile closeness cπ attains the maximum value when π is the entire set of the graph vertices. In this case, cπ(v) = cC(v) for any node v. Therefore, the centralization of the profile closeness coincides with the closeness centrality. However, we need to compare the performance of cC and cπ with respect to the intended applications of cπ. As cC is a global measure whereas cπ is highly localized to the profile π, the comparisons need to be done locally as well. So, two comparisons need to be done - one with the global closeness centrality cC, and the other with a local closeness measure known as cluster closeness, ccluster. Note that the only difference here is that ccluster does not have the priority ranking of group members, which is an essential feature of cπ. We generate some random scale-free networks and identify their clusters. Subsequently, we calculate the global closeness cC for each node. We calculate the ccluster of a node as its closeness to its parent cluster. In addition, we construct a profile with these clusters. Here, the rank of a node v, r(v), is δcluster(v)(the number of neighbors of v within the cluster). Thus, if a node has a large number of connections within its cluster, then it is considered as having higher priority in the profile. We compute cπ with these profiles and compare them with cC and ccluster over all the generated networks. For comparing these measures, we use the correlation between them. Simulating correlation We performed simulations on random scale-free networks with 50, 100, 500, and 1000 nodes and average degrees 2, 5, and 7. The results of the correlation are shown in tables I and II. The values in each cell are the average correlation between the measures. The range of correlation (maxmin) is shown below each value in brackets. 50 0.516 0.522 0.480 2 5 7 1000 0.833 0.857 0.872 100 0.617 0.628 0.617 500 0.782 0.805 0.817 [0.864-0.124] [0.879-0.272] [0.944-0.605] [0.935-0.658] [0.793-0.128] [0.816-0.247] [0.900-0.684] [0.924-0.710] [0.732-0.054] [0.803-0.312] [0.900-0.660] [0.930-0.692] TABLE I: Correlation between closeness and profile closeness Table I shows the correlation between the closeness central- ity and profile closeness for the generated random networks. Both are positively correlated, and the relationship is fairly good enough. An important point here is that the closeness centrality in large networks is highly correlated with its profile closeness. This seems interesting because the computation of profile closeness is less data-consuming when compared to the computation of closeness centrality. Assume that both measures give the same ranking of nodes in a large network N. Then, we can use the low-computational profile closeness for the closeness ranking of nodes in N. However, more investigations need to be done in this regard. We need to simulate the experiment on very large networks in order to ensure this capability of profile closeness. [1.0-0.595] [0.997-0.734] [0.999-0.049] [0.999-0.923] 2 5 7 50 0.953 0.947 0.957 [0.999-0.514] [0.999-0.748] 100 0.960 0.948 [1.0-0.653] 0.949 [1.0-0.537] 500 0.962 0.965 0.953 [0.999-0.646] [0.999-0.752] [0.999-0.595] 0.968 [1.0-0.706] 1000 0.980 0.970 TABLE II: Correlation between cluster closeness and profile closeness Table II shows the correlation between cluster closeness and profile closeness for the generated random networks. We observed that the average correlations are high, which indicates a strong relationship between ccluster and cπ. An- other interesting observation is that the average correlation increases steadily with network size for sparse as well as dense networks. III. APPLICATION: COMMUNITY CLOSENESS When the profile under consideration is a community, we call it a community profile. The relative importance of commu- nity members differ with their influence on other community members and the network as a whole. Some of the related works in this regard are discussed below. Guimer´a and Amaral (2005) [13] studied the pattern of intra-community connections in metabolic networks. They analyzed the degrees of nodes within the community (within- module degree) to understand if it is centralized or decentral- ized. A community is centralized if its members have different within-module degrees. Wang et al. (2011) [23] proposed two kinds of important nodes in communities: community cores and bridges. Commu- nity cores are the most central nodes within the community whereas bridges act as connectors between communities. Han et al. (2004) [14] has also given a similar characterization of nodes important in a community as party hubs and date hubs where party hubs are like community cores and date hubs are like bridges. Gupta et al. (2016) [12] proposed a community-based centrality known as Comm Centrality to find the influential nodes in a network. The computation of this centrality does not require the entire global information about the network, but only the intra and inter-community links of a node. The above works indicate that the communities, especially the relative importance of their members, influence the overall behavior of the network considerably. A community profile captures the relative importance of the community members. Here, all the nodes are not considered homogenous and we prioritize nodes like community cores and bridges. The application of a community profile is two-fold. • The community cores and bridges are prioritized in all the communities in a profile. Then, the profile closeness determines the accessibility of these vital nodes from ev- ery nook and corner of the network. This first application, the details of which are outside the scope of this work, provides a means to measure the global accessibility of the network. • The community profile is constructed from a single community; with priority given to vital members. Then, the profile closeness predicts the new nodes who may join the community and members who may be on the verge of leaving the community. This second application, which will be discussed in detail in the next section, is associated with the local accessibility to a community. A. Construction of community profile The first step in constructing a community profile is the identification of communities in the network. Once we have detected the communities, we need to rank the members in each community. The ranking is based on the intra-modular degree (δcomm). We can also use other relevant community- based measures like Comm centrality ( [12]) for ranking. r(v) denotes the rank of a node v. Now, we define the community profile π as π = {(v, r(v))} The construction of a community profile is devised in algo- rithm 1, Gen π. Algorithm 1 Gen π: Constructing community profile Require: Community comm = (Vcomm, Ecomm) Ensure: π 1: for v ∈ Vcomm do 2: 3: 4: end for 5: return π π ← π(cid:83){(v, δcomm(v))} δcomm(v) = N eighborcomm(v) B. Computing community closeness Algorithm 2 computes the community closeness of the entire network ccπ[.] du[.] ← SSSP (N, u) for (v, r(v)) ∈ π do Algorithm 2 CC: Finding community closeness Require: Network N, profile π Ensure: cπ[.] 1: for u ∈ V (N ) do 2: 3: Dπ(u) = 0 4: 5: 6: 7: 8: 9: 10: end for 11: return cπ[.] end if end for cπ[u] ← n if (u (cid:54)= v and du[v] (cid:54)= ∞) then Dπ(u) = Dπ(u) + [du[v] × r(v)] Dπ[u] C. Predicting community members Given a node u and profile π in N, algorithm 2 correctly computes the closeness of the node to the community corre- sponding to π. A community is stable when every node in a community has comparable closeness values. In other words, the community is unstable when the intra-community close- ness of its nodes show drastic variations. Nodes with higher values are likely to continue in the community, whereas those with very low values may leave the community in the future. We conducted experiments on networks with first-hand infor- mation on their ground-truth communities. Empirical evidence shows that the above observation is true. Another interesting observation was that the nodes that exhibit more closeness towards an external community tend to join that community in future. Thus, profile closeness is an adequate indicator of how communities evolve in a network. The efficiency of this prediction depends on the design of the community profile. D. Empirical evidence - Networks with ground-truth commu- nities Research on community detection has been very active for the past two decades. Many community detection techniques were devised. The Girvan-Newman method of community de- tection [9], based on edge betweenness, was a novel approach. Later, the same team came up with the modularity concept, a qualitative attribute of a community. See [10]. Modularity is defined as the difference between the fraction of the edges in a community and the expected fraction in a random network. Girvan and Newman observed that, for a robust community, this attribute falls between 0.3 and 0.7. Therefore, modularity optimization can lead to better community detection. However, this is an NP-complete problem [4]. Different approximation techniques based on modularity optimization produce com- munity structures of high quality, that too with very low time requirements of the order of network size. A very recent survey by Zhao et al. [25] gives a clear picture of the state-of-art in this regard. In this study, we used the Louvain method [5] of modularity optimization for detecting communities. It is an agglomerative technique with each node initially assigned as a unique com- munity. The algorithm works in multiple passes until the best partitions are achieved. Each pass consists of two phases; in phase 1 the nodes are moved to the neighboring community if it can achieve a higher gain in modularity and in phase 2 a new network is created from the communities detected in pass 1. First, we simulated our results using two real-world net- works in which the community structure is evident. The networks are Zachary's karate club network [24] and the American college football network [9]. See table III. Network Karate Club College Football Dolphin Nodes Edges Communities 34 115 62 78 613 159 2 12 2 Density 0.2781 0.0935164 0.0840825 TABLE III: Networks with ground-truth communities 1) Zachary's karate club network: We conducted our pri- mary survey on the famous karate club network data collected and studied by Zachary [24] in 1977. In his study, Zachary closely observed the internal conflicts in a 34-member group (a university-based karate club) over a period of 3 years. The conflicts led to a fission of the club into two groups. See table IV. He modeled the fission process as a network. The nodes of the network represented the club members and edges represented their interactions outside the club. Zachary predicted this fission with greater than 97% accuracy and argues that his observations are applicable to any bounded social groups. Many researchers used this network as a primary testbed for their studies on community formation in complex networks. Community I II 1 11 10 27 2 12 15 28 3 13 16 29 Member nodes 6 4 18 14 23 19 30 32 5 17 21 31 7 20 24 33 8 22 25 34 9 26 TABLE IV: Ground-truth communities in Karate network We identified 4 communites in the network (using the Louvain method). See table V. Comm. I II III 1 5 9 34 24 2 6 10 3 7 15 4 11 16 12 Member nodes 8 13 17 19 21 23 14 27 18 30 20 31 22 33 25 IV TABLE V: Communities detected in Karate network 26 32 28 29 We used the intra-module degree (δcommunity) of nodes for constructing the profile. The nodes in the profile were prior- itized based on their δcommunity value. Nodes having higher Fig. 1: Community closeness in Karate club network. Fig. 2: Profile closeness of external nodes to community I. value were given higher priority. Subsequently, the profile closeness was computed for each community member. See figure 1. Different colors represent the members of different communities. The relative size of the nodes represent their profile closeness with respect to their own community. The profile closeness of node 9 in its community (ccCommunityIII (9)) is very low. From this, we can interpret that 9 has a higher tendency to leave its community. Also, we compared the profile closeness of all nodes with respect to community I (ccCommunityI ). See figure 2. Nodes external to Community I are colored blue. Among them, Node 9 has a higher value for ccCommunityI . This high value of ccCommunityI (9) and the low value of ccCommunityIII (9) indicates that 9 has more affinity towards Community I than its own community, Community III. This observation is relevant since node 9 originally belonged to Community I as noted by Zachary. Furthermore, Zachary had even observed that member 9 is a weak supporter of the second faction (II); but joined the first faction (I) after the fission. Our method also reproduced the same fact. 2) American college football network: The second network chosen for our study was the American college football network, from the dataset collected by Newman [9]. The nodes in this network represent the college football teams in the U.S. and the edges represent the games between them in the year 2000. About 8-12 teams were grouped into a conference. Altogether 12 conferences were identified. Most of the matches were between the teams belonging to the same conference. Therefore, the inherent community structure in this network corresponds to these conferences. These ground- truth communities are given in table VI. In the community detection step, we identified ten commu- nities (See table VII). Four among them (I, V II, IX and X) correspond to the ground-truth communities (AtlanticCoast, Pac 10, Big 10 and Big 12 respectively.) Community V III is a combination of two actual communities, Mountain West and Sun Belt. We then examined the profile closeness of all the nodes to community II. See figure 4. We observed that Central Florida has a greater closeness to II. This conforms to the ground truth that Central Florida team played with teams like Connecticut in many matches. 3) Dolphins network: Another chosen network with the ground-truth community is the dolphins network, which is from the dataset collected by Lusseau et al., in the University of Otago- Marine Mammal Research Group [16] (2003). Lusseau along with Newman [17] (2004) used this data to study social networks of bottlenose dolphins. In their study, they observed fission in the network to two groups with one individual (SN100) temporarily leaving the place. These communities are shown in table VIII. We detected 5 communities. See figure 5. The communities are shown in table IX. We checked the closeness to com- munity V . See figure 6. It is clearly visible that DN63 and Knit are having higher chances of grouping with community V . This conforms to the observation made by Lusseau and 2345678910111213141718202226282930313233124252715161921233423456789101112131417182022262829303132331242527151619212334 TABLE VI: US Football Network: Ground truth communities Conference Atlantic Coast IA Independents Mid American Big East Conference USA SEC W. Athletic Sun Belt Pac 10 Mountain West Big 10 Big 12 Fig. 3: Community closeness in American college football network. College teams Flora. St. Georg. Tech Clemson Cent. Flora Notre Dame Akron Kent Ohio Ball St. E. Michigan Virg. Tech Syracuse Miami Flora Alabama Birm. Memphis Tulane T. Christ. Vanderbilt S. Caro. Arkansas Missis. St. Louis. Tech S. Method. T. El Paso Boise St. Louis. Monroe N. Texas New Mex. St. Nev. Las Vegas Oreg. St. Stanford Ariz. Oregon Brigh. Y. Wyoming Illin. Iowa Ohio St. Indiana Oklah. st. Colorado Missouri Texas A & M N. Caro. St. Duke Maryland Connecticut Utah St. Bowl. Green St. Miami Ohio N. Illin. C. Michigan Virginia N. Caro. Wake Forest Navy Buffalo Marshall W. Michigan Toledo Boston Coll. Pittsburg Rutgers E. Caro. Houston Cincinnati Florida Georgia Auburn Louis. St. Fresno St. Nevada Tulsa W. Virg. Temple S. Missis. Louisville Army Kentucky Tennessee Alabama Missis. Rice San Jose St. Hawaii Louis. Lafay. Arkansas St. Mid. Tenn. St. Idaho S. Calif. Calif. Washing. New Mex. Utah Air Force Nwestern Penn St. Wisconsin Minnesota Texas Kansas Nebraska Oklahoma UCLA Ariz. St. Washing. St. San Diego St. Colorado St. Mich. St. Mich. Purdue Baylor Iowa St. Texas Tech Kansas St. Newman. IV. SUMMARY We proposed the concept of profile closeness centrality which is adequate for solving consensus problems in complex networks. A profile is a set of nodes with assigned priorities (rank). Some of the salient features of profile closeness are the following. • The rank assigned to a profile node depends on the extent of the influence that it has on the network. For example, high degree nodes, which directly influence a large part of the network, are ranked high. • Choice of the rank function depends on domain of the network. • It is suitable for budget-constrained network problems. • It closely correlates with the global closeness centrality for large networks. Therefore, profile closeness offers a Fig. 4: Profile closeness of external nodes to community II. BrighamYoungFloraStateIowaKansasStateNewMexicoTexasTechPennStateSouthernCaliforniaArizonaStateSanDiegoStateBaylorNorthTexasNorthernIllinoisNorthwesternWesternMichiganWisconsinWyomingAuburnAkronVirginiaTechAlabamaUCLAArizonaUtahArkansasStateNorthCarolinaStateBallStateFloraBoiseStateBostonCollegeWestVirginiaBowlingGreenStateMichiganVirginiaBuffaloSyracuseCentralFloraGeorgiaTechCentralMichiganPurdueColoradoColoradoStateConnecticutEasternMichiganEastCarolinaDukeFresnoStateOhioStateHoustonRiceIdahoWashingtonKansasSouthernMethodistKentPittsburghKentuckyLouisvilleLouisianaTechLouisianaMonroeMinnesotaMiamiOhioVanderbiltMdleTennesseeStateIllinoisMississippiStateMemphisNevadaOregonNewMexicoStateSouthCarolinaOhioIowaStateSanJoseStateNebraskaSouthernMississippiTennesseeStanfordWashingtonStateTempleNavyTexasA&MNotreDameTexasElPasoOklahomaToledoTulaneMississippiTulsaNorthCarolinaUtahStateArmyCincinnatiAirForceRutgersGeorgiaLouisianaStateLouisianaLafayetteTexasMarshallMichiganStateMiamiFloraMissouriClemsonNevadaLasVegasWakeForestIndianaOklahomaStateOregonStateMarylandTexasChristianCaliforniaAlabamaBirminghamArkansasHawaiiBrighamYoungFloraStateIowaKansasStateNewMexicoTexasTechPennStateSouthernCaliforniaArizonaStateSanDiegoStateBaylorNorthTexasNorthernIllinoisNorthwesternWesternMichiganWisconsinWyomingAuburnAkronVirginiaTechAlabamaUCLAArizonaUtahArkansasStateNorthCarolinaStateBallStateFloraBoiseStateBostonCollegeWestVirginiaBowlingGreenStateMichiganVirginiaBuffaloSyracuseCentralFloraGeorgiaTechCentralMichiganPurdueColoradoColoradoStateConnecticutEasternMichiganEastCarolinaDukeFresnoStateOhioStateHoustonRiceIdahoWashingtonKansasSouthernMethodistKentPittsburghKentuckyLouisvilleLouisianaTechLouisianaMonroeMinnesotaMiamiOhioVanderbiltMdleTennesseeStateIllinoisMississippiStateMemphisNevadaOregonNewMexicoStateSouthCarolinaOhioIowaStateSanJoseStateNebraskaSouthernMississippiTennesseeStanfordWashingtonStateTempleNavyTexasA&MNotreDameTexasElPasoOklahomaToledoTulaneMississippiTulsaNorthCarolinaUtahStateArmyCincinnatiAirForceRutgersGeorgiaLouisianaStateLouisianaLafayetteTexasMarshallMichiganStateMiamiFloraMissouriClemsonNevadaLasVegasWakeForestIndianaOklahomaStateOregonStateMarylandTexasChristianCaliforniaAlabamaBirminghamArkansasHawaii Community Member teams I II III IV V VI VII VIII IX X Flora St. Georg. Tech Clemson Connecticut Bowl. Green St. Miami Ohio N. Illin. C. Mich. Virg. Tech Syracuse Miami Flora Notre Dame Alabama Birm. Memphis Tulane Vanderbilt S. Caro. Arkansas Missis. St. Louis. Monroe Louis. Tech Rice San Jose St. Hawaii Oregon St. Stanford Arizona Oregon Brigham Y. Wyoming N Las Vegas N. Texas Utah St. Illinois Iowa Ohio St. Indiana Oklah. st. Colorado Missouri Texas A & M N. Caro. St. Duke Maryland Toledo Buffalo Marshall W. Mich. E. Mich. Boston Coll. Pittsburg Rutgers Mid. Tennes. St. E. Caro. Houston Cincinnati Flora Georgia Auburn Louis. St. C. Flora S. Method. T. El Paso Fresno St. S. Calif. Calif. Washing. New Mex. Utah Air Force Arkansas St. Idaho Nwestern Penn St. Wisconsin Minnesota Texas Kansas Nebraska Oklahoma Virginia N. Caro. Wake Forest Akron Kent Ohio Ball St. W. Virg. Temple Navy S. Missis. Louisville Army Kentucky Tennessee Alabama Missis. Louis.Lafay. Nevada Tulsa T. Christ. UCLA Arizona St. Washing. St. San Diego St. Colorado St. Boise St. New Mex. St. Fig. 5: Community closeness in Dolphins network. Mich. St. Michigan Purdue Baylor Iowa St. Texas Tech Kansas St. TABLE VII: US Football Network: Detected communities Member dolphins Group I II Beak Fish Hook MN83 Shmuddel SN89 Topless TSN83 Beescratch Gallatin Notch TR82 Web Bumper Five Jonah Oscar SMN5 SN9 TR120 Vau DN16 Jet Number1 TR88 Zig CCL Fork Kringel Patchback SN100 SN96 TR77 Whitetip DN21 Knit Quasi TR99 Cross Grin MN105 PL SN4 Stripes Trigger Zap DN63 MN23 Ripplefluke Upbang Double Haecksel MN60 Scabs SN63 Thumper TSN103 Zipfel Feather Mus SN90 Wave TABLE VIII: Ground-truth groups in dolphin network Fig. 6: Community closeness in Dolphins network. BeakBeescratchBumperCCLCrossDN16DN21DN63DoubleFeatherFishFiveForkGallatinGrinHaeckselHookJetJonahKnitKringelMN105MN23MN60MN83MusNotchNumber1OscarPatchbackPLQuasiRippleflukeScabsShmuddelSMN5SN100SN4SN63SN89SN9SN90SN96StripesThumperToplessTR120TR77TR82TR88TR99TriggerTSN103TSN83UpbangVauWaveWebWhitetipZapZigZipfelBeakBeescratchBumperCCLCrossDN16DN21DN63DoubleFeatherFishFiveForkGallatinGrinHaeckselHookJetJonahKnitKringelMN105MN23MN60MN83MusNotchNumber1OscarPatchbackPLQuasiRippleflukeScabsShmuddelSMN5SN100SN4SN63SN89SN9SN90SN96StripesThumperToplessTR120TR77TR82TR88TR99TriggerTSN103TSN83UpbangVauWaveWebWhitetipZapZigZipfel Group I II III IV V Bumper SN96 Double Member dolphins Beak PL CCL Zap Cross MN60 Trigger Fork Five MN83 Vau Grin SN4 TR120 TR99 DN16 MN23 Ripplefluke Web Shmuddel Thumper Zipfel Beescratch Jet Quasi Wave Fish TR77 Oscar Haecksel Patchback Hook SN63 TSN103 TR88 DN21 Mus SN90 Zig Knit SN100 Jonah SMN5 DN63 SN89 MN105 Topless Kringel Scabs SN9 Stripes TSN83 Whitetip Feather Notch TR82 Gallatin Number1 Upbang TABLE IX: Communities detected in dolphin network low computational complexity approximation of close- ness ranking. • It can aid in predicting community evolution. The most noteworthy finding of this work is that the relative importance of the community members plays a key role in at- tracting new nodes or repelling existing nodes. However, more investigations are needed to develop alternative techniques to assign member priorities. FUNDING This work was supported by the National Post-doctoral Fellowship (N-PDF) No. PDF/2016/002872 from the Science and Engineering Research Board (SERB), Department of Science and Technology (DST), Government of India. ACKNOWLEDGMENTS The authors are grateful to Prof. Animesh Mukherjee (IIT Kharagpur) for providing valuable comments on the work. REFERENCES [11] M. Granovetter, "Threshold Models of Collective Behavior," The Amer- ican J. Sociology, Vol. 83, 1978, pp. 1420 -- 1443. [12] N. Gupta, A. Singh, H. Cherifi, "Centrality measures for networks with community structure," Physica A, 452, 2016, pp. 46 -- 59. [13] R. Guimer´a, L. A. N. Amaral, "Functional cartography of complex metabolic networks," Nature, Volume 433, 2005, pp. 895 -- 900. [14] J. D. J. Han, N. Bertin, T. Hao, D. S. Goldberg, G. F. Berriz, L. V. Zhang, D. Dupuy, A. J. M. Walhout, M. E. Cusick, F. P. Roth, M. Vidal, "Evidence for dynamically organized modularity in the yeast proteinprotein interaction network," Nature, 430, 2004, pp. 88 -- 93. [15] L. Lu, D. Chen, X. Ren, Q. Zhang, Y. Zhang, T. Zhou, "Vital nodes identification in complex networks," Physics Reports, Volume 650, 2016, pp. 1 -- 63. [16] D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, S. M. Dawson, "The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations - Can geographic isolation explain this unique trait?," Behavioral Ecology and Sociobiology 54, 2003, pp. 396 -- 405. [17] D. Lusseau, M. E. J. Newman, "Identifying the role that animals play in their social networks," Proceedings. Biological sciences vol. 271 Suppl 6, 2004, pp. S477 -- S481. [18] H. M. Mulder, "Majority strategy on graphs," Discrete Appl. Math. 80, 1997, pp. 97 -- 105. [19] F. Morone, H. A. Makse, "Influence maximization in complex networks through optimal percolation," Nature 65, Vol 524, 2015, pp. 65 -- 68. [20] T. Opsahl, F. Agneessens, J. Skvoretz, "Node centrality in weighted networks: Generalizing degree and shortest paths," Social Networks, Volume 32, Issue 3, 2010, pp. 245 -- 251. [21] M. Siki´c, A. Lanci´c, N. Antulov-Fantulin, H. Stefanci´c,"Epidemic cen- trality is there an underestimated epidemic impact of network peripheral nodes?," Eur. Phys. J. B 86:440, 2013, 13 pages. [22] M. Takaffoli, R. Rabbany, O. R. Zaıane, "Community evolution predic- tion in dynamic social networks," 2014 IEEE/ACM International Confer- ence on Advances in Social Networks Analysis and Mining (ASONAM 2014), Beijing, 2014, pp. 9 -- 16. [23] Y. Wang, Z. Di, Y. Fan, "Identifying and Characterizing Nodes Important to Community Structure Using the Spectrum of the Graph," PLoS ONE, 6(11), e27418, 2011. [24] W. W. Zachary, "An Information Flow Model for Conflict and Fission in Small Groups," J. Anthropological Research, 33, 4, 1977, pp. 452 -- 473. [25] Z. Zhao, S. Zheng, C. Li, J. Sun, L. Chang, F. Chiclana, "A compar- ative study on community detection methods in complex networks," J. Intelligent & Fuzzy Systems, vol. 35, no. 1, 2018, pp. 1077 -- 1086. [1] H. J. Bandelt, J. P. Barth´elemy, "Medians in median graphs," Disc. Appl. Math. 8, 1984, pp. 131 -- 142. [2] K. Balakrishnan, M., Changat, H. M. Mulder, "Median computation in graphs using consensus strategies," (No. EI 2007-34). Report / Econo- metric Institute, Erasmus University Rotterdam, 2007. [3] K. Balakrishnan, M., Changat, H. M. Mulder, "Plurality strategy in graphs," Australesian. J. Combin. 46, 2010, pp. 191 -- 202. [4] U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hoefer, Z. Nikoloski, D. Wagner, "On Modularity Clustering," IEEE Transactions on Knowl- edge and Data Engineering, vol. 20, no. 2, pp. 172-188, Feb. 2008. [5] V. D. Blondel, J-L. Guillaume, R. Lambiotte, E. Lefebvre, "Fast unfolding of communities in large networks," J. Statistical Mechanics: Theory and Experiment (10), P10008, 12 pages, 2008. [6] M. Changat, D. S. Lekha, A. R. Subhamathi, "Algorithms for the remoteness function, and the median and antimedian sets in (cid:96)1-graphs," International Journal of Computing Science and Mathematics; 6(5), 2015, pp. 480 -- 491. [7] M. G. Everett, P. Sinclair, P. Dankelmann, "Some centrality results new and old," J. Math. Sociol., Volume 28, 2004, pp. 215 -- 227. [8] L. Freeman, "Centrality in Social Networks," Social Networks, 1, 1978, pp. 215 -- 239. [9] M. Girvan, M. E. J. Newman, "Community structure in social and biological networks," Proc. Natl. Acad. Sci. USA 99, 2002, pp. 7821 -- 7826. [10] M. Girvan, M. E. J. Newman, "Finding and evaluating community structure in networks," Phys. Rev. E 69, 026113, 16 pages 2004.